JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2001

CYBER-SOCIETY-LIVE 2001

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: E-Legality Bulletin, June 2001

From:

John Armitage <[log in to unmask]>

Reply-To:

The Cyber-Society-Live mailing list is a moderated discussion list for those interested <[log in to unmask]>

Date:

Tue, 5 Jun 2001 15:19:00 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (360 lines)

Searchable archive of old issues available at:http://www.e-legality.org
This issue will be archived at the end of the month

E-Legality Bulletin
-Tracking law makers and breakers

Issue 3, June 2001

*CONTENTS

News:
     90 Charged in FBI operation
     CoE to table cybercrime treaty
     US to rethink IT security plan
     Peekabooty poised to launch
     EC launches safety site

Resources
Conference diary

In-depth:
     Analysis: US frustrates EU Echelon investigation
     Feature: Hackers waive the rules

*NEWS:

News: 90 CHARGED IN FBI OPERATION

An FBI crackdown on online crime called 'Operation Cyber Loss' has led to
charges being brought against 90 people who are alleged to have cost 56,000
victims over $117m.

Some of the schemes were uncovered thanks to the Internet Fraud Complaint
Centre (http://www.ifccfbi.gov), a partnership between the FBI and the
National White Collar Crime Centre.

The partners said, "The accomplishments of this operation are a direct
result of the close working relationship law enforcement has developed with
the private sector and e-commerce companies." E-Money company Pay Pal
(http://www.paypal.com) and financial information provider Motley Fool
(http://www.fool.com) were picked as useful informants.

The charges brought include wire fraud, mail fraud, bank fraud, money
laundering and intellectual property violations resulting from evidence of
online auction fraud, non-delivery of items, credit card fraud, bank fraud
and pyramid schemes.

*An Internet Fraud Complaint Centre report released in parallel with the
announcement of the results of Operation Cyber Loss said that Internet
auctions accounted for 64% of all Internet fraud reported.
See: http://www.ifccfbi.gov/strategy/AuctionFraudReport.pdf

News: CoE TO TABLE CYBERCRIME TREATY

A draft convention on cybercrime is due to be handed on to the European
Committee on Crime Problems in mid-June, the final stage before being
submitted to the Council of Ministers for adoption.

The proposed convention, now in its 27th draft, is said to be the first
document of its kind. Signatories agree to a list of undertakings meant to
ensure they meet minimum and compatible standards of cybercrime law
enforcement.

Among the draft's proposals are that signatory countries agree to adopt
legislative measures to allow its authorities to: search and seize stored
computer data, collect or force service providers to collect data in real
time; and agree to assist one another.

Critics are concerned that there is no equivalent treaty to counterbalance
enforcement undertakings with human rights and privacy undertakings.

The draft report can be downloaded from:
http://conventions.coe.int/treaty/EN/cadreprojets.htm

News: US TO RETHINK IT SECURTY PLAN

President George W Bush announced plans to rethink the National Plan for
Cyberspace Security on 9 May, shortly after the publication of a damning
108-page General Accounting Office report.

The GAO report, entitled 'Critical Infrastructure Protection: Significant
Challenges in Developing National Capabilities' [ref: see below], took a
particularly dim view of the FBI's National Infrastructure Protection Centre
(NIPC), recipient of $60m since it was established in 1998.

Among the criticisms were: that the definition of what constitutes a cyber
attack threatening national security is ill-defined; that NIPC hacker
warnings have come too late to prevent significant damage; that there is a
lack of communication between it and other relevant departments; and that
there is insufficient private sector involvement.

The presidential statement indicated that the new cybersecurity plan will
have a greater input from the private sector input and from other government
departments. The planning is being coordinated by the Department of
Commerce's Critical Infrastructure Assurance Office (http://www.ciao.gov).

*The GAO report (ref: GAO-01-323) was released on 25 April and came into the
public domain on 22 May. It can be downloaded from: http://www.gao.gov

News: PEEKABOOTY POISED TO LAUNCH

In July, high-profile hacking fraternity Cult of the Dead Cow will launch
Peekabooty, a browser that allows users to download encrypted files from a
peer-to-peer network similar to Napster's.

According to Cult of the Dead Cow (CDC), Peekabooty will protect users from
political persecution, but the browser could also be used by criminals to
escape detection.

Security company Baltimore was quick to seize the opportunity to promote its
products.
Jonathan Tait said Peekabooty downloads can be prevented because, "The
browser has to point at a server or URL to work, and these addresses will be
listed somewhere."

News: EC LAUNCHES SAFETY SITE

Saferinternet, an European Commission funded web site, went online this
month with the aim of providing a forum to exchange awareness about illegal
and harmful Internet content.

The site (http://www.saferinternet.org) contains links to Internet safety
news, debate and resources for the consumer and information about the
commission's Internet Action Plan, of which the site is a part. The site
also gives organisations a way to solicit partnerships and details of EC
grants to develop filtering software.

The Eu210,000 a year platform was built by Brussels-based ECOTEC which was
formed in December last year following the takeover of NEI Kolpron, based in
Rotterdam, by Birmingham-based ECOTEC Research & Consulting.

Resources:
NET INVESTIGATION: The Coalition for the Prevention of Economic Crime (CPEC)
has published a new guide to using the Internet in investigation and
research.
http://www.ncpec.org/whats_new/cpec_datasheet.pdf
INFORMATION WARFARE: An Australian-based team is calling for papers on
information warfare for a journal due out in September 2001.
http://www.mindsystems.com.au/autt.nsf/pages/infowarfare
MONEY LAUNDERING DATABASE: Moneylaundering.com, launched a searchable
archive of money laundering articles dating back to 1993. To try it out
visit:
http://www.moneylaundering.com/MLAdatabase.htm

Conference diary:
5-6 June - INET 2001: The Internet Society's annual conference covering the
technology, uses, and governance of the Internet. Topics include
intellectual property, peer-to-peer networks and censorship.
See: http://www.isoc.org/inet2001/
6 June - GREEN/EFA RESEARCH FORUM: European Parliament. Preliminary
programme includes a presentation on Infowar by R. Bendrath of Free
University of Berlin and T. Bunyan of Statewatch (UK).
Contact: [log in to unmask]
19-20 June: THE INFORMATION SOCIETY: Review of regulatory and public policy
aspects of information society.
See: http://www.emf.be/regul/regul_presentation.htm
2-6 July - CYBERLAW 'SUMMER CAMP': The Berkman Center for Internet and
Society is hosting Internet Law Program covering copyright protection, the
digital distribution of music, free speech and privacy online.
See: http://cyber.law.harvard.edu/ilaw


*IN-DEPTH

Analysis: US FRUSTRATES EU ECHELON INVESTIGATION
By Phil Cain  [log in to unmask]

The EU team investigating Echelon, an international electronic communication
interception system headed by the US National Security Agency, cut short its
visit to the US this month because it was denied planned meetings with
representatives of the US Advocacy Centre.

The Advocacy Centre was set up by the Department of Commerce in 1993 to help
US firms to win foreign public contracts. Some believe the centre could have
helped pass on economic information picked up by the Echelon network to US
corporations. Proving such exchanges took place is crucial to proving the EU
's contention that Echelon may have significantly damaged EU economies.

Denial of access to the Advocacy Centre meant the investigation team, led by
'rapporteur' Gerhard Schmidt, was unable to verify or discount documents
which suggested the CIA is involved in the Centre's work. Nor could it find
out the identity of five of the 19 agencies the Centre says it works with
but does not name.

US intelligence officials admit to state-sponsored industrial espionage
justifying it by saying it is simply a way to uncover foreign corruption
which put US companies at an unfair disadvantage. In answer reports
published by the EU investigative team this month (see below) say: "It
should be pointed out to the Americans that all EU Member States have
properly functioning criminal justice systems. If there is evidence that
crimes have been committed, the US must leave the task of law enforcement to
the host countries."

The reports, released shortly after the investigation team's untimely return
from the US, said the balance of evidence suggests that the Echelon system
does exist. But it also did not rule out the possibility that France and
Russia may operate similar global surveillance operations but concluded that
there was "insufficient evidence to draw a firm conclusion".

The new documents emphasise the limits technology imposes on the capacity of
any such signal interception system. In particular they pointed out the way
the Internet transmits data means: "Echelon states have access to only a
very limited proportion of Internet communication transmitted by cable."
Satellite and radio transmissions were reckoned to be more likely sources of
Echelon's raw material.

Whatever the medium monitored by the system, the reports conclude the
restricted capacity of computer keyword-matching and the limited number of
intelligence analysts meant the number of messages that could be scanned by
the system would by no means be comprehensive. By way of example the report
pointed out that a comparable German signals intelligence system monitors
only 10% of messages.

The reports also note that a filtering system would be put under significant
extra strain if required to pick up economic key words as well as ones
relating to national security.

The EU reports suggests that participants in the putative Echelon
surveillance network - the US, UK, Canada, Australia and New Zealand - may
have contravened certain international laws, including EC law. Though the EC
Treaty, which sets out the ground rules for the EU, does not cover state
security operations and law and order it does not allow members to spy on
other member's companies.

The report said US privacy law and the EU Charter of Human Rights could not
be used against Echelon, but it noted Article 8 of the European Court of
Human Rights (ECHR) could offer redress to parties injured by Echelon. The
article requires signatory governments to monitor foreign intelligence
services on their territory. The report raises the question about how
diligently the UK and Germany have monitored US intelligence activities on
their territory in the past.

Consequently, the reports states that there is good reason "to call on
Germany and the UK to take their obligations under the ECHR seriously and to
make the authorisation of further intelligence activities by the National
Security Agency on their territory contingent on compliance with the ECHR."

