
A federal appeals court just shot down an attempt by confessed superhacker Jerome Heckenkamp to overturn his computer crime convictions, which were an end result of information provided by a university sysadmin who broke into Heckenkamp's computer to gather evidence.
The warrantless cyber-search was justified by the "special needs" exception to the Fourth Amendment, because "the administrator reasonably believed the computer had been used to gain unauthorized access to confidential records on a university computer," the U.S. 9th Circuit Court of Appeals ruled Thursday.
(Updated: someone from the University of Wisconsin responds).
The case began in December 1999, when an official at Qualcomm in San Diego detected a hack attack against the company's system, and notified both the FBI, and administrators at the apparent source of the attack -- the University of Wisconsin at Madison.
UWisc system administrator Jeffrey Savoy tracked the intrusion to Heckenkamp's dorm computer, and then determined that Heckencamp was also trying to hack into the university's mail server. Savoy blocked the hacker's IP address, which ended in 117, but Heckenkamp, being a pretty smart guy, changed it.
That's when Savoy turned the tables and counter-cracked the suspect computer, supposedly for the limited purpose of determining if it really was the same system with a different IP address, and to protect the university server from further attack. From today's ruling:
It's unclear why it took Savoy 15 minutes of poking around to determine the 117 computer and the 120 computer were the same -- since he used the password for the former to crack the latter. In any event, the FBI got a warrant and seized Heckenkamp's Linux box, which turned up evidence that Heckenkamp had hacked into Qualcomm, Exodus Communications, Juniper Networks, Lycos, and Cygnus Solutions. He was also, it turns out, the mysterious "MagicFX" who defaced eBay in 1999 and bragged about it to Forbes.
After years of sometimes bizarre court proceedings (at one point he argued the indictment against him was illegal because it spelled his name in all capital letters) Heckenkamp admitted the hacking and pleaded guilty to two felonies in 2004. He was sentenced to eight months in prison, which by then he'd already served in pre-trial custody.
His plea agreement allowed him to challenge the hacking of his computer, as well as a subsequent search of his dorm room and an FBI search warrant that was built on the warrantless searches. The 9th Circuit's ruling today (.pdf) says the counter-hacking was legal, in language that suggests students would be well advised to install a decent firewall before plugging into a university network.
Also on Wired today, Bruce Schneier's thesis on why vigilantism is a poor response to cyberattack.
Update:
University of Wisconsin IT guy Dave Schroeder (who is not an official spokesman) takes issue with my post. Specifically, my observation that the decision "suggests students would be well advised to install a decent firewall before plugging into a university network."
This smacks of vigilantism. According to the decision, UWisc cracked Heckenkamp's computer in order to confirm that he was the hacker they were looking for. Heckenkamp turned out to be guilty, so Schroeder's tough talk has some surface appeal. But what if Heckenkamp had been innocent?
The whole policy has some nasty implications for student privacy. There's no judge in the loop; no independent finder of fact. So who decides when there's enough evidence to break into the student's machine and riffle through his files? And then there's the inevitable mission creep. What happens when system administrators crack a suspected hacker's computer, and find he's innocent of the hack, but also turn up evidence that he's been selling dope to his friends? Or downloading pirated music? And eventually, instead of Qualcomm, it'll be the RIAA or the MPAA calling up the University of Wisconsin for a little help.
(Photo: Jake Schoellkopf /AP)