913 lines
36 KiB
Plaintext
913 lines
36 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun July 21 1993 Volume 5 : Issue 55
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Cpyp Editor: Etaoin Shrdlu, Senior
|
|||
|
|
|||
|
CONTENTS, #5.55 (July 21 1993)
|
|||
|
File 1--"What is CPSR and how can we Join?"
|
|||
|
File 2--Incident Response Workshop info
|
|||
|
File 3--"Science & Tech Through Science Fiction" Conference
|
|||
|
File 4--New hearing set for E-Fingerprinting in SF
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Mon, 19 Jul 93 13:04:39 PDT
|
|||
|
From: Nikki Draper <draper@CSLI.STANFORD.EDU>
|
|||
|
Subject: File 1--"What is CPSR and how can we Join?"
|
|||
|
|
|||
|
((MODERATORS' NOTE: CPSR, like EFF, is dedicated to improving
|
|||
|
cyberspace. CPSR has been relatively low-key in expanding its
|
|||
|
membership, and we asked them to provide some information on what they
|
|||
|
do and how people can join. In our view, it's a dynamic and productive
|
|||
|
organization, and one well worth supporting by joining. CPSR has been
|
|||
|
instrumental in filing a number of FOIA suits related to Operation Sun
|
|||
|
Devil and other law enforcement abuses, in lobbying efforts, and most
|
|||
|
recently, in filing FOIA requests and suits to peruse the U.S. Secret
|
|||
|
Service's role in the surveillance of the 2600 meeting in Washington,
|
|||
|
D.C., last fall. As the following summary indicates, CPSR is
|
|||
|
interested in a wide range of activities, and their track record over
|
|||
|
the years has been rather impressive)).
|
|||
|
|
|||
|
************************************************************************
|
|||
|
COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
|
|||
|
************************************************************************
|
|||
|
|
|||
|
CPSR empowers computer professionals and computer users to
|
|||
|
advocate for the responsible use of information technology and
|
|||
|
empowers all who use computer technology to participate in the
|
|||
|
public debate. As technical experts, CPSR members provide the
|
|||
|
public and policymakers with realistic assessments of the power,
|
|||
|
promise, and limitations of computer technology. As an organization
|
|||
|
of concerned citizens, CPSR directs public attention to critical choices
|
|||
|
concerning the applications of computing and how those choices
|
|||
|
affect society.
|
|||
|
|
|||
|
Every project we undertake is based on five principles:
|
|||
|
|
|||
|
* We foster and support public discussion of and public
|
|||
|
responsibility for decisions involving the use of computers in
|
|||
|
systems critical to society.
|
|||
|
|
|||
|
* We work to dispel popular myths about the infallibility of
|
|||
|
technological systems.
|
|||
|
|
|||
|
* We challenge the assumption that technology alone can solve
|
|||
|
political and social problems.
|
|||
|
|
|||
|
* We critically examine social and technical issues within
|
|||
|
the computer profession, nationally and internationally.
|
|||
|
|
|||
|
* We encourage the use of computer technology to improve the
|
|||
|
quality of life.
|
|||
|
|
|||
|
|
|||
|
Founded in 1981 by a small group of computer scientists concerned
|
|||
|
about the use of computers in nuclear weapons systems, CPSR has
|
|||
|
grown into a national public-interest alliance of computer industry
|
|||
|
professionals dedicated to examining the impact of technology on
|
|||
|
society.
|
|||
|
|
|||
|
************************************************************************
|
|||
|
CPSR PROJECTS
|
|||
|
************************************************************************
|
|||
|
|
|||
|
As computer technology becomes increasingly pervasive, the issues
|
|||
|
facing us become more complex. CPSR provides a forum where we
|
|||
|
can examine technology's impact on our lives, the lives of our fellow
|
|||
|
citizens, and on society as a whole. By sponsoring both national and
|
|||
|
local projects, CPSR serves as a catalyst for in-depth discussion and
|
|||
|
effective action in key areas:
|
|||
|
|
|||
|
Civil Liberties and Privacy
|
|||
|
|
|||
|
The National Information Infrastructure
|
|||
|
|
|||
|
Workplace Issues and Participatory Design
|
|||
|
|
|||
|
Reliability and Risk
|
|||
|
|
|||
|
In addition, CPSR's chapter-based projects and national
|
|||
|
working groups tackle issues ranging from the development
|
|||
|
of nanotechnology and virtual reality to computing and ethics
|
|||
|
to community computing to computers and education.
|
|||
|
|
|||
|
************************************************************************
|
|||
|
HOW TO BECOME A MEMBER
|
|||
|
************************************************************************
|
|||
|
|
|||
|
CPSR is a democratically organized grass roots alliance. Our
|
|||
|
accomplishments are the result of the member activism. Many
|
|||
|
CPSR members serve as national organizers
|
|||
|
|
|||
|
Just fill out the membership form, enclose a check and mail it to
|
|||
|
CPSR, P.O. Box 717, Palo Alto, CA 94301.
|
|||
|
|
|||
|
CPSR's cost to provide members with services is covered by the
|
|||
|
$75 dues. To keep CPSR membership open to a wide range of
|
|||
|
people, we offer dues levels of $20 and $50.
|
|||
|
|
|||
|
************************************************************************
|
|||
|
MEMBERSHIP BENEFITS
|
|||
|
************************************************************************
|
|||
|
|
|||
|
When you become a member of CPSR, you are joining a nationwide
|
|||
|
network of computer professionals who are committed to bringing
|
|||
|
social responsibility to all aspects of computer technology. CPSR
|
|||
|
sponsors, supports, and participates in conferences, roundtables and
|
|||
|
meetings on advanced issues in computing, local civic networks,
|
|||
|
cryptography, participatory design, and computers and social change.
|
|||
|
|
|||
|
Every fall the CPSR Annual Meeting brings together the foremost
|
|||
|
representatives of the technology industry to explore current topics
|
|||
|
in seminars and panel discussions. Our conferences and chapter
|
|||
|
meetings provide important opportunities to meet other members
|
|||
|
and share ideas and expertise.
|
|||
|
|
|||
|
************************************************************************
|
|||
|
OTHER MEMBERSHIP BENEFITS INCLUDE:
|
|||
|
************************************************************************
|
|||
|
|
|||
|
* a quarterly newsletter which provides in-depth analysis of key
|
|||
|
issues in computing as well as updates on CPSR activities and
|
|||
|
action alerts,
|
|||
|
|
|||
|
* an organized voice for socially responsible computing in
|
|||
|
Washington,
|
|||
|
|
|||
|
* well-researched public testimony and public policy development,
|
|||
|
|
|||
|
* invitations and discounts to CPSR events,
|
|||
|
|
|||
|
* discounts on research papers, books.and educational videotapes,
|
|||
|
|
|||
|
* on-line information and discussion of key issues in computing,
|
|||
|
|
|||
|
* membership in a local CPSR chapter (where available) and notices
|
|||
|
of chapter meetings and activities,
|
|||
|
|
|||
|
* participation in local and national working groups which allow you
|
|||
|
to have effective impact on the issues you care about,
|
|||
|
|
|||
|
* information and referral about crucial issues in computing.
|
|||
|
|
|||
|
|
|||
|
ORGANIZATIONAL INFORMATION
|
|||
|
|
|||
|
CPSR National Office
|
|||
|
P.O. Box 717
|
|||
|
Palo Alto, CA 94301
|
|||
|
415-322-3778
|
|||
|
415-322-3798 (FAX)
|
|||
|
E-mail: cpsr@csli.stanford.edu
|
|||
|
|
|||
|
|
|||
|
CPSR Washington Office
|
|||
|
666 Pennsylvania Ave SE, Suite 303
|
|||
|
Washington, D.C. 20003
|
|||
|
202-544-9240
|
|||
|
202-547-5481 FAX
|
|||
|
rotenberg@washofc.cpsr.org
|
|||
|
|
|||
|
|
|||
|
************************************************************************
|
|||
|
PRIVACY NOTICE
|
|||
|
************************************************************************
|
|||
|
|
|||
|
The CPSR membership database is never sold, rented, lent,
|
|||
|
exchanged, or used for anything other than official CPSR
|
|||
|
activity. CPSR may elect to send members mailings with
|
|||
|
information from other groups, but the mailings will always
|
|||
|
originate with CPSR.
|
|||
|
|
|||
|
|
|||
|
============================ clip and mail ===========================
|
|||
|
|
|||
|
CPSR MEMBERSHIP FORM
|
|||
|
|
|||
|
Name ___________________________________________________________
|
|||
|
|
|||
|
Address ___________________________________________________________
|
|||
|
|
|||
|
___________________________________________________________
|
|||
|
|
|||
|
City/State/Zip _____________________________________________________
|
|||
|
|
|||
|
Home phone _____________________ Work phone ______________________
|
|||
|
|
|||
|
Company ___________________________________________________________
|
|||
|
|
|||
|
Type of work ______________________________________________________
|
|||
|
|
|||
|
E-mail address _____________________________________________________
|
|||
|
|
|||
|
CPSR Chapter
|
|||
|
__ Acadiana __ Austin __ Berkeley
|
|||
|
__ Boston __ Chicago __ Denver/Boulder
|
|||
|
__ Los Angeles __ Madison __ Maine
|
|||
|
__ Milwaukee __ Minnesota __ New Haven
|
|||
|
__ New York __ Palo Alto __ Philadelphia
|
|||
|
__ Pittsburgh __ Portland __ San Diego
|
|||
|
__ Santa Cruz __ Seattle __ Washington, DC
|
|||
|
__ No chapter in my area
|
|||
|
|
|||
|
CPSR Membership Categories
|
|||
|
__ $ 75 REGULAR MEMBER
|
|||
|
__ $ 50 Basic member
|
|||
|
__ $ 200 Supporting member
|
|||
|
__ $ 500 Sponsoring member
|
|||
|
__ $1000 Lifetime member
|
|||
|
__ $ 20 Student/low income member
|
|||
|
|
|||
|
__ $ 50 Foreign subscriber
|
|||
|
__ $ 50 Library/institutional subscriber
|
|||
|
|
|||
|
|
|||
|
Additional tax-deductible contribution to support CPSR projects:
|
|||
|
__ $50 __ $75 __ $100 __ $250
|
|||
|
__ $500 __ $1000 __ Other
|
|||
|
|
|||
|
|
|||
|
Total Enclosed: $ ________
|
|||
|
|
|||
|
Make check out to CPSR and mail to:
|
|||
|
CPSR
|
|||
|
P.O. Box 717
|
|||
|
Palo Alto, CA 94301
|
|||
|
|
|||
|
************************************************************************
|
|||
|
|
|||
|
CPSR has several different electronic resources available at no cost.
|
|||
|
We established a list server to archive CPSR related materials and
|
|||
|
make them available on request, and to quickly disseminate official,
|
|||
|
short, CPSR announcements (e.g., press releases, conference
|
|||
|
announcements, and project updates). Mail traffic will be light P
|
|||
|
only the CPSR Board and staff can post to it.
|
|||
|
|
|||
|
We encourage you to subscribe to the list server and publicize it
|
|||
|
widely to anyone else interested in CPSRUs areas of work. To
|
|||
|
subscribe, send mail to:
|
|||
|
|
|||
|
listserv@gwuvm.gwu.edu (Internet) OR
|
|||
|
listserv@gwuvm (Bitnet)
|
|||
|
|
|||
|
Your message needs to contain only one line:
|
|||
|
|
|||
|
subscribe cpsr <your first name> <your last name>
|
|||
|
|
|||
|
You will get a message that confirms your subscription. The message
|
|||
|
also explains how to use the list server to request archived materials
|
|||
|
(including an index of everything in CPSRUs archive)
|
|||
|
|
|||
|
If you have a problem with the list server, please contact
|
|||
|
Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm).
|
|||
|
|
|||
|
There is a second list server at cpsr.org. This list server also has
|
|||
|
an extensive archive and houses several different lists on more
|
|||
|
specialized subjects relating to computing. For more detailed
|
|||
|
information on the listserv and other services, send email to
|
|||
|
|
|||
|
listserv@cpsr.org with the message:
|
|||
|
|
|||
|
GET CPSR/CPSR.ORG SOURCES or,
|
|||
|
|
|||
|
GET CPSR/CPSR.ORG QUICK_REF
|
|||
|
|
|||
|
If you have a problem using cpsr.org, contact ftp-admin@cpsr.org.
|
|||
|
|
|||
|
************************************************************************
|
|||
|
We hope you enjoy this new service.
|
|||
|
************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 8 Jul 1993 20:14:44 -0500
|
|||
|
From: spaf@CS.PURDUE.EDU(Gene Spafford)
|
|||
|
Subject: File 2--Incident Response Workshop info
|
|||
|
|
|||
|
** NOTE: July 10 is the deadline for discounted registration!! **
|
|||
|
|
|||
|
PRELIMINARY AGENDA
|
|||
|
5th Computer Security Incident Handling Workshop
|
|||
|
Sponsored by the Forum of Incident Response and Security Teams (FIRST)
|
|||
|
|
|||
|
August 10-13, 1993
|
|||
|
St. Louis, MO
|
|||
|
|
|||
|
|
|||
|
TUESDAY, August 10, 1993 Full-day Tutorials
|
|||
|
|
|||
|
1. Creating a Security Policy
|
|||
|
presented by Charles Cresson Wood:
|
|||
|
|
|||
|
[no abstract available at time of posting]
|
|||
|
|
|||
|
2. Vulnerabilities of the IBM PC Architecture: Virus, Worms, Trojan
|
|||
|
Horses, and Things That Go Bump In The Night
|
|||
|
presented by A. Padgett Peterson:
|
|||
|
|
|||
|
An intensive look into the architecture of the IBM-PC and MS/PC-DOS --
|
|||
|
What it is and why it was designed that way. An understanding of
|
|||
|
assembly language and the interrupt structure of the Intel 80x86
|
|||
|
processor is helpful.
|
|||
|
|
|||
|
The day will begin with the BIOS and what makes the PC a fully
|
|||
|
functional computer before any higher operating system is introduced.
|
|||
|
Next will be a discussion of the various operating systems, what they
|
|||
|
add and what is masked. Finally, the role and effects of the PC and
|
|||
|
various LAN configurations (peer-peer and client server) will be
|
|||
|
examined with emphasis on the potential protection afforded by login
|
|||
|
scripting and RIGHTS.
|
|||
|
|
|||
|
At each step, vulnerabilities will be examined and demonstrations
|
|||
|
made of how malicious software exploits them. Demonstrations may
|
|||
|
include STONED, MICHELANGELO, AZUSA, FORM, JERUSALEM, SUNDAY, 4096,
|
|||
|
and EXEBUG viruses depending on time and equipment available.
|
|||
|
|
|||
|
On completion attendees will understand the vulnerabilities and how
|
|||
|
to detect attempted exploitation using simple tools included with
|
|||
|
DOS such as DEBUG and MEM.
|
|||
|
|
|||
|
3. Unix Security
|
|||
|
presented by Matt Bishop:
|
|||
|
|
|||
|
Unix can be a secure operating system if the appropriate controls and
|
|||
|
tools are used. However, it is difficult for even experienced system
|
|||
|
administrators to know all the appropriate controls to use. This
|
|||
|
tutorial covers the most important aspects of Unix security
|
|||
|
administration, including internal and external controls, useful
|
|||
|
tools, and administration techniques to develop better security.
|
|||
|
|
|||
|
Upon completion, Unix system administrators will have a better
|
|||
|
understanding of vulnerabilities in Unix, and of methods to protect
|
|||
|
their systems.
|
|||
|
|
|||
|
WEDNESDAY, August 11, 1993
|
|||
|
|
|||
|
8:30 - 8:45 Opening Remarks - Rich Pethia (CERT/CC)
|
|||
|
|
|||
|
8:45 - 9:30 Keynote Speaker - Dr. Vinton Cerf (XXXX)
|
|||
|
|
|||
|
9:30 - 10:00 Break
|
|||
|
|
|||
|
10:00 - 12:00 International Issues - Computer networks and communication lines
|
|||
|
span national borders. This session will focus on how computer
|
|||
|
incidents may be handled in an international context, and on
|
|||
|
some ways investigators can coordinate their efforts.
|
|||
|
SPEAKERS:
|
|||
|
Harry Onderwater (Dutch Federal Police)
|
|||
|
John Austien (New Scotland Yard)
|
|||
|
other speakers pending
|
|||
|
|
|||
|
12:00 - 1:30 Lunch with Presentations by various Response Teams
|
|||
|
|
|||
|
1:30 - 3:00 Professional Certification & Qualification - how do you know if
|
|||
|
the people you hire for security work are qualified for the
|
|||
|
job? How can we even know what the appropriate qualifications
|
|||
|
are? The speakers in this session will discuss some approaches
|
|||
|
to the problem for some segments of industry and government.
|
|||
|
SPEAKERS:
|
|||
|
Sally Meglathery ((ISC)2)
|
|||
|
Lynn McNulty (NIST)
|
|||
|
Genevieve Burns (ISSA)
|
|||
|
|
|||
|
3:00 - 3:30 Break
|
|||
|
|
|||
|
3:30 - 6:00 Incident Aftermath and Press Relations - What happens after an
|
|||
|
incident has been discovered? What are some of the
|
|||
|
consequences of dealing with law enforcement and the press?
|
|||
|
This session will feature presentations on these issues, and
|
|||
|
include a panel to answer audience questions.
|
|||
|
SPEAKERS:
|
|||
|
Laurie Sefton (Apple Computer)
|
|||
|
Jeffrey Sebring (MITRE)
|
|||
|
Terry McGillen (Software Engineering Institute)
|
|||
|
John Markoff (NY Times)
|
|||
|
Mike Alexander (InfoSecurity News)
|
|||
|
|
|||
|
7:00 - 9:00 Reception
|
|||
|
|
|||
|
THURSDAY August 12
|
|||
|
|
|||
|
8:30 - 10:00 Preserving Rights During an Investigation - During an
|
|||
|
investigation, sometimes more damage is done by the
|
|||
|
investigators than from the original incident. This session
|
|||
|
reinforces the importance of respecting the rights of victims,
|
|||
|
bystanders, and suspects while also gathering evidence that may
|
|||
|
be used in legal or administrative actions.
|
|||
|
SPEAKERS:
|
|||
|
Mike Godwin (Electronic Frontiers Foundation)
|
|||
|
Scott Charney (Department of Justice)
|
|||
|
other speaker pending
|
|||
|
|
|||
|
10:00 - 10:30 Break
|
|||
|
|
|||
|
10:30 - 12:00 Coordinating an Investigation - What are the steps in an
|
|||
|
investigation? When should law enforcement be called in? How
|
|||
|
should evidence be preserved? Veteran investigators discuss
|
|||
|
these questions. A panel will answer questions, time permitting.
|
|||
|
SPEAKER:
|
|||
|
Jim Settle (FBI)
|
|||
|
other speakers pending
|
|||
|
|
|||
|
12:00 - 1:30 Special Interest Lunch
|
|||
|
|
|||
|
1:30 - 3:00 Liabilities and Insurance - You organize security measures but
|
|||
|
a loss occurs. Can you somehow recover the cost of damages?
|
|||
|
You investigate an incident, only to cause some incidental
|
|||
|
damage. Can you be sued? This session examines these and
|
|||
|
related questions.
|
|||
|
SPEAKERS:
|
|||
|
Mark Rasch (Arent Fox)
|
|||
|
Bill Cook (Willian, Brinks, Olds, Hoffer, & Gibson)
|
|||
|
Marr Haack (USF&G Insurance Companies)
|
|||
|
|
|||
|
3:00 - 3:15 Break
|
|||
|
|
|||
|
3:15 - 5:30 Incident Role Playing -- An exercise by the attendees
|
|||
|
to develop new insights into the process of
|
|||
|
investigating a computer security incident.
|
|||
|
Organized by Dr. Tom Longstaff of the CERT/CC.
|
|||
|
|
|||
|
7:30 - ? Birds of a Feather and Poster Sessions
|
|||
|
|
|||
|
|
|||
|
FRIDAY August 13
|
|||
|
|
|||
|
8:30 - 10:00 Virus Incidents - How do you organize a successful virus
|
|||
|
analysis and response group? The speakers in this session have
|
|||
|
considerable experience ans success in doing exactly this. In
|
|||
|
their talks, and subsequent panel, they will explain how to
|
|||
|
organize computer virus response.
|
|||
|
SPEAKERS:
|
|||
|
Werner Uhrig (Macintosh Anti-virus Expert)
|
|||
|
David Grisham (University of New Mexico)
|
|||
|
Christoph Fischer (CARO)
|
|||
|
Karen Picharczyk (LLNL/DoE CIAC)
|
|||
|
Ken van Wyk (DISA/Virus-L)
|
|||
|
|
|||
|
10:00 - 10:15 Break
|
|||
|
|
|||
|
10:15 - 11:15 Databases - How do you store incident, suspect, and
|
|||
|
vulnerability information safely, but still allow the
|
|||
|
information to be used effectively? The speakers in this
|
|||
|
session will share some of their insights and methods on this
|
|||
|
topic.
|
|||
|
SPEAKERS:
|
|||
|
John Carr (CCTA)
|
|||
|
Michael Higgins (DISA)
|
|||
|
speaker pending
|
|||
|
|
|||
|
11:15 - 12:15 Threats - Part of incidence response is to anticipate riska and
|
|||
|
threats. This session will focus on some likely trends and
|
|||
|
possible new problems to be faced in computer security.
|
|||
|
SPEAKERS:
|
|||
|
Karl A. Seeger
|
|||
|
speakers pending
|
|||
|
|
|||
|
|
|||
|
12:15 - 12:30 Closing Remarks - Dennis Steinauer (NIST/FIRST)
|
|||
|
|
|||
|
12:30 - 2:00 Lunch
|
|||
|
|
|||
|
2:00 - 3:00 FIRST General Meeting and the Steering Committee Elections
|
|||
|
|
|||
|
3:00 - 4:00 FIRST Steering Committee Meeting
|
|||
|
|
|||
|
^^^^^^^^^^^^^^^^^^^^^Registration Information/Form Follows^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
INQUIRES:
|
|||
|
|
|||
|
Direct questions concerning registration and payment to: Events at 412-268-6531
|
|||
|
|
|||
|
Direct general questions concerning the workshop to: Mary Alice "Sam" Toocheck
|
|||
|
at 214-268-6933
|
|||
|
|
|||
|
Return to: Helen E. Joyce
|
|||
|
Software Engineering Institute
|
|||
|
Carnegie Mellon University
|
|||
|
Pittsburgh, PA 15213-3890
|
|||
|
Facsimile: 412-268-7401
|
|||
|
TERMS:
|
|||
|
|
|||
|
Please make checks or purchase orders payable to SEI/CMU. Credit
|
|||
|
cards are not accepted. No refunds will be issued, substitutions are
|
|||
|
encouraged.
|
|||
|
|
|||
|
The registrations fee includes materials, continental breakfast,
|
|||
|
lunches (not included on August 13), morning and afternoon breaks and
|
|||
|
an evening reception on August 11. Completed registration materials
|
|||
|
must be received by the SEI no later than July 10, 1993.
|
|||
|
|
|||
|
A minimum of 7 attendees are needed for each tutorial and there will
|
|||
|
be limit of 50 attendees. You MUST indicate which tutorial you would
|
|||
|
like to attend and an alternate if your first choice is full.
|
|||
|
|
|||
|
GOVERNMENT TERMS:
|
|||
|
|
|||
|
If your organization has not made prior arrangements for reimbursement
|
|||
|
of workshop expenses, please provide authorization (1556) from your
|
|||
|
agency at the time of registration.
|
|||
|
|
|||
|
GENERAL REGISTRATION INFORMATION:
|
|||
|
|
|||
|
Workshop................................. ..............$300.00
|
|||
|
|
|||
|
All registrations received after July 10, 1993..........$350.00
|
|||
|
|
|||
|
Tutorials (Must be registered by July, 10, 1993)........$190.00
|
|||
|
|
|||
|
NAME:
|
|||
|
|
|||
|
TITLE:
|
|||
|
COMPANY:
|
|||
|
|
|||
|
DIVISION:
|
|||
|
|
|||
|
ADDRESS:
|
|||
|
|
|||
|
CITY:
|
|||
|
|
|||
|
STATE:
|
|||
|
|
|||
|
ZIP:
|
|||
|
|
|||
|
BUSINESS PHONE:
|
|||
|
|
|||
|
EMERGENCY PHONE:
|
|||
|
|
|||
|
FACSIMILE NUMBER:
|
|||
|
|
|||
|
E-MAIL ADDRESS:
|
|||
|
DIETARY/ACCESS REQUIREMENTS:
|
|||
|
|
|||
|
CITIZENSHIP: Are you a U.S. Citizen? YES/NO
|
|||
|
|
|||
|
Identify country where citizenship is held if not the U.S.:
|
|||
|
|
|||
|
(Note: there will be no classified information disclosed at this
|
|||
|
workshop. There is no attendance restriction based on citizenship or
|
|||
|
other criteria.)
|
|||
|
|
|||
|
GENERAL HOTEL INFORMATION:
|
|||
|
|
|||
|
RATES: A block of rooms has been reserved at the Hyatt Regency at
|
|||
|
Union Station, One St. Louis Union Station, St. Louis, Missouri 63103.
|
|||
|
The hotel will hold these rooms until July 10, 1993. Hotel
|
|||
|
arrangements should be made directly with the Hyatt, 314-231-1234. To
|
|||
|
receive the special rate of $65.00 per night, please mention the Fifth
|
|||
|
Computer Security Incident Handling Workshop when making your hotel
|
|||
|
arrangements.
|
|||
|
|
|||
|
ACCOMMODATIONS: Six-story hotel featuring 540 guest rooms, including
|
|||
|
20 suites. All rooms have individual climate control, direct-dial
|
|||
|
telephone with message alert, color TV with cable and optional pay
|
|||
|
movies. Suites available with wet bar. Hotel offers three floors of
|
|||
|
Regency accommodations, along with a Hyatt Good Passport floor, and a
|
|||
|
special floor for women travelers.
|
|||
|
|
|||
|
LOCATION/TRANSPORTATION FACTS: Downtown hotel located in historic
|
|||
|
Union Station one mile from Cervantes Convention Center and St. Louis
|
|||
|
Convention Center and St. Louis Arch. Fifteen miles (30 minutes) from
|
|||
|
St. Louis Zoo.
|
|||
|
|
|||
|
DINING/ENTERTAINMENT: Italian Cuisine is features at Aldo's, the
|
|||
|
hotel's full-service restaurant. Enjoy afternoon cocktails in the
|
|||
|
Grand Hall, an open-air, six-story area featuring filigree work,
|
|||
|
fresco and stained glass windows. The station Grille offers a chop
|
|||
|
house and seafood menu.
|
|||
|
|
|||
|
RECREATIONAL/AMUSEMENT FACILITIES: Seasonal outdoor swimming pool.
|
|||
|
Full health club; suana in both men's and women's locker rooms.
|
|||
|
Jogging maps are available at the hotel front desk.
|
|||
|
|
|||
|
SERVICES/FACILITIES/SHOPS: Over 100 specialty shops throughout the
|
|||
|
hotel, including men's and women's boutiques, children's toy shops and
|
|||
|
train stores.
|
|||
|
|
|||
|
--
|
|||
|
Gene Spafford, COAST Project Director
|
|||
|
Software Engineering Research Center & Dept. of Computer Sciences
|
|||
|
Purdue University, W. Lafayette IN 47907-1398
|
|||
|
Internet: spaf@cs.purdue.edu phone: (317) 494-7825
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 15 Jul 1993 14:24:18 UTC+0100
|
|||
|
From: Miquel Barcelo <blo@LSI.UPC.ES>
|
|||
|
Subject: File 3--"Science & Tech Through Science Fiction" Conference
|
|||
|
|
|||
|
|
|||
|
Friends,
|
|||
|
|
|||
|
You will find here the CALL OF PAPERS of a new Workshop on
|
|||
|
SCIENCE AND TECHNOLOGY THROUGH SCIENCE FICTION
|
|||
|
to be held next summer in Barcelona, Spain (22nd and 23rd, June 1994).
|
|||
|
|
|||
|
This will be the first edition of such a Workshop so, if you
|
|||
|
know more people that could be interested, please help in making this
|
|||
|
information available just forwarding this message.
|
|||
|
|
|||
|
If you need more information, please feel free to ask to:
|
|||
|
blo@lsi.upc.es
|
|||
|
|
|||
|
Yours,
|
|||
|
Dr. Miquel Barcel%
|
|||
|
Software Department - UPC
|
|||
|
Pau Gargallo, 5
|
|||
|
E 08028 BARCELONA (Spain)
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
First Announcement and CALL FOR PAPERS
|
|||
|
|
|||
|
STSF '94
|
|||
|
|
|||
|
An International Workshop on
|
|||
|
SCIENCE and TECHNOLOGY through SCIENCE FICTION
|
|||
|
|
|||
|
22nd-23rd June 1994 - BARCELONA (Spain)
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Organized by:
|
|||
|
|
|||
|
CONSELL SOCIAL (Board of Trustees)
|
|||
|
of Universitat Polit%cnica de Catalunya (UPC)
|
|||
|
|
|||
|
in cooperation with:
|
|||
|
|
|||
|
Software Department (UPC)
|
|||
|
Physics and Nuclear Engineering Department (UPC)
|
|||
|
WORLD SF (Hispanic Chapter)
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
THE WORKSHOP
|
|||
|
|
|||
|
A good working definition of science fiction is "speculative ex-
|
|||
|
trapolation about the effect of science and technology on society".
|
|||
|
The aim of this International Workshop is to provide a forum for iden-
|
|||
|
tifying, encouraging and discussing research about science and tech-
|
|||
|
nology, or their consequences, as portrayed in science fiction. The
|
|||
|
Workshop will bring together researchers, scientists, and other aca-
|
|||
|
demics with science fiction professionals to share information and ex-
|
|||
|
plore new ideas about the relationship between science fiction,
|
|||
|
science and technology.
|
|||
|
|
|||
|
|
|||
|
TOPICS OF INTEREST
|
|||
|
The topics of interest include but are not limited to:
|
|||
|
- Biotechnology, genetic engineering
|
|||
|
- Computer science, robotics, artificial intelligence
|
|||
|
- Macroengineering
|
|||
|
- Nanotechnology
|
|||
|
- Physics, astronomy, cosmology
|
|||
|
- Professional activity of scientists and engineers
|
|||
|
- Social impact of science and technology
|
|||
|
- Teaching science and technology with science fiction
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
PROGRAM COMMITTEE
|
|||
|
|
|||
|
* Miquel Barcel% (Software Dept., UPC, SPAIN)
|
|||
|
* Joe Haldeman (SFWA president, M.I.T. Associate Professor, USA)
|
|||
|
* Elizabeth A. Hull (SFRA past-president, USA)
|
|||
|
* Frederik Pohl (SFWA and WSF past-president, USA)
|
|||
|
* Vernor Vinge (Dept. of Math Sciences, SDSU, USA)
|
|||
|
|
|||
|
|
|||
|
ORGANIZING COMMITTEE
|
|||
|
|
|||
|
* Miquel Barcel% (Software Dept., UPC)
|
|||
|
* Laura Cabarrocas (Board of Trustees (secr.), UPC)
|
|||
|
* Gay Haldeman (Writing Program, M.I.T.,USA)
|
|||
|
* Pedro Jorge (Hispanic Chapter of WORLD SF)
|
|||
|
* Jordi Jos% (Physics and Nuclear Engineering Dept., UPC)
|
|||
|
* Louis Lemkow (Sociology Dept., UAB)
|
|||
|
* Manel Moreno (Physics and Nuclear Engineering Dept., UPC)
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
INSTRUCTIONS TO AUTHORS
|
|||
|
|
|||
|
Paper submissions must be in English and no more than 6000 words long.
|
|||
|
The Proceedings of the Workshop will be published by the organi-
|
|||
|
zing institution.
|
|||
|
Authors are requested to submit a "Letter of Intention" with the
|
|||
|
title of the paper and a short abstract (less than one page) be-
|
|||
|
fore November 30, 1993.
|
|||
|
Authors must submit five copies of each paper, before January 31,
|
|||
|
1994, to the:
|
|||
|
|
|||
|
Program Chairperson:
|
|||
|
Miquel Barcel%
|
|||
|
Facultat d'Inform%tica
|
|||
|
Universitat Polit%cnica de Catalunya
|
|||
|
Pau Gargallo, 5
|
|||
|
E 08028 BARCELONA (Spain)
|
|||
|
Tel: 34.3.401.6958
|
|||
|
Fax: 34.3.401.7113
|
|||
|
E-mail: blo@lsi.upc.es
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
IMPORTANT DATES
|
|||
|
|
|||
|
* Deadline for Letter of Intention: November 30, 1993
|
|||
|
* Deadline for Paper Submission: January 31, 1994
|
|||
|
* Notification of Acceptance: March 15, 1994
|
|||
|
* Camera Ready Papers Due: April 30, 1994
|
|||
|
* Workshop: June, 22-23, 1994
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 21 Jul 1993 11:06:05 -0700
|
|||
|
From: "James I. Davis" <jdav@WELL.SF.CA.US>
|
|||
|
Subject: File 4--New hearing set for E-Fingerprinting in SF
|
|||
|
|
|||
|
NEW HEARING SET FOR JULY 27 on ELECTRONIC FINGERPRINTING for
|
|||
|
WELFARE RECIPIENTS IN SAN FRANCISCO
|
|||
|
|
|||
|
Once again electronic fingerprinting for San Francisco welfare
|
|||
|
recipients is on the Board of Supervisors agenda. A formal request has
|
|||
|
been made by the SF Department of Social Services (DSS) to change the
|
|||
|
ordinance governing General Assistance (GA) to begin requiring
|
|||
|
electronic fingerprints as a condition for receiving GA benefits.
|
|||
|
Prints are matched ostensibly to prevent people from obtaining aid
|
|||
|
more than once.
|
|||
|
|
|||
|
A hearing on the ordinance has been set for TUESDAY, JULY 27 at 2:00
|
|||
|
p.m. in Room 228 of City Hall, San Francisco.
|
|||
|
|
|||
|
The Automated Fingerprint Image Reporting and Match (AFIRM) system is
|
|||
|
essentially a _political_ plan, using vague and unsubstantiated claims
|
|||
|
of welfare fraud as a justification for installing the computer
|
|||
|
system. That is, it is NOT a real fiscal savings plan and is incapable
|
|||
|
of introducing "accountability" into the welfare system, because no
|
|||
|
data exists to support its use (see below for details). As such the
|
|||
|
only way that the AFIRM system will be stopped is by raising as much
|
|||
|
noise about it as possible. If you think that electronic
|
|||
|
fingerprinting is a bad idea, please let the following supervisors
|
|||
|
know, and/or come to the hearing:
|
|||
|
|
|||
|
Supervisor Willie Kennedy
|
|||
|
(415) 554-5734 (voice)
|
|||
|
(415) 554-7034 (fax)
|
|||
|
|
|||
|
Supervisor Barbara Kaufman
|
|||
|
(415) 554-4880 (voice)
|
|||
|
(415) 554-4885 (fax)
|
|||
|
|
|||
|
Supervisor Annemarie Conroy
|
|||
|
(415) 554-7788 (voice)
|
|||
|
(415) 554-5163 (fax)
|
|||
|
|
|||
|
Mail address for all supervisors:
|
|||
|
Room 235
|
|||
|
City Hall
|
|||
|
San Francisco, CA 94102
|
|||
|
|
|||
|
*******
|
|||
|
Here are some abbreviated details on the situation. I have a
|
|||
|
longer question/answer analysis type background piece which I'm
|
|||
|
happy to send to you, you can also FTP it from cpsr.org
|
|||
|
(/ftp/cpsr/fingerprints/sffinger.analysis)
|
|||
|
|
|||
|
|
|||
|
Key points are:
|
|||
|
|
|||
|
-- IT'S NOT CLEAR THAT THERE IS A NEED FOR THE SYSTEM, OR THAT THE
|
|||
|
SYSTEM WILL SAVE ANY MONEY
|
|||
|
|
|||
|
The Department of Social Services (DSS) has presented NO DATA to
|
|||
|
substantiate how extensive the problem of "double-dipping" is, and
|
|||
|
data from Los Angeles County (which has been using the same system for
|
|||
|
two years) and Alameda County (using it since February) shows that the
|
|||
|
problem may be quite minuscule. Wild claims of cost-savings by Los
|
|||
|
Angeles and Alameda Counties do not stand up to careful scrutiny.
|
|||
|
During a changeover period, cases are closed for "non-compliance" if
|
|||
|
people fail to show up for their fingerprint appointment. I.e., no
|
|||
|
evidence of "fraud deterred" exists. It appears that cases counted as
|
|||
|
being closed because of the fingerprint program include cases that
|
|||
|
would already have been closed because of the normal 15 - 20% monthly
|
|||
|
turnover in GA cases (i.e., they would have been closed anyway, but
|
|||
|
are assigned as savings to AFIRM). "Non-compliance" could be the
|
|||
|
result of lost mail, lack of bus fare, paperwork screw-up, mental
|
|||
|
disability, or confusion about the rule change. Actual fraud that does
|
|||
|
occur may be caught by existing DSS security measures, including their
|
|||
|
ID process, social security number matching with other counties, the
|
|||
|
Fraud Early Detection Program, etc, so are unfairly assigned to the
|
|||
|
AFIRM system. And the cost of the system is probably understated.
|
|||
|
After an accurate cost-benefit accounting is made (none has been done
|
|||
|
yet), it could very well show that the system does NOT save _any_
|
|||
|
money.
|
|||
|
|
|||
|
|
|||
|
-- THERE ARE PROFOUND PRIVACY CONCERNS.
|
|||
|
|
|||
|
EDS, the computer services giant, will store and process the data.
|
|||
|
The data will be shared with other counties. The police, legally,
|
|||
|
under specific conditions, may get information from DSS on recipients.
|
|||
|
Conceivably this will include some kind of access to, or search
|
|||
|
capability of, the fingerprint data. And laws governing access to
|
|||
|
confidential welfare data may change. Historically, breaches in
|
|||
|
privacy protection have started with welfare programs (e.g., computer
|
|||
|
matching of data in 1977), and from their extend to other programs
|
|||
|
after the precedent has been established.
|
|||
|
|
|||
|
|
|||
|
-- IT PUSHES SOCIAL SERVICES TOWARDS BEING A LAW ENFORCEMENT ACTIVITY.
|
|||
|
|
|||
|
Regardless of its extension into many areas, fingerprinting is still
|
|||
|
commonly perceived as a law enforcement technology. While
|
|||
|
fingerprinting in some professions has a rationale because public
|
|||
|
safety is involved, or for personal security reasons, these do not
|
|||
|
apply to its use in welfare, where people must rely on the government
|
|||
|
for their survival. Being poor is technically not a crime, but the
|
|||
|
fingerprinting scheme reinforces this too common perception.
|
|||
|
|
|||
|
-- THE AFIRM SYSTEM IS DESIGNED FOR EXPANSION.
|
|||
|
|
|||
|
After GA, fingerprinting will extend to AFDC (mostly welfare mothers &
|
|||
|
kids). LA County is planning to extend AFIRM to AFDC recipients, as a
|
|||
|
pilot program this summer. This will quadruple the records on their
|
|||
|
system to 400,000. Will they fingerprint the kids? After that, food
|
|||
|
stamps is a likely candidate. Then we are well on the way to
|
|||
|
establishing a national poverty database. As the system extends to
|
|||
|
more government programs, it becomes a threat to everyone.
|
|||
|
|
|||
|
|
|||
|
In short, the electronic fingerprinting scheme is a bad idea. It is an
|
|||
|
expensive solution to a problem of unknown (but most likely
|
|||
|
overstated) dimensions, which will have undetermined results, with
|
|||
|
potentially serious negative side-effects. The proposed AFIRM system
|
|||
|
is not focused, cheap, or safe enough to merit its social and
|
|||
|
financial cost. The system is simply a poor use of taxpayer
|
|||
|
money.
|
|||
|
|
|||
|
Again letters, faxes, and phone calls are important!
|
|||
|
|
|||
|
Jim Davis
|
|||
|
Western Region Director
|
|||
|
CPSR
|
|||
|
|
|||
|
Please repost where appropriate!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.55
|
|||
|
************************************
|
|||
|
|
|||
|
|