Path: gmdzi!unido!unidui!math.fu-berlin.de!ira.uka.de!sol.ctr.columbia.edu!
samsung!uunet!munnari.oz.au!goanna!minyos.xx.rmit.oz.au!otto!s900657
From: s900...@otto.bf.rmit.oz.au (Felicity Jones [Ice])
Newsgroups: comp.org.eff.talk
Subject: Article in the "Australian" newspaper (re-posted from comp.society)
Message-ID: <1991Jul12.142359.20447@minyos.xx.rmit.oz.au>
Date: 12 Jul 91 14:23:59 GMT
Sender: use...@minyos.xx.rmit.oz.au (Njuiz noveles nova newes)
Organization: Faculty of Business, RMIT, Melbourne, Australia
Lines: 201



Apologies if this post appears twice.  I posted it yesterday but it seems
to have disappeared.

The following is a copy of a post to comp.society, which in turn was
a copy of an article that appeared in the "Australian" newspaper last
Tuesday (the Computers & Technology feature).

I was dismayed and then outraged at the "facts" in this article, 
particularly what is said regarding Len Rose.

There are many other generalisations, assumptions and inferences
that seem to be calculated to inflame the kind of panicky, knee-jerk
reaction that resulted in Operation Sun be-Devilled in the US.

Something that I do NOT wish to see here in Australia.

Comments and the real facts regarding Len's case and especially,
some references to the many forums and experts who have studied
the "hacker" problem would be appreciated, as I wish to write to
the "Australian" and inform them (and hopefully their readers)
of the facts rather than the scare-mongering half-truths that seem
to form the main point of this article.

Input from the EFF would be particularly useful, especially some
statistics on the true causes of computer security problems
which I know from my own reading is more likely to come from
a trusted employee rather than the "nerds" referred to in this
article.

So far, Australia has managed to remain fairly rational regarding
the hacker "problem", even though we have had our share of "incidents"
most of which are well known to net.people but curiously, not
mentioned in Forester's diatribe.   


Here is the article:
**************************************



A colleague recently published this article in the computer section
of 'The Australian' newspaper last week.  He thought it might interest
the net, or promote discussion - something difficult to do in its original
newspaper form.

George Bray [posting for Tom Forester]



Opinion:  "Hackers: 'Clamp Down Now' " 

The Australian, 2 July 1991, page 34.


It's about time we got tough with hackers and exposed them for 
the irresponsible electronic vandals they really are. 

Jailing a few of these malicious meddlers would set an example to 
other would-be data thieves and help stem the tide of 
computerized anarchism which is threatening to engulf the IT 
industry.

Breaking into a computer is no different from breaking into your 
neighbour's house. It is burglary plain and simple - though often 
accompanied by malicious damage and theft of information.  
Sometimes - as in the case of stolen credit card numbers - it is 
followed by fraud. 

The essence of hacking is that it is about gaining unauthorized 
access to other peoples' systems. It is an activity which has not 
been sanctioned by or approved of by the system's owner, be they 
private or public. 

Hackers are often portrayed as 'brilliant' or glamourized in the 
media as 'whiz-kids,' but often they are only mediocre 
programmers. Most 'great' hacks have in fact involved very little 
in the way of intellectual ability - you don't have to be an 
expert to work an autodialler and Unix systems - a favourite 
target of the hacker - have notoriously poor security. 

Far from being budding computer geniuses, hackers are often so 
incompetent and clumsy that they frequently cause more 
unintentional damage than intentional damage when blundering 
around inside someone else's system.

Far from being heroes of the computer revolution, hackers are 
little more than common thieves. Their modus operandi involves 
stealing log-in names and passwords and then stealing information 
expensively collected by the victim.  

Some hackers have even become infamous by betraying their 
country. Members of the Chaos Computer Club of Hamburg, in then 
West Germany,were caught selling United States military secrets 
to the KGB - the charred body of one of their number, Karl Koch, 
was later found in a forest outside Hanover. 

Other hackers, such as the group that infiltrated six London 
banks in 1989, have swiftly turned to blackmail. Yet some 
misguided persons have sought to justify this despicable crime by 
claiming hackers are really only helping 'test system security.' 

A second justification of hacking is that hackers safeguard our 
civil liberties by keeping a check on the activities of 
governments. I know of no cases where revealing the contents of a 
state database has done good rather than harm. 

If hacking cannot be defended, then virus creation is wholly 
unforgivable.  Enormous time and effort has been spent in recent 
years making good the damage caused by the pranksters who gave us 
the 'Stoned,' 'Bouncing Ball,' 'Pakistani Brain' and 'Israeli' 
viruses, to name but a few. 

Such computer anarchists have caused mayhem in recent years in 
the US. The famous Internet worm let loose by Cornell University 
student Robert Morris in late 1988 infected no less than 6,000 
systems and cost thousands of dollars to contain.

Last year, the so-called 'Legion of Doom' managed to completely 
stuff up the 911 emergency phone system in nine US states, thus 
endangering human life. They were also later charged with trading 
in stolen credit card numbers, long-distance phone card numbers 
and information about how to break into computers. 

In another case, Leonard DeCicco was charged with stealing US $1 
million worth of security software from Digital Equipment 
Corporation. Leonard Rose Jr. was charged with selling illegal 
copies of a US $77,000 AT&T operating system. 

One group of phone hackers was charged with stealing more than US 
$1.6 million worth of free long-distance phone calls, while 
another group was caught manipulating voice-mail boxes and 008 
toll-free numbers to the tune of millions of dollars.  

Unfortunately, attempts by US authorities to nail these deliquent 
nerds have not always been successful. This is because the law is 
unclear, and police lack the expertise in dealing with the 
crimes.

For example, last year's Operation Sun Devil, which involved 
raids in 14 cities and the seizure of 42 systems and 23, 000 
disks, has yet to result in any major prosecutions. 

Robert Morris, who launched the disastrous Internet worm, got a 
mere slap on the wrist in the form of a US $10,000 fine and 400 
hours' community service         Only in Britain - where the 
Computer Misuse Act became law in 1990 - do the authorities seem 
to winning the war against hackers: 'mad' hacker Nicholas 
Whiteley was recently jailed for four months for a series of 
malicious attacks on university computers.  

To some extent hacking has attracted individuals who are not at 
ease socially - the classic "nerd," if you like. They may relate 
better to machines than other humans. 

One image of the hacker is of an adolescent male, who, for 
reasons of shyness or "spots" does not get on with girls. 

Instead, he tends to spend his time with the computer, rising at 
2pm, then working right through to 6am,, consuming mountains of 
delivered pizza and gallons of soft drink. 

Some suffer from what Danish doctors are now calling "computer 
psychosis" - an inability to distinguish between the real world 
and the world inside the screen. 

For the hacker, the machine becomes a substitute for human 
contact, because it responds in rational manner, uncomplicated by 
feelings and emotions. 

In some senses, one can't help but feel sorry for hackers, but by 
taking out their hang-ups on society they do enormous damage and 
we all end up paying for their anarchic antics.  

One day, these meddlers will hack into a vital military, utility 
or comms system and cause a human and social catastrophe. It's 
time we put a stop to their adolescent games right now.      

TOM FORESTER



*Tom Forester is co-author, with Perry Morrison, of Computer 
Ethics: Cautionary Tales and Ethical Dilemmas in Computing 
(Blackwell / Allen & Unwin, 1990,).

*******************************************

Once again, please post or mail information regarding the above
so that I can write to the newspaper and hopefully put some
perspective on the issue.

Thanks

Felicity


--
BIS Student, RMIT Melb, Aust.                    s900...@otto.bf.rmit.oz.au  
Co Sysop, The Guru Meditation Amiga BBS             i...@guru.pub.uu.oz.au
     **All Fred Fish from #60 online and all Ami Newsgroups carried**
       Ph (03) 375 3438 all speeds to 9600 running Waffle v1.64 

Path: gmdzi!unido!mcsun!uunet!elroy.jpl.nasa.gov!usc!snorkelwacker.mit.edu!
world!eff!mkapor
From: mka...@eff.org (Mitch Kapor)
Newsgroups: comp.org.eff.talk
Subject: Re: Article in the "Australian" newspaper (re-posted from comp.society)
Message-ID: <1991Jul14.163354.4559@eff.org>
Date: 14 Jul 91 16:33:54 GMT
References: <1991Jul12.142359.20447@minyos.xx.rmit.oz.au>
Organization: The Electronic Frontier Foundation
Lines: 4

We will try to send replies to Forester and the Australian newspaper.

Mitch Kapor
EFF