⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 closing the net.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 3 页
字号:
			 "Closing the Net"				by			  Greg Costikyan[Reproduced with permission from the January 1991 issue of _Reason_magazine.  A one-year subscription (11 issues) is $19.95.  Copyright1991 by the Reason Foundation, 2716 Ocean Park Blvd., Suite 1062,Santa Monica, CA 90405.  Please do not remove this header.]       Back in early February, newspapers across the country reported thatcomputer hackers were interfering with emergency calls over the 911communications network.  The reports said the hackers had penetrated thesystem using information from a secret computer document.       The scare grew out of an indictment by a grand jury in Lockport,Illinois.  On February 7, Craig Neidorf and Robert Riggs were indicted onseven counts of wire fraud, violation of the Computer Fraud and Abuse Actof 1986, and interstate transportation of stolen goods.       Prosecutors alleged that Neidorf and Riggs had conspired to steal,using fraudulent methods, a confidential and proprietary document from theBell South telephone company.  This document, it was claimed, could allowcomputer hackers to disrupt the 911 emergency network.       The arrest of Neidorf and Riggs was only the beginning.	The SecretService, which has authority over crimes involving government computers,had embarked on a vast, nationwide investigation of hacker activity:Operation Sun Devil.       Imagine the night face of North America, shining not with cities butwith lines of light showing the transmission of data.  Brightest are NewYork City, the financial capital, and California, the technologicalcapital, with Washington, D.C., a close third.	The lines that crisscrossthe country are telephone wires and cables, microwave transmissions, andpacket-switching networks designed for computer communication.	Here andthere, beams dart into space to reflect off satellites and back to earth.       The computer networks in this country are huge.	The largest areentities like UseNet and InterNet, which link every academic computingcenter of any size and are accessible to every scientist, universitystudent, and faculty member in the nation.  The networks also includegovernment-operated systems, such as MilNet, which links military computersthat do not carry confidential information.  And there are the commercialservices, such as Dow Jones News/Retrieval, SportsNet, CompuServe, GEnie,and Prodigy.  CompuServe is the largest of these, with half a millionsubscribers.       In addition to these massive entities are thousands of tiny bulletinboard services, or BBSes.  Anyone with a computer and a modem can start aBBS; others can then call it up and use it.  BBSes offer, in miniature,essentially the same services that the commercial nets offer:  the abilityto chat with others by posting messages to an electronic bulletin board andthe ability to upload and download software and text files.  There are morethan 5,000 BBSes in the United States, most of them operated for fun.  Fewcharge their users.  In my local calling area alone, I know of BBSes forwriters, gamers, Macintosh enthusiasts, gays, and the disabled -- and I'msure there are others.       The vast majority of BBSes deal with unexceptional topics.  But someboards deal with questions of computer security.  These attract hackers.       Naturally, hackers discuss their hobby:	breaking into computers.Usually, however, bulletin board discussions are general in nature.Hackers are not stupid, and they know that posting credit card numbers orthe like is evidence of criminal activity.  By and large, BBS discussionsrarely, if ever, contain information that would be illegal if published inprint form.  It's not illegal, after all, to tell your readers how tocommit illegal acts.  If it were, books like _The_Anarchist's_Cookbook_ and_Scarne_on_Cards_ (and half the murder mysteries in print) would be banned.       The laws dealing with electronic transmissions, however, are farfrom clear.  And the methods used to enforce these vague laws set adangerous precedent for abridging freedom of speech.       In the future, the Net -- the combination of all the computernetworks -- will be the primary means of information transmission, withprint publication merely its adjunct.  The Net will replace the press, andusers of the Net must enjoy precisely the freedoms enjoyed by the press.If users of the Net have to worry about police surveillance, if censorshipis rife, if the state forbids mere discussion of certain topics -- then theliberty for which the Founders fought will have been destroyed, not by waror tyranny, but by mere technological change.       From the government's point of view, the arrest of Neidorf and Riggsdid not end the threat to the 911 network.  The document they had stolenwas not a single piece of paper that could be returned to its rightfulowner.	It was an electronic document that Riggs had downloaded from a BellSouth computer.       Riggs belonged to a hacker group called the Legion of Doom, whosemembers shared information.  It was likely that others in the group hadcopies of the 911 document.  Worse, Riggs had uploaded the 911 document toa bulletin board service in Lockport, Illinois.  Neidorf had downloaded thefile from the Lockport BBS.  Anyone else who used the same BBS could havedownloaded it, too, meaning that dozens of people might have this dangerousinformation.  Worse yet, Neidorf had published an edited version of theBell South document in an issue of his underground computer magazine,_Phrack_.       Unlike conventional magazines, _Phrack_ never saw a printing press;it was distributed electronically.  After preparing an issue, Neidorf woulddispatch it, via various computer networks, to his address list of 1,300names.	Any recipient could then upload the magazine to a bulletin board orto one of the academic or commercial nets.  That meant thousands, perhapsmillions, of people had access to the information in the Bell Southdocument.       We may imagine that the Secret Service was gravely concerned aboutthe potential threat to emergency services.  If not, then their subsequentactions are hard to fathom.       On March 1, 1990, employees of Steve Jackson Games, a small gamecompany in Austin, Texas, arrived at their place of business to find thatthey were barred from the premises.  The Secret Service had a warrant, andthe agents conducting the search wouldn't let anyone in until they weredone.       The agents ransacked the company's offices, broke a few locks, anddamaged some filing cabinets.  They searched the warehouse so thoroughly,says company founder Steve Jackson, that afterward it "looked like asnowstorm," with papers strewn randomly.  The agents confiscated threecomputers, a laser printer, several pieces of electronic equipment(including some broken equipment from a storeroom), several hard drives,and many floppy disks.	They told Jackson they were seizing the equipment"as evidence" in connection with a national investigation.       Among the equipment seized was the computer through which S.J. Gamesran a BBS to communicate with customers and freelancers.  It had never beena congregating point for hackers and was about as much a threat to thepublic order as a Nintendo game.       The loss of the equipment was bad enough.  Worse, the Secret Serviceseized all existing copies -- on hard drives, floppy disks, and paper -- ofS.J. Games' next product, a game supplement called GURPS Cyberpunk.  Theloss of that data shot Jackson's publication schedule to hell.	Like manysmall publishers, S.J. Games runs on tight cash flow.  No new products, noincome.  No income, no way to pay the bills.       Over the next several weeks, Jackson was forced to lay off abouthalf of his 17 employees.  By dint of hard work, he and his staff managedto reproduce the data they'd lost, mostly from memory.	S.J. Games finallypublished GURPS Cyberpunk as "The Book Seized by the Secret Service."  Ithas sold well by the (low) standards of the field.       Jackson estimates the raid has cost him more than $125,000, a sum asmall company like his can ill afford.	(The company's annual revenue isless than $2 million.)	He was nearly put out of business by the SecretService.       What justified the raid and the seizures?  Apparently, this:  Themanaging editor of Steve Jackson Games is Loyd Blankenship.  Blankenshipran The Phoenix Project, a BBS of his own in the Austin area.  Blankenshipconsorted with hackers.  He was fascinated by the computer underground andplanned to write a book about it.  He may or may not have once been ahacker himself.  He certainly knew and corresponded electronically withadmitted members of the Legion of Doom.       But perhaps Blankenship's worst luck was this:  An issue ofNeidorf's _Phrack_ magazine included an article titled "The PhoenixProject."  As it happens, that article had nothing to do with Blankenship'sBBS of the same name.  But the Secret Service was well aware of thecontents of _Phrack_.  Indeed, the revised indictment of Neidorf and Riggs,issued in July, cited the article by title.  The same morning that theSecret Service raided Steve Jackson Games, agents awakened Blankenship andheld him at gunpoint as they searched his house.  They seized his computerand laser printer as "evidence."       Consider the chain of logic here.  Robert Riggs is accused of acrime.	Riggs belongs to a group.  Loyd Blankenship is friends with othermembers of the group, though not with Riggs himself.  Steve Jackson Gamesemploys Blankenship.  Therefore, the Secret Service does grievous financialinjury to Steve Jackson Games.	This is guilt by association taken to anextreme.       Neither Blankenship, nor Steve Jackson Games, nor any companyemployee, has ever been charged with so much as spitting in a public place.The Secret Service refuses to comment, saying only that S.J. Games was nota target of the investigation.       The company is now receiving legal help from the Electronic FrontierFoundation, an organization devoted to promoting civil liberties inelectronic media.  The Secret Service has returned most -- but not all --of the company's seized equipment.  Some of it is broken and irreparable.The government has made no offer of restitution or replacement.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -