868 lines
36 KiB
Plaintext
868 lines
36 KiB
Plaintext
F I D O N E W S -- Vol.12 No.21 (22-May-1995)
|
||
+----------------------------+-----------------------------------------+
|
||
| A newsletter of the | ISSN 1198-4589 Published by: |
|
||
| FidoNet BBS community | "FidoNews" BBS |
|
||
| _ | +1-519-570-4176 |
|
||
| / \ | |
|
||
| /|oo \ | |
|
||
| (_| /_) | |
|
||
| _`@/_ \ _ | |
|
||
| | | \ \\ | Editors: |
|
||
| | (*) | \ )) | Sylvia Maxwell 1:221/194 |
|
||
| |__U__| / \// | Donald Tees 1:221/192 |
|
||
| _//|| _\ / | |
|
||
| (_/(_|(____/ | |
|
||
| (jm) | Newspapers should have no friends. |
|
||
| | -- JOSEPH PULITZER |
|
||
+----------------------------+-----------------------------------------+
|
||
| Submission address: editors 1:1/23 |
|
||
+----------------------------------------------------------------------+
|
||
| MORE addresses: |
|
||
| |
|
||
| submissions=> editor@exlibris.tdkcs.waterloo.on.ca |
|
||
| Don -- don@exlibris.tdkcs.waterloo.on.ca |
|
||
| Sylvia max@exlibris.tdkcs.waterloo.on.ca |
|
||
+----------------------------------------------------------------------+
|
||
| For information, copyrights, article submissions, |
|
||
| obtaining copies of fidonews or the internet gateway faq |
|
||
| please refer to the end of this file. |
|
||
+----------------------------------------------------------------------+
|
||
========================================================================
|
||
Table of Contents
|
||
========================================================================
|
||
|
||
1. Editorial..................................................... 1
|
||
2. Articles...................................................... 2
|
||
Downpour of Media Cliches Threatens To Flood Nation......... 2
|
||
InfoWarCon '95.............................................. 4
|
||
Dear Madam Emilia,.......................................... 14
|
||
Message Trackers!........................................... 14
|
||
3. Fidonews Information.......................................... 15
|
||
========================================================================
|
||
Editorial
|
||
========================================================================
|
||
FidoNews 12-21 Page: 2 22 May 1995
|
||
|
||
|
||
We seem to be into spring again, with the snooze being quite
|
||
slim as a result. It must be that fact that the students in
|
||
Fidonet all head off to summer jobs; we always have a dearth
|
||
of articles at this time of year.
|
||
|
||
Since there is little to fight about at the moment, here is
|
||
the snooze. ;<)
|
||
|
||
|
||
========================================================================
|
||
Articles
|
||
========================================================================
|
||
This one's been around before but just incase you missed it...
|
||
|
||
Downpour of Media Cliches Threatens To Flood Nation
|
||
By Jeff Cohen and Norman Solomon
|
||
Media Beat
|
||
|
||
We interrupt this newspaper for a special bulletin! A media flood
|
||
warning is now in effect for the entire United States.
|
||
|
||
A torrential January storm continues to dump large quantities of media
|
||
cliches on the American public. And the floodwaters are still rising.
|
||
|
||
But there's nothing natural about the current downpour of political
|
||
cliches. In recent years a lot of work has gone into seeding the
|
||
clouds. The new speaker of the House, Newt Gingrich, has described his
|
||
goal as "reshaping the entire nation through the news media."
|
||
|
||
You can assume that the media climate is backing up the sewers when the
|
||
same cliche appears on the covers of the country's two biggest news
|
||
weeklies. That's what happened with the Jan. 9 editions of Time
|
||
magazine ("Exclusive: How Gingrich plans to pull off his revolution")
|
||
and Newsweek ("Gingrich's Revolution").
|
||
|
||
Which brings us to the most popular -- and possibly weirdest -- media
|
||
cliche of the year so far:
|
||
|
||
"Revolution"
|
||
|
||
The news media can't seem to stop using the word "revolution" to
|
||
describe the activities of Gingrich and fellow Republicans. Our Nexis
|
||
computer search found that -- during the first 10 days of this year --
|
||
U.S. newspapers used "revolution" in over 270 articles while reporting
|
||
on Gingrich.
|
||
|
||
No longer able to utilize the worn-out description of Gingrich as a
|
||
"bomb-throwing backbencher," the news media now insist that he is
|
||
leading a "revolution."
|
||
|
||
If the Republicans are igniting a "revolution," it must be the first
|
||
one in world history aimed at giving the entrenched interests that run
|
||
the country still more entrenched power.
|
||
|
||
FidoNews 12-21 Page: 3 22 May 1995
|
||
|
||
Since when is it a "revolution" to make things even more cushy for the
|
||
wealthy and powerful, while making the rest of us even more vulnerable
|
||
to their prerogatives?
|
||
|
||
"Big government"
|
||
|
||
We keep being told that the Republicans are sworn foes of "big
|
||
government," determined to downsize and eliminate federal
|
||
bureaucracies. Our computerized search found references to Gingrich and
|
||
"big government" in 61 newspaper articles during the first 10 days of
|
||
January.
|
||
|
||
But news reports on "big government" virtually ignore the most costly
|
||
and wasteful federal bureaucracy -- the Defense Department -- spending
|
||
$270 billion this year on the military (almost as much as the amount
|
||
spent by the rest of the world combined). President Clinton has urged a
|
||
hefty increase, and the new GOP majority in Congress wants to hike the
|
||
department's budget even more.
|
||
|
||
A rarely mentioned fact is that the Pentagon purchases two-thirds of
|
||
the U.S. government's goods and services. And it issues 70 percent of
|
||
all federal paychecks.
|
||
|
||
But when was the last time you heard a media outlet mention the
|
||
Pentagon in a discussion of deplorable "big government"?
|
||
|
||
And when was the last time you saw a tough national news report on the
|
||
F-22 fighter jet, which moves forward even though the General
|
||
Accounting Office concluded that it is now unneeded and should be put
|
||
off? The jets are to be assembled by Lockheed, adjacent to Gingrich's
|
||
congressional district in Georgia.
|
||
|
||
"Middle class"
|
||
|
||
This one is an old standby, but it has gained renewed currency in
|
||
recent weeks as the Republican and Democratic parties battle to don the
|
||
mantle of champion for the "middle class." But who, precisely, is part
|
||
of the "middle class"?
|
||
|
||
To hear many politicians -- and journalists -- tell it, the "middle
|
||
class" is just about anyone who isn't below the official poverty line
|
||
and doesn't qualify as a millionaire.
|
||
|
||
Reporting from Southern California in 1993, under the headline "GOP
|
||
Blitz Against Budget Puts Democrats on Defensive", the New York Times
|
||
explained on its front page that President Clinton was not offering
|
||
much to "people earning more than $115,000, which is middle class in
|
||
this high-cost region." Six figures a year, and part of the beleaguered
|
||
middle class.
|
||
|
||
"Reform"
|
||
|
||
Of all the cosmetic buzzwords applied by American journalists and
|
||
pundits, none is more opaque than "reform." It means, simply, a
|
||
favorable gloss for any change of government policy in any direction --
|
||
FidoNews 12-21 Page: 4 22 May 1995
|
||
|
||
even if it involves the undoing of genuine reforms.
|
||
|
||
Our forecast for this political season calls for continued rhetorical
|
||
downpours, heavy at times, with only occasional periods of clarity.
|
||
|
||
But don't despair -- and don't worry about carrying a rhetoric-proof
|
||
umbrella. Once you decode the main cliches, the torrents of media
|
||
blather will roll off you like water off a duck's back.
|
||
|
||
--
|
||
if you want to destroy my sweater | Mason Loring Bliss
|
||
pull this thread as i walk away | Mac System Extension Hacker
|
||
watch me unravel, i'll soon be naked | mason@acheron.middleboro.ma.us
|
||
lying on the floor, i've come undone | 1:109/370.6 @ FidoNet
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
InfoWarCon '95
|
||
|
||
D I S T R I B U T E W I D E L Y
|
||
|
||
Here is the latest information about our upcoming Information Warfare
|
||
Conference;
|
||
please redistribute this information widely:
|
||
|
||
InfoWarCon '95
|
||
September 7-8, 1995
|
||
Stouffer Concourse Hotel
|
||
Arlington, VA
|
||
|
||
CONFERENCE OVERVIEW
|
||
|
||
The Information Warfare Conference (InfoWarCon 95) is our third
|
||
international conference dedicated to the exchange of ideas,
|
||
policies, tactics, weapons, methodologies and defensive posture
|
||
of Information Warfare on a local, national, and global basis.
|
||
|
||
InfoWarCon will bring together international experts from a broad
|
||
range of disciplines to discuss and integrate concepts in this
|
||
rapidly evolving field. Attendees will intensely interact with
|
||
the speakers and presenters as well as each other to increase each
|
||
other's understanding of the interrelatedness of the topics.
|
||
|
||
While there are many interpretations of Information Warfare by
|
||
different groups, the current working definition we employ is:
|
||
|
||
"Information Warfare is the use of information and information systems
|
||
as weapons in a conflict where information and information systems
|
||
are the targets".
|
||
|
||
Information Warfare is broken down into three categories, and
|
||
InfoWarCon speakers and attendees will interactively examine them all:
|
||
|
||
Class I: Personal Privacy. "In CyberSpace, You Are Guilty Until
|
||
Proven Innocent." The mass psychology of information. Privacy
|
||
FidoNews 12-21 Page: 5 22 May 1995
|
||
|
||
versus stability and law enforcement.
|
||
|
||
Class II: Industrial and Economic Espionage. Domestic and international
|
||
ramifications and postures in a globally networked, competitive society.
|
||
|
||
Class III: Global Information Warfare. Nation-state versus Nation-state
|
||
as an alternative to conventional warfare, the military perspective and
|
||
terrorism.
|
||
|
||
THE SPONSORS
|
||
|
||
National Computer Security Association
|
||
Winn Schwartau, Inter.Pact
|
||
Robert Steele, OPEN SOURCE SOLUTIONS, Inc.
|
||
|
||
THE CONFERENCE
|
||
|
||
The conference is designed to be interactive - with a healthy dialog
|
||
between all participants. The contents and discussions will all be
|
||
considered open source.
|
||
|
||
- What is Information Warfare?
|
||
- What Are the Targets?
|
||
- Protecting the Global Financial Infrastructure
|
||
- Military Perspectives on InfoWar
|
||
- InfoWar Vs. Non-Lethal Warfare
|
||
- Defending the U.S. Infrastructure
|
||
- The Intelligence Community and Information
|
||
- Open Source Intelligence
|
||
- The Psychology of Information
|
||
- Privacy Balances
|
||
- Information As the Competitive Edge
|
||
- International Cooperation
|
||
- Denial of Service
|
||
- Cyber-Terrorism
|
||
- Offensive Terrorism
|
||
- Offensive InfoWar Techniques
|
||
- Defensive InfoWar Postures
|
||
- Education and Awareness Training
|
||
- Corporate Policy
|
||
- Government Policy
|
||
- Global Policy
|
||
- Espionage
|
||
- Export Controls of Information Flow
|
||
- The Legal Perspective
|
||
- The New Information Warriors
|
||
|
||
Plenary sessions will accommodate all attendees, while the three
|
||
break-out session rooms will provide for more intimate presentations
|
||
and interactivity on topics of specific interests.
|
||
|
||
* * * * * * * Tentative Agenda * * * * * * *
|
||
|
||
Preliminary Schedule (Rev. 4; May 14, 1995)
|
||
|
||
FidoNews 12-21 Page: 6 22 May 1995
|
||
|
||
DAY I: Thursday, September 7, 1995
|
||
|
||
7:00 - 7:45 Continental Breakfast
|
||
|
||
7:45 - 8:00 Introductory Remarks:
|
||
- Peter Tippett, NCSA
|
||
- Robert Steele, OSS
|
||
- Winn Schwartau, Interpact
|
||
|
||
8:00 - 8:30 Keynote Address (TBD)
|
||
|
||
Morning Plenaries
|
||
|
||
"What Is Information Warfare?"
|
||
|
||
There is no consensus as to what Information Warfare means; everyone
|
||
has a different definition and application which often suits specific
|
||
agendas. The morning sessions are to provide attendees with a current
|
||
review of what Information Warfare means to different people.
|
||
|
||
8:30 - 9:30 "The Government Perspective"
|
||
|
||
How do the various military services see Information Warfare as
|
||
fitting within their needs and mission? Moving information rapidly
|
||
and efficiently to the modern soldier provides key battlefield
|
||
advantage. How does lethal versus non-lethal warfare fit into their
|
||
models?
|
||
|
||
9:30 - 10:30 "The Commercial View"
|
||
|
||
The commercial sector sees Information Warfare from a different
|
||
perspective. Business survival is top on the list. How do private
|
||
sector leaders view Information Warfare from both a defensive and
|
||
offensive standpoint? Government attendees will be especially
|
||
interested in this session.
|
||
|
||
10:30 - 11:00 Morning Coffee Break
|
||
|
||
11:00 - 12:00 Breakout Sessions I
|
||
|
||
Class I "Anti-Privacy Technology"
|
||
|
||
This will be a hands-on demonstration of how to breach personal privacy,
|
||
|
||
bug and eavesdrop on individuals and corporations. Attendees will see
|
||
how easy it is to violate privacy, and how hard it is to detect such
|
||
violations.
|
||
|
||
Class II: "Industrial and Economic Espionage - An Update"
|
||
|
||
What's new in the world or private spying? Front line experts will
|
||
what's better and what's worse. Who's spying on whom? What are they
|
||
looking for? What are their techniques and tools? What can you do
|
||
to protect your organization from being a victim?
|
||
|
||
FidoNews 12-21 Page: 7 22 May 1995
|
||
|
||
Moderator: Jim Settle
|
||
Former head of Natl. Computer Crime Squad, FBI
|
||
|
||
- Larry Watson, DECA, FBI
|
||
|
||
Class III "Magnetic Weapon Systems: Risks and Defenses"
|
||
|
||
The first half will present an overview of the risks of HERF Guns,
|
||
EMP/T Bombs and Magnetic Pulse Cannons (MPC). The attendee will
|
||
learn how easy they are to build, and why increasingly sophisticated
|
||
magnetic weapons will become a choice weapon for terrorists. The
|
||
second half will describe fundamental approaches to defensive postures
|
||
against such Class 3 Denial of Service Assaults.
|
||
- Winn Schwartau, Interpact, Inc.
|
||
- Don White, EMC
|
||
|
||
12:00 - 13:30 Working Lunch
|
||
|
||
Luncheon Speech 12:30 - 13:00 (TBD)
|
||
|
||
13:30 - 14:30 Breakout Sessions I
|
||
|
||
Class I "Well Managed Propaganda"
|
||
|
||
The media is a powerful filter by which citizens and the government
|
||
collect most of their information. Was the media a puppet of the US
|
||
in the Gulf War? Does aggressive PR makes media policy? How can the
|
||
media be used, or protect itself from being used? What do journalists
|
||
have to say about their apparent control over what people hear and see?
|
||
|
||
Moderated by: Neil Munro, Senior Editor, Washington Technology
|
||
|
||
Class II "Should the US Spy on the World?"
|
||
|
||
The US has been the target of economic and indutrial espionage by
|
||
military allies and 'friendly' competitors such as France, Japan,
|
||
Korea, Israel, Germany, Taiwan among others. With an estimated
|
||
intelligence budget of $30 Billion and arguably the most proliferate
|
||
and advanced technologies, should we turn our spying 'eyes' on our
|
||
global neighbors for the benefit of American economic security? Or,
|
||
are Mom and Apple Pie Americans above that?
|
||
|
||
Class III "Practicing Defensive Information Warfare"
|
||
Military lessons for the private sector
|
||
|
||
This exciting session will show 'real time' security testing with an
|
||
active Internet connection. The military has developed an arsonal of
|
||
tools for penetration and monitoring and alerting users about
|
||
intrusions. Commercial attendees will learn what life is like without
|
||
these mechanisms, and how much more secure they can be with them -
|
||
with a low increase in overhead. What steps are required to build a
|
||
defensive posture, and just how much defense is enough?
|
||
|
||
14:30 - 15:00 Afternoon Coffee Break
|
||
|
||
FidoNews 12-21 Page: 8 22 May 1995
|
||
|
||
Afternoon Plenaries
|
||
|
||
15:00 - 15:30 "Denial of Service on Information Systems"
|
||
|
||
Confidentiality Availability and Integrity, two of the three
|
||
pinions of security have been technically solved with advanced
|
||
encryption techniques. The third aspect, Availability remains
|
||
unsolved because of daunting technical problems. What do DOS
|
||
attacks look like? From the Civil-Cyber Disobedience to Accidental
|
||
Acts God or Man, a failure of key system components can trigger a
|
||
domino-like chain of collapses. This sessions examines the
|
||
vulnerability of current US infrastructures and the application
|
||
such techniques in offensive military applications.
|
||
|
||
15:30 - 16:00 "Terrorism and Counter-Terrorism"
|
||
|
||
Terrorist attacks against the US are now occurring on our home ground.
|
||
What can the modern terrorist do which will meet his goals of sowing
|
||
fear and distrust? Key infrastructures such as power grids,
|
||
communications and transportation systems are attractive targets for
|
||
the terrorist minded Information Warrior. What are we doing in planned
|
||
response?
|
||
|
||
16:00-17:00 "What Is the Role of Government in defending National
|
||
|
||
Economies?"
|
||
|
||
As evolving global conditions shift competitive value from military
|
||
might to economic advantage, how should we redefine national security?
|
||
The threats to the private sector increase and become more likely
|
||
targets in information warfare of all three classes. What is, and what
|
||
should the role of the military be in defending US interests both
|
||
domestically and abroad? This session will provide plenty of time for
|
||
audience involvement.
|
||
|
||
17:00 - 19:00 Cocktail Reception
|
||
|
||
Most speakers will be available for more intimate groups chats,and
|
||
authors will be available to sign books. Great opportunity to pursue
|
||
those ideas with people from different disciplines.
|
||
|
||
19:00 - 21:00 Birds of a Feather Dinners
|
||
|
||
"Dutch" dinners give attendees the chance to dig into more and more
|
||
depth in areas of their particular interest.
|
||
|
||
* * * * *
|
||
|
||
DAY II: Friday, September 8, 1995
|
||
|
||
7:00 - 8:00 Continental Breakfast
|
||
|
||
8:00 - 8:30 Keynote II (TBD)
|
||
|
||
8:30 - 9:00 "Defending the Financial Infrastructure"
|
||
FidoNews 12-21 Page: 9 22 May 1995
|
||
|
||
|
||
Not only the US is concerned. The world's financial infrastructure are
|
||
inextricably linked. If one portion is hurt, the rippling effect is
|
||
immediate. Trillions and trillions of dollars are trade every day.
|
||
What can Information Warriors do to the global spider-web of electronic
|
||
money, and what defenses are in place?
|
||
|
||
9:00 - 9:30 "PsyOps"
|
||
|
||
The military and intelligence community have practiced Psychological
|
||
Operations against adversaries for decades. How is this done, and how
|
||
well does it work? Does PsyOps also have a place in commercial
|
||
ventures?
|
||
|
||
9:30 - 10:00 "CORE WARS:
|
||
Practicing Information Warfare in Cyberspace"
|
||
|
||
The Core War was invented by A.K. Dewdney from the University of
|
||
Western Ontario, Canada. As fought today on the Internet, Core Wars
|
||
represent the purest intellectual tests of pure strategy, tactics and
|
||
capability. Battalions of software programs must genetically breed
|
||
themselves for combat knowing that they will go up against fierce
|
||
competition. Video examples will be used to portray how Core Wars is
|
||
a working model for Information Warriors on the front lines.
|
||
Chair:
|
||
Stuart Rosenberg, University of Cologne, Germany
|
||
Jo Seiler, University of Cologne, Germany
|
||
|
||
10:00 - 10:30 "Security By Obscurity: Point-Counterpoint"
|
||
|
||
Should the threats and details of potential vulnerabilities and actual
|
||
events be guarded under the shrouds of official government secrecy or
|
||
corporate policy of denial? Or is open disclosure the best route for
|
||
education, awareness and defense? How can one defend against the
|
||
unknown? Strong arguments exist for all views.
|
||
|
||
10:30 - 11:00 Morning Coffee Break
|
||
|
||
11:00 - 12:00 Breakout Sessions I
|
||
|
||
Class I "An Electronic Bill of Rights"
|
||
Defining Privacy In Cyberspace
|
||
|
||
How do we as a nation balance the privacy rights of the individual
|
||
against the legitimate needs of the state, and in sync with the
|
||
policies of our global trading partners? The views from three
|
||
differing positions will stimulate a healthy audience-panelist
|
||
dialogue.
|
||
|
||
Moderated by: Andrew Grosso, Former Asst. US Attorney
|
||
Scott Charney, DOJ Computer Crime Unit
|
||
|
||
Class II: "The 'Third Wave' Approach to Managing
|
||
Information Warfare: Building a Commercial War
|
||
Room"
|
||
FidoNews 12-21 Page: 10 22 May 1995
|
||
|
||
|
||
Maximizing the flow and control of informations key to competitiveness-
|
||
|
||
whether it be on the battlefield or in the marketplace. An innovative
|
||
tool and approach to planning and managing information in these very
|
||
intense, time-sensitive environment is the advent of "war rooms."
|
||
These are dynamic facilities which are optimized to channel the
|
||
collection, analysis and dissemination of information. 'War rooms'
|
||
can be static or field-portable and vary in ergonomic layout and
|
||
technical capability.
|
||
|
||
This session will provide case studies on the use of war rooms in
|
||
government and industry. State of the art automated war rooms will be
|
||
described which feature the projection of computer-generated
|
||
information.
|
||
|
||
Tools and practices for knowledge discovery, processing and
|
||
dissemination will help you understand how you go about planning and
|
||
building a competitive intelligence War Room?
|
||
Chair: Steve Shakar, KnowledgeBASE, Inc.
|
||
Panel: Mark Gembecki, Technology and Security Oversight
|
||
Consultant, US Dept of State
|
||
Robert Beckman, Alta Analytics, Inc.
|
||
|
||
Class III "International Cooperation"
|
||
|
||
All countries have an interest in stability, but rising nationalism
|
||
often transcends the greater good. While most countries are becoming
|
||
militarily allied, we all remain competitively aggressive. 25% of
|
||
the world's population control 75% of the wealth (The Haves) while
|
||
nearly 4 billion people share the remaining 25% (The Have-Nots). Where
|
||
is the balance, and at what point does Information Warfare become
|
||
openly hostile? In an electronically border-less world, how do we
|
||
collectively avoid getting to that point?
|
||
|
||
12:00 - 13:30 Working Lunch
|
||
|
||
12:30 - 13:00 Luncheon Speech
|
||
|
||
What are the organizing principles for information security and the
|
||
design basis of information systems and networks? The DII is
|
||
mandated to provide information services to the war-fighter. The
|
||
NII initiative is enhancing the economic posture of the US. The
|
||
infrastructures are inter-related and the loss of either
|
||
capability could have devastating effect on the economy and
|
||
security of the United States. The GII will necessarily find
|
||
similar challenges where all nations must develop a viable means
|
||
of cooperation. This presentation outlines high level approaches
|
||
to successful implementation.
|
||
|
||
13:30 - 14:30 Breakout Sessions
|
||
|
||
Class I "The Legal Consequences:
|
||
The Lawyers Are Coming, The Lawyers Are Coming."
|
||
|
||
FidoNews 12-21 Page: 11 22 May 1995
|
||
|
||
What are the legal rights of Cyber-citizens in the US and how do those
|
||
relate to the laws in other countries? What is the real criminal and
|
||
civil recourse and remedies to combat industrial espionage? How do we
|
||
legally handle non-physically violent attacks against the interest of
|
||
the US on our own soil or overseas? Get the views of the experts.
|
||
|
||
Moderated by: Daniel Kuehl, PhD, Professor
|
||
National Defense University
|
||
Scott Charney, DOJ Computer Crime Unit
|
||
|
||
Class II "Defending Against the Internet"
|
||
|
||
The chaotic ravages of the Internet constantly knock at the doors of
|
||
anyone or any company is connected. What do you have to do to protect
|
||
your information resources? What have others done? Is it enough and
|
||
what does the future bode?
|
||
Chair: Kermit Beseke, President, Secure Computing Corp.
|
||
John Nagengast, NSA, Deputy Chief of Network Security
|
||
|
||
Class III "The First Information War"
|
||
|
||
The military is attempting to build a global network where intelligence
|
||
information from the field is fed back to a War Room, analyzed,
|
||
decisions made, and then instructions sent back to the theater: almost
|
||
in real time. How well does this work, and how far from reality is the
|
||
Pentagon's dream?
|
||
Chair: Mich Kabay, Ph.D., NCSA
|
||
Alan D. Campen, Col. USAF (Ret.)
|
||
Author, "The First Information War."
|
||
Former Director of Command and Control Policy
|
||
to the Undersectrary of Defense.
|
||
|
||
14:30-15:00 Afternoon Coffee Break
|
||
|
||
15:00 - 15:30 "Who Are The Information Warriors?"
|
||
|
||
Who are the bad guys? Who has the capability and the motivation to
|
||
wage any of the Three Classes of Information Warfare? It's time to
|
||
name names.
|
||
|
||
15:30 - 16:00 "Hackers: National Resources or Criminal Kids "
|
||
DEBATE
|
||
|
||
Germany uses professional hackers for their domestic industrial and
|
||
economic advantage. What about the US? The kindest words ever uttered
|
||
by Mich Kabay, Ph.D., about hackers is, "Amoral, sociopathic scum."
|
||
Robert Steele, President of Open Source Solutions, Inc. sees them as
|
||
national
|
||
resources, to be cultivated as a tool for US economic security. Do they
|
||
have a value in the protection of the US infrastructure, or can their
|
||
specific expertise be found elsewhere? After short opening statements,
|
||
the audience will be encourage to ask provocative questions.
|
||
|
||
Robert Steele, President, OPEN SOURCE SOLUTIONS, Inc.
|
||
Mich Kabay, Ph.D. NCSA Dir of Education
|
||
FidoNews 12-21 Page: 12 22 May 1995
|
||
|
||
|
||
16:00 - 17:00 "The Future of Information Warfare"
|
||
|
||
Where do we go from here? After two intensive days of interaction,
|
||
learning and listening, what's the next step? What do industry and
|
||
the government have to do to better understand each other? What steps
|
||
can each take to improve individual, corporate and national defensive
|
||
postures?
|
||
|
||
Chair: National Defense University
|
||
|
||
17:00 - 17:15 Closing remarks
|
||
- Peter Tippett
|
||
- Robert Steele
|
||
- Winn Schwartau
|
||
|
||
17:15 - 19:00 No host reception.
|
||
|
||
-==========================-
|
||
|
||
Hotel Information:
|
||
|
||
Stouffer Concourse Hotel (Crystal City)
|
||
2399 Jefferson Davis Highway
|
||
Arlington, VA 22202
|
||
|
||
703-418-6800
|
||
|
||
-============================-
|
||
|
||
Conference Fees:
|
||
|
||
$495.00/445.00 - NCSA Members/OSS Attendees
|
||
|
||
$595.00/545.00 - All others
|
||
|
||
($50.00 discount available if payment is received by July 1, 1995)
|
||
|
||
-============================-
|
||
|
||
InfoWarCon '95 Registration Form:
|
||
|
||
Name: ___________________________________________________________
|
||
|
||
Title: ___________________________________________________________
|
||
|
||
Org: ___________________________________________________________
|
||
|
||
Address: ___________________________________________________________
|
||
|
||
Address: ___________________________________________________________
|
||
|
||
City: ___________________________________________________________
|
||
|
||
State: _______________________________ Zip: _____________________
|
||
FidoNews 12-21 Page: 13 22 May 1995
|
||
|
||
|
||
Country: __________________________ Email: ________________________
|
||
|
||
Phone: __________________________ Fax: _________________________
|
||
|
||
FEES:
|
||
|
||
Payment made BEFORE July 1, 1995:
|
||
|
||
( ) $445.00 NCSA Members/OSS Attendees
|
||
( ) $545.00 All others
|
||
|
||
Payment made AFTER July 1, 1995:
|
||
|
||
( ) $495.00 NCSA Members/OSS Attendees
|
||
( ) $595.00 All others
|
||
|
||
Make checks payable to NCSA, or
|
||
|
||
Charge to: ( ) VISA ( ) MasterCard AMEX ( )
|
||
|
||
Number: ___________________________________________
|
||
|
||
Exp date: ___________________________
|
||
|
||
Signature: ___________________________________________
|
||
|
||
MAIL OR FAX REGISTRATION TO:
|
||
|
||
National Computer Security Association
|
||
10 South Courthouse Avenue
|
||
Carlisle, PA 17013
|
||
Phone 717-258-1816 or FAX 717-243-8642
|
||
|
||
EMAIL: 74774.1326@compuserve.com
|
||
CompuServe: GO NCSAFORUM
|
||
|
||
Winn Schwartau Interpact, Inc.
