Re: [SLUG] Port Probing Tool Needed

From: Brian Coyle (brian@linuxwidows.com)
Date: Wed Jul 24 2002 - 19:41:10 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wednesday 24 July 2002 18:27, Paul M Foster wrote:
> On Tue, Jul 23, 2002 at 09:16:20PM -0400, Brian Coyle wrote:
>
> <snip>
>
> > And IANAL, but I'd be remiss not to mention this:
> >
> > Florida Statute 815 - "The Computer Crimes Act". ?
> > http://www.clas.ufl.edu/docs/flcrimes/section2_1_1.html
> >
> > This law was enacted in 1978 and makes it a third degree
> > felony for "Whoever willfully, knowingly, and without
> > authorization accesses or causes to be accessed any computer,
> > computer system...

[snip]

> IMHO, port scanning is like knocking on the door. You haven't actually
> accessed anything. You're just trying to find out if you _could_ access
> it.

[snip]

However, you need to dig into the terms and definitions for F.S.815:

        http://www.clas.ufl.edu/docs/flcrimes/subsubsection2_1_1_2_3.html

        #10. "Access" means to approach, instruct, communicate with,
        store data, retrieve data, or otherwise make use of any
        resources of a computer, computer system, or computer network.

Port scanning certainly fits this definition.

ISTR, Thomas Sadaka, Special Counsel for Computer Crime and Identity Theft
Prosecutions mentioned at the 2001 Uf ITSA day[1] this law has been used
successfully to charge/prosecute port scanners.

[1] http://www.itsa.ufl.edu/day2001.htm

- --
If you're not living on the edge, you're taking up too much space...
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9PzswER3MuHUncBsRAu6ZAJ9bu+q2BGsq3nUbITR16XxPjgGaEwCbBWO6
wMUZB3aTrUjyXdMOLYRBYMA=
=FGA8
-----END PGP SIGNATURE-----



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 14:24:29 EDT