*Sources:
Shortly after the EU investigative team's return a document said to be a
92-page draft report on Echelon written before the US visit was posted on
the Internet.
See: http://cryptome.org/Echelon-ep.htm
And, not long after that an updated 113-page draft was officially released.
See: http://www.fas.org/irp/program/process/prEchelon_en.pdf


Feature: HACKERS WAIVE THE RULES
By Derek Parkinson  [log in to unmask]

Although hacking activity predated the Internet, it is the emergence of the
Internet as a mass-market technology that pumped up the profile of hackers
as a new social menace. But according to some they are certainly not all
bad.

Jeff Taylor, for example, who worked for GEC Marconi on the flight control
software of the Boeing 777 and on UBS Warburg's Microsoft SMS system, says:
"The hacking community is a much needed part of the Internet world. Without
these individuals continually probing the edges of our security, we'd never
know there were holes open to the nastier parts of the community."

Broadly, hackers fall into three groups: so-called 'white hats', the sort
that gain qualified respect from IT professionals; 'black hats' or 'crackers
', who aim not just to identify security holes but to exploit them for a
variety of reasons, among the most common being politics, status, or for
financial gain. The last, largest, and least respected group are the 'script
kiddie', who rely on kits published on the web to build their viruses and
tools.

"There's been an explosion of website defacements, due mainly to script
kiddies picking things up from bulletin boards. They don't know what they're
doing, they're looking for kudos," says Gunter Ollman, principal security
analyst with Internet Security Systems.
In Ollman's view, it's difficult to gauge how much hacking activity has a
criminal purpose: "There's very little information on this but it's clearly
the intent in many attacks such as theft of information, credit card
details, for example."

Despite the lack of hard data, there is growing apprehension that tools and
expertise developed by crackers, published on bulletin boards and eagerly
grabbed by script kiddies, can just as easily fall into the hands of
organized crime. Rumours of well funded and trained East European and
Russian cracker gangs continue to swirl around the Internet.

---New technologies create more targets---

Hackers will have a greater variety of targets to pick from. We can expect
to see more attacks on wireless LANs, often touted as a convenient
alternative to cable networks: "Drive-by hacking is possible now - all you
need is a laptop with a wireless LAN card, which costs you about #80," says
Ollman.

He also picks out home PCs as a likely new target: "The home PC is becoming
a more valuable target because applications like home banking mean that
confidential information like passwords are stored on the hard disk," he
says. Home PCs will also be used by hackers to store 'warez' - pirated
software - without being caught in possession. According to Ollman, trojans
and scanners that seek vulnerable programming interfaces have already been
developed for home PCs, and with the spread of DSL 'always on' connections,
attacks are certain to follow.

Mass attacks are also likely to increase according to Ollman, with
intelligent agents developed to deface sites and multiply, searching for and
installing themselves on vulnerable servers.

Taylor agrees: "Hackers will start to employ artificial intelligence in
their attempts at breaking in. Bots will become the modern version of the
war-dialler of old. They'll be programmed to target specific sites, knocking
continuously to find a way in," he says.

It seems likely that as software agents like bots become more sophisticated,
so they will become more difficult to detect. The signs aren't promising -
according to Chris Roberts, head of IT security at Imperial College London,
we are already losing ground in the fight against viruses: "Traditional
anti-viral software has two stages - fingerprinting and deletion, but
viruses can outsmart fingerprinting by being modified slightly. The only way
of dealing with this is fuzzy matching, but that's not very well developed
at the moment," he says.

---Counter measures---

Whether over-hyped or under-reported, hacking is an issue that cannot be
ignored, but security and law - the two most obvious countermeasures - are
woefully unprepared. According to Professor Roger Needham, MD Microsoft
Research, it is partly a question of attitude: "When people are developing
software, security is not the thing you first think of. Security is a
nuisance - you want to have it but you don't want to pay for it," he says.

Richard Boothroyd, a security consultant with ICL, claims current laws fail
to offer adequate protection: "For example, in the UK, hacking does not
carry strong enough penalties - it's still seen as white-collar crime," he
says. Boothroyd was also downbeat on the prospects for international
collaboration: "Apparently, getting an international law of the sea took 40
years of negotiation."

It is an uncomfortable analogy for those who imagine hackers will one day be
eliminated: The seas were plagued by pirates fore hundreds of years before
maritime law was established, and are certainly not absent from shipping
lanes even today.

*HOW TO SUBSCRIBE TO E-LEGALITY BULLETIN
To subscribe email [log in to unmask]
To unsubscribe email [log in to unmask]
Or visit http://www.e-legality.org, where there is also an
archive of old issues.

If you choose to unsubscribe, we will immediately and
permanently delete your email address from the mailing list.

COPYRIGHT NOTICE: Unless stated otherwise the copyright of all
material contained in this email publication belongs to its
editor Phil Cain. For permission to re-publish any of the
elements contained, email [log in to unmask]

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager