Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hackers Get Novel Defense; the Computer Did It
Reuters ^ | October 27, 2003 | Elinor Mills Abreu

Posted on 10/28/2003 2:18:23 PM PST by avg_freeper

SAN FRANCISCO (Reuters) - Prosecutors looking to throw the book at accused computer hackers have come across a legal defense expected to become even more widespread in an era of hijacked PCs and laptops that threatens to blur the lines of personal responsibility: the computer did it.

In one case that was being watched as a bellwether by computer security experts, Aaron Caffrey, 19, was acquitted earlier this month in the United Kingdom on charges of hacking into the computer system of the Houston Pilots, an independent contractor for the Port of Houston, in September 2001.

Caffrey had been charged with breaking into the system and crippling the server that provides scheduling information for all ships entering the world's sixth-largest port.

Although authorities traced the hack back to Caffrey's computer, he said that someone must have remotely planted a program, called a "trojan," onto his computer that did the hacking and that could have been programed to self destruct.

In two other cases, British men were accused of downloading child pornography but their attorneys successfully argued that trojan programs found on their computers were to blame.

In all three cases, no one has suggested that the verdicts were anything other than correct.

Some legal and security experts say the trojan defense is a valid one because computer hijacking occurs all the time and savvy hackers can easily cover their tracks. "I've seen cases where there is a similar defense and it could work or not work based on corroborating evidence" such as how technical the defendant is, said Jennifer Stisa Granick, clinical director of the Sanford Law Center for Internet and Society.

It is relatively easy to trace a hack back to a particular computer, but proving that a specific person committed the crime is much more difficult, she and others said.

Someone other than the computer owner could use the machine, either by gaining physical access or remotely installing trojan software that was slipped onto the computer via an e-mail sent to the computer owner or downloaded from a malicious Web site, they said.

"On the one hand, this is 100 percent correct that you can not make that jump from computer to keyboard to person," said Bruce Schneier, chief technology officer at Counterpane Internet Security based in Cupertino, California. "On the other hand, this defense could (be used) to acquit everybody.

"It makes prosecuting the guilty harder, but that's a good thing," he added.

Mark Rasch, former head of the U.S. Department of Justice computer crime unit, agreed.

"The more difficult problem is people could actually go to jail for something they didn't do" as a result of trojan programs, said Rasch, chief security counsel for computer security provider Solutionary. "If I want to do something illegal I want to do it on someone else's machine."

But Dave Morrell, a computer consultant for the Houston Pilots who worked with the FBI after the attack, said the defense also opened the door to hackers. "It sets a precedent now in the judicial system where a hacker can just claim somebody took over his computer, the program vanished and he's free and clear," he said

Michael Allison, chief executive of computer forensics firm Internet Crimes Group in Princeton, New Jersey, said experts should have been able to prove if there had been a trojan on the computer in question.

"In some cases, I do suspect there are people whose computer is taken over by third parties," he said. "It's also a clever defense to exculpate your client."

The defense is likely to become more widespread especially given the increasing use of "spyware" programs that can be used by hackers to steal passwords and essentially eavesdrop on a computer user, experts said.

"The emergence of spyware will only enhance these claims," said Michael Geist, a law professor at the University of Ottawa Law School in Canada. "We're going to have to sort through the level of responsibility a person has for operating their own computer."

The trojan defense has not yet been put to the test in the United States.

(Additional reporting by Bernhard Warner in London)


TOPICS: Business/Economy; Crime/Corruption; Front Page News; News/Current Events
KEYWORDS: computer; computersecurityin; hacking; pc

1 posted on 10/28/2003 2:18:24 PM PST by avg_freeper
[ Post Reply | Private Reply | View Replies]

To: avg_freeper
We need computer control. Big computer doesn't want you to feel safe though because it would impact their absurd corporate profits which they pay no taxes on. Of course this would lead to the slippery slope of banning computers and when computers are banned only hackers will have computers.

I am in no way associated with views expressed in my posts.

2 posted on 10/28/2003 2:22:16 PM PST by Naspino (I am in no way associated with views expressed in my posts.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Naspino
I bet that one day "testimony" or data from one's own computer can be refused in the same way as a spouse’s testimony.
3 posted on 10/28/2003 2:30:18 PM PST by avg_freeper (Gunga galunga. Gunga, gunga galunga)
[ Post Reply | Private Reply | To 2 | View Replies]

To: avg_freeper
People don't hack websites. Computers do.
Time to lock up computers and put a 30 day waiting period on all new purchases.
4 posted on 10/28/2003 2:32:09 PM PST by RedBloodedAmerican
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper; Naspino
"The more difficult problem is people could actually go to jail for something they didn't do" as a result of trojan programs, said Rasch, chief security counsel for computer security provider Solutionary. "If I want to do something illegal I want to do it on someone else's machine."

As a Hacker I never feel protected without my Trojan.

5 posted on 10/28/2003 2:33:59 PM PST by Pontiac
[ Post Reply | Private Reply | To 1 | View Replies]

To: RedBloodedAmerican
"People don't hack websites. Computers do."
Absolutely, look what SUV's do by themselves.
6 posted on 10/28/2003 2:46:38 PM PST by NTegraT
[ Post Reply | Private Reply | To 4 | View Replies]

Comment #7 Removed by Moderator

To: avg_freeper
A good friend of mine had his system hijacked by a spammer a couple of months ago. He never would have know if Road Runner had not contacted him after they notced heavy traffic on their email servers coming from his computer.
8 posted on 10/28/2003 3:20:56 PM PST by Orangedog (Soccer-Moms are the biggest threat to your freedoms and the republic !)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Orangedog
A good friend of mine had his system hijacked by a spammer a couple of months ago. He never would have know if Road Runner had not contacted him after they notced heavy traffic on their email servers coming from his computer.

Anyone long for the good old days when you could actually see what was running on your computer and notice if anything was amiss?

9 posted on 10/28/2003 4:15:45 PM PST by supercat (Why is it that the more "gun safety" laws are passed, the less safe my guns seem?)
[ Post Reply | Private Reply | To 8 | View Replies]

To: avg_freeper
bump
10 posted on 10/28/2003 8:16:32 PM PST by RippleFire
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson