The first fallout from Cybergate

    Date11 Feb 2004
    CategoryGovernment
    3061
    Posted ByAnthony Pell
    This might be analogous to the difference between trespassing and "breaking and entering". It is a well known aspect of law that breaking into private property that has been explicitly locked is far more serious than if it was left open. If left open, the issues become muddied with those of entrapment; the act of encouraging a crime so that you can persecute it. If the Democratic memos were left completely unsecured, which appears to be the case here, it clouds the legal case against those who read them. . . . Politics is dirty business, and rarely so much as in the area of patronage: appointments to sought-after federal jobs in general, and to the federal bench in particular. So it should be little surprise that, with so much at stake, one political party would want to use the insecurity inherent in computerized databases to its political advantage.

    What is surprising, however, is that, caught with their hand in the cookie jar, Senate Republicans employed the tactic of blaming the victim: they said, in essence, It's your fault that we got and used your information. If successful, this tactic does not bode well for the government's ability to prosecute computer crimes, and to protect critical infrastructures.

    With the resignation last Thursday of Senate staffer Manuel Miranda as the first victim of what I might call "cybergate," we may learn whether this tactic will be pursued and whether it will be ultimately successful.

    The scandal itself revolves around the process by which federal judges are appointed, and more importantly, how such appointments are blocked by the opposing party. When President George W. Bush came to office, he sought to make numerous appointments to the federal bench -- some to positions that conservative Republicans had deliberately left vacant for years of Democratic administrations.

    The Democrats, at the time a majority in the Senate, sought to use tactics similar to those they criticized Republicans for in preventing such nominations from reaching a vote on the floor of the Senate. The key Senate Committee responsible for such appointments was the Judiciary Committee.

    Democratic staffers wrote and transmitted confidential memoranda describing the means they would use to block such nominations in general, and the nomination of conservative Republican Miguel Estrada in particular. A year ago, in February 2003, columnist Robert Novak -- the same columnist responsible for revealing the name of a CIA operative on a leak from government officials -- published information from these Democratic strategy memos. Novak reported that the information came from "internal Senate sources" but refused to identify these sources when questioned by Boston Globe reporter Charlie Savage.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"5","type":"x","order":"1","pct":45.45,"resources":[]},{"id":"56","title":"No","votes":"6","type":"x","order":"2","pct":54.55,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.