| ==Phrack Inc.== | |
| Volume Two, Issue 23, File 10 of 12 | |
| In The Spirit Of The Vicious Circle Trilogy... | |
| Phrack Inc. Presents | |
| ***************************************** | |
| *** *** | |
| *** Big Brother Online *** | |
| *** *** | |
| *** by Thumpr Of ChicagoLand *** | |
| *** *** | |
| *** June 6, 1988 *** | |
| *** *** | |
| *** Special Thanks To Hatchet Molly *** | |
| *** *** | |
| ***************************************** | |
| The United States Government is monitoring the message activity on several | |
| bulletin boards across the country. This is the claim put forth by Glen L. | |
| Roberts, author of "The FBI and Your BBS." The manuscript, published by The | |
| FBI Project, covers a wide ground of FBI/BBS related topics, but unfortunately | |
| it discusses none of them in depth. | |
| It begins with a general history of the information gathering activities of the | |
| FBI. It seems that that the FBI began collecting massive amounts of | |
| information on citizens that were involved with "radical political" movements. | |
| This not begin during the 1960's as one might expect, but rather during the | |
| 1920's! Since then the FBI has amassed a HUGE amount of information on | |
| everyday citizens... citizens convicted of no crime other than being active in | |
| some regard that the FBI considers potentially dangerous. | |
| After discussing the activities of the FBI Roberts jumps into a discussion of | |
| why FBI snooping on BBS systems is illegal. He indicates that such snooping | |
| violates the First, Fourth, and Fifth amendments to the Constitution. But he | |
| makes his strongest case when discussing the Electronic Communications Privacy | |
| Act of 1987. This act was amended to the Federal Wiretapping Law of 1968 and | |
| was intended to protect business computer systems from invasion by "hackers." | |
| But as with all good laws, it was written in such broad language that it can, | |
| and does, apply to privately owned systems such as Bulletin Boards. Roberts | |
| (briefly) discusses how this act can be applied in protecting *your* bulletin | |
| board from snooping by the Feds. | |
| How to protect your BBS: Do NOT keep messages for more than 180 days. Because | |
| the way the law is written, messages less then 180 days old are afforded more | |
| protection then older messages. Therefore, to best protect your system purge, | |
| archive, or reload your message base about every 150 days or so. This seems | |
| silly but will make it harder (more red tape) for the government to issue a | |
| search warrant and inform the operator/subscriber of the service that a search | |
| will take place. Roberts is not clear on this issue, but his message is stated | |
| emphatically... you will be better protected if you roll over your message base | |
| sooner. | |
| Perhaps the best way to protect your BBS is to make it a private system. This | |
| means that you can not give "instant access" to callers (I know of very few | |
| underground boards that do this anyway) and you can not allow just anyone to be | |
| a member of your system. In other words, even if you make callers wait 24 | |
| hours to be validated before having access you need to make some distinctions | |
| about who you validate and who you do not. Your BBS needs to be a PRIVATE | |
| system and you need to take steps to enforce and proclaim this EXPECTED | |
| PRIVACY. One of the ways Roberts suggests doing so is placing a message like | |
| this in your welcome screen: | |
| "This BBS is a private system. Only private citizens who are not | |
| involved in government or law enforcement activities are authorized | |
| to use it. The users are not authorized to divulge any information | |
| gained from this system to any government agency or employee." | |
| Using this message, or one like it, will make it a criminal offense (under the | |
| ECPA) for an FBI Agent or other government snoop to use your BBS. | |
| The manuscript concludes with a discussion of how to verify users and what to | |
| do when you find an FBI agent using your board. Overall, I found Roberts book | |
| to be moderately useful. It really just whetted my appetite for more | |
| information instead of answering all my questions. If you would like a copy of | |
| the book it sells for $5.00 (including postage etc). Contact; | |
| THE FBI PROJECT | |
| Box 8275 | |
| Ann Arbor, MI 48107 | |
| Visa/MC orders at (313) 747-7027. Personally I would use a pseudonym when | |
| dealing with this organization. Ask for a catalog with your order and you will | |
| see the plethora of anti-FBI books this organization publishes. Undoubtedly | |
| the FBI would be interested in knowing who is doing business with this place. | |
| The manuscript, by the way, is about 20 pages long and offers references to | |
| other FBI expose' information. The full citation of the EPCA, if you want to | |
| look it up, is 18 USC 2701. | |
| Additional Comments: The biggest weakness, and it's very apparent, is that | |
| Roberts offers no evidence of the FBI monitoring BBS systems. He claims that | |
| they do, but he does not give any known examples. His claims do make sense | |
| however. As he states, BBS's offer a type of "publication" that is not read by | |
| any editors before it is "published." It offers an instant form of news and | |
| one that may make the FBI very nervous. Roberts would do well to include some | |
| supportive evidence in his book. To help him out, I will offer some here. | |
| * One of the Ten Commandments of Phreaking (as published in the | |
| famous TAP Magazine) is that every third phreaker is an FBI agent. | |
| This type of folklore knowledge does not arise without some kind of | |
| justification. The FBI is interested in the activities of phreakers | |
| and is going to be looking for the BBS systems that cater to them. If | |
| your system does not, but it looks like it may, the FBI may monitor it | |
| just to be sure. | |
| * On April 26, 1988 the United States Attorney's Office arrested 19 | |
| people for using MCI and Sprint credit card numbers illegally. These | |
| numbers were, of course, "stolen" by phreakers using computers to hack | |
| them out. The Secret Service was able to arrest this people by posing | |
| as phone phreaks! In this case the government has admitted to placing | |
| agents in the field who pretend to be one of us. Watch yourself out | |
| there, the success of this "sting" will only mean that they will try | |
| it again. Be wary of people offering you codes. | |
| * In the famous bust of the Inner Circle and the 414s, the FBI monitored | |
| electronic mail for several months before moving in for the kill. | |
| While it is true that the owners of the systems being hacked (Western | |
| Union for one) invited the FBI to snoop through their files, it does | |
| establish that the FBI is no stranger to the use of electronic | |
| snooping in investigating crimes. | |
| Conclusion: There is no reason to believe that the government is *not* | |
| monitoring your bulletin board system. There are many good reasons to believe | |
| that they are! Learn how to protect yourself. There are laws and regulations | |
| in place that can protect your freedom of speech if you use them. You should | |
| take every step to protect your rights whether or not you run an underground | |
| system or not. There is no justification for the government to violate your | |
| rights, and you should take every step you can to protect yourself. | |
| I have no connections with Roberts, his book, or The FBI Project other then | |
| being a mostly-satisfied customer. I'm not a lawyer and neither is Roberts. | |
| No warranty is offered with this text file. Read and use it for what you think | |
| it is worth. You suffer the consequences or reap the benefits. The choice is | |
| yours, but above all stay free. | |
| \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\*/////////////////////////////////////// | |