politeness in computingDoes Saying "Please Log In" Give Anyone and Everyone the Right to Be in Your System?![]()
by John Nicholson
John Nicholson is an attorney in the Technology Group of the firm of Shaw Pittman in Washington, D.C. He focuses on technology outsourcing, application development and system implementation, and other technology issues.
Welcome to the first of what I hope will be a series addressing legal issues facing system administrators and the technical community in general.[1] Future columns will deal with free speech, privacy, and censorship; intellectual property; export issues; policies and procedures and how they relate to system administrator liability; computer crime; and other issues or situations that you raise. If you have questions about a particular issue facing you, or comments on a particular column, please feel free to send them to me. This column addresses one of the great debates in system administration whether you can prosecute someone for cracking your system if it says "Please log in" at the prompt. After all, if it says "Please log in" and someone does that, whether authorized or not, that person has only done what you asked, right? Dealing with the law is a lot like dealing with computer systems law has its own language, areas of specialization with specific rules (which can sometimes interact in very strange, unexpected, and counterintuitive ways), and processes and procedures. Just as with technology, once you understand how the law works, you can apply that knowledge and understanding to new situations. Like computer systems, law is built on the structure of history. In law, that structure is the laws that have been passed by Congress or the states and the decisions made by courts some dating as far back as colonial or Roman times. When a U.S. court is faced with a particular issue, the first question the judge (or judges) will ask is whether or not there is a U.S. federal or state law addressing the issue. If there is such a law, then the judge will look to see if a higher court that is directly in line above that court has interpreted how the law applies to the issue. For example, if you are in a U.S. district court, then the judge will look at decisions made by the circuit court that is directly above that district court, as well as to the U.S. Supreme Court. If one of those two courts has ruled on the issue, then that is considered a binding precedent to which the lower court will defer. If there is no similar decision from a higher court directly in line above that lower court, then the lower court will look to decisions made by other higher courts and other courts at the same level as the deciding court. For example, a district court will look for rulings from other U.S. circuit courts and other U.S. district courts. If there is no specific law on the subject, the judge will follow the same procedure as above, looking at decisions of other courts. This is the analysis in which the decisions from English, colonial, and even Roman courts can come into play. A great deal of U.S. property law, for example, is based on what is called the "common law" established by English courts before the U.S. declared its independence. This is important because if there is no binding precedent, as is often the case with the technology arena, courts will frequently look to analogous areas of the law, public-policy considerations, and common sense to determine an appropriate course. At this point, you may be wondering when I'm going to answer the question I've posed; but understanding how the different components of a system interact is the key to understanding the answer. To analyze this question, we first look to see if there is any federal or state law addressing it. The Federal Computer Fraud and Abuse Act (CFAA)[2] states
Whoever . . . (A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; (B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or (C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage; . . . shall be punished as provided in subsection (c) of this section.[3] Section 1030 of the CFAA defines a "protected computer" as
a computer (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or (B) which is used in interstate or foreign commerce or communications and defines "damage" as
any impairment to the integrity or availability of data, a program, a system, or information, that (A) causes loss aggregating at least $5,000 in value during any 1 year period to one or more individuals;[4] (B) modifies or impairs, or potentially modifies or impairs, the medical examination, diagnosis, treatment, or care of one or more individuals; (C) causes physical injury to any person; or (D) threatens public health or safety. For the purposes of this article, importantly, the Act does not discuss whether the login prompt of a system has warnings about accessing the system or just says "Please log in." The law merely says "without authorization." So, the question remains: does saying "Please log in" automatically authorize anyone to be in your system? Since the relevant federal law covers virtually every computer but does not specifically address the issue, I will focus on court decisions interpreting the Act rather than look for state statutes.[5] Since this is a hypothetical case, and the federal district or state is indefinite, I will look at decisions from all federal courts. In the case of U.S. v. Sablan,[6] Sablan had recently been fired from the Bank of Hawaii's Agana, Guam, branch for circumventing security procedures in retrieving files. Sablan left a bar where she had been drinking with a friend and entered the closed bank through an unlocked loading-dock door. She went to her former work site (using a key she had kept) and used an old password to log into the bank's mainframe. Sablan contended that she then called up several computer files and logged off. The government asserted that Sablan changed several of the files and deleted others. Under either party's version of the story, Sablan's actions severely damaged several bank files. Sablan was convicted of violating §1030 of the CFAA at trial; on appeal, Sablan argued that she did not intend to damage the bank's files, and that §1030 required that she have such an intention. The court held that the intention requirement in the act required only that the unauthorized user intend to gain access to the system, not that the user intend to cause damage. Nowhere in the analysis of the case did the court focus on whether the bank's system had a warning on it or the invitation "Please log in." In the case of U.S. v. Czubinski,[7] Czubinski was an employee of the IRS who, as part of his job, routinely accessed information about taxpayers from one of the IRS data-bases. Using a valid userid and password, Czubinski was able to access income-tax-return information for virtually any taxpayer. IRS Rules of Conduct specified that employees could not use any IRS computer system for other than official purposes. Czubinski, solely out of curiosity, conducted searches and browsed files online that were not related to his job. Czubinski was prosecuted for violating §1030. At trial, Czubinski did not argue that he was authorized to view the files, and the issue of whether the login prompt said "Please log in" or not was not raised. Czubinski was acquitted, however, because he merely looked at the files and did not do any damage, disclose the information that he found, or "obtain anything of value."[8] Neither the law nor the courts appear to address directly the question of whether the prompt saying "Please log in" automatically authorizes a hacker (or other undesired user) to be in the system. Indirectly, however, the courts have provided two examples of an "unauthorized user," and these examples make intuitive sense. Both Sablan and Czubinski were unauthorized users because the owners of the computers said they were, and neither could have reasonably argued that they did not intend to get into a system they knew they were not supposed to access. To see why this makes such intuitive sense, let's look to an analogous area of the law, property law, to see if we can analogize someone unauthorized getting into a network to situations in the real world. Let's say your system is your house, the login prompt is the front door, the userid (or other authentication device) is the equivalent of looking through the peephole to see who's at the door, and the password is the key. Assuming your network has a prompt that says "Please log in," is there a real-world equivalent and should it make a difference to whether or not you can prosecute an unauthorized user?
Scenario 1
Scenario 2 (Modified Czubinski Scenario)
In this case, as in Czubinski, you knew the identity of the person going into your house (the userid), he had the right key (password), and he was there with your permission. But, your friend exceeded the rights that he had been granted. Where Czubinski merely looked, your friend took something of value. In property law as well as under §1030, your friend has committed a crime.
Scenario 2a
Scenario 3 (The Sablan Scenario)
Conclusion
NOTES
[2] 18 U.S.C. §1030. [3] 18 U.S.C. §1030(a)(5). [4] The law does not specify how to calculate the damage caused. It is easy to see how virtually any intrusion can cause a loss of more than $5,000 when the cost of your time and any consultant's time spent dealing with the problem is factored in. [5] The federal law covers any computer used in interstate or foreign commerce (which covers virtually any workstation, server, or mainframe at a business) or communications (which covers virtually every other computer). Since the federal law covers virtually every computer, it's the minimum standard that would be used to prosecute any hacker. Individual states might enact tougher laws, but using state laws in cyberspace involves tricky issues of location. Realistically, for a state law to be used, both the hacked computer and the hacker have to be in the same state. [6] 92 F.3d 865 (9th Cir. 1996). [7] 106 F.3d 1069 (1st Cir. 1997).
[8] Id. at 1078.
|
![]() Last changed: 13 Apr. 2000 mc |
|