textfiles/hacking/issm202.hac

1930 lines
51 KiB
Plaintext
Raw Permalink Normal View History

2021-04-15 11:31:59 -07:00
The Information Systems Security Monitor
_______ /--------\ /--------\ \ /|
| | | | \ / |
| | | | \ / |
| \_______ \_______ | \ |
| \ \ | |
| | | | |
| | | | |
| \________/ \________/ | |
-------
Dedicated to the pursuit of security awareness............
=================================================================
Volume 2 Number 2 April 1992
=================================================================
////////////////////// In this Issue \\\\\\\\\\\\\\\\\\\\\\\\\\\
Choosing the Right Password
Comptroller General Decision on EDI
Security Hall of Fame
OAIS Employees Judge Student Contest
Cyberspace: A Hacker's Response
Quick Fix Security
Dear Clyde
Computer Speak
What's New
----------------------------------------------------------------
Hacker Lists Passwords Hackers Look For
Choosing the Right Password!
Imagine a hacker entering a system with your id and password
because you did not take the time to choose a good password, this
is something that can be completely prevented if people would take
a few minutes to choose a good password. You must be creative when
choosing a password not lazy. Since a password is usually the
first line of defense against unauthorized access to a computer
system, when the first line is broken the rest only take time. The
average user usually has a password that is easy to select and easy
to remember. Any word that is easy to select or is contained in
a dictionary is a poor and insecure selection for a password. The
reason this makes a poor selection is because these words are the
first ones an intruder will try when attempting to compromise your
system. For instance, if your name is Tom Smith and your logon id
is TSMITH your password should not contain any variation of these
two words (Tom & Smith). A hacker will try TSMITH, SMITHT,
TOMSMITH, SMITHTOM, TSMITH1, HTIMST, etc. before anything else.
As far as the length of a password goes its definitely the longer
the better. To demonstrate this point I give you the following
table:
# of Possible Average Time
Characters Combinations To Discover Example
1 36 6 min q
2 1,300 4 hrs bt
3 47,000 5 days tyu
4 1,700,000 6 months insw
5 60,000,000 19 years potnb
etc...
The greater the number of possibilities a hacker must sort through,
the better the chances of a password remaining undiscovered.
The best passwords are those that contain a combination of letters
and numbers or are a combination of two or more unrelated words
i.e. TREEFLOOR, TVBOOK, RADIOSHOE, etc. Another possibility is to
select the initials of your two grandmothers combined with the
number of times you have seen your favorite movie to come up with
a password that resembles PAWH07, 07WHPA, PA07WH, etc.
If you think that you have chosen a password that is hard to guess
or would take too much time to guess keep in mind that hackers have
automated the process. There have been programs written for the
sole purpose of guessing passwords, they take a list similar to the
one in this article and try each and every one of them
These are the types of passwords that are hard to guess and will
most likely not be found in any dictionary or word list. I am
enclosing a list of common passwords that most hackers have a
variation of, under no circumstances should you ever use a word
contained in this list. All forms of profanity should also be
included in this list. 100
666
6969
aaa
abc
abel
academia
academic
academie
access
ada
adele
adeline
adelphe
admin
adrian
aerobic
aerobics
agathe
agnes
aide
aime
aimee
airplane
alain
alban
albanie
albany
albatros
albatross
albert
alex
alexander
alexandre
alf
algebra
algebre
alias
aliases
alice
alida
alix
alpha
alphabet
alphonse
ama
amadeus
amandine
ambroise
amedee
ami
amorphe
amorphous
amour
amy
an
analog
analogue
ananas
anchor
ancre
andre
andromache
andy
angele
angerine
anicet
animals
animaux
anne
annie
annonciation
anselme
answer
anthelme
antoine
antoine-marie
anvils
anything
aout
apollinaire
apolline
apotre
aquin
arc
aria
ariane
aristide
armand
armel
arnaud
arrow
arsene
arthur
ascension
asd
asm
assise
assomption
athena
athenes
atmosphere
aubin
aude
audrey
augustin
automne
autoroute
avent
avila
avion
avril
aymar
aymard
aztecs
aztecs
azur
azure
bacchus
badass
bailey
balance
banana
bananas
banane
bande
bandit
banks
banque
baptiste
barbara
barber
barbier
bariton
baritone
barnabe
barnard
bart
barthelemy
bartman
basic
basile
bass
basse
basson
bassoon
batch
batman
baudouin
beach
beater
beaute
beauty
beaver
beethoven
belier
beloved
benedicte
benoit
benz
beowulf
berkeley
berlin
