Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
United States

When The FBI Knocks, A First-Person Account 674

Ever wondered what happens when your IRC chatter draws the attention of the public servants at the FBI? dilinger writes: "I wrote up a description of what happened to me last weekend. The FBI confiscated my computers for checking out yankees.com, after it had been defaced. If this doesn't make you paranoid, nothing will. :)"
This discussion has been archived. No new comments can be posted.

When The FBI Knocks, A First-Person Account

Comments Filter:
  • There's more information to be found on a computer disk than what you can get by dumping the contents

    Yes, that is true. On the same note, there is more information in a wall splattered with blood than the pictures and measurements. Does the FBI come to the house and cut down the wall for 'evidence', using regular field agents to handle cutting down the wall with sledgehammers and sawzalls? Nope. They use specialized blood spatter technicians, who do the tests on the wall, photograph, sample, measure, and leave in a timely fashion. If their tests reveal that there may be more information on/in the wall, they come back and do the test. If you've washed your wall in bleach to remove the stains (and destroyed the evidence they might have liked) too fucking bad.

    Why should they make an exception in the case of digital data on electronic storage?
  • "Evidence", yeah, right. But how much of what they took can possibly be real evidence of anything? Not much, and they dont have any real reason to keep it either. IANAL, but heres why I think so...

    If they booted that machine they took even once their chain of evidence is tainted. It doesnt take much C++ skill to mess around with, for example, a DHCP client that will irreversibly trash certain areas of the HD if the packet that gave it its IP addy happens to come from the wrong MAC address indicating the machine is no longer on its home network - it could even be made to look plausible by looking like a boot-time fsck pass. If they did anything but temporarily connect the media on the confiscated system to a different machine and make a raw copy of each disk (without even mounting it) they cant trust anything they see.

    Of course if they are doing that once, they can do it twice and present the guy they are accusing with a copy of the evidence they collect just like in the UK the police are required to tape interviews (on a machine that records 2 tapes simultaneously) and give you or your lawyer a copy of the tape immediately the interview is over. Of course I'd bet the cops really wouldnt like that - it means if theres a single bit difference between the two images when it comes time to go to court and the defendants lawyer can prove their copy has been sitting in his safe the whole time then somebody just got caught tampering with evidence. No matter how good the police force is, some of that goes on in all of them - thats why the UK introduced that regulation about the taped interviews.

    This also means that every piece of data on that computer is in their hands. They probably will want to hang onto the physical media from it in case they decide to do the more invasive data recovery techniques but theres no harm to their chain of evidence from handing back the machine(s) excluding disks, but with a complete disk image on whatever media they like. No unjust deprivation of a persons access to and use of their personal property either - and yes, I include the data in that category as well, its the most valuable component of the system because hardware is replaceable, work is not.

    I, for one, am not holding my breath waiting for this to happen though. Perhaps the best we can hope for is to have the cops wake up to reality and make sure that they actually send along somebody who knows his ass from his elbow where data security is concerned to cases like these, just like they send cops trained in accountancy on financial cases.

    # human firmware exploit
    # Word will insert into your optic buffer
    # without bounds checking

  • >As someone else mentioned, its like not just
    >viewing a crime scene, but crossing the yellow >tape.

    Except... there was no yellow tape.
  • Oh yes, it does. It keeps you, in your ignorance of the law, from telling the FBI things that they can later use against you. Maybe port scanning is illegal in the state the server resides in. Maybe that state has an extradition treaty with your state. Maybe your knowledge dazzles the FBI so much that they decide you MUST be the one. Maybe your statements match the profile of the crime. Maybe they harass you while they investigate you. Maybe you get screwed on the basis of shooting off your own mouth and trusting people whose job it is to spend eight hours a day, five days a week, 52 weeks a year dealing with criminals.

    It's kind of like tech support. When all you deal with is broken computers, you start to think that all computers are broken. When all you talk to are stupid people, you start to think that people are stupid. When all you deal with is criminals lying to you, you start to think that accusation = guilt...
  • Hell, if I can't get him to wear a helmet when he rides his skateboard. . .

    kidding, of course.
  • First off, I don't for one second think you did anything illegal regarding this. Nor do I think you did anything wrong. However, You should consider the fact that if you hang around tampering with a fresh crime scene, its JUST POSSIBLE that someone is taking notes and you might get targeted as a suspect.

    From what it sounds like, the FBI's actions were simply an act of evidence gathering, not necessarily singling you out as a suspect. However, your actions were sufficient to warrant "probable cause" to obtain a warrant, and once that happens, you're pretty much screwed. They can pretty much do or take anything they want until a trial comes up (and we all know how long "hacking" trials can take)

    Do I think this is fair, no I most certainly do not. Do I think you could have avoided all this? Yes, I do.

    -Restil
  • The question shouldn't be why the FBI confiscated his computer--in the case of a serious crime, I can see that being reasonable.

    The question should be: why is that kind of "vandalism" considered a serious crime to begin with? Granted, it's unpleasant and shouldn't happen. But it is hardly the case that anybody got hurt, or that anybody made money from it. It seems to me roughly the equivalent of sticking an easy-to-remove poster to a store window.

    The problem with making minor pranks major crimes is that it greatly expands the power of the police and the state. Or, as a police officer once told me during traffic school (which I had to attend for a traffic offense I didn't commit): you can't leave your front door without violating some traffic law; we can get you if we want to.

    Criminalizing almost everything and imposing harsh punishments on everything doesn't lead to a safe society, it leads to a police state.

  • The Yankees are still a big business, and the FBI is available for businesses who are victims of computer fraud/theft/espionage/etc. If our site was hacked, the FBI would be on the top 3 organizations we'd contact. (Actually, it'd be the first). Any time there's an "incident" that could possible cross state/international lines, the FBI is involved.

    If you were in charge of Yankees.com, and your site was compromised.. what would you do? Nothing? Call all your 3R33T friends? Investigate by yourself?

    This is yet more proof that the average slashdot computer dweeb has zero clue about how business really works outside their dorm or pre-IPO VC dot-com.

    Life sucks, wear a helmet.
    ~dlb
  • If they seize your drugs, are you going to insist they leave you with the same amount you seized, until you're found guilty? Sheesh.
  • This can be directly equated to a situation where you hear about a liquor store that got robbed so, as a curious citizen, you drive by and take a look. Being that you left some small piece of evidence that you were there at all, the FBI or whoever comes back to your house, confiscates your car and questions you. Anyone see anything wrong with this?? Anyone???

    Not at all, but let me make a better example, based on what he said:

    ...I returned to my IRC client, said "Looks like a dns hack...", and and the conversation went elsewhere. The entire thing lasted possibly five minutes, and occupied no more than 3 or 4 lines on IRC.

    Say you were walking down the street and happen to notice the evidence of a break-in, with a policeman standing there. So, if you tell your friend, "Hmm, looks like they broke the window open with a brick," the police would be able to thoroughly question you about your knowledge of break-ins, how you obtained the knowledge, and take any property that you own that could be considered to be "break-in material"?
  • This war on hacking is gonna be just like the war on drugs. Suspects have no rights. The law is supreme and those who represent the law have supreme power. Speak against them and you will be branded a deviant, a criminal sympathizer, and perhaps much worse.

    The War on Drugs has resulted in a much more powerful police force and much weaker rights than we previously had. The government used the War on Drugs to justify civil forfeiture laws which allows local and federal agencies to confiscate your property merely upon suspiscion that it was used in a crime--and they never have to give it back even if you are proven innocent! Here's the real kicker: The agencies (local and/or federal) get to keep your property for their own use, or sell it. In states that restrict this kind of behavior, municipalities can team up with a federal agency such as the DEA or FBI to circumvent these restrictions so they still can get a slice of the pie. In almost all cases where the person is found to be innocent the property is still not returned.

    The government obviously feels the need to police the Internet, and have expressed the need for more resources to do it. A War on Hacking modeled after the War on Drugs is the winning formula for them to accomplish this.

    If you want to learn the history that we were not taught, but are likely doomed to repeat, check out:

    "civil forfeiture" [google.com] on Google
    LibertyBoard.org [libertyboard.org]

    Smokedot.org [smokedot.org] - Smokedot links to a lot of great articles on War on Drug issues as well as other stuff. It's not just for stoners ya'know.

    numb

  • It is interesting that in most jurisdictions traffic violations are "Guilty until proven innocent". I had a scenario similar to your example. I was headed down a hill in an area notorious for strict enforcement, so I was doing exactly the posted 25 mph. This old guy in a pickup truck grows impatient and blasts past me and down the hill. Sure enough, there is a motorcycle cop at the bottom of the hill. The cop is having a cigarette and a coke and looking the other way. His radar gun beeps at him, he turns around and sees me. I'm clearly doing the speed limit (hey, 25 mph is visible to the naked eye, and a long way from 42 mph). He didn't see it that way and wrote up the ticket. When we got to court, the only questions I was allowed to ask are "are you certified to use radar", "was your radar gun calibrated" and "was the grade of the hill or the distance from the curve outside the legal limits for radar use". The question of whether he had the dang thing pointed at me at all was ruled out of order. The fact that he was looking in the complete other direction - out of order. There are only three acceptable arguments to a radar ticket, none of them have to do with "the officer made a mistake". I asked later if they would allow a videotape of the entire event as evidence. Nope, not admissible. BTW, this didn't happen in Turkey or Singapore or some other more limited civil rights area. This happened in Atlanta, GA.
  • Remember though, KahunaBurger is a bonafide fascist, if Mussolini were running for office, he'd be out with a "he makes the trains run on time" placard waving to people from a street corner.

    *laugh* Hey, I've been called a facist before by this crowd, but when did I get bonafide? Maybe I could add that to my business card - "Facist as bonafide by some loser on slashdot who doesn't agree with my politics."

    I don't think the trains line would get anywhere in my neck of the woods, tho. The MBTA runs on an OK schedule generally. Maybe "he'll make them stop running an express train to harvard when you're at central and already late."

    Heck, he's probably a member of one of our more corrupt PDs in this country (like LAPD, for instance).

    hmmm... The guy manages to err on my gender, occupation, state of residence and political leanings all in on post. Nice job, if you had managed to make incorrect assumptions about my OS as well, it could have been a loser clean sweep.

    -Kahuna Burger

  • And aim for the head...jackbooted thugs wear body armor.
  • If this guy is telling the truth, he hasn't done anything illegal. But that doesn't mean the FBI did anything wrong. What this guy did was the equivalent of rooting through a trash bin and obtaining the gun that was used in a murder and taking it home with him. He may not have killed anyone, but he's given plenty of reason to suspect him. I don't see any civil liberties violation here. The FBI needs his computer as evidence. Would anyone complain if the FBI confiscated the gun he brought home?
    --
  • He did more than visit the website. He took it upon himself to "analyse" the crack, sniffing around, trying to find what vulnerabilities there were. He deserved it.
  • Hopefully your atty is used to dealing with the Feds.

    IANAL, neither am I a cop, but I know lots of them including computer forensic guys. Standard procedure is to inspect your equipment then copy your HD's and examine the copies. Once this is done in a properly documented manner, i.e. the copies are verified as usable, the need for them to retain the equipment is minimal.

    Get your attorney to write a letter petitioning the judge who authorized the warrant in the first place to get your equipment back. Stress that you are a student and the equipment is critical to completing your studies. Also point out that the logs should clearly show your accessing the site AFTER the defacement took place. And it wouldn't hurt to volunteer to talk to their forensic people to offer them info on what you looked at to examine the hack. I think everyone who works for the FBI is a sworn officer, so talking to one of their techs is talking to an investigator.

    You want to show sincere humility. You are an innocent bystander whose fingerprints were at the crime scene. Suck up, just like you would to a professor. Quiet and humble, even though you were screwed. Getting mad at this point accomplishes nothing excepting guaranteeing feet-dragging when it comes to getting your stuff back.

    Oh, and watch your porn collection. Different types of porn are illegal in different areas. For example, "shower" scenes are illegal in my area as is beastiality. Keep your collection at the Playboy level and you're good.

    And why is the FBI involved? First, the Yankee's is a multi-million $ business, second, I'm guessing that your school is not in NY state, which makes it an interstate crime.

    Again, IANAL or a cop, I just know a lot of them.

    --
  • They are *supposed* to err on the side of the rights of citizens.

    yes, yes they are. You will notice that the people who had suffered damage in this case were also citizens. Those citizens had the right to have a crime against them investigated. The cops had an obligation to not run rampant over the rights of the citizen being ivestigated as well. The part where your response becomes strange is when you realize that they didn't.

    Lets actually look at this kids story. He had just gotten fired. He still had access to the systems of the people who just fired him and accessed them that morning. The systems were maliciously compromized. Now what part of "erring on the side of the rights of citizens" wouldn't make him a suspect? The part where anyone saying "oh, this is a mistake, I'm innocent or possibly framed" causes police officers to respond "oh, sorry for bothering you, we would never continue a reasonable investigation after someone says they're innocent"? Of course he was investigated.

    Saying "shit happens" is a cop out.

    Sometimes, saying "shit happens" is the only mature response to a situation. Specifically, it is the mature response when the system, running as best it can in the best ballance we have come to, nonetheless fails you. The immature response is to attck the system and call the police names when their actions aren't what you like. The even less mature response is to assume that the entire system must be overhauled to avoid ever making that mistake (even if it would lead to many more mistakes of an equally unpleasant kind)

    My NICOE was threatened with a frivilous assault charge by a girl subleting with us who bragged that "the police will take my word cause I'm the female" and "your life will be screwed even if you win". She knew how to use the laws in our state to screw someone. After I stayed up for 36 hours straight, crashed for 12 hours and stayed up another 36 all because I was so overwhellemed with rage at her actions that I couldn't sleep, she moved out without making good on the threat, and life returned to normal. The point of this story is that before this incident, I supported the domestic violence and restraining order laws that she had threatened my NICOE with. After it happened, I still supported those same laws. Why? Because the laws cannot be written to prevent all such possible abuses without making them totally toothless, and it would be immature for me to change my overall assessments of the risks and benifits just because I had had personal expereince with the risks. The mature response was not to rail against the system as intrinsicly broken or the authorities as evil, but to say "We had a psycho sublet. Shit happens. Glad thats over." In fact, I would say the decision criteria that needed to be changed based on the incident was our system for picking housemates/sublets, not anything in the MA criminal code.

    The mature response to the orriginal poster's situation is (IMHO) similar. "Though either coincidence or malevolence, someone I had a apparent motive against, suffered damage I was capable of right after the potentially motivating situation. This caused a lot of stress, but no end charges. Shit happens. Glad that's mostly over without charges filed. Next time I will encourage them to change passwords and such the day that I leave as a protection for myself as well as them."

    This is the mature use of "shit happens", its no copout, the copout is pretenting that the system could work right every single time, or at least should work wrong in the way that never causes you any trouble.

    -Kahuna Burger

  • Hasn't anyone else ever gone to jail before?

    "Could you be more specific? I get so many rides home from jail." -- Half Baked.

    Seriously, though, yeah and you are right. The police won't even necessarily inform you that you have the right to an attorney, although they are supposed to. In my case they refused my request to speak with an attorney (my brother) since they assumed I did not already have an attorney, but only wanted to (find and) speak to an attorney. I learned later that they should have honored my request since I had the number in my head and only had to pick up a phone. Make sure you always say, "I want to speak with my attorney."

  • rm -rf /* is a poor deletion technique anyways. There are several undocumented 'unrm' utilities out there (I've seen one myself) that are basically fancy implementations of 'dd' that can easily recover data from a UFS or ext2 filesystem.

    If you really want to wipe your data clean you should use sdelete [sysinternals.com] (Windows) or secure delete [pimmel.com] (Unix).
  • The people left in the bank after a bank robbery don't go sniffing around behind the counter, examining the drawers that the robbers took money from, interrogating the tellers, and examining anything the robbers touched. That's why.
  • Who said it was a crime? They said he was a SUSPECT - they didn't charge him with "sticking his nose in". However, his actions are would make cause for investigation/being a suspect VERY REASONABLE, if you ask me.
  • In other words I have to stop and do first aid but if there are any police there I don't have to.

    Actually, you may find it interesting to know that for the same reasons, many law enforcement officers will not become CPR certified for liability reasons. I've actually seen officers stand there waiting for the paramedics because if they attempt (and fail) to save a person's life, they may be sued and lose everything they own.

    -jerdenn

    speaking as a former cop turned techie.
  • I am always appalled at the details of what should be a fine legal system (I mean, the premises on which it is built make sense).

    However, the fact that state does not have any liability for seized goods, nor a burden of proof to seize it in the first place is completely flabergasting. I just don't see how this travesty came about?

    It seems to me that the state should have to bond all items it seizes. If they are kept more than so long, a partial payment (rent) is made to the owner, and upon their return, any value diminishment is to be reimbursed from the bond. Thus, if a car is damaged in the pound, the bond will repair it, or if a computer is obsolesed, the owner reimbursed.

    This will give the agencies the incentive to a) care for physical evidence, and b) return it in a timely manner -- for example, returning a computer after having made a certified copy of the hard drive (or keeping the hard drive and offering the owner a chance to make a copy).
  • by Morgaine ( 4316 ) on Tuesday October 31, 2000 @02:54PM (#661764)
    To be fair, you should have labelled the FBI lines "lawyer" or "barrister". The FBI may be intrusive and power-mad and have an over-inflated opinion of their own value to society, but at least they're not the totally amoral, logic distorting scum of the earth that roam the courtroom.

    The FBI are just misguided protectors of an obsolescent social order with their backs against the wall in a desperate and impossible fight to keep up with the times. They need to be kept at arms length, but ultimately some sympathy is due to them. They think they're fighting the good fight, and it just so happens that their fight is based on false premises. Sigh.

    But that contrasts markedly with the lower officers of the bar, the only human social group that institutionalizes moral bankruptcy in an official medium built on professional sophistry while having the gall to call the result justice. No punishment is bad enough for them. Douglas Adams had the right idea with his Ark 'B'.
  • This is incorrect. If the police see evidence of illegal activity, they may act on it.
    No. They have to collect enough evidence to have probable cause, convince a judge, and get a warrant. If in the course of executing that warrant, they think they have evidence of some other crime, they have to go convince the judge again and get another warrant.

    At least, according to the text of the Fourth Amendment:

    ...no warrants shall issue, but upon probable cause, supported by oath or affirmation, and
    particularly describing the place to be searched, and the persons or things to be seized.
  • I very much doubt it would work. Hard disks are encased in a metal case, which is an alloy of iron. This has a high magnetic permeability (which behaves like a "good conductor" of magnetism with a low "resistance" to magnetic flux, to use analogies from electric circuits). Hence, any applied magnetic field will tend to be confined within the low "resistance" of the case material and the magnetic flux will not go near the magnetic media. In my experience, hard drives stand up to magnetism pretty well - I use a standard laptop computer as part of an instrumentation setup within a large magnetic field on a daily basis, and have yet to suffer any form of data loss.

    Besides, even if you were to realign magnetic domains sufficiently to make the data unreadable to the drive itself, a determined "bad guy" could use magnetoresistive microscopy (Slashdot story here [slashdot.org]) to piece the data back together again. Magnetoresistive microscopy would even be able to recover your data if you did an "rm -rf /*" when the bad guys appeared. Maybe you could run "shred" to erase your drives thoroughly when the bad guys knock on your door, and then try to stall them for an hour or so while your data is safely erased?

  • How nice of the police to make it wrong to help someone...this is why i tend to think they do more harm then good

    Please note that it is not the police who caused this... It is their job to enforce this unpopular law, but they did not create it. For that, you may thank your baby-kissing politicians.

    -jerdenn

  • I had friends who were planning for the anti-World Bank demo in Washington, DC last April. The Secret Service broke into their apartment and stole research materials.

    I will publish and evidence, details, etc. on my website.


    ________________________________________
  • Why do police even bother with these seize and hold operations? They don't have the same "air of legitimacy" that civil forfeiture does. Civil forfeiture laws allow them to take and even destroy or sell a suspect's items without the "bother" of a criminal trial; they certainly do not require a criminal conviction. They also appear more legitimate because they can say, look you had a hearing, and you lost. We know civil forfeiture is an egregious abuse of rights, but average citizens do not.
  • As far as I can tell, this did not start out as a big conspiracy against the citizenry, but the results are equivalent.

    This is always the case. I seriously doubt the people staffing the government have plans to deliver us into a police state. However, each little thing they do to increase the power of the government over citizens sends us there nonetheless. No conspiracy needed.

    ________________________________________
  • Where would you go?

    Belize. Enlish-speaking, tropical, better human rights record than the U.S. and no extradition treaty.



    ________________________________________
  • Flimsiest coincidence? They move the server to a new hostname to provide an area for the cracker to be 'detected', this guy wanders in and takes it upon himself to work out what exploit they used, portscannning, checking nameservers, etc, and that's "flimsiest coincidence"?
  • Didn't you learn anything from kevin mitnick?

    This is exactly what he did (well I don't know if the filesystem itself was encrypted). He had a gig or two of encrypted data and refused to give over the password on 5th ammendment grounds and he sat in jail for years without a trial.

    Now it is true that this is partially because he was trying to gain access to said data under discovery laws (which certainly should apply) but this should illustrate the attitude of law enforcement to encrypted data.

    What you really need is some way to hide the data. Don't give me any of this BS about hiding it in the low bits of jpegs...this couldn't stand up to any reasonable analysis (the patterns in the low bits would probably stand out as not due to random pixels). Instead if disk filesystems filled a large section with random bytes then it might be possible for a real peer reviewd algorithm to make it nigh impossible to tell the difference between an empty filesystem versus one with quite a bit of data on it.
  • What ever happened to innocent until proven guilty?

    You share a misconception with a lot of people. You are entitled to a presumption of innocence in the eyes of the judge and jury, but the rest of the criminal justice system presumes you guilty if there is some evidence against you. This is how it needs to be to make the system work. If the entire system presumed you innocent, you wouldn't even need to show up in court. Why should you? Axe murderers couldn't be held till their trials. Evidence (in the example you are griping about) couldn't be collected.

  • But they don't recognize the notion of natural rights like we are supposed to with the Bill of Rights. Specifically, the right to bear arms.

    But, the whole idea of moving out of the country is predicated on the US becoming a statist hellhole -- at which point the 2nd amendment is rubbish, anyway.

    On the broader issue, I agree with you. But the USA is the only country with a Bill of Rights with the cajones ours has. I wish more countries had a Bill of Rights and Consitution like the one the U.S.A. has.

    ________________________________________
  • A few quotes...

    "Firearms stand next in importance to the Constitution itself. They are the American people's liberty teeth and keystone under independence. From the hour the Pilgrims landed, to the present day, events, occurrences and tendencies prove that to ensure peace, security and happiness, the rifle and pistol are equally indispensable. The very atmosphere of firearms everywhere restrains evil interference - they deserve a place of honor with all that's good."
    -George Washington

    "A free people ought ... to be armed, To be prepared for war is one of the most effectual means of preserving peace. A free people ought not only to be armed, but disciplined."
    -George Washington

    Americans [have] the right and advantage of being armed -- unlike the citizens of other countries whose governments are afraid to trust their people with arms,"
    -James Madison

    "That the said Constitution shall never be construed to authorize Congress to infringe the just liberty of the press or the rights of conscience; or to prevent the people of the United States who are peaceable citizens from keeping their own arms..."
    -Samuel Adams

    "The Constitution of most of our states (and of the United States) assert that all power is inherent in the people; that they may exercise it by themselves; that it is their right and duty to be at all times armed and that they are entitled to freedom of person, freedom of religion, freedom of property, and freedom of press."
    -Thomas Jefferson

    "And what country can preserve its liberties, if its rulers are not warned from time to time that this people preserve the spirit of resistance? Let them take arms ... The tree of liberty must be refreshed from time to time, with the blood of patriots and tyrants,"
    -Thomas Jefferson

    "No free man shall ever be debarred the use of arms. The strongest reason for people to retain their right to keep and bear arms is as a last resort to protect themselves against tyrrany in government,"
    -Thomas Jefferson

    "The great object is that every man be armed. Everyone who is able may have a gun,"
    -Patrick Henry

    "To preserve liberty, it is essential that the whole body of people always possess arms ..."
    -Richard Henry Lee

    "The best we can hope for concerning the people at large is that they be properly armed,"
    -Alexander Hamilton

    "False is the idea of utility that sacrifices a thousand real advantages for one imaginary or trifling inconvenience; that would take fire from men because it burns, and water because one may drown in it; that has no remedy for evils except destruction. The laws that forbid the carrying of arms are laws of such a nature. They disarm only those who are neither inclined nor determined to commit crime."
    -Cesare Beccaria, quoted by Thomas Jefferson

    "Both the oligarch and Tyrant mistrust the people, and therefore deprive them of arms."
    -Aristotle

    "Amendment. II. A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed. "
    --The Consitution of the United States of America

    ________________________________________

  • The students sign an agreement to live in the dorms. Part of this agreement opens them up to the IT group's "raids." Abuse your bandwidth by running a porn/warez site and you'll get a knock on the door in the morning, a Polaroid taken of your sleepy self, and you'll have to surrender your stuff.

    The IT guys also have their systems set up to page them when spammers abuse the open ethernet ports in the library. Once they spot a spammer's MAC address on the network, they get a page telling them what floor and what port to go grab the guy on. Cool.
  • I can only hope that something like that story happens to you someday; it will knock some of the arrogance and pseudo sophistication out of you.

    Sorry, kiddo, as I responded to an earlier Kahuna fan, "something like that story" did in fact happen to someone I'm very close to and knocked a good deal of maturity into me. My attitude is also informed by my study of signal detection theory (understanding type I and Type II errors and how they are linked is sort of enlightening in dealing with multiple fields, including law) and my growing appriciation for acceptance of ambiguity.

    I'm sorry if you find my attitude arrogent. I can't expect to communicate with people if my attitude turns them off of my message. Of course if my message is sent out into a pit of libertarian raving like /. has turned into, its hard to judge if my attitude is actualy at fault or not.

    What I can't figure out is why, with the mouth foaming negitive responses I seem to be getting, I can't get moderated down to save my life these days.

    -Kahuna Burger

  • If in the course of executing that warrant, they think they have evidence of some other crime, they have to go convince the judge again and get another warrant.

    Sir, you are incorrect. Please refer to what is commonly known as the 'plain view doctrine'. A perfect example is Ivatury v. Texas, 792 S.W.2d 845 (Ct. App. 1990). If, while conducting a legal search, evidence of another crime is found, such evidence may be seized.

    -jerdenn

  • Vandalism then.

    On-line graffiti takes time to clean up, and if my company could be billing me out at $100/hr, I'm sure they'd rather I wasn't cleaning graffiti. Especially not when someone claims it shouldn't even be a crime.

  • Why is it "entirely obvious he didn't do anything wrong", because he wrote a little story and posted it to slashdot?
  • Wow, and I thought I had it bad. I was involved in a very similar incident. After hearing about telnetting directly into an smtp server for the first time, I pulled the total idiot and decided to telnet, from my personal non-roaming computer, into my school's smtp server and send a few friends some gag emails.

    Turns out one of the sysadmins (who here at Harvard are actually pretty smart) didn't like my behavior, so he had me Ad Boarded (school judiciary board). I tried to tell them I hadn't done anything wrong, I was just pulling a gag, but they insisted that I was trying to snoop around the system. One administrator on the board tried to suspend me, but the single computer expert on the board said that would be ridiculous. In the end, all I got was a slap-on-the-wrist letter in my permanent file.

    Funny thing is, a month after the incident, I got a letter from the library system asking me if I would be on a student board to evaluate their new web layout. Guess where they heard that I was a computer geek?
  • Sir, you are incorrect. Please refer to what is commonly known as the 'plain view doctrine'.
    I have not been discussing doctines promulgated by illiterate justices. I thought I had made it quite clear that I have been discussing the actual text of the Constitution. Which is why I said "At least, according to the text of the Fourth Amendment," and quoted said text.

    Which, I repeat, states "particularly describing the place to be searched, and the persons or things to be seized." There is no latitude there for any "plain view" exemption.

  • He's gonna get (rightly) spanked over copyright violations, too. 99.9% of pr0n is a violation of someone's copyright, not to mention his DivX movies and MP3s.
  • This questionnaire is not authorized by law. (See below). Instead of asking the already angry federal agent to please fill out this stupid form (remember the agent has control over your possessions at this point because he has a warrant), silently cooperate. Say nothing, except that you didn't do it (if that's true), and that you'll be contacting an attorney. Don't give them any information except at the direction of your attorney. Get an inventory of everything they take down to the last power cord and floppy diskette. Take notes on when they came, how long they stayed, what they did and said, and what our impressions were. Those notes could turn into a goldmine in case you later sue them for violating your rights.

    Here's the text of the actual law that it's based on, 5 U.S.C. 552(a). BTW, the "Federal Register" is a daily publication of the government, available at many libraries.

    U.S.C. 552

    (a) Each agency shall make available to the public information as follows: (1) Each agency shall separately state and currently publish in the Federal Register for the guidance of the public-- (A) descriptions of its central and field organization and the established places at which, the employees (and in the case of a uniformed service, the members) from whom, and the methods whereby, the public may obtain information, make submittals or requests, or obtain decisions; (B) statements of the general course and method by which its functions are channeled and determined, including the nature and requirements of all formal and informal procedures available; (C) rules of procedure, descriptions of forms available or the places at which forms may be obtained, and instructions as to the scope and contents of all papers, reports, or examinations; (D) substantive rules of general applicability adopted as authorized by law, and statements of general policy or interpretations of general applicability formulated and adopted by the agency; and (E) each amendment, revision, or repeal of the foregoing. Except to the extent that a person has actual and timely notice of the terms thereof, a person may not in any manner be required to resort to, or be adversely affected by, a matter required to be published in the Federal Register and not so published. For the purpose of this paragraph, matter reasonably available to the class of persons affected thereby is deemed published in the Federal Register when incorporated by reference therein with the approval of the Director of the Federal Register. (2) Each agency, in accordance with published rules, shall make available for public inspection and copying-- (A) final opinions, including concurring and dissenting opinions, as well as orders, made in the adjudication of cases; (B) those statements of policy and interpretations which have been adopted by the agency and are not published in the Federal Register; (C) administrative staff manuals and instructions to staff that affect a member of the public; (D) copies of all records, regardless of form or format, which have been released to any person under paragraph (3) and which, because of the nature of their subject matter, the agency determines have become or are likely to become the subject of subsequent requests for substantially the same records; and (E) a general index of the records referred to under subparagraph (D); unless the materials are promptly published and copies offered for sale. For records created on or after November 1, 1996, within one year after such date, each agency shall make such records available, including by computer telecommunications or, if computer telecommunications means have not been established by the agency, by other electronic means. To the extent required to prevent a clearly unwarranted invasion of personal privacy, an agency may delete identifying details when it makes available or publishes an opinion, statement of policy, interpretation, staff manual, instruction, or copies of records referred to in subparagraph (D). However, in each case the justification for the deletion shall be explained fully in writing, and the extent of such deletion shall be indicated on the portion of the record which is made available or published, unless including that indication would harm an interest protected by the exemption in subsection (b) under which the deletion is made. If technically feasible, the extent of the deletion shall be indicated at the place in the record where the deletion was made. Each agency shall also maintain and make available for public inspection and copying current indexes providing identifying information for the public as to any matter issued, adopted, or promulgated after July 4, 1967, and required by this paragraph to be made available or published. Each agency shall promptly publish, quarterly or more frequently, and distribute (by sale or otherwise) copies of each index or supplements thereto unless it determines by order published in the Federal Register that the publication would be unnecessary and impracticable, in which case the agency shall nonetheless provide copies of such index on request at a cost not to exceed the direct cost of duplication. Each agency shall make the index referred to in subparagraph (E) available by computer telecommunications by December 31, 1999. A final order, opinion, statement of policy, interpretation, or staff manual or instruction that affects a member of the public may be relied on, used, or cited as precedent by an agency against a party other than an agency only if-- (i) it has been indexed and either made available or published as provided by this paragraph; or (ii) the party has actual and timely notice of the terms thereof. (3)(A) Except with respect to the records made available under paragraphs (1) and (2) of this subsection, each agency, upon any request for records which (i) reasonably describes such records and (ii) is made in accordance with published rules stating the time, place, fees (if any), and procedures to be followed, shall make the records promptly available to any person. (B) In making any record available to a person under this paragraph, an agency shall provide the record in any form or format requested by the person if the record is readily reproducible by the agency in that form or format. Each agency shall make reasonable efforts to maintain its records in forms or formats that are reproducible for purposes of this section. (C) In responding under this paragraph to a request for records, an agency shall make reasonable efforts to search for the records in electronic form or format, except when such efforts would significantly interfere with the operation of the agency's automated information system. (D) For purposes of this paragraph, the term "search" means to review, manually or by automated means, agency records for the purpose of locating those records which are responsive to a request. (4)(A)(i) In order to carry out the provisions of this section, each agency shall promulgate regulations, pursuant to notice and receipt of public comment, specifying the schedule of fees applicable to the processing of requests under this section and establishing procedures and guidelines for determining when such fees should be waived or reduced. Such schedule shall conform to the guidelines which shall be promulgated, pursuant to notice and receipt of public comment, by the Director of the Office of Management and Budget and which shall provide for a uniform schedule of fees for all agencies. (ii) Such agency regulations shall provide that-- (I) fees shall be limited to reasonable standard charges for document search, duplication, and review, when records are requested for commercial use; (II) fees shall be limited to reasonable standard charges for document duplication when records are not sought for commercial use and the request is made by an educational or noncommercial scientific institution, whose purpose is scholarly or scientific research; or a representative of the news media; and (III) for any request not described in (I) or (II), fees shall be limited to reasonable standard charges for document search and duplication. (iii) Documents shall be furnished without any charge or at a charge reduced below the fees established under clause (ii) if disclosure of the information is in the public interest because it is likely to contribute significantly to public understanding of the operations or activities of the government and is not primarily in the commercial interest of the requester. (iv) Fee schedules shall provide for the recovery of only the direct costs of search, duplication, or review. Review costs shall include only the direct costs incurred during the initial examination of a document for the purposes of determining whether the documents must be disclosed under this section and for the purposes of withholding any portions exempt from disclosure under this section. Review costs may not include any costs incurred in resolving issues of law or policy that may be raised in the course of processing a request under this section. No fee may be charged by any agency under this section-- (I) if the costs of routine collection and processing of the fee are likely to equal or exceed the amount of the fee; or (II) for any request described in clause (ii)(II) or (III) of this subparagraph for the first two hours of search time or for the first one hundred pages of duplication. (v) No agency may require advance payment of any fee unless the requester has previously failed to pay fees in a timely fashion, or the agency has determined that the fee will exceed $250. (vi) Nothing in this subparagraph shall supersede fees chargeable under a statute specifically providing for setting the level of fees for particular types of records. (vii) In any action by a requester regarding the waiver of fees under this section, the court shall determine the matter de novo: Provided, That the court's review of the matter shall be limited to the record before the agency. (B) On complaint, the district court of the United States in the district in which the complainant resides, or has his principal place of business, or in which the agency records are situated, or in the District of Columbia, has jurisdiction to enjoin the agency from withholding agency records and to order the production of any agency records improperly withheld from the complainant. In such a case the court shall determine the matter de novo, and may examine the contents of such agency records in camera to determine whether such records or any part thereof shall be withheld under any of the exemptions set forth in subsection (b) of this section, and the burden is on the agency to sustain its action. In addition to any other matters to which a court accords substantial weight, a court shall accord substantial weight to an affidavit of an agency concerning the agency's determination as to technical feasibility under paragraph (2)(C) and subsection (b) and reproducibility under paragraph (3)(B). (C) Notwithstanding any other provision of law, the defendant shall serve an answer or otherwise plead to any complaint made under this subsection within thirty days after service upon the defendant of the pleading in which such complaint is made, unless the court otherwise directs for good cause shown. [(D) Repealed. Pub.L. 98-620, Title IV, 402(2), Nov. 8, 1984, 98 Stat. 3357] (E) The court may assess against the United States reasonable attorney fees and other litigation costs reasonably incurred in any case under this section in which the complainant has substantially prevailed. (F) Whenever the court orders the production of any agency records improperly withheld from the complainant and assesses against the United States reasonable attorney fees and other litigation costs, and the court additionally issues a written finding that the circumstances surrounding the withholding raise questions whether agency personnel acted arbitrarily or capriciously with respect to the withholding, the Special Counsel shall promptly initiate a proceeding to determine whether disciplinary action is warranted against the officer or employee who was primarily responsible for the withholding. The Special Counsel, after investigation and consideration of the evidence submitted, shall submit his findings and recommendations to the administrative authority of the agency concerned and shall send copies of the findings and recommendations to the officer or employee or his representative. The administrative authority shall take the corrective action that the Special Counsel recommends. (G) In the event of noncompliance with the order of the court, the district court may punish for contempt the responsible employee, and in the case of a uniformed service, the responsible member. (5) Each agency having more than one member shall maintain and make available for public inspection a record of the final votes of each member in every agency proceeding. (6)(A) Each agency, upon any request for records made under paragraph (1), (2), or (3) of this subsection, shall-- (i) determine within 20 days (excepting Saturdays, Sundays, and legal public holidays) after the receipt of any such request whether to comply with such request and shall immediately notify the person making such request of such determination and the reasons therefor, and of the right of such person to appeal to the head of the agency any adverse determination; and (ii) make a determination with respect to any appeal within twenty days (excepting Saturdays, Sundays, and legal public holidays) after the receipt of such appeal. If on appeal the denial of the request for records is in whole or in part upheld, the agency shall notify the person making such request of the provisions for judicial review of that determination under paragraph (4) of this subsection. (B)(i) In unusual circumstances as specified in this subparagraph, the time limits prescribed in either clause (i) or clause (ii) of subparagraph (A) may be extended by written notice to the person making such request setting forth the unusual circumstances for such extension and the date on which a determination is expected to be dispatched. No such notice shall specify a date that would result in an extension for more than ten working days, except as provided in clause (ii) of this subparagraph. (ii) With respect to a request for which a written notice under clause (i) extends the time limits prescribed under clause (i) of subparagraph (A), the agency shall notify the person making the request if the request cannot be processed within the time limit specified in that clause and shall provide the person an opportunity to limit the scope of the request so that it may be processed within that time limit or an opportunity to arrange with the agency an alternative time frame for processing the request or a modified request. Refusal by the person to reasonably modify the request or arrange such an alternative time frame shall be considered as a factor in determining whether exceptional circumstances exist for purposes of subparagraph (C). (iii) As used in this subparagraph, "unusual circumstances" means, but only to the extent reasonably necessary to the proper processing of the particular requests-- (I) the need to search for and collect the requested records from field facilities or other establishments that are separate from the office processing the request; (II) the need to search for, collect, and appropriately examine a voluminous amount of separate and distinct records which are demanded in a single request; or (III) the need for consultation, which shall be conducted with all practicable speed, with another agency having a substantial interest in the determination of the request or among two or more components of the agency having substantial subject-matter interest therein. (iv) Each agency may promulgate regulations, pursuant to notice and receipt of public comment, providing for the aggregation of certain requests by the same requestor, or by a group of requestors acting in concert, if the agency reasonably believes that such requests actually constitute a single request, which would otherwise satisfy the unusual circumstances specified in this subparagraph, and the requests involve clearly related matters. Multiple requests involving unrelated matters shall not be aggregated. (C)(i) Any person making a request to any agency for records under paragraph (1), (2), or (3) of this subsection shall be deemed to have exhausted his administrative remedies with respect to such request if the agency fails to comply with the applicable time limit provisions of this paragraph. If the Government can show exceptional circumstances exist and that the agency is exercising due diligence in responding to the request, the court may retain jurisdiction and allow the agency additional time to complete its review of the records. Upon any determination by an agency to comply with a request for records, the records shall be made promptly available to such person making such request. Any notification of denial of any request for records under this subsection shall set forth the names and titles or positions of each person responsible for the denial of such request. (ii) For purposes of this subparagraph, the term "exceptional circumstances" does not include a delay that results from a predictable agency workload of requests under this section, unless the agency demonstrates reasonable progress in reducing its backlog of pending requests. (iii) Refusal by a person to reasonably modify the scope of a request or arrange an alternative time frame for processing a request (or a modified request) under clause (ii) after being given an opportunity to do so by the agency to whom the person made the request shall be considered as a factor in determining whether exceptional circumstances exist for purposes of this subparagraph. (D)(i) Each agency may promulgate regulations, pursuant to notice and receipt of public comment, providing for multitrack processing of requests for records based on the amount of work or time (or both) involved in processing requests. (ii) Regulations under this subparagraph may provide a person making a request that does not qualify for the fastest multitrack processing an opportunity to limit the scope of the request in order to qualify for faster processing. (iii) This subparagraph shall not be considered to affect the requirement under subparagraph (C) to exercise due diligence. (E)(i) Each agency shall promulgate regulations, pursuant to notice and receipt of public comment, providing for expedited processing of requests for records-- (I) in cases in which the person requesting the records demonstrates a compelling need; and (II) in other cases determined by the agency. (ii) Notwithstanding clause (i), regulations under this subparagraph must ensure-- (I) that a determination of whether to provide expedited processing shall be made, and notice of the determination shall be provided to the person making the request, within 10 days after the date of the request; and (II) expeditious consideration of administrative appeals of such determinations of whether to provide expedited processing. (iii) An agency shall process as soon as practicable any request for records to which the agency has granted expedited processing under this subparagraph. Agency action to deny or affirm denial of a request for expedited processing pursuant to this subparagraph, and failure by an agency to respond in a timely manner to such a request shall be subject to judicial review under paragraph (4), except that the judicial review shall be based on the record before the agency at the time of the determination. (iv) A district court of the United States shall not have jurisdiction to review an agency denial of expedited processing of a request for records after the agency has provided a complete response to the request. (v) For purposes of this subparagraph, the term "compelling need" means-- (I) that a failure to obtain requested records on an expedited basis under this paragraph could reasonably be expected to pose an imminent threat to the life or physical safety of an individual; or (II) with respect to a request made by a person primarily engaged in disseminating information, urgency to inform the public concerning actual or alleged Federal Government activity. (vi) A demonstration of a compelling need by a person making a request for expedited processing shall be made by a statement certified by such person to be true and correct to the best of such person's knowledge and belief. (F) In denying a request for records, in whole or in part, an agency shall make a reasonable effort to estimate the volume of any requested matter the provision of which is denied, and shall provide any such estimate to the person making the request, unless providing such estimate would harm an interest protected by the exemption in subsection (b) pursuant to which the denial is made. (b) This section does not apply to matters that are-- (1) (A) specifically authorized under criteria established by an Executive order to be kept secret in the interest of national defense or foreign policy and (B) are in fact properly classified pursuant to such Executive order; (2) related solely to the internal personnel rules and practices of an agency; (3) specifically exempted from disclosure by statute (other than section 552b of this title), provided that such statute (A) requires that the matters be withheld from the public in such a manner as to leave no discretion on the issue, or (B) establishes particular criteria for withholding or refers to particular types of matters to be withheld; (4) trade secrets and commercial or financial information obtained from a person and privileged or confidential; (5) inter-agency or intra-agency memorandums or letters which would not be available by law to a party other than an agency in litigation with the agency; (6) personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy; (7) records or information compiled for law enforcement purposes, but only to the extent that the production of such law enforcement records or information (A) could reasonably be expected to interfere with enforcement proceedings, (B) would deprive a person of a right to a fair trial or an impartial adjudication, (C) could reasonably be expected to constitute an unwarranted invasion of personal privacy, (D) could reasonably be expected to disclose the identity of a confidential source, including a State, local, or foreign agency or authority or any private institution which furnished information on a confidential basis, and, in the case of a record or information compiled by criminal law enforcement authority in the course of a criminal investigation or by an agency conducting a lawful national security intelligence investigation, information furnished by a confidential source, (E) would disclose techniques and procedures for law enforcement investigations or prosecutions, or would disclose guidelines for law enforcement investigations or prosecutions if such disclosure could reasonably be expected to risk circumvention of the law, or (F) could reasonably be expected to endanger the life or physical safety of any individual; (8) contained in or related to examination, operating, or condition reports prepared by, on behalf of, or for the use of an agency responsible for the regulation or supervision of financial institutions; or (9) geological and geophysical information and data, including maps, concerning wells. Any reasonably segregable portion of a record shall be provided to any person requesting such record after deletion of the portions which are exempt under this subsection. The amount of information deleted shall be indicated on the released portion of the record, unless including that indication would harm an interest protected by the exemption in this subsection under which the deletion is made. If technically feasible, the amount of the information shall be indicated at the place in the record where such deletion is made. (c)(1) Whenever a request is made which involves access to records described in subsection (b)(7)(A) and-- (A) the investigation or proceeding involves a possible violation of criminal law; and (B) there is reason to believe that (i) the subject of the investigation or proceeding is not aware of its pendency, and (ii) disclosure of the existence of the records could reasonably be expected to interfere with enforcement proceedings, the agency may, during only such time as that circumstance continues, treat the records as not subject to the requirements of this section. (2) Whenever informant records maintained by a criminal law enforcement agency under an informant's name or personal identifier are requested by a third party according to the informant's name or personal identifier, the agency may treat the records as not subject to the requirements of this section unless the informant's status as an informant has been officially confirmed. (3) Whenever a request is made which involves access to records maintained by the Federal Bureau of Investigation pertaining to foreign intelligence or counterintelligence, or international terrorism, and the existence of the records is classified information as provided in subsection (b)(1), the Bureau may, as long as the existence of the records remains classified information, treat the records as not subject to the requirements of this section. (d) This section does not authorize withholding of information or limit the availability of records to the public, except as specifically stated in this section. This section is not authority to withhold information from Congress. (e)(1) On or before February 1 of each year, each agency shall submit to the Attorney General of the United States a report which shall cover the preceding fiscal year and which shall include-- (A) the number of determinations made by the agency not to comply with requests for records made to such agency under subsection (a) and the reasons for each such determination; (B)(i) the number of appeals made by persons under subsection (a)(6), the result of such appeals, and the reason for the action upon each appeal that results in a denial of information; and (ii) a complete list of all statutes that the agency relies upon to authorize the agency to withhold information under subsection (b)(3), a description of whether a court has upheld the decision of the agency to withhold information under each such statute, and a concise description of the scope of any information withheld; (C) the number of requests for records pending before the agency as of September 30 of the preceding year, and the median number of days that such requests had been pending before the agency as of that date; (D) the number of requests for records received by the agency and the number of requests which the agency processed; (E) the median number of days taken by the agency to process different types of requests; (F) the total amount of fees collected by the agency for processing requests; and (G) the number of full-time staff of the agency devoted to processing requests for records under this section, and the total amount expended by the agency for processing such requests. (2) Each agency shall make each such report available to the public including by computer telecommunications, or if computer telecommunications means have not been established by the agency, by other electronic means. (3) The Attorney General of the United States shall make each report which has been made available by electronic means available at a single electronic access point. The Attorney General of the United States shall notify the Chairman and ranking minority member of the Committee on Government Reform and Oversight of the House of Representatives and the Chairman and ranking minority member of the Committees on Governmental Affairs and the Judiciary of the Senate, no later than April 1 of the year in which each such report is issued, that such reports are available by electronic means. (4) The Attorney General of the United States, in consultation with the Director of the Office of Management and Budget, shall develop reporting and performance guidelines in connection with reports required by this subsection by October 1, 1997, and may establish additional requirements for such reports as the Attorney General determines may be useful. (5) The Attorney General of the United States shall submit an annual report on or before April 1 of each calendar year which shall include for the prior calendar year a listing of the number of cases arising under this section, the exemption involved in each case, the disposition of such case, and the cost, fees, and penalties assessed under subparagraphs (E), (F), and (G) of subsection (a)(4). Such report shall also include a description of the efforts undertaken by the Department of Justice to encourage agency compliance with this section. (f) For purposes of this section, the term-- (1) "agency" as defined in section 551(1) of this title includes any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency; and (2) "record" and any other term used in this section in reference to information includes any information that would be an agency record subject to the requirements of this section when maintained by an agency in any format, including an electronic format. (g) The head of each agency shall prepare and make publicly available upon request, reference material or a guide for requesting records or information from the agency, subject to the exemptions in subsection (b), including-- (1) an index of all major information systems of the agency; (2) a description of major information and record locator systems maintained by the agency; and (3) a handbook for obtaining various types and categories of public information from the agency pursuant to chapter 35 of title 44, and under this section.

  • A link for this in a more printable form along with a little history and explanation can be found here [guntruths.com].

    Enjoy

  • by bigboi ( 156897 ) on Tuesday October 31, 2000 @01:44PM (#661861)
    actually, it is not safe to rely on this.

    the supreme court has ruled, for instance, that if officers have a warrant to search your house for guns and they find drugs, they can bring you up on drug charges (or vice versa).

    In fact, in the Bowers case in Georgia, officers had a out of date warrant to search Bowers' house (for drugs, I think). They didn't find any drugs, but when they entered the house they found him with another man and prosecuted him on sodomy charges. Bowers appealed, trying to get the evidence thrown out; but the Supreme Court upheld the ruling.

  • by Apotsy ( 84148 ) on Tuesday October 31, 2000 @05:37PM (#661907)
    I think that would be very impractical. I actually did some experiments on erasing magnetic media for a science project when I was in school. I tried to see how difficult it was to shield VHS tapes from magnetic erasure. The thing I found was that it was so hard to erase a tape in the first place that there's pretty much no way you can accidentally erase those damn things. I can tell you it would take a very powerful magnetic field to erase VHS tapes from a distance, and that probably applies to most other forms of magnetic storage as well.

    Here's a desciption of my little science project: At first, I figured I could take a small dime-store magnet and pass it within few inches of a VHS tape, and it would wreak total havoc. Nope. Nothing happened. There was no noticeable degradation of the video signal at all. So, I went to Radio Shack and asked for some bigger magnets. I discovered that a device existed for just what I wanted -- a high capacity bulk eraser. This was a small hand-held device that contained a monster electromagnet and was powered by plugging it directly into 120V wall socket. Apparently it didn't even bother converting the power to DC, since it had a very loud 60Hz hum when turned on. To give you an idea just how powerful this sucker was, I was able to place a set of keys on the floor, then hold the bulk eraser in the air about 6 inches above it, when I turned it on the keys would jump up and stick to the magnet (rattling very loudly with that same 60Hz hum I mentioned).

    So I bought one of these erasers and took it home to try it out. The instructions said that in order to truly erase information stored on magnetic media (that is, sufficiently randomize the data so that the media became indistinguishable from blank, unrecorded media), you needed a decaying magnetic field. To produce this using the bulk eraser, one had to start with the eraser right up against the media to be erased, then while moving the eraser in circles, slowly pull back to a distance of a few feet. So I decided to try this using the videotape. When I turned on the eraser, the tape actually stuck to the damn thing, it was so powerful. Wow. What little metal there was inside the VHS tape was still enough to actually lift it off the table when it was within reach of the bulk eraser's uber-magnet. I figured the tape must have been erased instantly, so I didn't even bother with the decaying field bit -- I just turned off the eraser and popped the tape in the player expecting to see static. To my suprise, the test pattern I had recorded was virtually unscathed! There was just a little bit of signal degradation visible, and that was it!

    Turns out, the instructions for the bulk eraser weren't kidding. In order to erase a VHS tape I had to very slowly pull back from the tape while moving it in circles, starting with the magnet right up against the cassette's outer shell and taking a good 30 seconds to a mintue to pull the eraser back away from it while going around in circles. Even when I did this as carefully as I could, I found that although the tape was reduced to mostly static, there was still a little bit of signal left behind on the tape -- enough, in fact, to tell what was once on it. No matter how much I tried, I was never able to completely erase a VHS tape, even with an extremely powerful electromagnet at close range. I also found that if I put the tape inside small lockbox so that I could only get within few inches of it, the eraser was pretty much useless, even when I pressed it right up against the outside of the lockbox's surface. Just a couple of inches of distance were enough to prevent erasure from one of the most powerful magnets I'd ever seen. The conclusion I reached from this project was that magnetic media is actually quite durable, and that all you need to protect it is to just keep people from getting to close to it.

    If you were to install something in a doorway with the intention of erasing a computer's hard drive as it passed through, the magnets would have to be so powerful that they would yank people's keys out of their pockets. The FBI goons would probably be able to feel their firearms being tugged on, which might make them a wee bit suspicious. And even with extremely powerful magnets, you still would have a hard time creating the "decaying" field effect necessary to sufficiently randomize the data.

    Now, I know what some people reading this are going to think. A VHS tape is a very different beast from one of today's high-capacity hard disks. For one thing, a hard disk has its information stored digitally, meaning it's an all-or-nothing situation. The data doesn't get degraded, it just becomes unreadable. Also, if any of the filesystem's metadata gets erased, it will also render the disk unreadable. Finally, information on hard disks is recorded at much higher density than the VHS tapes I was experimenting with, so they are much more sensitive to erasure my magnetic fields. Well, all of those points are valid, and yes, it probably would take a little less to erase a HD than a VHS tape, but even damaged or partially erased disks can be read by data recovery facitilties, which have clean room equipment and can go through and scan disks at the lowest possible level. To prevent the Feds from getting any data off your disks, you would have to make absolutely sure that the magnetic media were totally randomized, and that would take some pretty elaborate and specific conditions. I just don't think it would be practical to set up a doorway device that could erase a disk that passed through it.

    One other bit of anecdotal evidence: I've got an iMac sitting on my desk at work, and it performs a monitor degaussing every time I wake up the display. The degaussing coils are so powerful they produce distortion in a 17-inch monitor sitting about two feet away. Now consider that the iMac's hard drive is inside the same case as those degaussing coils. In fact, it's just a few inches away from them. Yet it remains intact through all those magnetic disturbances.

    I think a much better scheme would be to have a "kill switch" on your machine. Put a small battery-operated circuit board inside your computer that is capable of powering up the hard disk and sending it low-level format commands. Make it remote controlled. Then, using your remote control, activate it as the feds are taking your machine out the door. The hard drive would be erased by the time they got to it back to their offices.

  • by mindstrm ( 20013 ) on Tuesday October 31, 2000 @07:23AM (#661929)
    I thought a search warrant was a warrant to search a particular place for particular things.

    Seraching 'a dorm room for a computer' is not good enough. Searching for 'logs indicating xxx on a computer in the dorm room' should be fine... but they should in no way be able to sieze it!

    To think of one solution, I know a company in BC that was raided by the cops/fbi/irs/ and a few others in a big sting. The admins were cornered (so nobody would erase anyhting) and then, under supervision, were permitted to keep running the system, while the cops had experts take copies of relevant information.
  • by DaveHowe ( 51510 ) on Tuesday October 31, 2000 @07:23AM (#661937)
    If you think that is bad, you should see what they are trying to sneek into the US via the "treaty provisions" backdoor - US gov interests are lobbying for europe to adopt the english RIP bill as a european measure, so they can then "reluctantly" adopt it in the US without having to worry about that bothersome constitution getting in the way;
    One of the highlights of the new bill is that they can demand your encryption keys from you (on pain of 2 years emprisonment) and if you decide to mention it on your website as this guy has done? that's a five year prison sentence. Paranoia, you haven't begun to flow....
    --
  • Andres Salomon is a fool for putting his explanation on the net. He should get a lawyer and SHUT HIS MOUTH.

    So far, the "everything you say can and will be used againt you" has given the FBI a lot of evidence.

    FBI: "Your Honor, I present the following quotes from the defendant's website into evidence. You will see that the defendant in his own words has admitted that he used the Yankee's computer in very irregular in improper ways."

    *I'm simply an RPI student, admin, and programmer
    (C/perl/whatever) who likes to dabble in cryptography, kernel hacking,

    FBI: See, he's a hacker, by his own admission

    *I know my way around

    FBI: Bragging is typical for script kiddies.

    *my initial reaction was "oh shit, someone's pissed about my 30 gig mp3 collection

    FBI: The defendant also admits that he pirates music in large quantities.

    * I then began a post-mortem inspection; I always find this to be very interesting

    FBI: Get's his willies by trespassing. He's a criminal who loves crime.

    *The last time I did this, I discovered the intruder had gotten in through...

    FBI: The defendant did this on more than one system.

    *I first checked port 21 of www.yankees.com, noticing that it was running wu-ftpd-2.6.0;

    FBI: The defendant has stated exactly how he hacked the yankee website.

    *So, I did a zone transfer of yankees.com (host -l
    -t any yankees.com), and noticed an old.yankees.com.

    FBI: The defendant admits to yet another trespass command. He is letting us see how his criminal mind works.

    *I got no where with this (whether it was due to a firewall, I do not know), so I
    returned to my IRC client

    FBI: The defendant is describing how he dealt with an obstacle put in place by the yankee sysadmin.

    *The entire thing lasted possibly five minutes,

    FBI: The defendant is doing some more bragging. It is common among hackers to brag about being able to root a box quickly.

  • by DzugZug ( 52149 ) on Tuesday October 31, 2000 @07:28AM (#661961) Journal
    If anyone with a badge knocks on your door give there are only two things you should tell them.
    1. Your name
    2. Your lawyer's name
  • by 1010011010 ( 53039 ) on Tuesday October 31, 2000 @07:30AM (#661976) Homepage
    You just need to buy a computer made by G. Gordon Liddy Systems, inc. You know, one of those 9-mm "autoloader" point-and-click devices.

    ;)



    ________________________________________
  • by UnknownSoldier ( 67820 ) on Tuesday October 31, 2000 @07:46AM (#661981)
    PUBLIC SERVANT'S QUESTIONAIRE
    Public Law 93-579 states in part: "The purpose of this Act is to provide certain safeguards for an individual against invasion of personal privacy by requiring Federal agencies...to permit and individual to determine what records pertaining to him are collected, maintained, used, or disseminated by such agencies."

    The following questions are based upon that act and are necessary in order that this individual may make a reasonable determination concerning divulgence of information to this agency.

    1. Name of public servant...............

    2. Residence......City.....State......Zip......

    3. Name of department, bureau, or agency by which public servant
    is employed........supervisor's name......

    4. It's mailing address...........City......State....Zip......

    5. Will public servant uphold the Constitution of the United States?

    6. Did public servant furnish proof of identity?

    7. What was the nature of proof?..............

    8. Will public servant furnish a copy of the law or regulation which
    authorizes this investigation?

    9. Will the public servant read aloud the portion of the law authorizing
    the questions he will ask?

    10. Are the answers to the questions voluntary or mandatory?

    11. Are the questions to be asked based upon a specific law/regulation,
    or are they being used as a discovery process?

    12. What other uses may be made of this information?

    13. What other agencies may have access to this information?

    14. What will be the effect upon me if I should choose not to answer
    any part or all of these questions?

    15. Name of person in government requesting that this investigation be
    made...............

    16. Is this investigation 'general' or is it 'special'?

    17. Have you consulted, questioned, interviewed, or received information
    from any third party relative to this investigation?

    18. If so, the identity of such third parties..........

    19. Do you reasonably anticipate either a civil or criminal action to
    be initiated or pursued based upon any of the requested information?

    20. Is there a file of records, information, or correspondence relating
    to me being maintained by this agency? If yes, which?

    21. Is this agency using any information pertaining to me which was
    supplied by another agency or government source?

    22. May I have a copy of that information?

    23. Will the public servant guarantee that the information in these
    files will not be used by any other department other than the one
    by whom he is employed? If not, why not?

    If any request for information relating to me is received from any
    person or agency, you must advise me in writing before releasing such
    information. Failure to do so may subject you to possible civil or
    criminal action as provided by the act.

    I swear (affirm) that the answers I have given to the foregoing
    questions are complete and correct in every particular.
    X ____________________________ Date: ________/_________/_____________
    Witness:________________________ Witness:__________________________

    Authorities for Questions:

    1,2,3,4 In order to be sure you know exactly who you are giving the
    information to. Residence and business addresses are needed in case you
    need to serve process in a civil or criminal action upon this individual.

    5 All public servants have taken a sworn oath to uphold and
    defend the constitution.

    6,7 This is standard procedure by government agents and officers.
    See Internal Revenue Manual, MT-9900-26, Section 242.133.

    8,9,10 Title 5 USC 552a, paragraph (e) (3) (A)

    11 Title 5 USC 552a, paragraph (d) (5), (e) (1)

    12,13 Title 5 USC 552a, paragraph (e) (3) (B), (e) (3) (C)

    14 Title 5 USC 552a, paragraph (e) (3) (D)

    15 Public Law 93-579 (b) (1)

    16 Title 5 USC 552a, paragraph (e) (3) (A)

    17,18 Title 5 USC 552a, paragraph (e) (2)

    19 Title 5 USC 552a, paragraph (d) (5)

    20,21 Public Law 93-579 (b) (1)

    22 Title 5 USC 552a, paragraph (d) (1)

    23 Title 5 USC 552a, paragraph (e) (10)

    You can find more interesting information on your rights here: Frog Farm Faq [nettrash.com]
  • by fluxrad ( 125130 ) on Tuesday October 31, 2000 @07:32AM (#661984) Homepage
    hmm. that holds up.

    hmmm. so let's see here. you found out that your neighbor's place had been broken into (legal). you removed evidence from a crime scene (illegal). you went into your neighbor's home without their permission (tresspass. illegal). and now you think you have nothing to worry about??????? If the FBI just "questions" you, you've gotten off easy.

    let me tell you another story.

    this guy heard that a website had been hacked on irc (legal). So, he visited the site (legal). He then proceded to check the versions of some of the services running (legal). He did a DNS lookup to see which boxes were running on the network via such sinister and ill-used binaries as nslookup and, dare i say, dig possibly? DEAR GOD!!!!!!! (btw - also legal).

    at that point. the FBI felt that they had enough evidence to make this gentleman a suspect. They seized his computers (illegal). The way i see it, the only thing this guy did wrong was not making sure he had a lawyer present.


    FluX
    After 16 years, MTV has finally completed its deevolution into the shiny things network
  • by Anonymous Coward on Tuesday October 31, 2000 @07:47AM (#661990)
    Which is precisely why he should speak out. His explanation makes it clear that he was just passing through. Public outrage is his best hope for getting his - and our! - rights back. If he keeps quiet, he may be reducing his chance for legal trouble, but he's encouraging this behavior by the authorities in the future.
  • by Hard_Code ( 49548 ) on Tuesday October 31, 2000 @07:49AM (#661998)
    Yes, well when shit happens those in power are more often on the producing end. They are *supposed* to err on the side of the rights of citizens. Saying "shit happens" is a cop out. We employ these people with our tax dollars.
  • by wen ( 35796 ) on Tuesday October 31, 2000 @08:10AM (#662011) Journal
    I am involved in a linux security group. We are working on cracking our own boxes, to learn about security and hardening of systems.

    What implications does the law have on us? Under the law, are we allowed to crack our computers? After all if we force our way into our own house, is that breaking and entering?

    One important implication would be, what happens if one of our members should be suspected of cracking system(s). Do we automatically become liable in any way?

    How do hacking sites handle this problem?
  • by KahunaBurger ( 123991 ) on Tuesday October 31, 2000 @07:35AM (#662012)
    Assuming complete accuracy (unlikely recalling an oft told story with high emotional connotations well after the event) is that sometimes shit happens. Thats it. Its not that the cops hate you, its not that you can't trust anyone, its that sometimes something nasty happens to someone that you had the cababilty of doing, right after that someone did something expected to piss you off. And guess what, that makes you the prime suspect. Not because of persecution, or legal incompentence, or vindictiveness, just because of what happened.

    From your story, it sounds like you didn't do anything wrong except try to log into the system after you had been fired (as a kid you wouldn't know better, but you probably should have asked to arrange a time to come back and transfer files with a current sys admin) but just because you didn't do anything wrong doesn't mean that there is something evil or incompentent about suspicion towards you. Sometimes shit just happens that way.

    I hope that someday you will get a little perspective and be able to think about this unfortunate event maturely, but for now, your story is an example to us on the interactions between computer users and the law - just not neccassarily the example you intended.

    Kahuna Burger

  • by Alatar ( 227876 ) on Tuesday October 31, 2000 @07:35AM (#662014) Homepage
    The Steve Jackson Games case isn't all happy endings...they were illegally raided by the U.S. Government in 1990, had their computer equipment confiscated, and received their equipment back in 1994. By that time the 286s that the government stole were useless. The damages? $300,000, of which $250,000 went to attorney's fees. Who really won this case, I ask?
  • by sonoffreak ( 60226 ) on Tuesday October 31, 2000 @07:52AM (#662028)
    Last year I got a phone call paired with an email saying that I needed to make an appointment to meet with the Dean of Student Affairs of my smallish liberal arts school (and yes I realize I'm an idiot for even thiking about doing CS at a liberal arts school, but its too late now.)

    Anyway I figure its something to do with my grades or something and I go to his office that afternoon. I'm sitting out in the waiting room, waiting for him to get done with whatever he's doing and I picked up one of the newsweeks on the Yahoo DDoS stuff and look at how the mainstream media presents the issue to the average Joe. Then he calls me into the room and tells me that they have evidence that I launched a DoS attack on a "Canadian Website". I am completely dumbfounded. They said that they needed to find out what happened or I would have the FBI knocking on my door.

    I'm not script kiddie. Never have been. I have a little bit of an interest in security, but more in the areas of detection and protection, definitely not exploitation. Anyway, they want me to sign forms permitting the school to search my computer. This really freaked me out all these stories of people's equipment being raided flashed by in my head. I almost said no so I could call my parents and a lawyer, because I didn't know if that was the best thing to do, but then I realized I didn't have anything to hide.

    So we march back to my dorm room and meet up with the people from the campus Computer Center (Motto: COBOL is our friend) who are going to search my PC. Well we get to my room and they want to have a look at my computer. I opened up a terminal window and their "UNIX guy" sits down stares at the screen for a few seconds then gets back up and asks me to pull up the machines IP address. I type ifconfig and highlight the address for him. Then there's some confusion. They figure out that my rommates Pentium 133 laptop running Win95 has the source address of the attack. I find it funny that their hard evidence thats pointed to me is the source address of a computer that isn't mine and on a DoS attack where it is most likely spoofed. They then start lecturing me for running Linux on my computer. They said they don't support Linux. I said that's great, I don't need support. In fact, I am paid to be their support in the dorms.

    Anyway, they confiscated my rommates' computer, who is the classic stupid user, and "searched" it. They claimed that there was a virus on it that did it. You know, those pesky Canadian Website DoSing virii.

    I had a meeting with The Dean of Student Affairs later and told him that I thought it was pretty crappy that they accused me basically because they knew I was a geek. He told me "thats what I get for being on the edge of technology". Yeah, that would be a shame for me to learn at an institution of higher learning. Then again, what do I know? I'm just a college student.
  • by wowbagger ( 69688 ) on Tuesday October 31, 2000 @07:53AM (#662033) Homepage Journal
    Let me tell you a story:

    One day, as I was heading home from work, a police car whipped around my car and proceeded down the highway at great speed. I continued on my way at the speed limit. Nearing the turn-off to my neigborhood, I saw several police cars pulled off on that road, and a civilian car pulled over. Several police officers were arrayed around the civilian car, in the stance of men ready to draw down. I continued down the highway, and took a second route to my home.

    A somewhat boring story, but it illustrates my point. I could have turned off on my normal street. I was committing no crime (at least that I was aware of). However, realizing that being anywhere near a crime scene is a bad idea for anybody, I exercised common sense and avoided the scene.

    This idiot started doing the very things a cracker would do to a site that had been cracked. Was he breaking the law? No. Was he being smart? NO . The site didn't ask him to do this. He had no authority to do this. He fit the profile of a cracker. He was dumb.

    I'd love to learn more about how to crack cell phones - I work in the cellular industry, so it is of some bearing to my job. However, because I work in the cell industry, I have all the tools to turn that knowledge into action, and I'd have a really hard time explaining why I have that gear around (they're engineering prototypes. Honest!). As a result, I don't go to the cell phone cracking sites.

    I'm not saying the FBI isn't wrong here. The way our current government conducts itself is shameful. But if I poke at a lion with a short stick, the lion may have been overreacting, but I'm still going to be the one bleeding...
  • by warp_microkernel ( 249562 ) on Tuesday October 31, 2000 @07:39AM (#662045)
    The FBI seems to have lost their objectivity when it comes to requesting search warrants.

    They are intended to be used for INVESTIGATIVE purposes only. That's not what happened here. If the guy had logged in 20 seconds after the server was cracked, then yes, I could understand why the Feds would take a special interest in his box, however, this is like walking into a convenience store the day after it was robbed by someone of a completely different height, weight, body-type, race, etc. And getting strip searched for it.

    Right now, the FBI is under an enormous amount of pressure to catch "The evil online people who will steal our credit cards or hurt our children." The old adage, "You shouldn't be worried if you've got nothing to hide." doesn't really apply anymore (as if it ever did). Search warrants have become PREVENTATIVE measures. To scare people who have shown an interest in something illegal, even if there is no evidance to suggest they have actually done something. These days if you say or do the wrong thing online, you can get raided just like that. Even if what you did was not actually illegal itself. The search warrant saves the FBI the trouble of actually investigating you and spending some of their time following the innocent until proven guilty mantra. Just knock on enough doors at 5am and you can be sure that you will find someone guilty. The innocent ones can go back to their normal lives like nothing happened (yeah, right) and the guilty ones can give agents the professional boost they need.
  • by The Monster ( 227884 ) on Tuesday October 31, 2000 @07:56AM (#662054) Homepage
    RPoet [mailto] says:
    whether the FBI should actually be allowed to take his computer stuff (even his books) is a different question.
    It certainly is.

    IMNSHO, there is absolutely no reason why LEOs should have a warrant to seize disks, CDs, etc. when on a fishing expe... uh, investigating a crime. They can copy whatever they need to another drive. Even books could be taken to the station to scan/microfiche any marginal notes that might seem relevant, and then returned promptly to the "suspect".

    This is the difference between gathering information for an investigation, and asset forfeiture (spit).

  • by RPoet ( 20693 ) on Tuesday October 31, 2000 @06:58AM (#662063) Journal
    So he pokes around in a crime scene before the cops get there, and leave some fingerprints. Of course he'll be a suspect.

    Of course, whether the FBI should actually be allowed to take his computer stuff (even his books) is a different question.

    --
  • by supernaut ( 35513 ) on Tuesday October 31, 2000 @08:16AM (#662073)
    Alot of mention has been made on the rights we have, is the US like Nazi Germany. I personally believe we do in fact, live in a police state. To wit, ask yourself these questions:

    1) Does the United States follow, in spirit and in letter, the concept of innocence until proven guilty?

    No. The broad application of warrant, search and seizure laws, and the total absence of the legal premisis of "narrowly construed" has been slowly eroded away. These days, if you have been served with a warrant, and, have been questioned by the police, the usual assumption is that you are guilty.

    2) Do the police actually investigate a matter without bias, and with impartiality?

    No. This has always been a major problem for both local and federal authorities. When they feel they have a prime suspect, all other leads become trivial. And not worth investigating. Even if evidence of innocence of the prime suspect could be uncovered.

    3) Do we live under an unspoken law of guilt by association?

    Yes. Terms like "hacker" and whatnot are used to vilify and persecute people who are innocent.

    4) Are there severe loopholes in laws which allow police to run rampantly over individual liberty?

    Yes. Carnivore is an example of this. If the EU type ISP laws get into the act here in the US, then we are really screwed. Because, if your forced to hand over your encryption keys, you are no longer secure in your person. And any law protecting you from unreasonable search and seizure are moot.

    So lets see, unchecked police and political power, guilt by association, persecution due to label, so far so good. Sounding alot like Nazi germany to me. Lets go further:

    5) Are uninformed people attempting to pass laws which label people with terms like "hacker" and "hacking" and prosecute them for associations?

    Yes. In fact, there are several countries attempting this. Im sure it will only be a matter of time before this mindset gets to the United States.

    Gee, whats next, will someone who is a geek be forced to wear an armband in public? How about a scarlet letter?

    And, now for the kicker:

    6) are the minority in almost firm control, in one way or another, of the majority.

    Yes. With things like the DMCA, and minorities trying to kill off things like Reverse engineering, Donna Rice trying to censor the web, you have alot of minorities, trying to subvert the majorities. All in the name of profit, morality, and narrow mindedness.

    There was a time when the law was to be kept narrowly construed. In order to make sure it wasnt used as a hammer. Now, the only thing being narrowly construed is thought and reasoning ability.

    I was born an american citizen. I am embarrassed to be one these days. My father was an Air Force Vet, he fought for this country, and the way of life. Before his death, he saw this police state coming about. It upset him greatly, that police got warrants, based on suspicion, and conjecture, and, went about ruining people's lives, and they dont apologize when they are wrong. Nor are they forthcoming in returning what they steal.

    Its getting worse. The United States is becoming a police state, run by corporate america, and, narrow minded politicians, who care more about themselves, their wallet, and what they want. In an ironic way, we are faced with the same dilemma as the original 13 colonies.

    We once again, have a situation where we have no representation. We elect people who dont listen to those who elect them. We choose the lesser of two evils. And, we have no other recourse.

    I give it another 100 years tops. Before you see armed revolt. *sigh*. The great experiment is at its peak, and will start its decline. Harry Truman warned that if you want to know how to avoid decline, in the United States, keep the history of the Romans close to your heart. Nobody in government has done this. And those who do not learn history, are doomed to repeat it.

  • by Kagato ( 116051 ) on Tuesday October 31, 2000 @06:59AM (#662074)
    The most irritating thing our friend will find out is that his computer is now evidence. He's not going to get it back any time in the near, or not so near future. See Steve Jackson Games.

    Warrents are about the only thing that's actually fairly close to reality in TV crime shows. They aren't hard for the cops to get. Judges don't know any better and take the DOJ/DA's word for it as far as if it's needed.
  • by MemRaven ( 39601 ) <kirk@ki[ ]ylie.com ['rkw' in gap]> on Tuesday October 31, 2000 @07:58AM (#662082)
    This doesn't actually help you if they have a search warrant. If they do, you can get your lawyer there, but there's nothing they can do beyond making sure anything taken is within the scope of the warrant.

    Your advice is for when they start to QUESTION you. The only words you EVER need to remember are "I want my lawyer."

  • by Binestar ( 28861 ) on Tuesday October 31, 2000 @07:01AM (#662094) Homepage
    I live 5 blocks from the RPI campus.

    The FBI should look at some things...

    #1: Look at some timestamps on log files... If what was written is true he wasn't into the webpage until after it had been posted on various news sites.

    #2: The that might possibly in 3000 years turn out to be evidance and now it's the governments crap of confiscating computers is ludicrous. How could looking at a site be considered grounds for a search warrent?

    Things like this are pathetic.
  • by $lingBlade ( 249591 ) on Tuesday October 31, 2000 @08:39AM (#662101)
    You're all missing the impetus behind all this! The Yankees are a high-profile organization right? The guys who run the Yankees are VERY rich people right? So imagine this, you're the manager/owner/whatever of the Yankees, you wake up one day, roll out of your four thousand dollar bed and turn on your computer. Your homepage is Yankees.com (how cute) and you notice it's been tweaked. OR you're the webmaster @ Yankees.com and you notice upon routine checking of the site/availability/whatever that it's been tweaked... you call the owner or the owner finds it on his own. Point being, the funnelling stops here and it's now the owner who makes the call to his buddies who pull some strings in the FBI to get this stuff investigated ASAP! Not tomorrow, not after breakfast, RIGHT NOW! So they do, they expedite the warrant process and get right down to business. I mean come on people, you think every hacked page gets the FBI's attention in as little as 48/72 hours? Or that they routinely pair up a field agent with someone who actually knows computers? Whether or not this guy should or shouldn't be doing his forensic checking is a WHOLE other issue. My point (cuz I think I have one) is that the Feds treatment of this is RARE! The only time the Feds take this shit seriously is when it's high-profile (i.e. big MONEY losses or GAINED) or when there's an interpersonal tie with the feds themselves. A personal relationship with someone in the bureau. I myself have been/or are currently under their "watch" and it's ONLY because of a personal tie one person had with them directly... if not for that, nothing would ever have come of my "wrong-doing".
  • by nido ( 102070 ) <nido56.yahoo@com> on Tuesday October 31, 2000 @07:02AM (#662105) Homepage
    .. but when people with badges are asking you questions, your only respose should be to reply with a question or to not reply at all. This is especially true in traffic cases, as the first thing the cop will try to do is get a confession out of you - "Do you know how fast you were going?" If you say something like, "I think I was going 75 or 80", even though his radar gun said 83, he can write you down for 80 and get it to stand in court (radar tickets can be easy to beat) because that's what you said. So you've answered the Public Servant's question (who you don't even really know is a public servant, he could be an imposter - just 'cause his car has a light bar in no way means that he's valid) with the very best of intentions, hopefully making him so pleased with your obedience to his will that he'll let you off. It's never worked for me. In this case, they were out to hang, details didn't matter, they were going to take your computers, no matter what you said. The side of the road is not a courtroom, and people shouldn't treat it as such.
  • by mwalker ( 66677 ) on Tuesday October 31, 2000 @07:03AM (#662108) Homepage
    Kiss your computers goodbye

    My roommate and I called the cops my junior year in college, when we found a guy in our suite running an ftp server with kiddie porn.

    When the FBI comes to take your computer, you don't get it back. They didn't just take this kid's machine, they took my machine too - since our ethernet ran through the same hub, they were able to extend the search warrant. I got my computer back 2 years later. It's still sitting in my basement, running bsd, like it was before they took it.

    Remember, you live in a free society until you don't. Due process for you is going to mean that they will duly detain your computers and schoolwork till it is useless to you.

    Shame on you for being so smart.
  • by ackthpt ( 218170 ) on Tuesday October 31, 2000 @07:04AM (#662111) Homepage Journal
    ->NEW<- Carnivore

    And

    Carnivore Lite for making hasty decisions based upon the flimsiest coincidences!

    A Reno® product


    --

  • by makhnolives ( 135503 ) on Tuesday October 31, 2000 @07:04AM (#662116) Homepage

    The first thing to keep in mind when the FBI knocks on your door is that you shouldn't talk with them. Don't try and crack jokes or explain what might be going on. Don't answer their questions. Don't say anything other than you want to see a lawyer.

    These guys are trained professional terrorists. They have all kinds of behavioral science training and they have experience with PsyOps, which you all should read up on.

    I'm glad that this brave hacker has the balls to relate his experience. The FBI wants us to fear them. They are the bad guys, but don't think you are ever in this alone. There are many people out there who don't like the FBI.

    It's also important to realize that those of us who are Americans aren't living in some enlightened democracy where the cops are just our good friends because they keep the streets "clean." No, the United States has more cops than any other country and it just completed an expensive effort to militarize the police. If any of you have paid attention to the recent anti-capitalist protests, you can see that they've taken the gloves off. I had friends who were planning for the anti-World Bank demo in Washington, DC last April. The Secret Service broke into their apartment and stole research materials.

    In Philadelphia, during the anti-Republican Convention protests, the police sent undercover cops into the organizing spaces being used by activists. Some cops even helped some friends of mine build a float.

    So the watchword is: be careful, but don't be afraid.

    Someday we'll defeat these guys.

  • by mr ( 88570 ) on Tuesday October 31, 2000 @08:02AM (#662119)
    Ok.

    What about ORBS.ORG?

    They scan, looking for exploitable holes in e-mail programs. And log for vulnerabilites. Post the found vulnerable systems on the internet.

  • by rikki_t ( 81004 ) on Tuesday October 31, 2000 @07:04AM (#662120) Homepage
    Indeed. Getting things out of evidence is a pain and a half. Once it goes in, it rarely comes out. If you can get publicity, and maybe the EFF [eff.org] involved, you might get your personal info back.

    And the SJ Games reference is here [sjgames.com] - they eventually got their equipment plus a good chunk of change back. So there is hope.

  • by IronChef ( 164482 ) on Tuesday October 31, 2000 @07:04AM (#662127)

    A friend of mine works in IT at a big university. The dorm IT guys not only cooperate with the cops, they will enter dorms and seize equipment THEMSELVES. This has happened a number of times when students ran, for example, a commercial porn site out of a dorm room.

    The school IT guys will cooperate (bend over) for the FBI if they are smart -- you don't want to get the feds pissed at you, and what do you do when you need them? Best to maintaina good working relationship.

    Besides, if the cops show up with a warrant, the school has no legal grounds to interfere. They have to show the feds to the dorm door and play along, unless they want to get in trouble for obstructing justice or something.
  • by nharmon ( 97591 ) on Tuesday October 31, 2000 @07:05AM (#662135)

    The FBI managed to get a search warrant based on logs from a firewall, that showed my IP only connecting, not even logging in, hours after news of the cracking had appeared on news sites.

    So essentially the FBI doesn't have a hard time getting a warrant. Does this scare anyone else concerning Carnivore? I mean, if they can get a physical search warrant this easily, what's to say it'd be more difficult to get an internet-sniff warrant?

  • by Veteran ( 203989 ) on Tuesday October 31, 2000 @09:10AM (#662142)
    I can only hope that something like that story happens to you someday; it will knock some of the arrogance and pseudo sophistication out of you.

    Maturity is not just accepting things that happen to you - it is knowing when something is malicious, and when it is not. Immature people either believe that everything is malicious - or like you - believe nothing is malicious. The 'nothing that ever happens is deliberate malice' approach is just as wrong as seeing conspiracies around every corner. You might as well fall flat on your face as to lean over too far backwards. A mature human recognizes malice when it exists.

    The behavior of the police in the story was malicious. The police believed their malice was justified but their behavior was deliberate (they got a warrant) not accidental (they didn't question the wrong person - they went after the one they wanted). Keeping the equipment on the plausible lie of "its evidence" is malicious. There was no crime committed - so there is no evidence to hold.

    We pay the police to be malicious toward 'criminals'. If the police decide that you are a criminal they will be malicious toward you. It is our mistaken belief that we won't ever be seen that way that gives people their sense of safety.

  • by kfg ( 145172 ) on Tuesday October 31, 2000 @09:12AM (#662150)
    They took his frickin BOOK?

    I'm sorry, but his books are not evidence. The fact that he possessed such books might be, but this did not in any way require the actual siezing of the books themselves.

    As a CS student the fact that he was * required * to possess the book is probably even a matter of record.

    This was a pure harrassment measure, period.

    As I noted in my post the other day he should have invoked his RIGHT to * shut the hell up.*

    He should have called his lawyer and insisted on his right to have his lawyer present. If he didn't have a lawyer he should have picked one out of the phone book and told them " I have FBI agents in my premisises and I need a lawyer NOW."

    BEFORE all this happened he should have had off site backups. One set of those backups should have been BURIED in a capsule somewhere. He should have had backups stored using stegenography in his porn and/or Mp3's. He should have burned every note that was no longer needed. He should have written 0's to his entire HD every time he did a fresh install. He should have done this every few months even if he didn't need a new install.

    Once they were there he should noted to them that his monitor, speakers, keyboard, mouse, CPU, video card, etc, were NOT evidence, only his possession of such was, and they had no right to sieze them. In fact, ONLY his HD was technically evidence. If nothing else his having noted it to them could be used as evidence against THEM in a civil suit should they ignore it. He should have noted that the supreme court has extended the protection of printing presses DIRECTLY to computers that are used for printing and thus cannot be legally siezed as evidence. He should have noted that his HD contained personal corespondence totally unrelated to the crime under investigation and that they were thus under obligation to have a warrant for SPECIFIC documents to sieze, which he would then cooperate in handing over, they have no right to sieze EVERY document. He should have noted that the supreme court has ruled that EVERY person whose e-mail is compromised by siezure without a specific warrant is due a cash settlement from the government.

    In point of fact, he, and his lawyer, should have actually READ the warrant and only complied with legally SPECIFIC items contained therein.

    He might even have insisted on being charged. This probably wouldn't have worked in this case, but more often than not it ends the whole damn thing right there. In any case his insistence, and their refusal, would have been more evidence for his following civil action.

    "Officer, if I am suspected of a crime kindly charge me with such so that I may invoke my right to a public trial by a jury of my peers in confrontation with my accusor, otherwise I'm afraid I may have to consider this an illegal fishing expedition in violation of my civil rights and take appropriate legal action."

    In fact, he could have noted that even though they have a warrant the * warrant itself might not stand up to legal scrutiny.*

    Again, many of these things might not have helped him at the time, but could be invaluable in a later civil suit.

    Oh yeah, he should sue the bastards. We should ALL sue the bastards every chance we get, pro se if we have to, just to make them think twice about the hassle and paperwork they'll be facing if they step out of line.
  • by h3x0r ( 132441 ) on Tuesday October 31, 2000 @07:07AM (#662166)
    Since I first read about it, I have wanted to install the physical security system mentioned in Cryptonomicon -- you know, the one that turns the door frame into a giant electromagnet. Sure, the "bad guys" may get your hardware, but that's about all they'll get. (And probably even less, if you can set up the magnet to pulse its field so it spikes through the electronics...)

    Just out of curiosity, though, is something like this realistic? That is, would it really work the way Stephenson describes it?

    At any rate, it'll have to wait until I get my own place. I think the apartment manager would get pretty pissed if I suddenly started remodeling the door to my flat.


    ---
  • by makhnolives ( 135503 ) on Tuesday October 31, 2000 @07:08AM (#662182) Homepage
    If An Agent Knocks [harborside.com]
  • by Hellvis ( 111132 ) on Tuesday October 31, 2000 @08:48AM (#662189)
    The previous day, I was doing my usual routine for a friday with no class; up at 7 AM, ...

    This guy is clearly a Russian spy, no red-blooded American college student gets up at 7AM for no good reason.

  • by cvd6262 ( 180823 ) on Tuesday October 31, 2000 @07:11AM (#662200)
    I noticed the family's house next door had a broken window. "That's funny," I thought. So, I went over and looked in....

    "Hmmm. There's a small rock, like the ones they put around their plants in their front yard. They might want to know this. I think I'll just put on in my pocket."

    "Whoa. Look at the mess the robbers left. I think I'll just go straighten things up a bit. Ah, man! They took the new DVD player. I was looking forward to tonight's Halloween party. I hope they left the "Blair Witch Director's Cut" disk."

    "I wonder if they got the jewlery.... Let's see, I think they kept it in that box on their dresser. Well, there's no jewels in it now. I guess I just go home."

    Later that day, the cops came over to ask me some questions. "What's that in your pocket?" "How did you know the DVD player was taken?" "Can we finger-print you?"

    Now I'm afraid that I may be suspected for something I didn't do. The Nerve! I was just curious and trying to help.

  • by Mozai ( 3547 ) on Tuesday October 31, 2000 @09:20AM (#662203) Homepage
    [ This message does not state or imply an accusation of misconduct by the man dubbed 'bofh', so put those lawyers away. This is an opinion piece -- the events as I remember them. ]

    Heh. I guess we all have these stories. I didn't know the whole story of what happened to me until two years later.

    First, I was a student at the University of Waterloo, Canada. Very respected place, top-notch mathematics faculty that actually gives out Bachelors of Mathematics. The Computer Science Club is actually quite famous too. Anywho, U of Waterloo has a co-op program and thru co-op I got a job as a Unix Sysadmin at the Univesrity of Western Ontario, an hour's drive away. Four month contract, then back to school. I fell ill during my work term, and I had to telecommute for the last two months, but I still got stellar marks and a glowing evaluation in the end. During my time there, I spent ten minutes getting help with an SMTP server with a man reputed to be an RCMP (Americans: read FBI) toadie I'll call 'bofh' for reasons that will later become apparent.

    Back at Waterloo, I was going thru a bad episode (breaking up with live-in girlfriend), and during spring break I faked a USENET posting. Not a spoof, because I wasn't pretending to be anyone, just a faked "From:" header line. I did it (in the "let's see if I can do it" fashion) by telnetting to a mail server at U of Western Ontario, faking a mail message to be sent to U Waterloo's mail-to-news gateway. The message itself was a public announcement that some newsgroups were going to be banned due to high traffic -- Waterloo had a recent big stink about newsgroups being banned because of a feminist student group complaining about objectionable content (alt.sex.fetish.lolitas somehow escaping their scrutiny). I was successful, even though I misspelled "displatch", so I went back to slouching and playing too much Xpilot.

    Next morning, I get a call at home. It's bofh (I still don't know how he got my home number).

    bofh: "This is bofh. Did you telnet to port 25 on machine xxxx.uwo.ca yesterday?"
    me: "Uh... yes."
    bofh: "You'll never touch another machine at Western again. *click*" (that's the exact quote)

    Phone rings again.

    Peter (of the CompSci Club): "Moses? This is Peter. The Math Department sysadmins are bloodhounding you, but Ian [a friend] found you first. Why are they tracking you down?"
    So I told Peter about the mail-to-news business yesterday.
    Peter: "Oh Moses, Moses, Moses. ... you got caught."

    So there was the ritual dragging me out in front of an authority figure, some tounge lashing, and a formal request to have me ousted from the CompSci Club because I was their sysadmin and couldn't be trusted (that was on the record -- off the record, nobody expected me to get kicked out over something so trivial). The CompSci Club said no, the Math Department made a politically safe "no comment," and life continued.

    A week later, I'm summoned before the Asst. Dean of Mathematics, whom I'll call W. Seems the U of Western is raising a big stink, and 'something' must be done. I assume he's talking about the "displatch" event. W tells me that I can't return for a second work term at Western, and my marks will be changed to a failure for the term that just went by. I protest that this isn't fair (but actually my knees were shaking like Jell-O). He says he has to think about it. I take the chance to talk to a student ombudsman, who knows about the "displatch" event and he's surprised W. is overreacting. He suggests I approach the Student Disciplinary Committee. When next I'm summoned before W, he suggests that I be failed for the upcoming term; I protest again that I shouldn't fail something that hasn't happened yet, and it will unduely affect my chances at getting a work term somewhere else. I suggest the SD Commitee should get involved, and W threatens to expell me if I talk to the SD Commitee. I break, sorry, I was really scared. I plead that he merely suspend me for the upcoming term. He says he'll think about it. A week later when I meet with him, he tells me that he's come up with a better idea: he'll suspend me for the upcoming term. Can I agree? I point out that I gave him that idea, and I agree. I'm to be taken off the list of eligiable students for job interviews.

    A week later I found out I wasn't taken off the list, and I missed three interviews. I was almost punished for not showing up to these interviews, but I badgered and pushed my way thru the department (we called it "Needless Hall") until I met a director. I told him my story to date, and he laughed and agreed to sort things out. So, I was suspended, I accepted a job offer in Toronto (which was bogus, but that's another story), and didn't have enough money to return to school for years. I got a letter from my former employer at U of Western Ontario, saying he was disappointed in me for what I've done. That kinda hurt.

    Now... 2 years later, I'm working at a Toronto company, and I'm recognized as that kid who was a sysadmin at the U of Western Ontario. He says he heard what happened, so I tell him my story. He's quiet for a while, and says "That's not what I heard. Everyone at UWO was told that you were using Western computers to steal credit card numbers through the Internet."

    Jumping Jehosaphat. No wonder W overreacted. And this must be what bofh ment by "You'll never touch another machine at Western again." It still burns my buns to know that W was ready to expell me when he had not even circumstantial evidence, and he wouldn't tell me what I was accused of nor listen to my side of the story. I won't return to U of Waterloo until W is no longer employed there, but I will still speak highly of it as an educational institution.

    It's a frame job that changed my life forever. Thank goodness I turned it into a positive change. My friends still refer to it as the "displatch" event. I'd rather not chase after bofh for justice, beacuse I'm certain he could create some evidence against me (like the firewall logs mentioned above) and the RCMP are likely to believe him because of rumoured student-expelling 'favours' he's done them in the past. Besides, I think the false 'hacker' reputation actually helped in one job interview.

  • by ConceptJunkie ( 24823 ) on Tuesday October 31, 2000 @08:50AM (#662204) Homepage Journal
    What planet are you living on? Check out Bruce Sterling's "Hacker Crackdown". Once your suspected, you're always suspected, regardless of any inconvenient reality. It was clear, based on the letter, that there only the most tenuous circumstantial evidence to link him to the site in the first place.

    I'm sure a time will come when any Internet activity other than a browser or e-mail package will be looked on as suspicious, if not criminal.

  • by ackthpt ( 218170 ) on Tuesday October 31, 2000 @07:11AM (#662215) Homepage Journal
    He should have known better than to be running Freeh® BSD!


    --
  • by Danse ( 1026 ) on Tuesday October 31, 2000 @08:28AM (#662220)

    They'll probably keep the computer until the statute of limitations on the crime runs out. By then it will be an antique.

  • by John Jorsett ( 171560 ) on Tuesday October 31, 2000 @08:57AM (#662256)
    1. Do NOT talk to law enforcement without your lawyer present. They are not your buddies, no matter how friendly they seem. They are trained to disarm you and get you talking, and you cannot help your case by doing so without the advice of counsel.
    2. If you think the requirement for a warrant is any sort of obstacle, think again. Law enforcement develops relationships with tame judges, who will issue a warrant on virtually any pretext. You might later manage to get it and the evidence it turns up suppressed, but that isn't going to stop them from coming in and taking whatever they want.
    3. For any sort of controversial access (or maybe all the time, if you don't mind the small delays it causes), use a service like ZeroKnowledge Freedom [zeroknowledge.com]. It masks your identity completely, and allows email, chat, and web browsing.
    4. Encrypt your entire hard drive (keep offsite backups, because you likely won't ever get the drive back if you refuse to hand over the key). You have no idea what might be lurking on there. I have an automated program that scans newsgroups for items of interest. If it accidentally downloaded kiddie porn, I might not know it until the Gestapo has my hard drive in its hands. If you ever sent a humorous email to a friend about cracking a system, or killing your girlfriend, it might end up used against you.

    The author of the article is right, you can't overdo the paranoia.

  • by Skyshadow ( 508 ) on Tuesday October 31, 2000 @08:58AM (#662267) Homepage
    That's why I keep my lawn seeded with Claymore Mines(tm).

    Remember, if it doesn't say Claymore(tm), you're not fraggin' with the best.

    ----

  • by fluxrad ( 125130 ) on Tuesday October 31, 2000 @07:17AM (#662277) Homepage
    port scanning, DNS lookups (whois, nslookup, etc.) are NOT illegal.

    the whole point of the story is one of a very big brother-esque denial of our civil liberties. I see alot of people who know next to nothing about computers in general beyond double-clicking on IE to get an internet connection. Nevermind that they don't know how their own box works - i don't care. But they have begun to vilify those who they do not understand simply because of a few crackers.

    This can be directly equated to a situation where you hear about a liquor store that got robbed so, as a curious citizen, you drive by and take a look. Being that you left some small piece of evidence that you were there at all, the FBI or whoever comes back to your house, confiscates your car and questions you. Anyone see anything wrong with this?? Anyone???

    unfortunately, hackers' rights are in serious jeopardy right now. I don't see this trend stopping as more and more 'ignorant' individuals get online. they are scared of that which they do not know, and every time they hear that someone is a 'hacker' or knows what they're doing....they will instantly brand them as criminals. The only thing you can do....get a phone number of a good lawyer and make yourself comfortable here in Salem. It's gonna be a looong witch hunt.


    FluX
    After 16 years, MTV has finally completed its deevolution into the shiny things network
  • by GooseKirk ( 60689 ) <{goosekirk} {at} {hotmail.com}> on Tuesday October 31, 2000 @09:00AM (#662278) Homepage
    Wouldn't an electromagnet strong enough to wipe a disk in one not-so-near pass (i.e., walking through the doorframe) have to be so powerful, it would induce a noticeable pull on the metal of the box?

    I can just picture a g-man lugging a tower case out the door, only to have it CLANG against the frame and get stuck there and they have to get crowbars to pry the thing off. You know, they just might get a little suspicious at that point...
  • by kibitz ( 247641 ) on Tuesday October 31, 2000 @09:01AM (#662282)
    While there are some exceptions (breathalizer and blood tests, identity information, etc., for example) the target of an investigation is under no obligation to provide _any_ information to the authorities. This means that the target is under no obligation to provide passwords, etc. Further, if faced with one of these situations you must understand that the police are going to take your equipment, disks, etc., regardless of what you do or say, so the best thing is to say _nothing_ to them. You should politely cooperate with them in loading up your equipment, request a detailed inventory of what is being taken, including a statement that all items being taken are in good operating condition and repair. You should then tell them that you will contact them with the name and telephone number of your lawyer and that all future contact should be through your lawyer. If you are a student, most universities or student governments have legal aid programs available. One other thing to be wary of: If the law enforcement people involved are federal, and you _do_ choose to talk to them (even though that is a very dumb thing to do), be sure that you tell them the _whole_ truth and don't leave out anything. If you do, there is a possibility (slight in most cases, but definitely there) that you could be charged with making a false statement to a federal officer, a felony, even if you are not otherwise guilty of any crime. Remember Henry Cisneros, who was charged with that very thing. Cops have a lot of "tricks" for obtaining information, none of them illegal. The one I like the most is not arresting someone until they get to the station house and not saying a word to them on the drive there. Usually the suspects will happily blab away simply to fill the empty air. Anything useful can be used even though the suspect has not been Merandized because the cop didn't actually ask the suspect anything.
  • by justis ( 162375 ) on Tuesday October 31, 2000 @07:17AM (#662287) Homepage
    Question: How does the field agent know what is evidence and what isn't? I guess you'd like to make sure that all FBI agents are also fully trained as sysadmins for every OS/Harware combo known to man.

    THe feds seized the equipment because it might be evidence and they have no way to know for sure without running it through a computer forensics lab.

    The real travesty will be trying to get the equipment back after he is no loger a suspect.
  • by Sangammon ( 100874 ) on Tuesday October 31, 2000 @10:29AM (#662292)
    When an Agent Knocks

    ...you do what the rest of us do. You run. You run your ass off.

    -Tal

  • by Electric Eye ( 5518 ) on Tuesday October 31, 2000 @09:01AM (#662297)
    What the fuck? A baseball team's WEB SITE is defaced, and my goddamn tax dollars are paying for a massive investigation to pay for it??????? You have to be kidding me!!! It's a web site, people! For a sports team! It's not the White House, for Christ's sake. Thanks, Men in Black, for eating up my taxes.
  • by SuiteSisterMary ( 123932 ) <slebrunNO@SPAMgmail.com> on Tuesday October 31, 2000 @07:19AM (#662311) Journal
    although the fact that he first looked at it hours after the breakin tells me about how clueful the FBI is
    Actually, that behaviour is valid. Many criminals are caught because they're idiots, and do idiot things like hang around the crime scene, blab to friends, etc etc. Checking your own handiwork hours after the fact is common behaviour. Go find some decent books on Criminal Psychology, and you'll find some interesting reading material.
  • by toast- ( 72345 ) on Tuesday October 31, 2000 @07:19AM (#662314)
    One day (last week) While telling some anti-pine friends how much I love pine (over email), I decided i'd telnet to the local SMTP port of my university's mail server and teach myself SMTP headers, and send them an e-mail with telnet. Well, after attempting (it would not let me relay) i recieved a nasty email from the NOC telling me to never do it again, and that i am a hacker, etc etc. Point being, I was merely attempting to teach myself SMTP headers, not trying to hack into the system but they immediately labelled me. I replied back, explained my side of the story and never heard from them again.
  • by sremick ( 91371 ) on Tuesday October 31, 2000 @10:41AM (#662323)
    Now Z DNe t knows. [zdnet.com]

    Cool. Spread the word. CNN?

Egotist: A person of low taste, more interested in himself than in me. -- Ambrose Bierce

Working...