Computer Ethics, Summer 2010

Week 6, Thursday (class 16), June 29
Corboy Law Room 323


Patents
    NTP prior art
    Bilski
Hacking
    TJX, credit cards
    Legal tools
    Citrin case
    Felony prosecutions



Reading original patent descriptions

You can look them up online. Follow uspto.gov -> patents -> patft (uspto.gov/patft). Or go directly to the search-by-patent-number page:
      http://patft.uspto.gov/netahtml/PTO/srchnum.htm


NTP v RIM


uspto.gov -> patents -> patft (uspto.gov/patft) Search by patent number:
http://patft.uspto.gov/netahtml/PTO/srchnum.htm

Look at patents


5436960 One of Campana's earliest patents. It contains the acknowledgement of RF links in prior-art email, though

6317592 Electronic mail system with RF communications to mobile processors This is the "newest" patent. Claim 150 (really paragraph 150) was singled out as having been infringed. (It is reproduced below.) (6 of 9 NTP v RIM claims)

6198783 System for wireless serial transmission of encoded information Modulation techniques

6067451 Electronic mail system with RF communications to mobile processors. See the Appendix, under Background Art, for prior art. Note that in Figure 3, some of the underlying telecom infrastructure is shown ("closest LATA switches"). The first non-prior-art diagram is Figure 8 (page 9). (2 of 9 NTP v RIM claims)

Diagrams, and some text pages in .bmp format, are at http://cs.luc.edu/pld/ethics/campana.

6272190 System for wireless transmission and receiving of information and method of operation thereof

4644351: Zabarsky patent, possible prior art. Note that this is cited in the '592 patent. Paging is also cited there as prior art, in the paragraph beginning, "FIG. 2 illustrates a diagram of a prior art network"

A communications system for carrying messages via a radio channel between one central site of a plurality of central sites and a plurality of two-way remote data units is disclosed. Each central site has a radio coverage area and each remote unit has a unique address and association with one of the central sites. When a message addressed to one of the remote units is received in a central site, a file of remote unit addresses is searched to find the location and central site association of the remote unit to which the message is addressed. If an address match is found indicating that the remote transceiver is in the coverage area of the message-receiving central site, the addressed message is stored and transmitted in that site. If an address match is found indicating that the remote transceiver is in another central site, the addressed message is conveyed to that site for transmission.

This would seem to cover delivering text to specific end-users; eg paging.



Here are two primary claims. The "patentese" is unfortunate and confusing, but the core claim in both cases is using RF links to transmit email.

claim 248 of patent 6067 451

246. In a system comprising a communication system which transmits electronic mail containing information, with the electronic mail being inputted to the communication system from a plurality of processors, a RF system and an interface connecting the communication system to the RF system with the information contained in the electronic mail and an identification of a RF device in the RF system being transmitted from the interface to the RF system and broadcast by the RF system to an identified RF device, the identified RF device comprising:

a RF receiver, which receives the information when the identification of the device is detected in a broadcast by the RF system to the RF receiver; and

a memory, coupled to the RF receiver, which stores the information received by the RF receiver contained in the electronic mail inputted to the communication system.

247. The RF device in accordance with claim 246 further comprising:

a processor, coupled to the memory, which after the information has been outputted from the memory, processes the information.

248. The RF device in accordance with claim 247 further comprising:

at least one application program, executed by the processor, which processes the information.

Fig. 8 is the first non-prior-art figure. It is described under the "BEST MODE FOR CARRYING OUT THE INVENTION" heading.

Certainly Campana appears to be patenting the use of RF links in email.

claim 150 of patent 6317592

150. In a communication system comprising a wireless system which communication system transmits electronic mail inputted to the communication system from an originating device which executes electronic mail programming to originate the electronic mail, mobile processors which execute electronic mail programming to function as a destination of electronic mail, and a destination processor to which the electronic mail is transmitted from the originating device and after reception of the electronic mail by the destination processor, information contained in the electronic mail and an identification of a wireless device in the wireless system are transmitted by the wireless system to the wireless device and from the wireless device to one of the mobile processors, the wireless device and one mobile processor comprising:

a wireless receiver connected to the one mobile processor with the one mobile processor receiving the information contained in the electronic mail after the identification of the wireless device is detected by the wireless receiver in a broadcast by the wireless system.

Patent 5436960

FIG. 1 illustrates a block diagram of a typical electronic mail system 10 in commercial use such as by AT&T Corporation. The electronic mail system 10 is comprised of a plurality of single processors or groups of processors #1-#N with N being any number with each group having individual processors A-N with N being any number. The groups of processors #1-#N may be distributed at locations which are linked by the public switch telephone network 12. The individual processors may be portable personal computers with a modem which are linked to the public telephone switch network 12 through wired or RF communications as indicated by a dotted line. Groups of associated processors #1-#3 may have diverse configurations with the illustrated configurations only being representative of possible architectures of groups of associated processors. The groups of associated processors may be connected to a host or mainframe computer through various communication mechanisms such as direct telephone communications (#1), communications through a local area network (#2), or communications through a private automatic branch exchange (#3)...

This sure sounds to me like an acknowledgement that RF links by themselves are prior art.



Patent reexaminations (from http://en.wikipedia.org/wiki/NTP,_Inc.)

NTP has appealed most of the rejections to the Federal Circuit.

Final BPAI decisions for:

To look these up, start at http://portal.uspto.gov/external/portal/pair. Actual documents are under the "image file wrapper" tab. Don't forget "select new case" as appropriate!

In the '451 rejection, the patent examiner found that the "Perkins" prior art included all features of the NTP system, at least when the NTP system was "broadly construed". Also, NTP tried to argue that Perkins wasn't an "electronic mail system", by construing that term very narrowly.

See also page 114, regarding "obviousness". NTP made the following claims as to why their approach was an improvement:

  1. the RF receiver is detachable from the destination processor and operates to wirelessly receive the eimail messages while it is detached...
  2. the RF receiver includes its own memory to store the received email messages intended for the destination processor and does not require power from the destination processor to receive and store those messages.
  3. the RF receiver provides reception and reveiew of email messages without need of the destination processor for which the email messages are intended.
Alas for NTP, "none of NTP's claims [being appealed] requires an RF receiver which recieves email while it is detached...". In other words, NTP does not have a patent on the "detachability" feature they claimed was the central feature!

On page 125, the decision states,
Furthermore, satisfaction of a long-felt but unresolved need is not evidence of nonobviousness unelss it is shown that widespread efforts of skilled workers having knowledge of the prior art had failed to find a solution to the problem.

That is consistent with the idea that what RIM really brought to the table was not innovation, but the willingness to invest in the considerable infrastructure needed to support something that many office workers would find useful but would they find it useful enough?

Judge Spencer, of the DC trial, did claim

Furthermore, NTP offered irrefutable evidence of nonobviousness in the form of tremendous commercial success of the infringing Blackberry products, which indicated the satisfaction of 'long-felt' need."

But the BPAI doesn't buy the theory that meeting long-felt need is evidence of nonobviousness!




DataTreasury (datatreasury.com)

They have developed technology for storage of digital images of bank checks. They actually did develop the whole system, although again the inevitability issue arises here. They did not develop any of the actual root technology: scanners, or data security, or digital storage systems with enough capacity to hold images for negligible cost.

From their website:

The Corporation was founded in 1998 and was granted its first two Network architectural patents (5,910,988 and 6,032,137) in 1999 and 2000, respectively. The patents detail the important and revolutionary aspects of DataTreasury's systems for remote image capture, document imaging, centralized processing and electronic storage. Our innovations were particularly noted for enhanced security, fault tolerance and high reliability. These key elements form the underpinnings of DataTreasury's technology.

That said, it is clear that none of DataTreasury's ideas are revolutionary.

From politico.com/news/stories/0308/9202.html The company had benefited from a controversial 1998 court ruling that broadened the definition of a patent to include business processes.

The proposed (but never passed) patent-reform act of 2007 singled out this patent for congressional revocation.

It appears that DataTreasury is claiming a business-method patent on the use of electronic image scanning for check processing. They are looking for very significant licensing fees. Again, EVERY piece of the technology has been around from well before the patent (scanning, secure storage, ???)

The DataTreasury patent has been singled out by Congress for action, but it is not clear what will happen.



Patent reform:

Someone tried patenting a movie storyline a few years ago. This patent WAS rejected.


Patent Reform Act of 2007: H.R. 1908 and S. 1145 (did not pass)

Those in bold are the most significant.

did not pass (yet)  Here are some of the proposed changes in U.S. patent law

Discuss: first-to-file: who benefits? how are small inventors affected? How are prior-art rules affected?

publish applications.

This has again been introduced in 2009; apparently the issues are the damages calculation, post-issuance reexamination proceedings, and defining inequitable conduct. At least the last provision has been removed from the 2009 bill. A good-faith defense for believing a patent was invalid is also included. Also included is a definition of prior art to include anything "available to the public"; publication no longer would have to occur.

[Note that NTP argued that RIM's conduct was held to be inequitable simply because NTP had sent them a letter outlining its patent claims, and RIM had disagreed.]


KSR v Teleflex, April 30, 2007

Some good patent news

This Supreme Court case altered the legal standard for disproving "non-obviousness" in favor of defendants. It is now slightly easier to challenge patents on this basis.

Teleflex had a patent on a pedal coupled to an electronic throttle control (basically cruise control). The question was whether that was "obvious".

The proper question to have asked was whether a pedal designer of ordinary skill, facing the wide range of needs created by developments in the field of endeavor, would have seen a benefit to upgrading [a prior art patent] with a sensor

not thought of it by themselves, and not motivated to implement the change, but simply saw the benefit. The old "nonobviousness" standard often in effect required proving that a patent was "prior art". This test was known as the "teaching-suggestion-motivation" test. All three pieces had to be there. Another sentence from that decision:

[t]he combination of familiar elements according to known methods is likely to be obvious when it does no more than yield predictable results.

Does that cover my obvious-in-context approach? Does that suggest that not clicking the mouse is obvious?

Teaching-suggestion-motivation test: too narrow

Would this have helped RIM? Probably.


Bilski case

Federal Curcuit decision released October 30, 2008
Supreme Court decision released June 28, 2010 (decision here)

This was a very significant case, decided at the appellate level by an en bancsitting of the Federal Circuit. They proposed a "machine or transformation" test for patentability of abstract processes. The Supreme Court then heard the case, and while they did not uphold the "machine or transformation" test, they ruled that Bilski's invention was not patentable because it was too abstract. There had been widespread speculation that the Supreme Court would use the Bilski case to rein in business-method patents, or at least make the patentability rules a little clearer. They apparently did not do either.

Bilski patent: Claimed method of managing the risk of bad weather in commodities trading.

He submitted a patent application seeking exclusive rights to a method of using hedge contracts to reduce the risk that a commodity's wholesale price might change.

Again, the technique fails under both prior-art and obviousness standards. But those don't apply in the same way to business-method patents.

The patent was rejected by the Patent Board of Appeals. The Board, in rejecting the claim, asked the fedearl circuit court for assistance in determining patentability of non-technological method claims.

The federal circuit court did the following:

The court by its own action grants a hearing en banc. The parties are requested to file supplemental briefs that should address the following questions:

  1. (1) Whether claim 1 of the 08/833,892 patent application claims patent-eligible subject matter under 35 U.S.C. §101? (the patent-eligibility rules)
  2. (2) What standard should govern in determining whether a process is patent-eligible subject matter under section 101?
  3. (3) Whether the claimed subject matter is not patent-eligible because it constitutes an abstract idea or mental process; when does a claim that contains both mental and physical steps create patent-eligible subject matter?
  4. (4) Whether a method or process must result in a physical transformation of an article or be tied to a machine to be patent-eligible subject matter under section 101?
  5. (5) Whether it is appropriate to reconsider State Street Bank & Trust Co. v. Signature Financial Group, Inc., 149 F.3d 1368 (Fed. Cir. 1998), and AT&T Corp. v. Excel Communications, Inc., 172 F.3d 1352 (Fed. Cir. 1999), in this case and, if so, whether those cases should be overruled in any respect?

The appellate court did affirm the need for a physical transformation. Their central doctrine is "Machine or Transformation". This would have been a problem for business patents, and perhaps software patents.

Note that their reasoning was taken straight from the few SCOTUS cases on record.

The following question arises whenever a patent is applied for on an abstract process: 

[Is the patent] tailored narrowly enough to encompass only a particular application of a fundamental principle rather than to pre-empt the principle itself?

Benson: NO
Diehr: YES (one of the prior SCOTUS cases)
Bilski: NO

This part of the Federal Circuit's reasoning may still stand.

Part of the Benson ruling: Transformation and reduction of an article 'to a different state or thing' is THE clue to the patentability of a process claim that does not include particular machines.

The Diehr patent was for making rubber, using a computer to control the process. It wins the "different state or thing" standard hands down.

They also DISMISS the "useful, concrete, or tangible result" test: that is NOT enough to establish patentability.

They also reject the "technological arts" test (see above) that was once-upon-a-time part of the method-patent rules. They agree that it is too hard to tell whether something involves the technological arts; however, unlike the USPTO, they end up ruling the OTHER WAY; that is, to reject MORE broadly than the TA test.

machine-or-transformation test: emphasize the OR.

We will, however, consider some of our past cases to gain insight into the transformation part of the test. A claimed process is patent-eligible if it transforms an article into a different state or thing. This transformation must be central to the purpose of the claimed process. But the main aspect of the transformation test that requires clarification here is what sorts of things constitute "articles" such that their transformation is sufficient to impart patent-eligibility under §101.

Tanning leather curing rubber (Diehr case)

The raw materials of many information-age processes, however, are electronic signals and electronically-manipulated data. And some so-called business methods, such as that claimed in the present case, involve the manipulation of even more abstract constructs such as legal obligations, organizational relationships, and business risks. Which, if any, of these processes qualify as a transformation or reduction of an article into a different state or thing constituting patent-eligible subject matter?

Note that while the Bilski decision does not claim to reverse State Street (the case that led to business-method patents), most commentators seem to feel that it has that effect. It is less clear that Bilski means software patents no longer stand.

Applying the Machine-or-Tranformation test to famous cases

RSA? material transformation in "real" terms The transformation is to a file. While it is electronic, it is decidedly material.

MP3? material transformation in "real" terms? An mp3 file isn't a physical thing, but it does have a certain "thingness". People think of them as things, and buy them as things. An mp3 file is material.

NTP? maybe no? The argument can be made that there is no "material thing" on the table here. Email messages are NOT it; the patent only addresses the delivery of email.

DataTreasury? It seems unlikely that DataTreasury's patents would stand up to this new test.

Pamela Samuelson, writing in the March 2010 CACM, believes the court is likely to stick close to the machine-or-transformation test, because they appeared during oral arguments to believe that some way is needed to disallow patenting of nontechnological processes. Justice Scalia asked whether horse-training techniques should be patentable, and techniques to "win friends and influence people". Justice Sotomayor asked whether speed-dating methods could be patentable, and Justice Breyer asked if a professor could patent an improved teaching method.

However, this did not quite happen. Here are a few quotes from the decision, written by Justice Kennedy:

Section 101 specifies four independent categories of inventions or discoveries that are patent eligible: “process[es],” “machin[es],” “manufactur[es],” and “composition[s] of matter.” “In choosing such expansive terms, . . . Congress plainly contemplated that the patent laws would be given wide scope”

This Court’s precedents provide three specific exceptions to §101’s broad principles: “laws of nature, physical phenomena, and abstract ideas.”

The machine-or-transformation test is not the sole test for patent eligibility under §101. The Court’s precedents establish that although that test may be a useful and important clue or investigative tool, it is not the sole test for deciding whether an invention is a patent-eligible “process” under §101. In holding to the contrary, the Federal Circuit violated two principles of statutory interpretation: Courts “ ‘should not read into the patent laws limitations and conditions which the legislature has not expressed,’ ” Diamond v. Diehr, 450 U. S. 175, 182, and, “[u]nless otherwise defined, ‘words will be interpreted as taking their ordinary, contemporary, common meaning,’ ”

Section 101 similarly precludes a reading of the term “process” that would categorically exclude business methods. The term “method” within §100(b)’s “process” definition, at least as a textual matter and before other consulting other Patent Act limitations and this Court’s precedents, may include at least some methods of doing business.

Because petitioners’ patent application can be rejected under the Court’s precedents on the unpatentability of abstract ideas, the Court need not define further what constitutes a patentable “process,” beyond pointing to the definition of that term provided in §100(b) and looking to the guideposts in Benson, Flook, and Diehr. Nothing in today’s opinion should be read as endorsing the Federal Circuit’s past interpretations of §101. [that is, the Supreme Court is not endorsing the State Street Bank case -- pld]

The appeals court may have thought it needed to make the machine-or-transformation test exclusive precisely because its case law had not adequately identified less extreme means of restricting business method patents. In disapproving an exclusive machine-or-transformation test, this Court by no means desires to preclude the Federal Circuit’s development of other limiting criteria that further the Patent Act’s purposes and are not inconsistent with its text.


Return to Gottschalk v Benson (which Bilski v Kappos did apparently firmly uphold)

It is easy to interpret Bilski as reinforcing the Benson decision. But it's a lower-court ruling that in fact simply brings lower-court patent rules in line with Benson. It's up to the Supreme Court, however, to decide if Benson was in fact the right approach. The idea expressed in Benson that the algorithm was "too general" and might be used for anything seems in hindsight rather quaint; it is clear a few decades later that this is going to be the case with just about all software patents. For example RSA patented a method of encryption that could be used for anything: banking, personal matters, commerce, digital signatures, etc.



A brief history of hacking
Legal tools
Felony prosecutions
Zero-day exploits: cisco, MBTA
Trust and SSL
Jurisdiction
Trusting software
Voting
Linking

Hacking

To some of you, hacking is clearly wrong and there shouldn't even be a question here. If you're one of them, just pay attention to the legal-strategies-against-hackers part. However, is using a website in a manner contrary to the provider's intentions always hacking? A more serious case is logging on to a site, but not changing anything and in particular not committing theft.

Baase's "three phases of hacking"

1. Early years: "hacking" meant "clever programming"

2. ~1980-~1995:
    hacking as a term for break-in
    largely teenagers
    "trophy" hacking
    phone lines, BBSs, gov't systems
    lots of social engineering to get passwords
  
1994 Kevin Mitnick Christmas Day attack on UCSD (probably not carried out by Mitnick personally), launched from apollo.it.luc.edu. [!]
   
3. post-1995: hacking for money

early years / trophy
Phone phreaking: see Baase, p 256
Joe "The Whistler" Engressia was born blind in 1949, with perfect pitch. He discovered (apparently as a child) that, once a call was connected, if you sent a 2600 Hz tone down the line, the phone system would now let you dial a new call, while continuing to bill you for the old one. Typically the first call would be local and the second long-distance, thus allowing a long-distance call for the price (often zero) of a local call. Engressia could whistle the 2600 Hz tone.
       
According to the wikipedia article on John Draper, Engressia also discovered that the free whistle in "Cap'n Crunch" cereal could be modified to produce the tone; Engressia shared this with Draper who popularized it. Draper took the nickname "Cap'n Crunch".

As an adult, Engressia wanted to be known as "Joybubbles"; he died August 2007
       
Draper later developed the "blue box" that would generate the 2600 Hz trunk-line-idle tone and also other tones necessary for dialing.
       
How do we judge these people today? At the time, they were folk heroes. Everyone hated the Phone Company!
   
Is phone-phreaking like file sharing? Arguably, there's some public understanding now that phone phreaking is wrong. Will there later be a broad-based realization that file-sharing is wrong?
   
How wrong is what they did? Is there a role for exposing glitches in modern technology?
   
From Bruce Sterling's book The Hacker Crackdown: Law and Disorder on the Electronic Frontier, mit.edu/hacker:

What did it mean to break into a computer without permission and use its computational power, or look around inside its files without hurting anything? What were computer-intruding hackers, anyway -- how should society, and the law, best define their actions? Were they just browsers, harmless intellectual explorers? Were they voyeurs, snoops, invaders of privacy? Should they be sternly treated as potential agents of espionage, or perhaps as industrial spies? Or were they best defined as trespassers, a very common teenage misdemeanor? Was hacking theft of service? (After all, intruders were getting someone else's computer to carry out their orders, without permission and without paying). Was hacking fraud? Maybe it was best described as impersonation. The commonest mode of computer intrusion was (and is) to swipe or snoop somebody else's password, and then enter the computer in the guise of another person -- who is commonly stuck with the blame and the bills.


  
What about the Clifford Stoll "Cuckoo's Egg" case: tracking down an intruder at Berkeley & Livermore Labs; Markus Hess was a West German citizen allegedly working for the KGB. Hess was arrested and eventually convicted (1990). Berkeley culture at that time was generally to tolerate such incidents.

Robert Tappan Morris (RTM) released his Internet worm in 1988; this was the first large-scale internet exploit. Due to a software error, it propagated much more aggressively than had been intended, often consuming all the available CPU. It was based on two vulnerabilities: (1) a buffer overflow in the "finger" daemon, and (2) a feature [!] in many sendmail versions that would give anyone connecting to port 25 a root shell if they entered the secret password "wiz".

Were Morris's actions wrong? How wrong? Was there any part that was legitimate? RTM was most likely trying to gain fame for discovering a security vulnerability. There was no financial incentive.

The jury that convicted him spent several hours discussing Morris's argument that when a server listened on a port (eg an email server listening on port 25), anyone was implicitly authorized to send that port anything they wanted. That is, it is the server's responsibility to filter out bad data. While the jury eventually rejected this argument, they clearly took it very seriously.

Mitnick attack: how much of a problem was that, after all? There are reports that many Mitnick attacks were part of personal vendettas. (Most of these reports trace back to John Markoff's book on Mitnick; Markoff is widely believed to have at a minimum tried to put a slant on the facts that would drive book sales.)



Stage 3: even now, not all attacks are about money.

Baase, p 259:
"In 1998, the US Deputy defense secretary desribed a series of attacks on US military computers as 'the most organized and systematic attack the Pentagon has seen to date.' Two boys, aged 16 and 17, had carried them out."
   
What about the London attack of about the same era on air-traffic control?

2000: the "Love Bug" or ILOVEYOU virus, by someone named de Guzman. If you read the subject and opened the document, an MS-word macro launched the payload.

MS-word macros were (and are) an appallingly and obviously bad idea. Should people be punished for demonstrating this in such a public way? Was there a time when such a demonstration might have been legitimate?


Yahoo ddos attack & mafiaboy, aka Michael Calce
The attack was launched in February 2000. Calce got discovered by bragging about the attack pseudonymously on chatrooms. Alas for him, he'd previously used his pseudonym "mafiaboy" in posts that contained more-identifying information.

Conficker worm, April 1, 2009, apparently about creating a network of email 'bots.

Putting a dollar value on indirect attacks

This is notoriously hard. One of Mitnick's colleagues (Phiber Optik?) was facing damage claims from one of the Baby Bell companies in excess of $100,000, when it was pointed out that the stolen document was in fact for sale for under $25.

Mark Abene (Phiber Optik) was imprisoned for a year. That was rather long for the actual charge. Mitnick himself spent nearly five years in prison, 4.5 of which were pre-trial. That situation is similar to that of Terry Childs in San Francisco, who is still in prison.



Calce, Abene & Mitnick now both work in computer security. Is this appropriate?

One theory is that gaining notoriety for an exploit is the way to get a security job. Is that appropriate?

If not, what could be done differently?



Modern phishing attacks (also DNS attacks)


Stealing credit-card numbers from stores. (Note: stores are not supposed to retain these at all. However, many do.)

Boeing attack, Baase p 262: how much should Boeing pay to make sure no files were changed?

TJX attack: Baase p 87 and p 271

The breakin was discovered in December 2006, but may have gone back to 2005.

40 million credit-card numbers were stolen! And 400,000 SSNs, and a large number of drivers-license numbers.

Hackers apparently cracked the obsolete WEP encryption on wi-fi networks to get in, using a "cantenna" from outside the building. Once in, they accessed and downloaded files. There are some reports that they eavesdropped on data streaming in from stores, but it seems likely thatdirect downloads of files was also involved.

Six suspects were eventually arrested. I believe they have all now been convicted; there's more information in the privacyrights.org page below (which also pegs the cost to TJX at $500-1,000 million).

For a case at CardSystems Solutions, see http://www.schneier.com/blog/archives/2005/06/cardsystems_exp.html. Here the leak was not due to wi-fi problems, but lack of compliance with standards was apparently involved. Schneier does a good job explaining the purely contractual security requirements involved, and potential outcomes. Schneier also points out

Every credit card company is terrified that people will reduce their credit card usage. They're worried that all of this press about stolen personal data, as well as actual identity theft and other types of credit card fraud, will scare shoppers off the Internet. They're worried about how their brands are perceived by the public.

The TJX and CardSystems attacks were intentional, not just data gone missing.

When attacks ARE about money, often the direct dollar value is huge. And tracing what happened can be difficult. An entire bank account may be gone. Thousands of dollars may be charged against EVERY stolen credit-card number.


Here's a summary of several incidents: http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP.

An emerging standard is Payment Card Industry Data Security Standard (PCI DSS), supported by MasterCard, Visa, Discover, American Express, and others. See http://www.pcicomplianceguide.org/pcifaqs.php for some particulars; a more official site is https://www.pcisecuritystandards.org. Note that PCI DSS is not a law, but is "private regulation". Once upon a time, the most effective regulators of steam-powered ships were insurance companies [reference?]. This is similar, but MasterCard and Visa are not quite the same as insurers. From the FAQ above:

Q: What are the penalties for noncompliance?
A: The payment brands may, at their discretion, fine an acquiring bank $5,000 to $100,000 per month for PCI compliance violations. The banks will most likely pass this fine on downstream till it eventually hits the merchant. Furthermore, the bank will also most likely either terminate your relationship or increase transaction fees.  Penalties are not openly discussed nor widely publicized, but they can catastrophic to a small business. 

It is important to be familiar with your merchant account agreement, which should outline your exposure.

If you are a store, you can refuse to pay the fine. But then you will lose the ability to accept credit cards. This is extremely bad!

Visa's CISP program is described at http://www.visa.com/cisp.

The PCI standards do allow merchants to store the name and account-number data. However, this is strongly discouraged. Sites that keep this information are required by PCI to have it encrypted. CardSystems was keeping this data because they were having a higher-than-expected rate of problems with transactions, and they were trying to figure out why.

To some extent, PCI DSS compliance is an example of how ethical behavior is in your own long-term best interest.


Identity Theft

what is it? What can be done?

And WHO IS RESPONSIBLE??

The most common form of identity theft is someone posing as you in order to borrow money in your name, by obtaining a loan, checking account, or credit card. When someone poses as you to empty your bank account, that's generally known as "just plain theft".

Note that most "official" explanations of identity theft describe it as something that is stolen from you; that is, something bad that has happened to you. In fact, it is probably more accurate to describe "identity theft" as a validation error made by banks and other lenders; that is, as a lender problem.

This is a good example of nontechnical people framing the discourse to make it look like your identity was stolen from you, and that you are the victim, rather than the banks for making loans without appropriate checks. And note that banks make loans without requiring a personal appearance by the borrower (which would give the bank a chance to check the drivers-license picture, if nothing else) because that way they can make more loans and thus be more profitable.





Hacking and probing

Is it ok to be "testing their security"?
What if it's a government site?

Should you be allowed to run a security scanner against other sites?

What if the security in question is APPALLINGLY BAD?

What if you have some relationship to the other host?
 
Baase, p 270:
"The Defense Information Systems Agency estimated that there were 500,000 hacker attacks on Defense Department networks in 1996, that 65% of them were successful, and that the Dept detected fewer than 1%". But 1996 was a long long time ago.

Do we as citizens have an obligation to hack into our government's computers, to help demonstrate how insecure they are?

What about hacking into Loyola's computers? Are we obligated to do that? What about Loyola's wireless network?

Ok, failing that, what is our obligation to prevent intrusions that are not likely to be directly harmful to us?



Hactivism


In 2006, Kevin Mitnick's sites were defaced by a group. There's some irony there.

Other Baase cases:
    several attacks against Chinese gov't sites, due to repressive policies
    pro-Zapatista groups defacing Mexican government sites
    US DoJ site changed to read "Department of Injustice"




Legal tools against hackers

Once upon a time, authorities debated charging a hacker for the value of electricity used; they had no other tools. The relative lack of legal tools for prosecution of computer breakins persisted for some time.

Computer Fraud & Abuse Act of 1986: made it illegal to access computers without authorization (or to commit fraud, or to get passwords)

USAP AT RIOT act:
extends CFAA, and provides that when totting up the cost of the attack, the victim may include all costs of response and recovery. Even unnecessary or irresponsible costs.
   
Trespassing?
"Trespass of Chattels": maybe. This is a legal doctrine in which one party intentionally interferes with another's chattels, essentially personal property (including computers). Often actual harm need not be proven, just that the other party interfered, and that the interference was intentional and without authorization.

In 2000 e-bay won a case against Bidder's Edge where the latter used search robots to get information on e-bay auctions. The bots used negligible computation resources. The idea was for Bidder's Edge to sell information to those participating in eBay auctions. In March 2001, Bidder's Edge settled as it went out of business.

Later court cases have often required proof of actual harm, though. In 1998 [?], Ken Hamadi used the Intel email system to contact all employees regarding Intel's allegedly abusive and discriminating employment policies. Intel sued, and won at the trial and appellate court levels. The California Supreme Court reversed in 2003, ruling that use alone was not sufficient for a trespass-of-chattels claim; there had to be "actual or threatened interference".

       After reviewing the decisions analyzing unauthorized electronic contact with computer systems as potential trespasses to chattels, we conclude that under California law the tort does not encompass, and should not be extended to encompass, an electronic communication that neither damages the recipient computer system nor impairs its functioning. Such an electronic communication does not constitute an actionable trespass to personal property, i.e., the computer system, because it does not interfere with the possessor’s use or possession of, or any other legally protected interest in, the personal property itself. [emphasis added]

How do you prosecute when there is no attempt to damage anything?

Part of the problem here is that trespass-of-chattels was a doctrine originally applied to intrusions, and was quickly seized on as a tool against those who were using a website in ways unanticipated by the creator (eg Bidder's Edge). Is that illegal? Should the law discourage that? Should website owners be able to dictate binding terms of use for publicly viewable pages (ie pages where a login is not required)?



International Airport Centers v Citrin

Generally the Computer Fraud & Abuse Act (CFAA) is viewed as being directed at "hackers" who break in to computer systems. However, nothing in the act requires that a network breakin be involved, and it is clear that Congress understood internal breakins to be a threat as well.

Just when is internal access a violation of the CFAA? Internal access is what Terry Childs is accused of.

In the 2006 Citrin case, the defendant deleted files from his company-provided laptop before quitting his job and going to work for himself. From http://technology.findlaw.com/articles/01033/009953.html:

Citrin ultimately decided to quit and go into business for himself, apparently in breach of his employment contract with the companies. Before returning the laptop to the companies, Citrin deleted all of the data in it, including not only the data he had collected [and had apparently never turned over to his employer -- pld], but also data that would have revealed to the companies improper conduct he had engaged in before he decided to quit. He caused this deletion using a secure-erasure program, such that it would be impossible to recover the deleted information.

His previous employer sued under the CFAA, noting that the latter contained a provision allowing suits against anyone who "intentionally causes damage without authorization to a protected computer". Citrin argued that he had authorization to use his company-provided laptop. The District Court agreed. The Seventh Circuit reversed, however, arguing in essence that once Citrin had decided to leave the company, and was not acting on the company's behalf, his authorization ended. Or (some guesswork here), Citrin's authorization was only for work done on behalf of his employer; work done against the interests of his employer was clearly not authorized.

Once again, the court looked at Citrin's actions in broad context, rather than in narrow technological terms.

Note that Citrin's specific act of deleting the files was pretty clearly an act that everybody involved understood as not what his employer wanted. This is not a grey-area case.

Compare this to the Terry Childs or Randall Schwartz cases. below. We don't have all the facts yet on Childs, but on a black-and-white scale these cases would seem at worst to be pale eggshell (that is, almost white). It seems very likely that Schwartz's intent was always to improve security at Intel; it seems equally likely that at least in the three modem-related charges against Childs there was absolutely no intent to undermine city security, or to act in any way contrary to what the city would have wanted if it had in fact any clue.


Felony prosecutions: Kutztown 13, Randall Schwartz, Terry Childs, Julie Amero

Kutztown 13
Students were issued 600 apple ibooks in 2004
The admin password was part of school address, taped to the back! The password was changed, but the new one was cracked too. Some of the students got admin privileges and:
                bypassed browser filtering
                installed chat/IM software, maybe others
                disabled monitoring software
The students were accused of monitoring teachers or staff, but that seems unlikely.

The school's security model was hopelessly flawed. Who is responsible for that?
The school simply did not have the resources to proceed properly.
       
The offenders were warned repeatedly. But why didn't the schools simply take the iBooks away? Why were felony charges pursued? The charge was for felony computer trespass.

The school argued that the charges were filed because the students signed an "acceptable use" policy. But why should that make any difference in whether felony charges were pursued?
      
http://www.wired.com/news/technology/0,1282,68480,00.html
cutusabreak.org: now gone
Wikipedia: Kutztown_Area_high_School
       



Randall Schwarz
    http://www.lightlink.com/spacenka/fors

Oregon made it a FELONY to do anything UNAUTHORIZED.
Also, taking a file without authorization was declared to be THEFT.

Schwartz faced three counts:

  1. Installation of an email backdoor at Intel (he thought he had some kind of permission)
  2. Taking password file
  3. Taking individual passwords

These he did as a former sysadmin, now assigned to other duties, but still concerned about password security. All he did was to run the "crack" program to guess passwords. This involved copying the public /etc/passwd file, which at that time contained the encrypted passwords, and to this day contains the username-to-userid mapping used every time you run ls -l.

The appeals court argued that although "authorization" wasn't spelled out in the law, Schwartz did things without authorization as narrowly interpreted. The appellate court also upheld the trial court's interpretation of "theft": taking anything without permission, even if the thing is essentially useless or if the taking is implicitly authorized.

The appellate court also seemed to believe that Schwartz might have been looking for flaws to take credit for them, and that such personal aggrandizement was inappropriate. But employees all the time look for problems at work and try to fix them, hoping to receive workplace recognition.



Schwartz and Kutztown 13 cases have in common the idea that sometimes the law makes rather mundane things into felonies. For Schwartz, it is very clear that he had no "criminal" intent in the usual sense, although he did "intend" to do the actions he was charged with.