Results 1 to 14 of 14

Thread: Spyware at center of wiretap case

  1. #1

    Spyware at center of wiretap case

    Spyware at center of wiretap case

    Employee bugs boss' PC, claims he's a whistleblower

    By Bob Sullivan
    Technology correspondent

    MSNBC
    Updated: 8:36 p.m. ET March 24, 2004

    A Los Angeles-area man was indicted today for allegedly installing a tiny, almost imperceptible hardware device to spy on his boss's every keystroke, in a case that shines a spotlight on the ease with which spy technologies now can be purchased and used by consumers.
    The $49.95 device, called a Key Katcher, is barely the size of a child's pinkie, but it has 46-year-old Larry Lee Ropp in a heap of trouble. Ropp, who says he was acting as a whistleblower, was indicted by a federal grand jury for illegally intercepting electronic communications and now faces up to five years in jail.
    The complex case begins with a class action lawsuit that was settled last year against Ropp's employer, Bristol West Insurance Group/Coast National Insurance Company. In the settlement, the company admitted no wrongdoing but agreed to set aside $6.3 million to refund consumers who had auto insurance policies prematurely terminated. Claimants had until Sept. 15, 2003 to register as part of the class and thus be entitled to compensation.
    On Sept. 3, Ropp, then a claims manager, was fired from the firm. According to his arrest warrant, he claimed at the time to be gathering information for the California Department of Insurance, and suggested he was being fired because of that. The next day, he contacted another employee at the company and asked that she recover a "toy" he had left in the company vice-president's office. He told the employee to inspect a computer used by the vice president's secretary -- on the back, she'd find a small device which looked like a male/female computer connector.
    She wouldn't do it, and when Ropp tried a second employee, she got suspicious and told her boss. The insurance firm then called in computer forensics experts, which later called in the FBI.
    In an affidavit signed by FBI agent Daniel Whelan, Ropp allegedly admitted to installing the device, but said the only reason he used it was "to capture the main list of Bristol customers who would fall within the Mostajo v. Coast National Insurance Company class action lawsuit." During an interview, he again claimed to be working on behalf of state insurance regulators.
    Whelan's affidavit claims the California Department of Insurance never authorized Ropp's behavior.
    Ropp's attorney, Craig Wilke, said Ropp had been in touch with insurance regulators and other attorneys who were involved in litigation with the company.
    "There were several activities going on at the company that he believed were in bad faith," Wilke said. "He was not acting out of self interest. His motive was to blow whistle on the company."
    But Ropp's motives don't actually matter, says U.S. Attorney Jim Spertus, because Ropp's actions were still illegal.
    "It's irrelevant, even if the employee were a savior," Spertus said. "People can't rob banks to pay for their dying mother's cancer operations."
    California attorney Mark Attwood, a whistleblower law specialist and partner at Jackson Lewis LLP, said provisions designed to protect employees who want to squeal on their firms' misbehaviors don't protect illegal activities.
    "This guy was intercepting communications that were intended to be private. He may have had a good motive, but he is still breaking the law," Attwood said.
    The case may cross some uncharted legal waters. Wilke said he plans to contest the charge of illegal interception of communications. Such a charge requires that a suspect listen in on conversations between two parties, and Wilke said the key logger merely intercepts data flowing from a keyboard to computer -- not communications between two parties.
    21st century bug
    At the center of the story is the Key Katcher, a small, dongle-like hardware device which fits in between the keyboard and the PC. It's the 21st century's equivalent of a listening "bug," albeit a bit easier to use.
    With an internal 128K memory, the device can store several weeks worth of typing. The would-be spy can then just remove the device, and download all that text onto another machine. Forensic experts who looked at the Key Katcher Ropp allegedly used were able to retrieve a host of private company e-mails.
    Key Katcher president Steve Allen said he's been selling the device for four years, but wouldn't say how many buyers he's had. He said he was upset that about the insurance company incident, and claims it's a legitimate device that can be used to monitor a child's activity on the Internet.
    "I've tried to make this a responsible product," Allen said. "I mark the product very clearly to indicate there's a user agreement and people need to abide by it."
    Internet marketing for the product describes it as a tool that's "popular with spouses trying to catch their partner cheating." The Key Katcher Web site makes clear that the user is responsible for complying with local laws.
    Hardware can be sneaky
    When consumers think of spyware, cheating spouses and key logging devices, they generally think of software -- which has a natural antidote in the computer world: antispyware. Many antivirus products also defend computers against spyware.



    But small hardware devices are another matter. Since physical security at many companies can actually be less sophisticated than computer security, hardware-based spying can be much easier. Installing Key Katcher only requires a moment's access to the target's PC.
    Tom Wolfe, a spyware industry veteran who formerly represented spyware software firm WinWhatWhere, admitted there were certain advantages to the hardware version.
    "It does suppose people don't look at the back of their computer," he said. "A million years could go by and they'll never check it." Other hardware-based devices are even harder to spot, he said, including some versions that are stuck right inside the keyboard and are invisible to the naked eye.
    But independent software consultant Richard Smith, who operates Computerbytesman.com, said there really isn't anything new about employees snooping around the office.
    "It's not that unusual for employees to go poking around where they shouldn't a lot," Smith said. "They can go poking around on a server, get incriminating documents, that's a little more murky. But there's no legitimate reason to put on a key logger."
    Attorney Mark Zwillinger, hired by Coast to conduct its internal investigation into Ropp's behavior, said he believed this was the first criminal case of its kind around the country. The U.S. Attorney's Office also suggested this was the first time a suspect had been indicted for using a key logger.
    But Zwillinger said it was not the first time he'd seen a key logger while conducting corporate investigations.
    "We have run across this kind of device before. Often we get the question as to whether an employer can put these on to monitor employees," he said. "I wonder why this is device is sold at all?"
    Allen answers that, like any product, it can be used for good or ill.
    "I've gotten a number of e-mails from people with great success, who've found out about their kid on drugs or skipping school, stuff like that," he said. "There are a lot of products that can be misused, just like a butcher knife."
    © 2004 MSNBC Interactive

  2. #2
    Join Date
    Oct 2003
    Location
    Florida
    Posts
    152
    Can't wait to see the outcome of this.Should that program be restricked?
    John w Tuthill III
    MMC,ESWS USNavy Ret.
    Member FRA,NJN,NAIS,IPIU,
    Certified Identity Theft Resolution & Prevention Investigator
    Badge #9039

  3. #3
    Join Date
    Feb 2004
    Location
    California
    Posts
    59
    No. I do not think the program should be restricted. Now, if the man happened to be a liscensed investigator, would his actions have been legal?

    Tracy

  4. #4
    Join Date
    Oct 2003
    Location
    Florida
    Posts
    152

    Red face spyware.

    Doubful without a warrant.He the same as a peeping tom.He might have never been caught but he saked someone else to take it off the computer.
    John w Tuthill III
    MMC,ESWS USNavy Ret.
    Member FRA,NJN,NAIS,IPIU,
    Certified Identity Theft Resolution & Prevention Investigator
    Badge #9039

  5. #5
    Stephen L. Keeling -'s Avatar
    Stephen L. Keeling - is offline Private Investigator Forum Member

    Professional Management Member of:
    International Private Investigators Union (IPIU)
    Join Date
    Oct 2002
    Location
    Texas
    Posts
    171
    This device might be something I would like on my computer. You never know what teenage boys are up to these days.

  6. #6
    Mr. Ropp's intentions were good, but illegal. Saying he acted on anothers behalf when actually he wasn't is simply lying. Before one does any similar act to the one mentioned above, he should be aware of the laws that govern such acts and not try to take the Law into his own hands.

  7. #7
    Join Date
    Dec 2003
    Location
    Florida
    Posts
    75
    Quote Originally Posted by James L Parmenter
    Mr. Ropp's intentions were good, but illegal. Saying he acted on anothers behalf when actually he wasn't is simply lying. Before one does any similar act to the one mentioned above, he should be aware of the laws that govern such acts and not try to take the Law into his own hands.
    This is pretty much my main concern while conducting investigations.....knowing the law and how far I can go to find out information...Hope that I will learn more about the law during my readings..
    amber

  8. #8
    Michael Harris is offline Lifetime Professional Management Member

    Distinguished Insignio Colleague of:
    International Private Investigators Union (IPIU)
    Join Date
    Jun 2003
    Location
    New Jersey
    Posts
    3,751
    Quote Originally Posted by Amber B. Moore
    This is pretty much my main concern while conducting investigations.....knowing the law and how far I can go to find out information...Hope that I will learn more about the law during my readings..
    Amber,

    First, it is an interesting case and I would like to know a lot more about this kind of issue.

    Second, you have clearly identified the issue -knowing the law and how far to go to collect information.
    Michael E. Harris

    Badge #6718

  9. #9
    Join Date
    Jun 2004
    Location
    Georgia
    Posts
    8
    Sounds to me like this guy MAY have had good intentions, but went about it completely wrong. If he knew how to contact is insurance commissioner in his state, then he had the right information, just went about it wrong. You never know, sometimes people claim to be doing good for others, when what they are after is blackmail goodies.

  10. #10
    Join Date
    Aug 2004
    Location
    Arkansas
    Posts
    111
    Jolene,

    Blackmail is exactly what I thought of. If not for outright cash, then for leverage for promotions or security against firing etc. Who knows what he was really up to.

    On the other hand, some over-zealous person with the state may have encouraged him and then hung him out to dry when it all came out.

    Which is another reason, if our own personal ethics won't keep us within the law, why we shouldn't cross over the line. Even in the name of good, if something goes wrong, most likely we will be the "fall guy".
    April Rank always learning more

  11. #11
    M Michelle Le Fevre--'s Avatar
    M Michelle Le Fevre-- is offline
    (On Leave of Absence)

    Distinguished Member:
    Private Investigators Forum
    Join Date
    Jul 2004
    Location
    Illinois
    Posts
    672
    Quote Originally Posted by Stephen L. Keeling
    This device might be something I would like on my computer. You never know what teenage boys are up to these days.
    Stephen,

    If you do a google on Ethereal, you should find the Open Source(Free) Network Protocol Analyzer. Now this is assuming you are savvy with PC's and have a home network or are sharing a cable modem, however, I can see exactly every word my Son sends out by analyzing the packets. I can also see what is coming in as well. If you want to find out more, do a search for Sniffers, however I would not suggest you run this on your comany's network.

    Hope I did not get to techie on you.
    M Michelle Le Fevre
    MCSD, MCP, IPIU
    Case Examiner
    Badge #10178

  12. #12
    Join Date
    Jan 2004
    Location
    California
    Posts
    219
    What kind of sentence did this gentleman recieve? This is a very interesting case and I am also curious to know what the law is exactly and how far we can go as investigators. Could we find that kind of information if we took a law class and what kind of law class would that fall under? Criminal law. Thank you for any information.

  13. #13
    Join Date
    Aug 2005
    Location
    Kansas
    Posts
    18
    There's a thin line that we can not cross and must always hold respect for otherwise we are no different than the ones we read about such as this man

  14. #14
    Retired from the NYPD/District Attorney's Office I was informed by an ADA that a Key Logger could not be considered a wiretap because the transfer of information was not instant. Example Eblaster a software sold by Spector. This software sends via internet any and all activity on a subject computer to an email address which you program. Because of the time it takes to send this information it is very close to a wiretap. The Key Logger on the other hand has to be removed and attached to another computer so it can read the information.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •