Computer crime survey

Computer crime survey

Volume7 Ndmber Ii ISSN 0142-0496 OCTOBER 1985 COMPUTERS SEGURITY BULLETIH 1 _ Editor: Editorial Advisors: MICHAEL COMER, Director, Network Sec...

342KB Sizes 5 Downloads 206 Views

Volume7

Ndmber Ii

ISSN 0142-0496

OCTOBER 1985

COMPUTERS SEGURITY BULLETIH 1

_

Editor:

Editorial Advisors:

MICHAEL COMER, Director, Network Security Management Ltd. London

Jay J. BloomBecker, Director, National Data Center for Computer Crime, Los Angeles

Associate Editor: FRED LAFFERTY, Director of Corporate Security, Cargill Inc. Minneapolis

Patrick M. Ardis, Partner, Wildman. Harold, Allen Dixon & McDonnell Robert P. Campbell, CDP, President, Advanced Information Management

Inc, Woodbridge,

Virginia

Andrew Chambers, BP Professor of Internal Auditing, The City University Business School, London Pieter van Dijken, Former Chief of Fraud Department,

N.C.I.S., The Hague

Dr. Jerry Fitzgerald, Jerry Fitzgerald & Associates, Redwood City, California Fred M. Greguras, Attorney, Fenwick, Stone, Davis & West, Palo Alto, California Peter Hamilton, Managing Director, Zeus Security Consultants Ltd, London Jocelin Harris, Lawyer and Banker, London Peter J. Heims, Fellow of the Institute of Professional Investigators, London Geoffrey Horwitz, Consultant, Johannesburg Alistair Kelman, Barrister and Legal Expert in Microelectronics

and Computing, London

Jules B. Kroll, President, Kroll Associates, New York David Lancaster, Vice President and Chief Auditor, Gulf Investment Corp, Kuwait Las Lawrence, Director, Venalda Pty, Ltd. New South Wales, Australia R. J. Lindquist, Lindquist Holmes & Co, Toronto Norman Luker, Security Management,

Northern Telecom Ltd. Montreal

James Martin, Author and Lecturer Special Technical Advisors: James Khosla, Open Computer Security Ltd. Brighton

Adrian R. D. Norman, Consultant, Arthur D. Little Ltd, London Dorm B. Parker. Senior Management Systems Consultant, Stanford Research Institute, Menlo Park, California Alec Rabarts, Fellow of the Institute of Chartered Accountants, London Michael I. Sobol, President, MIS Training Institute, Framingham, Timothy J. Walsh, President, Harris and Walsh Management

Martin Samociuk, Consultant, Network Security Management

Massachusetts

Consultants, New York

Graeme Ward, Head of Audit, Abbey National Building Society, London Ltd

CONTENTS

COMPUTER CRIME SURVEY

Philip Weights, Philip Weights&Associates

Inc. Panama

crime survey UK Software P.rotection Act becomes law

Computer

1 4

News on the international copyright front The security of personal computers: a growing concern

4

5

We are haunted by the self-described 'hacker' who told us we had convinced him to commit a computer crime. He was convinced that the paucity of computer crime charges against teenagers meant he was unlikely to ever see the grim interior of Juvenile Hall. We suspect there are millions like this caller, who will never change until there is a clear necessity to do so. there should be a mainstream computer ethic. It seems obvious: There should be agreement about what is right and what is wrong when you use a computer or a computer program or a computer communication system. But there isn't. The malicious 'hacker', the computer criminal, the pirate, the manufacturer which produces inadequately tested software, the salesman who misrepresents a machine's capabilities, the bigot who maintains lists of enemies on a computer - these are but a few manifestations of an absent mainstream computer ethic. Think about just the first of this list. Security consultant Stever Ross noted sagely, "The issue is not the actions of misguided children; it is society's attitude towards those acts."

a 1985 Elsevier Science Publishers B.V. (Information & Business Division), Amsterdam. /85 / $9.99 + 2.20 No part of this publication may be reproduced. stored in a retrieval system. or transmitted by any form or by any means. electronic. mechanical. photocopying. recording or otherwise. without the prior permission of the publishers. (Readers in the U.S.A. - please see special regulations listed on back cover).

Vol 7. No 12. Page 2. One way of finding out what society's attitude is, is to look at how perpetrators of computer crime fare when they have been caught. The following survey was conducted through over one hundred state prosecutors in the US to determine the significance of various computer crime laws passed in the States.

0ccupti0M/ls

Forty-three defendants and juveniles were surveyed to find out how they were treated in court and what kind of punishment they received, if guilty. Their average age was twenty-seven years and their occupations were as follows: Occupation

Number of Peop

Unemployed Unskilled labourer Accomplice (work unspecified) Private investigator Programmer Input clerk Bank teller Computer firm executive Programming teacher Computer technician Student Of the individuals listed here , only those in the student category The programmers are likely to fit the typical hacker stereotype. were primarily employees who got into disagreements with their employers and either took programs they claimed rights to, or did damage to the employer's system. Based on an analysis of the police reports and prosecutors' case summaries, we find little evidence of computer sophistication in our sample. It is notable that almost one-third of those in the sample demonstrated no knowledge of computer science. With the exception of the students , most of the others are likely to have learned enough to commit their crimes from training they got in their work assignments. Victim4

1. Who are the victims? Number of Gas'

Victim Banks Miscellaneous commercial users Telecommunications companies Governmental units Individuals Computer product manufacturers Retail department manufacturers Universities

The two major victim classifications are those who produce compute products and those who use them. The producers are more likely to be subjected to the taking of, or damage to, programs or data. To the extent that computer users develop their own software or data, they are subject to the same crimes as their suppliers.

D1985 Elsevier Science Publishers B.V. (Information & Business Division), Amsterdam. /84 / $0.00 + 2.20 No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, mechanical. (Readers in the U.S.A. -please

photocopying, recording or otherwise, without see special regulations listed on back cover).

the prior permission

of the publishers.

Vol 7. No 12. Page 3. 2. What are the crimes? Number of Cases

Type of Crime

18 8 3 5 4

Theft of money Taking programs and data Alteration of data for gain Damage to programs or data Theft of services 3. What are the losses? Type of Crime

Av. Loss

Theft of money Theft of programs or data Damage to programs or data

$5245 $81 000 $93 600

Number of Cases 18 2 5

With the exception of the figures for losses in theft of money In cases, these statistics are of questionable usefulness. addition to the two cases summarized as taking programs and data, there were four in which no value could be put on the software or data taken, and two in which the value was estimated as minimal.

Figurea queationab&

Analogously, the figures for damage to programs and data are questionable. They represent estimates of the cost to fix a damaged computer system, ranging from $450 to $250 000. A final category of losses is those resulting from changes in information or unauthorized disclosure of information. It is impossible to put a dollar value on the loss in the four cases fitting in this category. 4. What happens in court? Almost all cases are dismissed or disposed of by plea bargain. 52 cases in the sample, the dispositions were as follows: Disposition

Of

Number of Cases

Guilty plea Trial Not guilty Still pending

30 2 7 13

Of the not guilty findings, three involved factual difficulties in applying the law to the actions of the defendant. In each case, there was insufficient evidence to prove that the defendant intended to commit the acts which constituted the crime charged. In one case a court found that the computer crime law did not cover theft from a computerized subway train ticket machine, calling it nothing more than a big Coke machine. One individual was not prosecuted because one cooperated with the police; in another the victim would not cooperate. One case was dropped when the codefendant 'took the rap.' 5. What are the penalties? Of the 14 sentenced to jail time, one received one year, three got six months, one got five.months , and the rest got six weeks or less. $129 600 in restitution was ordered , with the highest being 0 1985 Elsevier Science Publishers B.V. (Informalion No part of this means. (Keaders

publication

electronic.

may be reproduced.

mechanical.

in the U.S.A.

please

photocopying. see special

stored

& Business

recording

regulations

Division).

in a retrieval

system.

or otherwise. listed

Amsterdam. or transmitted

without

on back cover).

the prior

184 / $0.00 + 2.20 by any form permission

or by any

of the publishers.

Vol 7. No 12. Page 4. $87 000, and the low being three cases in the $500 range. fines were for $1000 (twice) and $300 once. Penalty

The

Number of Cases

Jail time Prison time Restitution Fine Community service

14 1 11 3 4 JAY BLOOMBECKER

UK SOFTWARE PROTECTION ACT BECOMES LAW

The Federation aginst Software Theft (FAST)-sponsored Copyright (Computer Software) Amendment Act 1985 finally came into force in the UK on the 16th of September. According to the Department of Trade and Industry this Act removes any doubt that computer programs are protected by copyright and enhances the criminal remedies of the Copyright Act 1956. Making, importing or distributing copies of programs which infringe copyright now carries a maximum penalty of an unlimited fine and two years imprisonment on indictment. The less serious retailing offences attract a maximum penalty of E2000 fine and/or two months imprisonment. On passage of this Government-supported Act, John Butcher, Parliamentary Under Secretary of State for Industry, stated: "The powers of this new Act ensure that the creators of computer programs enjoy the same protection as other creative writers. I hope the Act will be as effective against software piracy as earlier legislation was in dealing with video piracy". This earlier legislation that the Minister referred to - the Copyright Act 1956 (Amendment) Act 1982 and the Copyright (Amendment) Act 1983 - has indeed led to a dramatic fall in video piracy which, at its peak, was estimated to be losing the industry as much if not more than software piracy (El50 million per annum). Meanwhile FAST has been busy requesting co-operation from the UK software industry in identifying cases of software infringement. According to the 23rd of October issue of Datalink, FAST has already received information on over 40 alleged cases of piracy some of them full-scale counterfeiting operations - and will be soon discussing some of these with the police with a view to prosecution under the new Act.

NEWS ON THE INTERNATIONAL COPYRIGHT FRONT

The copyright situation in Japan appears to have changed again with a new edict that databases now qualify as "intellectual work" and This small therefore are eligible for copyright protection. advance in the battle against piracy has been followed by Singapore, which has just drafted new copyright laws increasing the penalties for companies or individuals found guilty of software piracy. These laws are expected to be passed by the Singapore government sometime in the next six weeks and come into force in the new year. This action is seen to be very timely as Singapore has just been accused of being one of the leading world sources of 1985 Elscyier Science Publishers B.V. (Information No part ot this means.

[f&ders

pubtxatmn

etec.tronir:.

may be reproduced.

mechanical.

in the I1.S.A.

photoLopylng.

please SW special

stored

& Business Division), in a retrluval

record~ngor

regulations

listed

system.

otherwise.

Amsterdam. or transmitted

without

on back covrr)

the prior

184 / $0.00 + 2.20 by any term or by any permission

of the

pubbshers.