From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 103d231ca34080ddff8a091743d1aef2111ff80686c7f655e40dc6fd2a4cceac
Message ID: <199602151941.OAA09821@pipe2.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-02-16 00:40:31 UTC
Raw Date: Fri, 16 Feb 1996 08:40:31 +0800
From: John Young <jya@pipeline.com>
Date: Fri, 16 Feb 1996 08:40:31 +0800
To: cypherpunks@toad.com
Subject: Remailers Pose Risk
Message-ID: <199602151941.OAA09821@pipe2.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Computerworld, February 12, 1996, Front page:
Stealth E-mail poses corporate security risk
By Gary H. Anthes
Anonymous remailers on the Internet are emerging as a
threat to national and corporate security, some experts
warn.
These remailers are Internet sites that strip the names and
addresses from electronic-mail messages before passing them
along anonymously to prople or newsgroups.
For corporate information systems managers, stealth E-mail
is especially troubling because it allows hackers to attack
systems, steal trade secrets and broadcast them worldwide
without leaving an audit trail for authorities to follow.
"Anonymous remailers have a lot of nasty potential," said
Stephen T. Kent, chief scientist for security technology at
BBN Corp. in Cambridge, Mass. "They have the broadcast
potential of the news media but without the possibility of
recourse if something is unsubstantiated or defaming is
published."
Critics are calling for strict limits or an outright ban on
remailer sites, but others insist they are a safeguard
against electronic snooping by abusive governments and
should be considered a political freedom.
Anonymous remailers have been used in a variety of criminal
acts, including distributing pornography and computer
viruses, violating copyright laws and harassing people with
nasty messages.
One snowy day last month, for example, about 25% of the
workforce at a defense contractor in Rockville, Md., went
home after they received a bogus E-mail message dismissing
them for the day. The message originated from an anonymous
remailer that allowed the user to impersonate a senior
company official.
But there are more scary, less publicized uses of
remailers, said Paul Strassmann, former director of defense
information at the Pentagon. Stealth E-mail also is used
extensively by Russian criminals, often former KGB agents.
"This method of communication is a favorite for engaging
the services of cyber-criminals and for authorizing payment
for their acts through a third party." Strassmann said.
Its Reputation Precedes It
Perhaps the best-known remailer site is in Finland at
anon.penet.fi.
The Finnish server was used last year to publish
confidential and copyrighted scriptures from the Church of
Scientology. It also was used to reveal the secret source
code used by RSA Data Security, Inc. in some of its
encryption products.
Last year, police raided the Finnish site and seized
records and computer gear as part of an investigation of
alleged copyright infringement.
The administrator of anon.penet.fi offers this warning to
new users: "I believe very firmly that it's not for me to
dictate how other people ought to behave. But remember,
anonymous postings are a privilege, and use them
accordingly. Remember, this is a service that some people
who use newsgroups such as alt.sexual.abuse.recovery need.
Please don't do anything stupid that would force me to
close down the service."
One remailer advertises itself as a way to thwart attempts
by intelligence agencies to trace illegal traffic,
Strassmann said. It holds all incoming messages until five
minutes after the hour, then remails them in random order.
The messages are sent through five to 20 other remailers,
with a stop in at least one of the several countries noted
for lax law enforcement, he said.
Yet other experts say the threat from remailers is greatly
exaggerated. "We've had remailers around for a while, and
society hasn't fallen," said Mike Godwin, staff counsel at
the Electronic Frontier Foundation in San Francisco. "We've
had anonymous communication in the U.S. for years, you can
use a public telephone, send a letter without a return
address or engage in a cash transaction."
Last year, the U.S. Supreme Court struck down an Ohio law
that required the authors of political posters and
pamphlets to identify themselves. "In the case of political
speach, you can't make people tell you who they are," said
Patrick Sullivan, executive director of the Computer Ethics
Institute in Washington.
But Sullivan said the police raid on the Finnish remailer
was prompted by the Church of Scientology's legitimate
complaint about violations of copyright law.
"I haven't heard many uses of remailers that haven't
involved, at the very least, being disrespective and, at
the most, trying to cause harm of some sort." he said.
_________________________________________________________
Battle against remailers an unfair fight
Think of anonymous remailers as enemies you can't fight
face to face, says Paul Strassmann, former director of
defense information at the Pentagon and now a lecturer at
the U.S. Military Academy at West Point.
"Anonymous remailers are here to stay," he said. "That
means the old military paradigm of retaliation falls apart.
The whole theory of warfare has been if someone attacks
you, you can attack them. But when you are anonymous, there
is no one to shoot at."
Strassmann said society myst look for defenses in the
health sciences, not among electronic technologies.
"The history of public health teaches us that suppression
of any disease must be preceded by a thorough understanding
of its behavior, its method of transmission and how it
creates its own ecology," he said.
"As in the case of smallpox, yellow fever, flu epidemics,
AIDS or malaria, it will take disasters before the public
may accept that some forms of restrictions on the
electronic freedom of speech and that privacy may be
worthwhile."
- Gary H. Anthes
_________________________________________________________
Do's and don'ts
Unethical or illegal uses of anonymous remailers:
- To spread viruses or other malicious software
- To harass or commit libel
- To violate copyright laws
- To encourage others to commit unethical or illegal
behavior
Legitimate uses of anonymous remailers:
- For "whistle blowing"
- For political speech
- For encouraging frank but constructive exchanges of
opinions
_________________________________________________________
Article also contained chart on how to use anon.penet.fi,
not included here.
[Thanks to BC for transcribing]
Return to February 1996
Return to “John Young <jya@pipeline.com>”
1996-02-16 (Fri, 16 Feb 1996 08:40:31 +0800) - Remailers Pose Risk - John Young <jya@pipeline.com>