📄 closing the net.txt
字号:
The computer nets do need policing. Computer crooks can steal andhave stolen millions of dollars. But a balance must be struck betweencivil liberties and the legitimate needs of law enforcement. The laws ascurrently constituted are inadequate from both perspectives, and the SecretService seems determined to interpret them with a callous disregard forcivil liberties. To attack computer crime, prosecutors primarily use the statutesdealing with wire fraud and interstate transportation of stolen goods, theComputer Fraud and Abuse Act of 1986, and the Electronic CommunicationPrivacy Act of 1986. The wire fraud statute prohibits the use of thetelephone, wire services, radio, and television in the commission of fraud.The courts have, logically, interpreted it to apply to electroniccommunications as well. The interstate transportation statute prohibits transportation ofstolen goods valued at $5,000 or more across state lines. Neidorf's lawyermoved to dismiss those counts, claiming that nothing tangible istransported when a document is uploaded or downloaded. The judge ruledthat tangibility was not a requirement and that electronic transmissioncould constitute transportation. The Computer Fraud and Abuse Actprohibits knowingly, and with intent to defraud, trafficking in informationthat can be used to gain unauthorized access to a computer. The Electronic Communications Privacy Act makes it a crime toexamine private communications transmitted electronically. Among otherthings, it requires law enforcement agencies to obtain search warrantsbefore opening electronic mail. It is unclear whether electronic mailfiles on a BBS's hard drive are covered by a warrant that permits seizureof the hard drive, or whether separate warrants are needed for eachrecipient's mail. The reliance on fraud statutes to fight computer crime presentsproblems. Fraud is the use of chicanery, tricks, or other forms ofdeception in a scheme to deprive the victim of property. Most attempts byhackers to gain illegal access to a computer do involve chicanery ortricks, in some sense -- the use of other people's passwords, the use ofknown bugs in systems software, and so on. Much of the time, however, ahacker does not deprive anyone of property. If the hacker merely signs on and looks around, he deprives thecomputer operators of a few dollars of computer time at worst. If hedownloads a file, the owner still has access to the original file. If thefile's confidentiality has value in itself -- as with a trade secret --downloading it does deprive the owner of something of value, but this israrely the case. We need a "computer trespass" statute, with a sliding scale ofpunishments corresponding to the severity of the violation. Just asburglary is punished more severely than trespass, so a hacker who stealsand uses credit card numbers ought to be punished more severely than onewho does nothing more than break into a computer and examine a few publicfiles. In the absence of such a scheme, law enforcement personnelnaturally try to cram all computer violations into the category of fraud,since the fraud statutes are the only laws that currently permitprosecution of computer crimes. As a result, petty crimes are charged asfelonies -- as with Neidorf and Riggs. Legitimate users and operators of computer networks need to beprotected from arbitrary seizures and guilt by electronic association. Thecriminal code permits law enforcement personnel to seize equipment used ina crime or that might provide criminal evidence, even when the owner has noknowledge of the crime. But the purpose of such seizures is to allow theauthorities access to evidence of criminal activity, not to shut downbusinesses. Searchers need not remove computer equipment to inspect thefiles it contains. They can sit down and make copies of whatever filesthey want on the spot. Even if they expect some piece of incriminatingmaterial to be hidden particularly well -- for example, in a speciallyprotected file or in a ROM chip -- it is unreasonable to hold onto theseized equipment indefinitely. And it's clearly wrong to seize equipment that cannot, by anystretch of the imagination, contain incriminating data. In both the SteveJackson and Ripco cases, the Secret Service seized laser printers alongwith other equipment. Laser printers have no permanent memory (other thanthe factory-supplied ROM chips that tell them how to operate). They printwords on paper, that's all. They cannot contain incriminating information. Even computers themselves cannot possibly constitute evidence. Whenyou turn off a computer, its memory dies. Permanent data exist only onstorage media -- hard drives, floppy disks, tape drives, and the like.Even if law enforcement personnel have some compelling reason to takestorage media away to complete a search, they have no reason to take thecomputers that use those media. Just as a computer is not evidence because it once carriedincriminating information, a network is not a criminal enterprise becauseit once carried data used in or derived from fraudulent activity. Yetunder current law, it seems that the operator of a bulletin board is liableif someone posts an illegal message on it. Say I run a BBS called Mojo.You dial Mojo up and leave Mario Cuomo's MasterCard number on the board,inviting anyone to use it. Six people sign on, read the message, and flyto Rio courtesy of the governor before I notice the message and purge it.Apparently, I'm liable -- even though I had nothing to do with obtainingCuomo's credit card number, never used it, and strenuously object to thismisuse of my board. Such an interpretation threatens the very existence of the academicand commercial nets. A user of UseNet, for instance, can send a message toany other user of UseNet. The network routes messages in a complex fashion-- from Computer A to Computer B to Computer C, and so on, depending onwhat computers are currently live, the volume of data transmitted amongthem, and the topography of the net itself. The message could pass throughdozens of computers before reaching its destination. If someone uses themessage to commit fraud, the system operators of every computer along itspath may be criminally liable, even though they would have no way ofknowing the contents of the message. Computer networks and BBSes need the same kind of "common carrier"protection that applies to the mails, telephone companies, and wireservices. Posting an illegal message ought to be illegal for the personwho posts it -- but not for the operator of the board on which the messageappears. The main function of the Net is to promote communication. Peopleuse it to buy goods, research topics, download software, and a myriad ofother things as well, but most of their computing time is spentcommunicating: by posting messages to bulletin boards, by "chatting" inreal time, by sending electronic mail, by uploading and downloading files.It makes no sense to say that discussion of a topic in print is OK, butdiscussion of the same topic via an electronic network is a crime. Yet as currently interpreted, the law says that mere transmission ofinformation that someone _could_ use to gain access to computers forfraudulent purposes is itself fraud -- even if no fraudulent access takesplace. The Secret Service, for instance, was willing to indict Neidorf forpublishing information it thought could be used to disrupt the 911 network-- even though neither Neidorf nor anyone else actually disrupted it. Wemust clearly establish that electronic communications are speech, and enjoythe same protections as other forms of speech. The prospects for such legal reform are not bright. Three times inthis century, technological developments have created new venues forspeech: with radio, with television, and with cable. On the grounds ofscarcity, government restricts freedom of speech on radio and television;on the grounds of natural monopoly, government regulates speech on cable.Recent events, such as the conviction of former Cornell graduate studentRobert T. Morris for introducing a virus into the nationwide ARPANet, havearoused worry about hacker crimes. But concern for the rights oflegitimate users of computer nets has not received that same level ofpublicity. If anything, recent trends lean toward the adoption of moredraconian laws -- like the Computer Fraud and Abuse Act, which may make itillegal even for computer security professionals to transmit informationabout breaches of security. The Net is vast -- and growing fast. It has already changed thelives of thousands, from scientists who learn of new breakthroughs far morequickly than if they had to wait for journal publication, to stay-at-homewriters who find in computer networks the personal contact they misswithout office jobs. But the technology is still in its infancy. The Nethas the capacity to improve all our lives. A user of the Net can already find a wide variety of information,from encyclopedia entries to restaurant reviews. Someday the Net will bethe first place citizens turn to when they need information. The morningpaper will be a printout, tailored to our interests and specifications, ofarticles posted worldwide; job hunters will look first to the Net; millionswill use it to telecommute to work; and serious discussion will be given tothe abolition of representative government and the adoption of directdemocracy via network voting. Today, we are farmers standing by our country lanes and marveling asthe first primitive automobiles backfire down the road. The shape of thefuture is murky. We cannot know what the Net will bring, just as a farmerseeing a car for the first time couldn't possibly have predicted six-lanehighways, urban sprawl, the sexual revolution, and photochemical smog.Nonetheless, we can see that something remarkable is happening, somethingthat will change the world, something that has the potential to transformour lives. To ensure that our lives are enriched and not diminished, wemust ensure that the Net is free.-- Greg Costikyan is a writer of fiction and nonfiction who has designed 23 commercially published games.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -