>On Nov 3, padgett @
>> This was one of the more important elements IMHO of the Air Force briefing
>> on Information Warfare and "Internet Caller-ID" in Baltimore: crackers were
>> hacking systems, the AF was backtracing the intrusions through nultiple
>> nodes *and no one noticed* ...
>The implication (for me) is that the AirForce broke
>into intermediate systems to backtrack the intruders.
Exactly ! Was obviously the fastest way to do it. As far as the AF breaking
in, *the hole was already there - it had been created by the intruder*, the
AF was just using the same hole.
What was done was confirmed at the briefing. I was told that a blanket
authorization had been obtained for the AF to do exactly that. I believe
the time frame of authorization was limited: 72 hours AIR and that Scott
Chaney's name was mentioned as having something to do with it (nothing
is garenteed from memory - I asked for a copy of the briefing slides but they
have never arrived).
Now before any opinions are raised, IMHO the AF people were in "hot pursuit"
of a law breaker and only had a limited window of opportunity to backtrack.
This doctorine is well established in US law - if a criminal breaks into
a bank through a private residence next door and the police catch them in
the act, pusuit through the residence is authorized. I have no problem with
this since it *reduces* the risk to the householder next door.
The fact is that like most software patents (another pet peeve) this is really
nothing new, just pre-existing doctrine being applied in a new way.
ps was almost a lawyer once - decided to remain creative instead.