"Dave Gillett" writes:
 > On 21 Jul 99, at 18:04, Matthew G . Harrigan wrote:
 > 
 > > Last I checked, utilizing things such as port scanners, tcp fingerprinting
 > > tools, and the like are not illegal, because there is no way to
 > > disseminate legitimate system administration techniques (you'll notice that
 > > enterprise network management packages which do network discovery utilize
 > > all of the above.) from actual penetration attempts, unless the activity
 > > yields someone actually gaining user level access to a said networked
 > > device. I would find it hard to believe that someone could be prosecuted
 > > based on something like an nmap scan. 
 > 
 >   This is like saying that car theft can't be illegal because it would 
 > prevent anyone from ever driving!  [Clue:  It becomes criminal when you don't 
 > have the owner's permission....]

Your impression that you must have an owner's permission to portscan, 
otherwise it is illegal is mistaken.  

Criminal intent must be present or else it's not a crime, regardless if
the was permission or not, at least in the U.S.A.

For example, if a student decides to do a report on the number of web
servers running today on the Internet and in doing the work, port scans
your hosts looking for web servers, it's not a crime because there wasn't
criminal intent.  Now the student may have violated an acceptable use 
policy at her/his site, but that's a long way from committing a crime.

< paul
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to