Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The first fallout from Cybergate
The Register UK ^ | Feb 10, 2004 | Mark Rasch, SecurityFocus

Posted on 02/10/2004 11:22:27 AM PST by lchoro

Did Republican staffers commit a crime by clicking on the "My Network Places" icon to access Democratic memos, asks SecurityFocus columnist Mark Rasch.

Politics is dirty business, and rarely so much as in the area of patronage: appointments to sought-after federal jobs in general, and to the federal bench in particular. So it should be little surprise that, with so much at stake, one political party would want to use the insecurity inherent in computerized databases to its political advantage.

What is surprising, however, is that, caught with their hand in the cookie jar, Senate Republicans employed the tactic of blaming the victim: they said, in essence, It's your fault that we got and used your information. If successful, this tactic does not bode well for the government's ability to prosecute computer crimes, and to protect critical infrastructures.

With the resignation last Thursday of Senate staffer Manuel Miranda as the first victim of what I might call "cybergate," we may learn whether this tactic will be pursued and whether it will be ultimately successful.

The scandal itself revolves around the process by which federal judges are appointed, and more importantly, how such appointments are blocked by the opposing party. When President George W. Bush came to office, he sought to make numerous appointments to the federal bench -- some to positions that conservative Republicans had deliberately left vacant for years of Democratic administrations.

The Democrats, at the time a majority in the Senate, sought to use tactics similar to those they criticized Republicans for in preventing such nominations from reaching a vote on the floor of the Senate. The key Senate Committee responsible for such appointments was the Judiciary Committee.

Democratic staffers wrote and transmitted confidential memoranda describing the means they would use to block such nominations in general, and the nomination of conservative Republican Miguel Estrada in particular. A year ago, in February 2003, columnist Robert Novak -- the same columnist responsible for revealing the name of a CIA operative on a leak from government officials -- published information from these Democratic strategy memos. Novak reported that the information came from "internal Senate sources" but refused to identify these sources when questioned by Boston Globe reporter Charlie Savage.

It now appears that the memos were stored on a computer server that also served the Judiciary Committee. When the Republicans regained control of the Senate, they regained control of the Judiciary Committee as well. Eager young staffers apparently discovered that access to the Democratic strategy memos was not password-protected, and was located on the shared server, where they could access it by clicking on the "My Network Places" icon on their own desktops.

There is some dispute over what happened next -- though in my opinion it makes no difference. The Republicans argued that a computer technician told the Democrats about the configuration problem in the summer of 2002, and the Democrats claim they knew nothing about it until November of 2003. In either event, it's clear that Republican staffers, learning of the lack of protection to the documents, used the opportunity to take, read and leak the contents of the memos.

The 'They Deserved It' Defense

When the source and method of the leaks became apparent, the Senate Sergeant at Arms launched an investigation. Former Republican Senate Judiciary Committee Staffer Manuel Miranda came under suspicion, as he was one of the committee's point people on judicial appointments, and had since left the Judiciary committee to work for Senate Majority Leader Bill Frist.

What is amazing is what comes next. When interviewed by the Boston Globe about the incident, Miranda reportedly claimed that the only wrongdoing was on the part of the Democrats, both for the content of their memos, and for their negligence in placing them where they could be seen.

"There appears to have been no hacking, no stealing, and no violation of any Senate rule," the Globe quoted Miranda as saying. "Stealing assumes a property right and there is no property right to a government document. . . . These documents are not covered under the Senate disclosure rule because they are not official business and, to the extent they were disclosed, they were disclosed inadvertently by negligent [Democratic] staff."

So, Miranda claims it isn't stealing because you can't steal government documents, and it's not a violation of the rules because they aren't government documents. Or something like that. He also seems to argue that the password misconfiguration made the documents fair game.

There was a time when that would have been true.

When the federal computer crime law passed was passed by Congress in 1986, the statute only made it illegal to access certain computers (deemed "federal interest computers") without authorization, and made no provision for those who exceeded the scope of authorized access. This was not an oversight, but a deliberate limitation on the scope of the statute, and it was cited by courts in, for example, dismissing computer crime charges against Boston IRS employee Richard Czubinski who repeatedly violated rules and searched IRS databases for information about friends, relatives and political enemies. Congress specifically indicated that people who were authorized users of a computer system, and who used that access to look at individual files they were not supposed to see, should not be covered by the law.

But in one of the many amendments to the federal computer crime statute, Congress changed the wording, and explicitly criminalized the act of exceeding the scope of authorized access to a system. Doing this to federal computers is outlawed by Title 18 U.S.C. 1030(a)(2), which makes it a crime to intentionally access a computer without authorization or to exceed authorized access, and thereby obtain "information from any department or agency of the United States."

So, did the Republican Judiciary Committee staffers violate the law?

What I love about being a lawyer is that the answer to any question is always the same: "It depends." The law requires proof that the unauthorized access, or the exceeding of authorized access, was done intentionally.

With no passwords, and no lines of demarcation, it is possible to argue that the Republicans' access to the Democratic strategy documents was not deliberate, or that it was not exceeding the scope of authorization, because all of the documents were on a single, unprotected server.

This, of course, defies common sense, but the law often defies common sense. Similarly, the federal law requires proof that the information obtained be obtained from "an agency or Department of the United States." It seems that Miranda is arguing that, when the Democratic staffers act in a political capacity, their documents no longer relate to an Agency or Department - it's just politics. Finally, Miranda seems to argue that there is no proprietary right to government documents. While he is correct that government documents are not entitled to copyright protection, this does not imply that it is therefore okay to break into a computer database and take them.

The investigation continues, and Miranda, while continuing to proclaim his innocence, is so far the only casualty. But if his argument that failures of security excuse the taking of documents is accepted, truth, justice and information security may be the next casualties of political warfare.

Mark D. Rasch, J.D., is a former head of the Justice Department's computer crime unit, and now serves as Senior Vice President and Chief Security Counsel at Solutionary Inc.


TOPICS: Government; Politics/Elections
KEYWORDS: computersecurity; cybergate; democraticmemos; estradamemo; judiciarycommittee; legal; naacpmemo
FYI
1 posted on 02/10/2004 11:22:28 AM PST by lchoro
[ Post Reply | Private Reply | View Replies]

To: lchoro
By this logic it was not Nixon who did anything wrong at Watergate, but Deepthroat should be considered the real criminal. I demand an investigation and that Deepthroat be brought to justice.
2 posted on 02/10/2004 11:24:54 AM PST by Always Right
[ Post Reply | Private Reply | To 1 | View Replies]

To: lchoro
if you leave the keys inyour car and it gets stolen, it's your fault. same diff.
3 posted on 02/10/2004 11:31:16 AM PST by camle (keep your mind open and somebody will fill it with something for you))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Always Right
Remember when the couple illegally recorded Newt Gingrich on a cell phone call? When Rep. Jim MeDermott (D-Wa.) got the tape and gave it to the press, the illegality was a non-issue. The media's double standard strikes again.
4 posted on 02/10/2004 11:31:47 AM PST by Spok
[ Post Reply | Private Reply | To 2 | View Replies]

To: lchoro
No one is asking the key question: What the hell are politicians doing using MY computers -- the ones I paid for -- to conduct party business?
5 posted on 02/10/2004 11:34:20 AM PST by Glenn (What were you thinking, Al?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: lchoro
Still missing the point. The Dems are DESPERATE to change the topic from WHAT THEY DID to HOW WE LEARNED WHAT THEY DID.
6 posted on 02/10/2004 11:36:24 AM PST by LS (CNN is the Amtrack of news.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: camle
if you leave the keys inyour car and it gets stolen, it's your fault. same diff.

And you give the car thief a free ride as the keys were in there?
7 posted on 02/10/2004 11:36:51 AM PST by lelio
[ Post Reply | Private Reply | To 3 | View Replies]

To: lelio
nothing even got stolen here. embarrasssing documents that the Democrats posted on a public part of a computer network got read by alert Republicans. What the Democrats are complaining about is equivalent to leaving naked pictures of your girlfriend on the front seat of your car and then demanding that passersby who looked in at the pictures be jailed because they are peeping toms.
8 posted on 02/10/2004 11:44:51 AM PST by vbmoneyspender
[ Post Reply | Private Reply | To 7 | View Replies]

To: vbmoneyspender
I agree with you on that one VB
Just call me Peeping Tom.
Luigi
9 posted on 02/10/2004 11:52:14 AM PST by LuigiBasco
[ Post Reply | Private Reply | To 8 | View Replies]

To: vbmoneyspender
To continue on with your Peeping Tom analogy: one of the staffers made copies of the emails and both he and Miranda went back several times to read them. That's like setting up a video camera and taping your neighbor through her un-draped bedroom window.
10 posted on 02/10/2004 11:55:23 AM PST by lelio
[ Post Reply | Private Reply | To 8 | View Replies]

To: Glenn
" What the hell are politicians doing using MY computers"

Exactly. The Democrat Senators should be charged with conspiracy to subvert the Constitution of the United States, violation of civil rights and misappropriation of government property.
11 posted on 02/10/2004 12:03:35 PM PST by Ben Hecks
[ Post Reply | Private Reply | To 5 | View Replies]

To: Glenn
What the hell are politicians doing using MY computers -- the ones I paid for -- to conduct party business?

Good question. Miranda touches on this point in his resignation letter:

I knew that there is no privacy expectation to documents on a government server, documents that are regularly backed up and stored in a government facility. I knew that these were not confidential or classified documents.
12 posted on 02/10/2004 12:06:56 PM PST by MamaLucci (Free The Judiciary Committee Memos!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: lelio; vbmoneyspender
To continue on with your Peeping Tom analogy: one of the staffers made copies of the emails and both he and Miranda went back several times to read them. That's like setting up a video camera and taping your neighbor through her un-draped bedroom window.

Yes, but the question is: What exactly was your neighbor doing with a keg and the local Cub Scout pack in her bedroom, after 1 AM on a school night?

I would say that the Democrat senators are trying to change the subject from the keg and the Kubs. :-)

13 posted on 02/10/2004 1:02:58 PM PST by an amused spectator (articulating AAS' thoughts on FR since 1997)
[ Post Reply | Private Reply | To 10 | View Replies]

To: lchoro; lelio

New York Militia Men Leak Secret Memo

It seems that the militiamen are arguing that, when British spies act in a political capacity, their documents no longer relate to an Agency or Department - it's just politics. Finally, the militiamen seem to argue that there is no proprietary right to documents hidden in a spy's boot. While he is correct that hidden documents are not entitled to blanket protection, this does not imply that it is therefore okay to look in a spy's boot and take them. Andre's state-appointed mouthpiece

By the act of 3d November, 1780, it was "Resolved, Whereas Congress have received information that John Paulding, David Williams and Isaac Van Wart, three young volunteer Militia men of the State of New York, did on the 23d day of September last intercept Major John Andre, Adjutant-General of the British Army, on his return from the American lines, in the character of a spy, and notwithstanding the large bribes offered them for his release, nobly disdaining to sacrifice their country for the sake of gold, secured and conveyed him to the commanding officer of the district, whereby the dangerous and traitorous conspiracy of Benedict Arnold was brought to light, the insidious designs of the enemy baffled and the United States rescued from impending danger. Resolved that Congress have a high sense of the virtuous and patriotic conduct of the said John Paulding, David Williams and Isaac Van Wart, in testimony whereof ordered that each of them receive annually out of the public treasury two hundred ($200) dollars in specie, or an equivalent in the current money of these States during life, and that the board of war procure for each of them a silver medal, on one side of which shall be a shield with this inscription: 'Fidelity!' and on the other the following motto: 'Vincit amor patrias!' and forward them to the Commander-in-Chief, who is requested to present the same, with a copy of this resolution and the thanks of Congress for their fidelity and the eminent services they have rendered their country."

14 posted on 02/10/2004 1:19:46 PM PST by an amused spectator (articulating AAS' thoughts on FR since 1997)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson