Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Perl Programming User Journal Government Intel The Courts News

Randal Schwartz's Charges Expunged 219

After 13 years, Randal Schwartz has had his conviction expunged. In effect, legally it never happened. If you haven't heard about this one before, my take is that as a contractor at Intel, Randal did some over-zealous white-hat cracking free-of-charge; this embarrassed some people in management (he pointed out that their passwords were terrible) and management then chose to embarrass themselves further by having him convicted of a felony under an 'anti-hacking' law. More info can be had from the Friends of Randal Schwartz.

This discussion has been archived. No new comments can be posted.

Randal Schwartz's Charges Expunged

Comments Filter:
  • Congratulations (Score:5, Insightful)

    by Ron Harwood ( 136613 ) <harwoodr@nOspaM.linux.ca> on Thursday March 01, 2007 @10:41PM (#18202718) Homepage Journal
    Congratulations to Randal - it's nice to actually read a good news story with regards to the legal system.
  • by Almost-Retired ( 637760 ) on Thursday March 01, 2007 @10:43PM (#18202744) Homepage
    Congratulations Randall, its great news to hear that the legal system actually works once in a while.

    --
    Cheers Gene
  • by vux984 ( 928602 ) on Thursday March 01, 2007 @10:45PM (#18202756)
    Except that it did.

    And all the effects can never be erased.

    For example any "lists" he's been added to over the last 13 years will not be updated to reflect his new 'never was a criminal' status. Be it terrorist watch lists, no fly lists, FBI persons of interest list, or whatever else, not to mention his prints will remain in the system, etc, etc.

  • Re:Congratulations (Score:5, Insightful)

    by A beautiful mind ( 821714 ) on Thursday March 01, 2007 @10:48PM (#18202782)
    13 years of fighting doesn't sound especially pleasant. I can't imagine what Randall had to go through to get his name cleared.
  • by cmholm ( 69081 ) <cmholmNO@SPAMmauiholm.org> on Thursday March 01, 2007 @11:17PM (#18202958) Homepage Journal
    It shouldn't have been necessary, but it was Randal's misfortune to show us the way to live with catch-all computer crime laws. To wit:

    The independent contractor shall...
    • Put all proposed activities in the contract/statement of work in as great a detail as possible, then...
    • Get written approval from the customer (your immediate POC and their boss) for any additional activities that occur to you after work commences.

    The in-house employee shall...
    • Review company computer use policies yearly, if not already required to do so.
    • Before attempting activities that may even conceivably be considered against company policy, get approval from lead in writing, hard copy signature if possible.

    May not seem a good use of time, unless you consider the value of staying out of the criminal legal system.
  • by belmolis ( 702863 ) <billposer.alum@mit@edu> on Thursday March 01, 2007 @11:32PM (#18203048) Homepage

    Uh, actually, this program doesn't do the right thing. Surely the right thing to do is not to delete the files but to remove Randall's name from them. Some people deserve to be on those lists.

  • Re:Whither $68k? (Score:5, Insightful)

    by krbvroc1 ( 725200 ) on Thursday March 01, 2007 @11:47PM (#18203130)

    At the federal level, it depends on the president. Clinton was fairly liberal with his pardons. Bush is tight with his. Whoop dee do.

    Most of the 'controversial' pardons are granted the last day of office, so there is not enough data to compare the current president and former. Report back in 2008 when there is more data.

  • Re:Whither $68k? (Score:2, Insightful)

    by jomegat ( 706411 ) on Friday March 02, 2007 @12:00AM (#18203220)
    Here's how W's list will start:
    • Lewis "Scooter" Libby
    • Donald "Rummy" Rumsfeld
    • Richard "Dick" Cheney
    Note that like most mobsters, W's friends have nicknames. And yes, I know none of these people have been convicted for anything, but there's still time.
  • by 1010110010 ( 1002553 ) on Friday March 02, 2007 @12:08AM (#18203270)
    Are you fucking serious? After 13 years? You call that working?
  • by tji ( 74570 ) on Friday March 02, 2007 @12:20AM (#18203332)
    The slashdot crowd has a short memory.. This is not a simple issue of "embarassing the management", as the summary states. In fact, in all the original writeups, I don't remember ever hearing executive passwords being an issue. The issues were egregious violations of corporate security policy, and basic logic:

    - His position at Intel was not involved in security, intrusion detection, or other areas that might actually call for "white hat hacking" as part of the job function. He was a contractor, not an Intel employee, which I'm sure made Intel even more concerned about his security violations.

    - He had installed backdoors on Intel machines, which allowed him to access the Intel network from outside the company.

    - He took passwd files and ran cracking tools against them to break other users passwords.

    - Not only was he cracking password files from Intel organizations, he was using Intel systems to crack password files from other companies, including O'Reilly and Associates.

    See this writeup [mit.edu] for information from the person involved in shutting him down.

    Whether this was "white hat" hacking could be debated. In any case, it was fucking stupid. Bypassing network security for an inbound back door?!? Cracking password files from other companies on Intel computers?!? These are just stupid moves, which anyone should expect to get fired for doing.
  • by kcbrown ( 7426 ) <slashdot@sysexperts.com> on Friday March 02, 2007 @12:37AM (#18203448)

    No, the real moral of this story, and others like it, is simple:

    • Don't bother testing the security of a system unless you're forced to use that system to store, in unencrypted form, information you care about.
    • If you are forced to use such a system (and thus to test its security), perform all your tests in such a way that there's no way they can be traced back to you.
    • If you find security holes, the only action you should take is to minimize your use of the system. Under no circumstances should you actually tell management about the security holes unless you have, signed and in writing, authorization to perform the security testing. If you have such authorization, make sure you store copies of it in safe places. Even so, with today's fucked up legal environment, it's entirely possible that their lawyers would be able to get said document stricken from the evidence record on some sort of legal technicality, which means that even if you have ironclad proof that you were authorized to perform the security testing in question, you might not be able to use it.
    • If you absolutely must tell someone, make sure it's someone you can absolutely, positively trust with your life. Because that may be what's on the line (well, at least part of it, because we're talking about jail time here, and inmates love fresh nerd meat).

    The bottom line is that corporate management doesn't give a shit about the actual security of their system. They only care about the illusion of security, and they'll bring their full wrath against anyone who dares shatter that illusion.

    Let them have their illusion. If they ever get seriously 0wn3d, as is likely (it's only a matter of time), you can laugh your ass off at them, because it'll be evil people getting the shaft from other evil people. But today there is nothing but a whole lot of pain for the good guys in the world. Welcome to the real world, where evil usually wins in the end thanks to the world's inherent tendency towards chaos. You can try to fight it if you want, but you'll probably lose, so why bother? You're probably better off just keeping your own affairs in order and letting the others get fucked up the ass for their stupidity.

  • by Wavicle ( 181176 ) on Friday March 02, 2007 @01:43AM (#18203852)
    and Randall still can't get a clearance without being upfront about it.

    As someone who has gone through a security background check, worked at Intel and read the decision of the appeals court: I would be fairly surprised if Randal was able to get a security clearance even even if no conviction had occurred. The undisputed portions of the case suggest that Randal lacked an ethical barrier between him and either his curiosity about things for which he did not have access or his desire to gain respect by demonstrating his skill. This was 13 years ago maybe he has changed, I don't know.

    Whether his intentions at the time were noble or not: he logged onto a system for which he knew his account should have been deleted; he ran a gate program on the system (after previously being told to stop running a gate on other systems); he cracked one of the passwords to someone with higher access on the system; he then logged on to the system using the cracked user's account; he transferred the password file to another machine; he ran crack on this other machine; he turned up 35 weak passwords; he said nothing; he left for a while to teach a class; he came back; he still said nothing; he re-ran crack on another faster machine (this is apparently what eventually got him caught).

    Randal claims he did all this to re-gain respect at Intel's supercomputer division. I have no reason to doubt this is honest. The fact that he so freely gave so much information to the police suggests to me that he was trying to convey that he had no intention of harming Intel's business. However it is very, very bad judgment. Now if you were the agent assigned to his security background check, looking to see if his character demonstrates a likelihood of compromising sensitive information, even unintentionally, what would you think?
  • by doom ( 14564 ) <doom@kzsu.stanford.edu> on Friday March 02, 2007 @03:47AM (#18204358) Homepage Journal

    I would be fairly surprised if Randal was able to get a security clearance

    I was once working as an engineer at a secure facility, where one of my friends explained to me that he had never actually planned on working there. He figured he'd let them pay them while the background check was in progress, but never expected to actually be cleared (the interview with the Feds went something like Q: "So what about all these hits of acid they found in your refrigerator?", A: "Well, they were there.")

    But they did indeed give him a clearence, I would infer because they concluded he wasn't vulnerable to blackmail on the point, and so on.

    And I have to say that the opinion of "someone who has gone through a security check" isn't terribly authoritative, unless you were turned down for having a similar background to Randal's.

  • have you rehabilitated yourself?
    That's something Mr. Schwartz has in common with Nelson Mandela. Since his release from prison, Mandela has not reoffended. So the justice system works!
     
  • Re:Congratulations (Score:3, Insightful)

    by Bretai ( 2646 ) on Friday March 02, 2007 @04:42AM (#18204606) Homepage
    I agree that his actions are not anywhere close to "perfect", but the punishment given under this ridiculous law, is not in the neighborhood of justice either. I can only assume that the government thought it would be too hard to prove damages once someone hacked into computer systems, so they simply criminalized the attempt. I don't think a felony conviction, 5 years of probation, 60 days of full-time community service, 90 days in jail, $68K in restitution, and more than $100K in legal bills fits this crime in the absence of any damages, or even malice. At least one more of those is removed now, so he's a little closer to justice than before.

    Try to understand that when you know that you intend no harm, it's easy to see your actions as harmless. I think those were different times, when companies were still trying to understand and come to grips with the threat of hackers - and Intel was a soulless mega-corporation. They still are, but I doubt they would take the same action today. They'd just terminate his contract with prejudice and move on.

    After what he's been through, I'd say he deserves to put this behind him and have a beer with his friends. Cheers.
  • I can probably still get out of jury duty, since I now have a bias about criminal convictions. {grin}

    Having personally sufferred through a miscarraige of justice, you still don't don't see the point of the jury.

    And people wonder what's wrong with the legal system these days.
  • by cheros ( 223479 ) on Friday March 02, 2007 @06:20AM (#18204990)
    At a sufficiently high level, a security check is not something you 'fail' or 'pass' - it's simply a risk assessment that clarifies to those that are planning to use your services which areas of risk they need to manage. It's not a tick box process that HR does over lunch - it takes months of investigative work. There is a simple way to get through that: do. not. lie.
  • Re:Congratulations (Score:5, Insightful)

    by Mikkeles ( 698461 ) on Friday March 02, 2007 @07:57AM (#18205414)
    Justice delayed is justice denied. This is not a feather in the cap for the justice system.
  • by LizardKing ( 5245 ) on Friday March 02, 2007 @07:58AM (#18205430)

    You'd already been reprimanded for a security violation of the SSD facility after your contract there had expired. You were using resources (on a machine you had been told not to use) to crack the passwords of not only an Intel facility you no longer worked at, but also another company. You installed a backdoor that while you may argue it was secure, allowed external access to the Intel network without having approval to do so. Every employer I have worked at would look on these unauthorised actions as gross misconduct, and I would be surprised if they didn't pursue legal action against the violator. The only reason anyone defends your actions are ignorance of the details of what you did and a blinkered willingness to support anyone that is seen as part of the "geek herd".

  • by TheLink ( 130905 ) on Friday March 02, 2007 @11:32AM (#18206976) Journal
    What I'm curious about is why does Sony get away so easily with installing backdoors and you don't?

    I mean just look at the fine to revenue ratios. And who got a criminal record because they were involved in the sony rootkit thing?

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...