berline
berliner
bernadette
bernard
bernardin
bertille
bertrand
beryl
beta
everly
bicameral
bienheureux
bienvenue
bishop
bitch
blaise
bob
boris
bradley
brian
brice
brigitte
broadway
bruno
bsd
bumbling
burgess
cad
cafe
calude
camarade
campanile
cancer
cantor
capricorne
cardinal
careme
carine
carmel
carmen
carole
carolina
caroline
carson
cartouche
cascades
casimir
cassis
castle
castle
cat
catherine
cayuga
cecile
celine
celtics
cendres
cerulean
challenger
change
chantal
charles
charlotte
charmant
charming
charon
chat
chateau
chem
chemin
chemistry
chess
chester
cheval
chevalier
chien
chou
christ
christian
christine
christophe
cible
cigar
cigare
citroen
claire
clarisse
class
classic
classique
claude
clemence
clement
clotilde
cluster
clusters
code
coeur
coffee
coke
colette
collins
come
computer
comrade
comrades
conception
condo
condom
connect
console
constant
constantin
conversion
cookie
cooper
corinne
cornelius
couscous
create
creation
creosote
crepin
cretin
criminal
croix
cshrc
cyrille
daemon
dame
damien
dancer
daniel
danny
dapper
data
dave
davy
deb
debbie
deborah
december
decembre
default
defoe
defunts
delphine
deluge
denis
denise
desperate
develop
device
dial
diane
didier
diet
dieter
dieu
digital
dimanche
dimitri
disc
discovery
disk
disney
dog
dominique
donald
donatien
dos
drought
duncan
dupond
dupont
durand
dwladys
eager
earth
easier
easy
eatme
eau
edges
edinbourg
edinburgh
edith
edmond
edouard
edwige
edwin
egghead
eiderdown
einstein
elephant
elisabeth
elisee
elizabeth
ella
ellen
email
emeline
emerald
emeraude
emile
emilie
emma
enclumes
endeavour
enemy
engin
engine
engineer
entreprise
enzyme
epiphanie
erenity
eric
ersatz
establish
estate
estelle
ete
eternity
etienne
euclid
euclide
eudes
eugenie
evelyn
evrard
extension
eymard
fabrice
facile
fairway
famille
felicia
felicie
felicite
fender
ferdinand
fermat
fernand
ferrari
fete
fevrier
fiacre
fidele
fidelite
fidelity
field
file
filet
fini
finite
firmin
fishers
flakes
fleche
fleur
fleurs
float
flocon
flocons
florent
florentin
flower
flowers
foolproof
football
foresight
format
forsythe
fourier
fraise
framboise
francine
francois
francoise
fred
frederic
friend
frighten
fulbert
fun
function
fungible
gabin
gabriel
gaetan
games
gardner
garfield
gaston
gateau
gatien
gatt
gauss
gautier
gemeaux
genevieve
geoffroy
george
georges
gerard
geraud
germain
germaine
gertrude
ghislain
gibson
gilbert
gildas
gilles
ginger
gisele
glacier
gnu
golf
golfer
gontran
gorgeous
gorges
gosling
gouge
goutte
graham
grahm
gras
gregoire
group
gryphon
gucci
guenole
guess
guest
guillaume
guitar
guitare
gumption
guntis
guy
gwladys
habib
hack
hacker
hal
hamlet
handily
happening
harmonie
harmony
harold
harvey
hawaii
hebrides
heinlein
helene
hello
help
henri
herbert
hermann
hermes
herve
hiawatha
hibernia
hidden
hippolyte
hiver
homework
honey
honore
honorine
horse
horus
hubert
hugues
humbert
hutchins
hyacinthe
hydrogen
ibm
ida
ignace
igor
imbroglio
imbroglio
immaculee
imperial
include
inconnue
ines
info
ingres
ingress
ingrid
inna
innocent
innocuous
internet
invite
irene
irenee
irishman
irlande
isabelle
isidore
isis
jacqueline
jacques
janvier
japan
japon
jean
jean-baptiste
jean-claude
jean-francois
jean-michel
jean-pierre
jean-yves
jeanclaude
jeanfrancois
jeanmichel
jeanne
jeanpierre
jeanyves
jerome
jessica
jester
jeudi
jixian
joel
johnny
joseph
joshua
jour
judas
judicael
judith
juggle
juillet
juin
jules
julia
julien
julienne
juliette
jumeaux
jupiter
juste
justin
justine
kathleen
kermit
kernel
kevin
key
kirkland
kiwi
knight
ladle
lambda
lamination
landry
lapin
larissa
larkin
larry
laurent
lazare
lazarus
lea
lebesgue
lee
leger
leland
leon
leonce
leroy
lewis
library
licorne
light
lion
lisa
lisp
loch
lock
lockout
louis
louise
lourdes
love
luc
lucie
lucien
lumiere
lundi
lune
lydie
macintosh
mack
madeleine
madelene
maggot
magic
magique
mai
mail
maint
malcolm
malcom
manager
mangue
marc
marcel
marcelle
marcellin
mardi
marguerite
marie
marie-madeleine
marietta
mariette
marina
marius
mark
markus
mars
marthe
martial
martin
martine
martinien
marty
marvin
master
math
mathilde
matthias
matthieu
maurice
maxime
medard
melaine
mellon
memory
mercredi
mercure
mercury
meres
merlin
metro
mets
mgr
michael
michel
michelle
mike
minimum
minsky
mit
modem
modeste
mogul
moguls
monique
mont
moose
morley
morts
mouse
mozart
mutant
nadege
nagel
naissance
nancy
napoleon
narcisse
nasa
natacha
nathalie
nationale
nativite
navette
nepenthes
neptune
ness
nestor
net
network
new
news
newton
next
nicolas
nina
ninon
nobody
noel
norbert
notre
novembre
noxious
nuclear
nutrition
nyquist
oceanography
ocelot
october
octobre
odette
odile
odilon
office
olive
olivetti
olivia
olivier
open
operator
oracle
orca
orwell
osiris
outlaw
oxford
pacific
pacifique
pad
padoue
painless
pakistan
pam
paper
papers
papiers
paques
parfait
pascal
pass
password
pat
paterne
patrice
patricia
patrick
paul
paule
paulin
peche
pecheur
pecheurs
peggy
pelagie
pencil
penguin
penis
pentecote
peoria
percolate
peres
persimmon
persona
pete
peter
peugeot
peur
philip
philippe
phoenix
phone
pierre
pizza
plane
playboy
plover
pluto
pluton
plymouth
poire
poisson
poissons
polynomial
pomme
pondering
porc
pork
porsche
poster
power
praise
precious
prelude
presence
presto
prevision
prince
princeton
printemps
prisca
priv
private
privs
professor
profile
program
prosper
protect
protozoa
prudence
pub
public
pumpkin
puppet
quentin
qwerty
rabbit
rainbow
raindrop
raissa
raleigh
rameaux
random
raoul
rap
rascal
raymond
reagan
really
rebecca
regional
reine
remi
remote
renaud
renault
rene
reponse
requin
reseau
richard
rick
ripple
risc
rje
robert
robot
robotics
rochester
rodent
rodolphe
rodrigue
roger
roi
roland
rolande
rolex
romain
romano
romaric
romeo
romuald
ronald
root
rosalie
rose
rosebud
roseline
rosemary
roses
rosine
ruben
rules
ruth
sabine
sacre
sade
sagittaire
sainte
sal
sales
salome
samedi
samson
sandrine
saturn
saturne
saturnin
saxon
scamper
scheme
school
scorpion
scott
scotty
sebastien
secret
security
seigneur
sensor
septembre
serenity
serge
service
sesame
severin
sex
sharc
shark
sharks
sharon
sheffield
sheldon
shell
shiva
shivers
shuttle
sidoine
signature
silvere
simon
simple
simpsons
singer
single
smile
smiles
smooch
smother
snatch
snoopy
soap
socrate
socrates
solange
somebody
sophie
sossina
sourire
souris
souvenir
sparrows
spit
spring
springer
squires
stanislas
strangle
stratford
student
stuttgart
subway
succes
success
summer
sun
super
superuser
support
supported
surfer
suzanne
swearer
sylvain
sylvere
sylvestre
sylvie
symmetry
sys
sysadmin
system
tangerine
tanguy
tape
target
tarragon
tatiana
taureau
taylor
tech
telephone
temptation
tennis
tentation
terminal
terre
test
thailand
thailande
thecle
theodore
theophile
therese
thibault
thibaut
thierry
thomas
tiger
tigre
toggle
tomate
tomato
topography
tortoise
tortue
toussaint
toxic
toyota
trails
transfer
transfiguration
travail
trivial
trombone
tty
tuba
tubas
tuttle
ulrich
umesh
unhappy
unicorn
unix
unknown
uranus
urbain
urchin
util
utility
uucp
valentin
vasant
venceslas
vendredi
venus
ver
veronique
verseau
vertige
vertigo
vianney
vicky
victoire
victor
victorien
vierge
village
vincent
virgin
virginia
virginie
virus
visitation
visitor
viviane
vivien
volvo
wargames
warren
water
weenie
whatever
whatnot
whiting
whitney
wholesale
wilfried
will
william
willie
winston
wisconsin
wizard
wombat
woodwind
word
work
wormwood
wyoming
xavier
xaviere
xfer
xmodem
xyz
yaco
yang
yin
yosemite
yves
yvette
zap
zimmerman
zita
zmodem
zzz
Written by "The Butler", a hacker at heart, a Systems Administrator
in real life who enjoys learning as much as possible about any
given system including how to circumvent its security measures. He
has written articles for various hacker magazines that deal with
computer security. He currently administers a PC Network for a
medium size business (250 people). He also lectures to various
groups including Local EDP Auditors Association, User Groups, and
Private Corporations on how to protect their systems from hackers
like himself but who use their knowledge for mischievous purposes.
========================end of article========================
Dear Clyde Responses to
questions for
those who are
searching for
the truth.
Send your comments or questions to Clyde c/o the AIS Security
Branch in Parkersburg, Room 1011, or leave them in Clyde's mailbox
located on the Security bulletin boards throughout the Parkersburg
office.
Dear Clyde,
What is the proper way to dispose of diskettes which are no longer
able to be used? Are there security concerns here?
Peggy
Dear Peggy,
Yes there are security concerns as the data stored on the diskettes
may still be readable, if someone wants to take the effort to
retrieve it. Therefore the diskettes should be disposed of
properly. Any method of destroying the diskette can be used.
Cutting it up as you do a credit card that is no longer to be used
is one method. However the important thing is to make certain the
disk surface, that is the inner contents of the envelope or plastic
case, is destroyed.
(Note: I personally prefer giving the disk several good whacks with
my sword and lance to render it unusable.)
Clyde ....... Sir Clyde?
Rumor has it that Clyde is to be recognized for his continuing
efforts in the arena of computer security by being knighted. There
will be more on this in the next issue, stay tuned.
========================end of article========================
...........................................................
A Journey Behind (further behind) . . .
.
. . . . . ..
.
. The Dark Side of CYBERSPACE . . ..
. .
. . . . . .
.
Hackers in Their Illusive World: . A Response .
. .
...........................................................
A Response by: Dispater
Editor in Chief of Phrack Inc. Magazine
InterNet: phracksub@stormking.com
First of all, I would like to thank Kim Clancy for providing me
with the opportunity to reply to her article in the previous issue
of the ISSM. I find myself agreeing with her on more issues than
not. I read her piece on Cyberspace... Most of the article was
good, but I felt unclear about what she was saying in the section
titled "The Dark Side." So I have attempted to present a few
things from this hacker's viewpoint and make a few points where I
have disagreed with her. The ">" indicates Kim's previous
writings.
>...What is scary to me in regard to some of the avenues is
>the ability for individuals to get to so many different
>types of information...
What scares me are the kinds of people who have access to
the most personal parts of our lives compiled into data
bases (like Information America) that are for sale to anyone
who wants to pay the money or has the "power" to access it.
Why does the government need to know my unlisted phone number? Is
it really any insurance agency's right to know that I have a son
or daughter that is about to turn age 16, and will soon need to buy
auto insurance? I think I have the right not to be bothered by an
onslaught of people that think they have something I want to
purchase from them. If you really enjoy junk mail and computerized
telephone sales calls you can thank these kinds of databases.
>I am not stating that I think information should be
>shielded from individuals.
The more diverse sources of information we can all access, the
better off society will become. If we look at the past we can see
how accuracy in books was improved drastically by the creation of
the printing press. The scribes of kings and church figures were
no longer relied upon as authorities of various subject matter.
Information was made cheap and easily possessed by the common man.
Therefore if someone disagreed with some book that was printed, he
and his guild could write their version of what THEY found to be
true. This promoted truth, accuracy, a deluge of human
interaction, and free thought.
>...I once went to a presentation about hackers. The
>presenter told a story about a mother who took her child's
>computer modem out into the driveway and ran over it after
>her son had been arrested for hacking...
What was the parent doing while her child was hacking?
Another thing we need to clarify is the use of the word
"child." These are not often children. There is a certain
level of mental development that must occur first. I don't
know much about child psychology, but I'd say that most kids
under the age of 13 would have a bit of difficult time
understanding computer networking. Most people in the
computer underground are at least 16. If they are not
16 years old almost every sysop I know, kicks them off the
system. The young person should be allowed to explore in areas the
parent might not agree with as long as he/she is willing to
talk about it with the parent afterward. Why are required to
water down and censor all information so that is safe and
easily understandable to the "little children?" If there is
a 12 year old that has network access and is reading USENET's
ALT.SEX.BONDAGE, I think there is a greater problem involved than
the type of information the nets carry!!
>While hackers spend time developing their skills and
>learning how to master cyberspace they also use cyberspace
>to share information about what they have learned.
This is the great benefit of getting involved. Everyone
should own a computer because of this reason.
>Information has been found on how to steal long distance
>phone calls from the phone company, how to make a pipe bomb
>and how to perform satanic rituals before sitting down to
>hack.
It is not illegal to know how to do any of the previously
mentioned things. As you mention later the information can
also be found in such places like libraries. We need to
keep a few things in perspective here. MOST of the
information readily available on phone phreaking is so out
dated, one couldn't hope to implement the use of such
knowledge without most surely getting caught in an ESS(Electronic
Switching System environment. Most of the United State's
telephones are on such a system.
Secondly, most of the information available on explosives is
very crude. Most of it isn't worth the time it took to
download. Actually there is more information available in
the library on that subject than in all the data bases in
the world. I personally think this kind of thing is simply
stupid. I will not print that kind of thing in Phrack.
That kind of information is typed in from books, by people
who don't have anything else to do.
In regards to "satanic rituals", it is difficult to make any
comments about this because in all my years of calling BBS's
and talking to other hackers, I have never seen such an
animal. I have seen *THREE* articles on the Wiccan religion
which is similar to white witchcraft, but it's not even
close to anything satanic. However, other than this
minuscule tidbit in cyberspace, the only things I've seen
were things that were written as pranks and for joke
purposes. It amazes me that if one person has written
something or done something it is representative of the
whole community. This is definitely not a responsible
conclusion. If some people would just open their eyes to
reality, they would not see a computer underground filled
with "satanic, child molesting anarchists".
>I hesitate to write the above because I don't want people
>to avoid the technology. Everything I have found is in
>most libraries, but the accessibility of it through
>computers makes it much easier to obtain.
You hesitate with good reason and you are correct about all
that information being already in your local library. The
problem boils down to "digital censorship." Some people are
saying it's OK for a library to have the aforementioned
information, but it's NOT OK for it to be on my computer's
hard drive.
In regards to that argument I say it is much easier to get
the information from a library than the computer. Let's
take a look at they facts. First of all, most libraries are
FREE. On the other hand the average computer system
(386/33) costs around $1500. Your typical 8th grader
doesn't usually have that kind of cash.
The problem is that reality and virtual reality is the same
for some of us. We will promptly ignore silly rules like
"it's ok for some people to know certain things, but it's
not ok for me to know the same bit of information."
In the information age we are all becoming much more aware
of each other's presence. We are finding out that we are
all very different. We each have some ideas that can
easily shock others. These ideas can and are being
challenged by the other people we interact with. Therefore,
we should NEVER take the step back into the "electronic dark
age."
The really funny thing about all this is, everyone in the
United States IS a part of cyberspace, even though most of
them don't want to recognize this fact. If your name is on
a computer somewhere, you are in cyberspace! So you'd
better become aware of your existence. Use it to learn and
question why its there!
========================end of article========================
OAIS Employees Volunteer to Judge Student Contest
Every October, the Computer Learning Foundation, a non-profit
educational foundation serving the United States and Canada, hosts
Computer Learning Month. During that month, among other numerous
activities, the foundation hosts numerous contests designed to
encourage students, educators, and community members to explore new
areas of using technology and to share their knowledge with others.
These contests for students provide parents and teachers with an
activity children can do today to begin thinking and learning about
what it means to be a responsible user of technology. One of this
year's contests was a student writing contest focusing on Adult
Attitudes on the Value of Technology and Ethical Issues. Students
were to interview one parent and one other adult, write a summary
of their opinions on the value of technology in our lives and the
ethical issues involved with using technology, then the students
evaluated what they thought of the comments and opinions expressed
by the adults they interviewed.
The Bureau of the Public Debt participated in this program with
several OAIS employees, Gretchen Bergmann, Kim Clancy, Bill Dobson,
Zephery Ellerson, Joe Kordella, Gary Smith, and Ed Alesius,
volunteering their time to judge the students entries.
While the use of a computer was not required to create the
critique many submissions showed an adept usage of various word
processing, desktop publishing and graphics software.
This interchange between the professional environment and schools
proved to be very enlightening. It is refreshing to see a group
dedicate its effort to a much needed task, keeping schools up with
technology and its responsible use.
========================end of article========================
QUICK FIX SECURITY
The following is a listing of some easy to do security controls
that help a lot....
1. Set modem to answer after 4-5 rings.
2. Select a dial-up number from a different prefix or out of order
from the rest of your office.
3. Use call back features.
4. Use proprietary software for your communications e.g.,
PC Anywhere IV.
5. Use special modems for encryption and access control e.g.,
Leemah Datacom.
6. Disconnect after a certain period of inactivity.
7. Do not allow certain userids' to have dial-up access.
8. Use caller id and call tracking.
9. Display a blank screen when a connection is made so the user
has no clue what they have connected to.
========================end of article========================
COMPUTER SPEAK
COMPUTER TERMS AND THEIR MEANINGS
access n. The ability of a subject to view, change, or
communicate with an object in a computer system. Typically, access
involves a flow of information between the subject and the object
(for example, a user reads a file, a program creates a directory).
cyberspace n. The world that is created by the connection of
computers. Travels thru this environment can be vast and undefined
just as space travel can be. This is the environment Cyberpunks
call home.
database n. A collection of data items processible by one or more
programs.
phreaking v. The art and science of cracking the phone network
(so as, for example, to make free long-distance calls). By
extension, security-cracking in any other context (especially, but
not exclusively, on communications networks).
virtual reality n. 1. Computer simulations that use 3-D graphics
and devices such as the Dataglove to allow the user to interact
with the simulation. 2. A form of network interaction incorporating
aspects of role-playing games, interactive theater, improvisational
comedy, and "true confessions' magazines. In a virtual reality
session, interaction between the participants is written like a
shared novel.
Phrack Inc. Magazine n. An electronically published and
distributed magazine that focuses on technical issues.
========================end of article========================
Comptroller General Decision on EDI
The Comptroller General of the United States has issued a decision
that electronic data interchange (EDI) technologies, with
enhancements such as message authentication and digital signatures,
can create valid legal contractual obligations between the U.S.
Government and the party with whom the agency contracts.
Digest
Contracts formed using Electronic Data Interchange technologies may
constitute valid obligations of the government for purposes of 31 U.S.C.
1501, so long as the technology used provides the same degree of
assurance and certainty as traditional "paper and ink" methods of
contract formation.
Decision
By letter dated September 13, 1991, the Director, Computer Systems
Laboratory, National Institute of Standards and Technology (NIST), asked
whether federal agencies can use Electronic Data Interchange (EDI)
technologies, such as message authentication codes and digital
signatures, to create valid contractual obligations that can be recorded
consistent with 31 U.S.C. 1501. For the reasons stated below, we
conclude that agencies can create valid obligations using properly
secured EDI systems.
Background
EDI is the electronic exchange of business information between
parties, usually via a computer, using an agreed upon format. EDI
is being used to transmit shipping notices, invoices, bid requests, bid
quotes and other messages. Electronic contracting is the use of
EDI technologies to create contractual obligations. EDI allows the
parties to examine the contract, usually on video monitors, but
sometimes on paper facsimiles, store it electronically (for example on
magnetic tapes, on discs or in special memory chips), and recall
it from storage to review it on video monitors, reproduce it on paper or
even mail it via electronic means. Using EDI technologies, it is
possible for an agency to contract in a fraction of the time that
traditional practices take.
As NIST pointed out in its request, the "paperless" nature of the
technology has raised the question of whether electronic contracts
constitute obligations which may be recorded against the government.
NIST is in the process of developing standards for electronic signatures
to be used in various applications,*1 including the formation of
contracts, but has been advised that section 1501 imposes a barrier to
the use of electronic technologies by federal agencies in this regard.
Discussion
Section 1501 establishes the criteria for recording obligations
against the government. The statute provides, in pertinent part, as
follows:
"(a) An amount shall be recorded as an obligation of the United
States Government only when supported by documentary evidence of-
(1) a binding agreement between an agency and another person
(including an agency) that is--
(A) in writing, in a way and form, and for a purpose
authorized by law. . . ."
31 U.S.C. 1501(a) (1) (A).
Under this provision, two requirements must be satisfied: first, the
agreement must bind both the agency and the party with whom the agency
contracts; second, the agreement must be in writing.
Binding Agreement
The primary purpose of section 1501 (a) (1) is "to require that there
be an offer and an acceptance imposing liability on both parties." 39
Comp. Gen. 829, 831 (1960) (emphasis in original). Hence the government
may record an obligation under section 1501 only upon evidence that both
parties to the contract willfully express the intent to be bound. As
explained below, EDI technology provides both the agency and the
contractor the means to electronically "sign" a contract.
A signature traditionally has provided such evidence. See generally
65 Comp. Gen. 806, 810 (1986). Because of its uniqueness, the
handwritten signature is probably the most universally accepted evidence
of an agreement to be bound by the terms of a contract. See 65 Comp.
Gen. at 810. Courts, however, have demonstrated a willingness to accept
other notations, not necessarily written by hand. See, e.g., Ohl & Co.
v. Smith Iron Works, 288 U.S. 170, 176 (1932) (initials); Zacharie v.
Franklin, 37 U.S. (12 Pet.) 151, 161-62 (1838) (a mark);Benedict v.
Lebowitz, 346 F. 2d 120 (2nd Cir. 1965) (typed name); Tabas v. Emergency
Fleet Corporation, 9 F.2d 648, 649 (E.D. Penn. 1926) (typed, printed or
stamped signatures); Berryman v. Childs, 98 Neb. 450, 153 N.W. 486, 488
(1915) (a real estate brokerage used personalized listing contracts which
had the names of its brokers printed on the bottom of the contract in the
space where a handwritten signature usually appears).
As early as 1951, we recognized that a signature does not have to be
handwritten and that "any symbol adopted as one's signature when affixed
with his knowledge and consent is a binding and legal signature. B-
104590, Sept. 12, 1951. Under this theory, we approved the use of
various signature machines ranging from rubber stamps to electronic
encryption devices. See 33 Comp. Gen. 297 (1954); B-216035, Sept. 20,
1984. For example, we held that a certifying officer may adopt and use
an electronic symbol generated by an electronic encryption device to sign
vouchers certifying payments. B-216035, supra. The electronic symbol
proposed for use by certifying officers, we concluded, embodied all of
the attributes of a valid, acceptable signature: it was unique to the
certifying officer, capable of verification, and under his sole control
such that one might presume from its use that the certifying officer,
just as if he had written his name in his own hand, intended to be bound.
EDI technology offers other evidence of an intent to be bound with the
same attributes as a handwritten signature. We conclude that EDI systems
using message authentication codes which follow NIST's Computer Data
Authentication Standard (Federal Information Processing Standard (FIPS)
113*2 or digital signatures following NIST's Digital Signature Standard,
as currently proposed, can produce a form of evidence that is acceptable
under section 1501.
Both the message authentication code and the digital signature are
designed to ensure the authenticity of the data transmitted. They
consist of a series of characters that are cryptographically linked to
the message being transmitted and correspond to no other message. There
are various ways in which a message authentication code or digital
signature might be generated. For example, either could be generated
when the sender inserts something known as a "smart card"*3 into a system
and inputs the data he wants to transmit. Encoded on a circuit chip
located on the smart card is the sender's private key. The sender's
private key is a sequence of numbers or characters which identifies the
sender, and is constant regardless of the transmission. The message
authentication code and the digital signature are functions of the
sender's private key and the data just loaded into the system. The two
differ primarily in the cryptographic methodology used in their
generation and verification.
After loading his data into the system, the sender notifies the system
that he wants to "sign" his transmission. Systems using message
authentication codes send a copy of the data to the chip on the smart
card; the chip then generates the message authentication code by applying
a mathematical procedure known a cryptographic algorithm. Systems using
digital signatures will send a condensed version of the data to the smart
card, which generates the digital signature by applying another
algorithm, as identified in NIST's proposed standard. The card returns
the just-generated message authentication code or digital signature to
the system, which will transmit it and the data to the recipient.
Under either approach, when an offeror or a contracting officer
notifies the system that he wants to "sign" a contract being transmitted,
he is initiating the procedure for generating a message authentication
code or digital signature with the intention of binding his company or
agency, respectively, to the terms of the contract.*4 The code or the
digital signature evidences that intention, as would a handwritten or
other form of signature. Both, generated using the sender's private key,
are unique to the sender; and, the sender controls access to and use of
his "smart card," where his key is stored.
They are also verifiable. When the recipient receives the contract,
either on his computer monitor or in paper facsimile, it will carry,
depending on which approach is used, a notation which constitutes the
message authentication code or the digital signature of the sender,
necessary information to validate the code or the signature and, usually,
the sender's name. The recipient can confirm the authenticity of the
contract by entering the data that he just received and asking his system
to verify the code or the digital signature. The system will then use
the information provided by the sender and either verify or reject it.*5
Both approaches use a key to verify the message just received; however,
the digital signature requires application of a different key from that
used to verify a message authentication code. The change of any data
included in the message as transmitted will result in an unpredictable
change to the message authentication code or the digital signature.
Therefore, when they are verified, the recipient is virtually certain to
detect any alteration.
Writing
To constitute a valid obligation under section 1501(a)(1)(A), a
contract must be supported by documentary evidence "in writing." As NIST
pointed out, some have questioned whether EDI, because of the paperless
nature of the technology, fulfills this requirement. We conclude that it
does.
Prior to the enactment of section 1501, originally section 1311 of the
Supplemental Appropriations Act of 1955, *6 there was no "clean cut
definition of obligations." H.R. Rep. No. 2266, 83rd Cong., 2d Sess. 50
(1954). Some agencies had recorded questionable obligations, including
obligations based on oral contracts, in order to avoid withdrawal and
reversion of appropriated funds. See 51 Comp. Gen. 631, 633 (1972).
Section 1501 was enacted not to restrict agencies to paper and ink in the
formation of contracts, but because, as one court noted, "Congress was
concerned that the executive might avoid spending restrictions by
asserting oral contracts." United States v. American Renaissance Lines,
494 F.2d 1059, 1062 (D.C. Cir. 1974), cert, denied, 419 U.S. 1020 (1974).
The purpose of section 1501 was to require that agencies submit evidence
that affords a high degree of certainty and lessens the possibility of
abuse. See H.R. Rep. No. 2266 at 50.
While "paper and ink" offers a substantial degree of integrity, it is
not the only such evidence. Some courts, applying commercial law (and
the Uniform Commercial Code in particular), have recognized audio tape
recordings, for example, as sufficient to create contracts. See e.g.,
Ellis Canning Company v. Bernstein, 348 F. Supp. 1212 (D. Colo. 1972).
The court, citing a Colorado statute, stated that the tape recording of
the terms of a contract is acceptable because it is a "reduction to
tangible form." *7 Id. at 1228. In a subsequent case, a federal Court
of Appeals held that an audio tape recording of an agreement between the
Gainesville City Commission and a real estate developer was sufficient to
bind the Commission. Londono v. City of Gainesville, 768 F.2d 1223 (11th
Cir. 1985). The court held that the tape recording constituted a "signed
writing." Id. at 1228.
In our opinion, EDI technology, which allows the contract terms to be
examined in human readable form, as on a monitor, stored on electronic
media, recalled from storage and reviewed in human readable form, has an
integrity that is greater than an audio tape recording and equal to that
of a paper and ink contract. Just as with paper and ink, EDI technology
provides a recitation of the precise terms of the contract and avoids the
risk of error inherent in oral testimony which is based on human
memory.*8 Indeed, courts, under an implied-in-fact contract theory, have
enforced contracts on far less documentation than would be available for
electronic contracts. See Clark v. United States, 95 U.S. 539 (1877).
See also Narva Harris Construction Corp. v. United States, 574 F.2d 508
(Ct. Cl. 1978).
For the purpose of interpreting federal statutes, "writing" is defined
to include "printing and typewriting and reproductions of visual symbols
by photographing, multigraphing, mimeographing, manifolding, or
otherwise." 1 U.S.C. 1 (emphasis added). Although the terms of
contracts formed using EDI are stored in a different manner than those of
paper and ink contracts, they ultimately take the form of visual symbols.
We believe that it is sensible to interpret federal law in a manner to
accommodate technological advancements unless the law by its own terms
expressly precludes such an interpretation, or sound policy reasons exist
to do otherwise. It is evident that EDI technology had not been
conceived nor, probably, was even anticipated at the times section 1501
and the statutory definition of "writing" were enacted. Nevertheless, we
conclude that, given the legislative history of section 1501 and the
expansive definition of writing, section 1501 and 1 U.S.C. 1 encompass
EDI technology.
Accordingly, agencies may create valid obligations using EDI systems
which meet NIST standards for security and privacy.
Comptroller General
of the United States
Sept. 13, 1990
General Counsel
U.S. General Accounting Office
441 G. Street, N.W.
Washington, D.C. 20548
Dear Sir:
As you know, National Institute of Standards and Technology (NIST) has
cooperated with the Department of Treasury and the General Accounting
Office to develop an electronic certification system wherein a
cryptographic Message Authentication Code (MAC) is used in place of a
written signature to bind a certifying officer to a payment order.
Several other agencies have expressed their interest in using this or a
similar system as a substitute for a written signature. In fulfillment
of our responsibilities under the Computer Security Act of 1987, NIST is
now in the process of developing a public key based Digital Signature
Standard (DSS) which is specifically designed for electronic signature
applications and will provide at least the same degree of security as the
MAC approach. We have attached the DSS Federal Register Announcement and
draft DSS which is now issued for public comment.
We have often been told that legal impairments exist which prevent
agencies from implementing electronic signatures to bind the federal
government. The specific statute cited is 31 U.S.C. 1501. Before
formally recommending these standards for contracting and financial
management applications, I would like to request a General Accounting
Office decision as to whether NIST standards such as Federal Information
Processing Standard (FIPS) 113 and a finalized DSS may be used throughout
the federal government to record obligations under 31 U.S.C. 1501. If
you need any further information in order to make your decision please
feel free to contact Miles Smid, (301) 975-2938, of my staff.
Sincerely,
James H. Burrows
Director, Computer Systems Laboratory
Enclosures
*1 The Congress has mandated that NIST (formally the National Bureau of
Standards) establish minimum acceptable practices for the security and
privacy of sensitive information in federal computer systems. Computer
Security Act of 1987, Pub. L. No. 100-235, section 2, 101 Stat. 1724
(1988).
*2 FIPS 113 adopts American National Standards Institute (ANSI) standard
X9.9 for message authentication. It outlines the criteria for the
cryptographic authentication of electronically transmitted data and for
the detection of inadvertent and/or intentional modifications of the
data. By adopting the ANSI standard, FIPS 113 encourages private sector
applications of cryptographic authentication; the same standard is being
adopted by many financial institutions for authenticating financial
transactions.
*3 A smart card is the size of a credit card. It contains one or more
integrated circuit chips which function as a computer.
*4 NIST officials advise us that technology using message authentication
codes and digital signatures will be available to both contractors and
contracting officers for use in government contracting.
*5 For the sake of simplicity, this example does not describe the
complicated system of controls used to ensure that (1) no human knows the
sender's private key and (2) the information received from the sender for
validating the message authentication code or digital signature is
correct and accurate.
*6 Pub. L. No. 663, 68 Stat. 800, 830 (1954).
*7 Other courts, interpreting the laws of other states, have held that a
tape recording is not acceptable. See Sonders v. Roosevelt, 102 A.D.2d
701, 476 N.Y.S.2d 331 (1984); Roos v. Aloi, 127 Misc.2d 864, 487 N.Y.S.2d
637 (N.Y. Sup. Ct. 1985).
*8 Of course, just as with any contract or other official document, an
agency must take appropriate steps to ensure the security of the
document, for example, to prevent fraudulent modification of the terms.
Agencies should refer to NIST standards in this regard. See, e.g., FIPS
113 (regarding message authentication codes). In addition, agencies
should refer to the GSA regulations regarding the maintenance of
electronic records, see 41 C.F.R. 201-45.2, and to the Federal Rules of
Evidence with regard to managing electronic records to ensure
admissibility, see generally Department of Justice Report, "Admissibility
of Electronically Filed Federal Records as Evidence," Systems Policy
Staff, Justice Management Division (October 1990).
========================end of article========================
Security Hall of Fame Established
Clyde's Computer Security Hall of Fame is being established to
recognize those who contribute above and beyond the normal call of
duty in their performance of contributing to the advancement and
enhancement of Public Debt's computer security program.
The first inductee to this much sought honor is Bob Settles. Bob
came to Public Debt immediately upon his graduation from college
in 1964. Apart from a two year stint in Vietnam, his first 18 years
were spent with the Internal Audit Staff. Then, in 1982, he was
selected to manage the AIS Security Branch and has served in that
capacity ever since. During his tenure as manager, the Branch's
responsibilities have grown steadily to keep pace with the emphasis
placed on information systems security throughout the Government.
Public Debt's security program is now among the most highly
regarded in the Treasury Department.
Bob has recently accepted a Computer Specialist position with the
Treasury Department at its main office in Washington, D.C.
Bob epitomized the best in seasoned management and his departure
will be keenly felt. We wish him the best in his new position!
========================end of article========================
What's New?
ISSM's gain recognition in international publication
The Public Debt Computer Security Program and the ISSM's received
international recognition when an article written by Kim Clancy and
Joe Kordella was published in ISPNews in the Jan/Feb 1992 edition.
The article presented the role computer security plays in the
protection of critical information assets of Public Debt in an
environment of rapid technological change. It stressed that the
ISSM's are key players in the implementation of the security
program.
New Security Branch Manager Selected
The selection of Kim Clancy as the Security Branch Manager
completes the consolidation of the Branch in Parkersburg. Kim was
previously a security analyst in the AIS Security Branch. Prior
to that, she was a computer security analyst for the State of
Arizona, for over three years. She was also a computer systems
security officer in the United States Air Force.
========================end of article========================
The AIS Security Branch runs an Electronic BBS. Give us a call at
(304) 420-6083. An electronic version of the ISSM is posted on the
board and can be downloaded. Articles in the electronic version
may include more detail in that we are not limited by space
constraints as we are in the paper copy.
The ISSM is a quarterly publication of the Department of Treasury,
Bureau of the Public Debt, AIS Security Branch, 200 3rd Street,
Parkersburg, WV 26101 (304) 420-6368
Editors: Kim Clancy
Joe Kordella
Ed Alesius
Mary Clark
Downloaded From P-80 International Information Systems 304-744-2253