|Rights and Responsibilities of Participants in Networked Communities|
source ref: ebooknet.html
The extent of electronic vandalism and other computer- related crime is unknown. Annual losses in the United States due to computer crime have been estimated at $2 million to $730 million, but these figures are suspect; several studies have estimated that only 1 percent of all computer crime is detected, and the Federal Bureau of Investigation (FBI) estimates that of crimes that are detected, only 14 percent are reported. In any case, it is clear that security on electronic networks is a growing concern.  Antivirus programs have become almost ubiquitous, and, as Eberhard Wunderlich of AT&T noted at the November workshop, there is a trend toward moving beyond user passwords to smart cards for access control, encryption, and electronic signatures. In the first half of 1994, concerns for security on the Internet were prompted by a rash of penetration attempts, many of which were successful. 
But technology cannot guarantee absolute security. Forum participants indicated, for instance, that a system operator may have difficulty detecting a fraudulent (i.e., stolen) user identification, particularly one forged by an expert. As Mitchell D. Kapor, co-founder and chair of the Electronic Frontier Foundation, said, "There's always some tiny fraction of the elite that is, in fact, technically capable of inflicting huge amounts of damage . . . ."
For those cases in which damage does occur, some remedy may be found in the law, though even this remedy is subject to the caveat that its efficacy depends on the reality of enforcement. If a district attorney refuses to prosecute or the civil courts take too long to handle a lawsuit, the determination of trespass or theft becomes an academic discussion.
SCENARIO 1: VIRUS DAMAGES BULLETIN BOARD
A computer club at a local high school sets up a dial-in bulletin board, using equipment bought for the club by a banker whose son is club president. The bulletin board is set up at the club president's home, and it can exchange messages with other bulletin boards across North America. The banker also has a computer system for working at home that is tied directly into the club's computer; the banker's computer is used to write a public newsletter for his bank. The telephone number of the bulletin board is distributed through a national magazine, and over time, the following activities are taking place on the bulletin board, although no club members are involved in any of these activities:
Issue: Criminal Liability
Club members have no criminal liability for failing to monitor the activities in this scenario, said Scott Charney, chief of the Computer Crime Unit at the Justice Department. If a potential criminal case involving a computer warranted an investigation, both the law and sensible policy would dictate use of the least intrusive means, such as a subpoena, to obtain information, he said. However, the answers to several questions might alter this response. The first question is how prosecutors learned of the problem; the club members themselves might have reported it, for example, thereby inviting an investigation.
The second and more complicated question involves intent. "Suppose, for example, that the people running this board knew about the illegal access codes and were actually fostering it and encouraging it," Charney said. "That doesn't mean the [bulletin board] is any less valid, but those running it may not be innocent third parties anymore. And how do you investigate that and get the evidence you need without infringing on the newsletter, which is protected under the First Amendment to the Constitution?"
If they pursued the virus case in Scenario 1, federal prosecutors would not seize equipment or search the bank computers, because neither the bulletin board nor the bank is involved in criminal activity, Charney said. In fact, it is not clear whether there is any criminal case at all; if the bulletin board is open to the public, then Joe, even as a nonmember, has access authority and hence no criminal liability, because the statute under which criminal liability is imposed requires unauthorized access.
Issue: Deficiencies in the Laws
Mark Rasch, an attorney with the firm Arent, Fox, Kintner, Plotkin, and Kahn, said Joe's inappropriate behavior has two elements: possible unauthorized access to the bulletin board and uploading the computer virus. Since Joe is arguably an "authorized" user (anyone could be an "authorized" user of a public bulletin board system, and 18 U.S.C. Section 1030 simply prohibits unauthorized access), Joe might well escape any liability at all. As for the uploading of the computer virus, "Prosecutors must prove Joe's intent. Why did he do it? The way the federal law is structured right now, if Joe accesses with authorization, even with intent to destroy and damage all the information in that computer, the computer crime statute says he is not guilty of a crime, because it is his initial access [that the law focuses on]." 
Rasch suggested that legislators based the law on an imperfect analogy-an office break-in, where no matter what intruders do in the office, they are guilty at minimum of trespassing. Although the analogy falls short, Rasch said lawmakers have relied on such analogies because of the lack of common experience in the environment of electronic networks. "When we see crimes in society, we can relate to them as criminal acts because we have a common experience about what is a crime and what is not a crime," he said. "And when we deal in cyberspace and we deal in the electronic environment, we don't have those experiences. We don't have those common human judgments. We don't have that ethical standard to fall back on. So then we end up . . . trying to draw analogies."
Kent Alexander, now U.S. attorney for the Northern District of Georgia, said Joe has extensive criminal and civil liability but that prosecuting him would be a challenge. Alexander said the Computer Fraud and Abuse Act of 1986 seldom applies in real cases, adding that prosecutors often depend on broader laws such as the wire fraud statute (18 U.S.C. Section 1343), which applies if a telephone is used in a scheme to defraud. Alexander and Rasch both said a federal destruction-of-property statute is needed.
That prospect prompted some caution. For example, Marc Rotenberg and Michael Godwin argued that although it was appropriate to criminalize undesirable behavior such as destruction of property and computer trespass, it was unnecessary to specify what the instrumentality of such behavior was. Godwin said the law generally approaches computers as if they were "inherently dangerous" in ways that other general-purpose tools, such as hammers, are not; he argued that this legal approach infringes on freedom of speech and that computer use should not be overregulated in this manner. Still, Alexander insisted that some computer- related laws are needed, because "cyberspace is . . . what we are going to live in." Rasch said, "The reason we need specific computer crime statutes is because analogies don't actually work perfectly," although he cautioned that it would be preferable to target a potential miscreant's overall strategy rather than a precise mechanism, because a vandal might be able to "engineer around" a defined mechanism.
Litigation specialist Thomas Guidoboni, of the firm Bonner and O'Connell, agreed with other speakers that the Computer Fraud and Abuse Act is flawed. He argued that victims should be able to recover damages through the civil system but that criminalizing and jailing hackers does not benefit victims, other than by serving as a deterrent. (The statute specifies punishment consisting of a fine and/or imprisonment.) He contended that, although the Congress prohibited computer trespassing, it did not address worse wrongs (such as the malicious destruction of computer files): "They need to be educated . . . . [T]hey don't really know what to prohibit."
Charney said the federal law should specify the type(s) of prohibited network intrusion. He noted that the Justice Department has asked the Congress to amend the Computer Fraud and Abuse Act because the ethics of computer usage have evolved and users' roles have changed since 1986. "It's better to say, 'Look, if you upload a virus, even if you are authorized [to access the computer] . . . intending to damage, without authority, other people's material, that's going to be criminal.' That way, everybody has plenty of notice and you've got a statute that directly applies to the conduct." Such a statute should not criminalize legitimate work with viruses, such as in the research community, he added.
Godwin noted that federal law doesn't require that intent to damage be established, and he suggested it is bad policy for criminal laws to ignore intent. He said criminal statutes generally, and rightly, focus on the intent or mental state of the defendant, because "we try to criminalize people for setting out to do bad things, not for unwittingly doing bad things." Joe's potential criminal liability for putting out a virus that disrupts network service or that damages a "federal interest" computer may not reflect the proper balance between civil and criminal sanctions, Godwin suggested, because the law now "makes no distinction between someone who accidentally causes damage and perhaps a terrorist who deliberately causes damage to vital systems." Rasch countered by arguing that even if the statute itself makes no such distinction, it is possible to make distinctions in other ways, such as in sentencing; he cited the sentence in the Morris case as an example (Box 5.1), arguing that Morris was not imprisoned because the damage he caused was accidental.
Godwin noted that Morris had authorized access to the computer from which he launched the virus. Guidoboni, who defended Morris, had argued unsuccessfully that his client, as a member of the Internet community, had authorized access to all computers on the system. Guidoboni pointed out at the forum that "authorization" and "access" can be difficult to define for the Internet. Guidoboni also warned against attempting to curb computer vandalism through "foolish" censorship, noting that the government refused to release the "cure" for the Morris virus, for fear of hackers obtaining it. "So of course a lot of you people on the Internet couldn't fix what was wrong, because our government didn't want to give you the code to fix it . . . . [It was their effort to] prevent a perceived wrong that probably did more harm in the end."
Issue: Civil Obligations and Liabilities
Civil liabilities arise from the general principle in common law that a person who has been wronged by another person is entitled to compensation for that wrong from that other person. Charney suggested that Joe might have considerable civil liability if the damage he caused was extensive. Alexander said a civil case against Joe probably would not hold up, assuming there were no federal agents or state police involved, because hackers usually are judgment- proof. (Hackers are usually judgment-proof because they are typically young people who have no assets to seize.) Conversely, although the father in Scenario 1 has not committed a criminal act, he probably will be sued because he and his bank are the only parties with any money, Guidoboni observed. Whether there is a valid case is doubtful, he added. Godwin noted that civil liability depends little, if at all, on the intentions of a defendant.
Godwin argued that "to a large extent, many of the issues regarding liability are not criminal law issues at all. We have a large body of civil law devoted to negligence obligations, obligations to be nonnegligent in maintaining other kinds of spaces, be it your yard or your business." He contended that, ultimately, individuals who maintain forums will have some duties of care that arise from civil obligations. He cautioned, however, that because an on-line bulletin board is a forum for speech, whatever civil obligations are imposed on a system operator must be consistent with the First Amendment.  He further contended that distribution of virus codes or information, and general discussion of viruses, are protected by the First Amendment. "It's always very troubling to discover that someone's teenaged son or daughter has access to a potentially damaging bit of computer code," he said. "But one of the choices that we have made in living in a free society is to say we're going to allow people to be a source of a lot of risk. We're going to risk having people who have dangerous information."
SCENARIO 2: MULTISYSTEM INTRUDER DAMAGES FILES
Computer A is penetrated by an unauthorized user. The intruder uses Computer A to reach Computer B, where he causes extensive damage to files. The operator of Computer A monitors the keystrokes of the intruder, who eventually is caught. The intruder claims that the operator violated the wiretapping statute.  Computer A did not display a warning message regarding unauthorized access because its operators forgot to install such a message, while Computer B did not display a warning message on the premise that anyone accessing it from Computer A would be an authorized user.
Issue: Trespassing and Theft
Scenario 2 is principally a trespassing case, and it illustrates the need for computer crime statutes, Rasch said. Computer trespassing is abhorrent, he asserted, even if no damage is done, because it destroys trust in the system. The crime is different in character from a home or office break- in because the distrust lingers. "When you are a user, and you see somebody without authorization on your system, you don't know that he didn't do anything, and it can take you a very long time to come to the conclusion that he didn't do anything," Rasch said. "It would be like having a calculator that 1 out of every 100,000 times adds the numbers up incorrectly."
Rasch argued that although trespassing is a crime in itself, monetary damage also should be calculated, to adjust the level of the offense. At the same time, he raised the issue of whether stealing electronic information should be criminalized at all. "If I steal the files in your office, you know I've stolen them. If, on the other hand, I simply copy them, the law is not clear on whether I've stolen something. In a computer environment, I can steal all the information in your computer and you won't know it, and you'll still have all the information." 
Although the federal statute does not criminalize reckless or negligent actions, Rasch said negligence will become an increasingly common basis for civil litigation. As to whether reckless actions should be criminalized, he acknowledged that this approach would help prosecute wrongdoing and encourage users to be careful, but he noted that the problem of proving a defendant's mental state would persist. He dismissed claims that intent can be difficult to prove, saying, "A person is presumed to intend the natural and probable consequences of his actions, so generally you can prove intent."
Godwin argued that the phrase "stealing information" implies that information is property, when in fact an argument can be made that information should be assumed not to be property.  To become property and be subject to theft, information must meet certain tests, such as those imposed by copyright or trade secret laws, he said. He agreed with prosecutor Charney that privacy is the key issue in computer intrusion, just as it is in wiretapping. "I think it's appropriate sometimes to criminalize intrusion and the examination and even the copying of data as perhaps the violation of a privacy interest," Godwin said. "But treating it like a theft crime, I think, doesn't help the public consciousness of . . . the true nature of these crimes."
While he supported the use of incentives to curb user negligence, Godwin questioned whether criminal law is the right tool. Users already have incentives to secure their systems and refrain from distributing damaging software; whether these incentives are adequate is the question, he said.
Godwin argued that criminal behavior on electronic networks should not be defined until "we actually have a sense of what the social norms are. . . . Many of us just say it's obvious that intruding in a computer is like intruding in your home," he said. "Believe me, if it were that obvious, then many of the people who have done computer intrusions would never have done it, because these people have never walked [without permission] into other people's homes."
Issue: Determining Damage
Assuming the two computers are in different states (i.e., a federal interest computer was involved pursuant to 18 U.S.C. Section 1030(e)(2)), and the intruder is not authorized to access either Computer A or Computer B, the intruder could be prosecuted under the Computer Fraud and Abuse Act (Section 1030(a)(5)) if damage totaled $1,000 or more,  Charney said. The intruder might also face a misdemeanor charge under Sections 1030(a)(2) and 1030(a)(3) if he accessed, without authorization, certain specified computers (i.e., computers used by financial institutions, card issuers, consumer reporting agencies, or the federal government).
Charney stressed the difficulty of calculating damage, a necessary task in determining whether a federal crime has been committed and how severe the sentence would be. If all the files in Computer B were destroyed, for example, it is not clear how to calculate their value, he noted. Charney also pointed out that, ironically, if the operator of Computer B had complete backup files, any federal crime effectively would be erased. "Does that make sense? I don't think so," the prosecutor observed. Of course, the victim would most likely incur costs associated with restoring the backup, changing passwords, cleaning up the system, and so on, although the cost of the "ancillary" activities might well be significantly less than the cost of recreating the destroyed files from scratch.
He applauded a recent U.S. Sentencing Commission recommendation for new sentencing guidelines for computer crime that would focus not on economic damage, but rather on confidentiality, integrity, and availability of data.  That approach makes sense, Charney said, because in many computer offenses "the real problem is not money, it's privacy and trusted systems, and I think we need to address that."
Guidoboni agreed with Charney that damage calculations are a problem. For example, prosecutors in the Morris case claimed substantial amounts of economic damage that would have been dismissed as "speculative" in the average civil case, Guidoboni said.
Issue: Ethics and Education
Charney and Godwin agreed that computer users need ethics education.  Charney noted that the Justice and Education departments recently published a booklet for educators on the ethical use of information technologies. Many computer hackers are not trying to damage anything; they simply are young and do not know any better, he explained. In such cases, federal agents visit the intruders' homes and tell the parents, and the problem generally stops. "Look, there will always be some percentage of the population that has a criminal bent, and as they learn to use computers, they are going to do nasty things with them," Charney said. "But if you eliminate all these other cases that exist only because the people haven't been educated, then you can apply what limited resources you have left to the really serious cases."
Other forum participants offered conflicting perspectives on the ethical status of computer users. Lance Hoffman, professor of electrical engineering and computer science at George Washington University, felt he was "living in fantasyland, listening to some of this discussion." He suggested that the term "ethically educated computer user" might be an oxymoron, citing a class he taught in which 22 out of 23 students did not feel that stealing information was a crime. On the other hand, Rasch-as noted earlier- suggested that "stealing information" was not a crime.
Still other participants argued that many hackers have a sense of ethics, citing the Legion of Doom as an illustration. The Legion of Doom was a group of several dozen hackers who broke into telephone systems and computer networks. The group acquired widespread notoriety beginning in 1989, when federal agents raided the homes of three Atlanta members who had been trafficking in stolen access codes. One hacker had broken into a BellSouth computer and obtained an administrative document. The crackdown continued into 1990, with raids in Texas and elsewhere. 
John Perry Barlow said these hackers "were astonishingly ethical people in spite of the fact that they had been raised in an environment where they had literally been without adult supervision,  both in their homes and in their chosen environment (i.e., the electronic networking environment). They had developed a set of ethics as a natural result of being in an environment where law simply didn't apply." Argued Barlow, "If they didn't have ethics, you would not be able to place a phone call-ever-in this country. They are amazingly careful about what they do. And there is nobody who is in a very good position to stop them." Alexander, who prosecuted the BellSouth case,  agreed with Barlow about their technical capabilities, noting that "if they had wanted to shut down service in the entire Atlanta area or up and down the Eastern seaboard or the entire country, they could have."
More recently (mid-1994), public attention has been called to the ethics issue by the National Computer Ethics and Responsibilities Campaign, which aims to provide people with the tools and pointers they need to use information technology in responsible and ethical ways. Sponsored by several different organizations,  the campaign is undertaking a variety of activities intended to encourage serious, ongoing discussion of the issue, lend the subject credibility and impact, provide a strong rationale for commentators to focus on the issue, create a structure that gets information into the hands of people who need it, and raise public awareness. Its core message is that users of information technologies have responsibilities that are peculiar to the management, development, and use of those technologies. The campaign is not promoting any approach, "code of conduct," position, or recommendation other than the need to raise awareness of the positive and negative consequences of the analog-to-digital shift and of the fact that tools and resources exist to help people make intelligent, informed choices about how best to develop, manage, and use information technology whether it is in the home, corporation, or classroom.
Issue: Operator Responsibilities and Liabilities
System operators and network service providers have an obligation to provide security capabilities and procedures that discourage unauthorized access and/or damaging conduct. But users of these systems and services have obligations as well to use these capabilities and procedures. Guidoboni argued that system operators should assume some responsibility for security rather than depend on laws to compensate for bad management. In the Morris case, he noted, passwords had been left in files that were accessible to nearly anyone. In a similar vein, Alexander said failure to install adequate system security should neither be criminalized nor become a basis for blocking prosecution of intruders.  He argued that common sense and the free-market system will encourage adoption of safeguards. More recently, the Clinton administration's Information Infrastructure Task Force has suggested that "users of personal information must take reasonable steps to prevent the information they have from being disclosed or altered improperly. Such users should use appropriate managerial and technical controls to protect the confidentiality and integrity of personal information."  Such a principle argues that individuals have an active responsibility to protect information about themselves.
An important theme of the dialogue, noted by several participants, was the unusual degree of accord among the factions represented. For instance, a variety of speakers stressed the need for user ethics education. In addition, prosecutor Charney and civil liberties advocate Godwin agreed that privacy, more than theft or specific damage, is the key issue in computer trespassing. (This is not to say, however, that damage resulting from break-ins is unimportant. Indeed, even when there is no explicit damage, companies may incur substantial costs if they are forced to take a network out of service temporarily to check it out and patch security holes. In addition, a user's sense of operating in a trustworthy computing environment may be compromised.)
Perhaps most important, a consensus emerged that federal computer crime statutes- United States Code Annotated , Title 18, Section 1030-needs to be updated, although panel members differed as to how. This statute originated with the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (Public Law 98-473) and was amended by the Computer Fraud and Abuse Act of 1986 (Public Law 99-474). It provides criminal sanctions for individuals who intentionally access a computer without authorization or exceed authorized access; it does not address reckless or negligent access or intent to cause damage.
The law is difficult to apply in practice. Charney and others pointed out, for example, that insiders pose a significant threat to network security: "We're seeing a fairly dramatic increase in the number of insiders who plant viruses and other types of malicious codes because they're either disgruntled or they're on their way out the door . . . . " These cases are a challenge to prosecutors because the defendants had authorized access to the system. Charney said legislation has been proposed, although not passed, that would criminalize "unauthorized use" instead. Rotenberg also emphasized the threat from insiders, suggesting that the federal statute be revamped altogether to focus on actual harm and criminalizing "people who cause damage and people who intend to cause damage."
Others pointed out that the definition of "authorization" is problematic, especially in a networked environment designed to make it easy to share computing resources. As Rasch said, "We have a question of what is somebody's authorization on a network. . . . As a member of the Internet community, I can send electronic mail to anybody on the network. And I can access their computer, albeit for limited purposes.  Therefore, I have authority [under one definition of the word] to access every computer on the network. . . . Even worse, the problem is not just authorization, it's also exceeding authorization. So even if you are authorized to be on a system, if you exceed that authorization, you may be subject to criminal sanctions." David Hughes pointed out that "it's not just authorization on the Internet, but everything is getting connected to everything else. . . . It looks like we are hooking up every network possible to every network possible. . . . Furthermore, the information is moving, and you don't even know what systems it's going through and whether you have authorization to go through that system." In short, Hughes argued that basing criminality on whether a user has authorized access to a system can raise some perplexing questions.
David R. Johnson, a lawyer with Wilmer, Cutler, and Pickering, pointed out that the Computer Fraud and Abuse Act criminalized unauthorized access only because the Congress was concerned that criminalizing electronic destruction by users with authorized access could open up a new avenue for inappropriate prosecution of whistleblowers and others engaged in First Amendment-type activities.
Still, the concordance among the panel members was seen as a positive sign. Anne Wells Branscomb spoke for many when she observed that "the legal profession seems to have made a bridge now to the computer scientists and the user, [and the] managers of some of these systems. . . . [I]n the past I think they have been talking at cross-purposes, have lived in different worlds."
In summary, electronic vandalism can be characterized along at least two separate dimensions. The first involves the nature of the offense: electronic trespass, electronic invasion of privacy, and destruction or theft of electronic property. Electronic trespass can be captured by the idea that a trespasser is executing commands on a computer that he or she does not have authorization to use. Electronic invasion of privacy refers to the unauthorized examination of files in a computer. Electronic destruction of property refers to the unauthorized deletion or alteration of files in a computer.
The second dimension involves the intent or lack thereof on the part of the alleged perpetrator. With a few exceptions, the presence of intent is what determines the extent to which an alleged perpetrator can be prosecuted under criminal statutes; in the absence of intent, liability for harmful actions is generally restricted to civil liability.
Although expressed in terms relevant to computing, these notions are not new. What computing and networking primarily change is the difficulty of determining when a given offense has occurred. For example:
1. C.D. Chen, "Computer Crime and the Computer Fraud and Abuse Act of 1986," Computer Law Journal , Vol. X(1), pp. 71-86, Winter 1990.
2. A classic case of network penetration is that of the Hanover Hacker, recounted by Clifford Stoll in The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage , Doubleday, New York, 1989.
3. Peter H. Lewis, "Hackers on Internet Posing Security Risks, Experts Say," New York Times , July 21, 1994, p. A-1.
4. Note that Joe may still be liable to prosecution under the applicable state's criminal law, if any.
5. As defined in the Computer Fraud and Abuse Act of 1986, a federal interest computer is a computer used exclusively or part-time by the U.S. government or a financial institution, where the offense affects the government's operation of the computer. The term also applies if two or more computers, not all of which are located in the same state, are used in committing the offense.
6. As private parties, Prodigy, America OnLine, CompuServe, or GEnie are not subject to the First Amendment in the sense that they have the right to establish the rules that apply to the use of their services as a contractual matter and to refuse to provide service to those subscribers who do not adhere to such rules. On the other hand, actions that can be legally taken by a governmental entity must be consistent with the First Amendment; to the extent that such actions are required to enforce a contract, all parties to the contract are affected by the First Amendment.
7. The wiretap statute is United States Code Annotated , Title 18, Sections 2510-2521. To use wiretaps for collecting information about the content of communications, law enforcement officials must obtain a court order by demonstrating probable cause and necessity. However, a party to a communication can consent to its interception. Federal policy holds that system operators do not have a privileged status allowing them to monitor communications, and so federal agencies place notices on computer systems warning hackers that they are subject to monitoring, according to Patrick Lanthier, director of public policy and technology for Pacific Bell. Different policies may obtain under state law.
8. There is a long legal tradition of protecting intellectual property, which is itself a legal construction that vests in certain people property interests in the intangible (for example, the law grants authors copyright protection and companies trade secret protection). However, the boundaries that separate criminal versus civil liability for violating these laws are fuzzier than those for governing theft of tangible property.
9. The question of whether or not information should be or can be regarded as property is subject to considerable debate. What is undeniable is that certain types of information and perhaps certain pieces of information (i.e., specific instantiations of those types) are generally regarded by society at large as being more appropriately shared or appropriately private than other types (and perhaps pieces) of information. Put differently, agreement on the principles that differentiate these categories could not be expected to result if a group of randomly chosen "reasonable people" were asked to articulate such principles.
10. This level of damage is likely, assuming that estimates of average losses are accurate. The average loss due to computer crime has been estimated at $44,000 to $10 million (Chen, "Computer Crime and the Computer Fraud and Abuse Act of 1986," 1990).
11. Federal Register , December 31, 1992. As of May 1994, the recommendation (revised since 1992) had not been adopted.
12. The need for ethics education was underscored in the CSTB report Computers at Risk: Safe Computing in the Information Age (National Academy Press, Washington, D.C.), published in 1990.
13. G. Cartwright, "Clash of the Cyberpunks," Texas Monthly , Vol. 21, pp. 104-106, 112-116, January 1993.
14. This may be hyperbole. At least one former member of the Legion of Doom says his parents knew of his activities. Moreover, the ethics of these hackers were self-serving, and they were fully cognizant of the law. For example, members were instructed to avoid causing damage to files-not for altruistic reasons, but so that they could avoid getting caught.
15. United States v. Riggs aka The Prophet , 967 F.2d 561, 1992, U.S. App. LEXIS 17592 (11th Cir. 1992).
16. Sponsors of the campaign launch activities include the Atterbury Foundation, Boston Computer Society, Business Software Alliance, CompuServe, Computer Ethics Institute, Computer Professionals for Social Responsibility, Computing Technology Industry Association, Electronic Privacy Information Center, Merrill Lynch & Co. Inc., Monsanto, National Computer Security Association, Software Creations BBS, Software Publishers Association, Symantec Corporation, and Ziff-Davis Publishing Company. Affiliated organizations included EDUCOM, the Electronic Messaging Association, the IEEE Computer Society, the California Privacy Rights Clearinghouse, and others.
17. In some European countries, failure to install adequate security can nullify any criminal charges against an intruder; moreover, the system operator can be held liable, Charney noted.
18. See p. 3 in Principles for Providing and Using Personal Information and the accompanying commentary, distributed for comments by the Information Infrastructure Task Force Information Policy Committee Working Group on Privacy in the National Information Infrastructure on May 4, 1994. Initial reactions to this document suggest that this particular principle is the most controversial.
19. One technical nuance to this point is the fact that Internet e-mail delivery is handled by an independent "postal system" that is not under the direct control of a mail sender. Thus, "Bob's" sending an e-mail message to "Alice" does not give Bob even limited access to Alice's computer any more than Bob's sending a letter gives him access to Alice's postal box. Perhaps the real issue is not who has access (though that is the concern of the law), but rather what is legal to send through e-mail. (For example, what is the electronic equivalent of a mail bomb?) A second technical nuance is that Bob might use another capability provided by most Internet-connected computers, such as "finger," that would in fact require direct access to Alice's computer. (The "finger" command typically provides information about a user with an account on the target computer.)
20. The status of "low cost" as a relative descriptor must be emphasized. For example, restoring a large database from a backup could require considerable work, although the cost might still be much lower than the cost of reconstructing the database from scratch. Moreover, "restored" files often do not contain the most recent changes made to them (e.g., a file might be restored using the backup made yesterday, but such a backup would obviously not include changes made since yesterday). Even worse, the absence of recent changes might not be noted by the user. Finally, the backups themselves may not be entirely reliable, and so it may not be possible to restore the "backed-up" version of the file properly.