|
||
Information Security & Warfare
|
||
V:813.393.6600 F:813.393.6361
|
||
Email: Winn@Infowar.Com
|
||
|
||
PGP Key(2.3a & 2.6) Available on key servers.Voice (AT&T) 0-700-TANGENT
|
||
F CON mailing list, mail: majordomo@fc.net with "subscribe dc-announce"
|
||
in the body. DEF CON FTP: ftp.fc.net /pub/defcon http://www.defcon.org
|
||
FidoNews 12-21 Page: 14 22 May 1995
|
||
|
||
|
||
Dear Madam Emilia,
|
||
|
||
i was wondering if the electronic medium will provide a similar boon
|
||
to the power of the individual as did the printing press? For
|
||
example, it is now possible to become relatively famous within
|
||
electronic culture by merely having somethings noteworthy to say,
|
||
and access to minimal hardware. In e-space, imagination is more
|
||
influential than money. Grapevine culture has more tendrils than
|
||
the old boys' network has bucks. ? . Would you vote for someone
|
||
whom you have never seen on television or in conglommerate
|
||
newspapers to be president/prime minister/prima donna?
|
||
|
||
Yes.
|
||
|
||
Is there already an agreed upon quasi-standard for the interactivity
|
||
of web pages? It would be nice if that realm were more human. If
|
||
there were such a standard then sysadmins would have fewer headaches,
|
||
but what if it all becomes like a huge mail-order catalogue instead
|
||
of cosy wonderplay?
|
||
|
||
Humph. windoze for e-mail.
|
||
|
||
[while being in a sad and frazzled state, one might mention
|
||
that the Rev. Visage has completely disappeared, much to the
|
||
alarm and anxiety of his addicted fans]
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Message Trackers!
|
||
By Carl Morris (1:285/302)
|
||
|
||
For more than the umpteenth time I have received mail marked
|
||
"The following message was flagged as undeliverable at
|
||
1:260/1@fidonet. > 1:260/447 .... Address unknown". These
|
||
messages are created by Message Trackers. In most cases Message
|
||
Trackers are software by the same name that checks the current
|
||
nodelist (at the site of the tracker mind you) and returns any
|
||
mail for addresses not in the nodelist.
|
||
|
||
While it may be usefull that the sender gets an acknowlegdement
|
||
that the address doesn't exist, its just short of pissing me
|
||
off! Appearently my Regional runs Message Tracker. Anything I
|
||
send to knew nodes or ones about to die often gets returned with
|
||
the above message. I do not feel it is the regional's
|
||
responsibility. I usually am just beating the nodelist by a
|
||
single day. In some instances I have started to wonder if the
|
||
regional updated his nodelist .... I would stronger like
|
||
messages to get clear to the host or hub of these questionable
|
||
nodes before my message is returned. It might be nice to know
|
||
when the posibility of not getting a reply is likely, but it
|
||
many cases Message Trackers are just wasting the dime to send me
|
||
back my message.
|
||
|
||
In some instances, Nets and Regionals are using Message Trackers
|
||
FidoNews 12-21 Page: 15 22 May 1995
|
||
|
||
to return Netmails that are to nodes in their location that are
|
||
not on their CPR! Since when in hell has a node been required
|
||
to take part in a CPR of an entire region to receive routed
|
||
netmail! I will not stand for this. The regional or network
|
||
host spent twice as much money to handle my message because he
|
||
was so arrogant as to return it! Who do we have as regionals
|
||
and network hosts!?
|
||
|
||
As I can nolonger call LD, I must route EVERYTHING, even this
|
||
submission has been routed (and probably returned ;).
|
||
|
||
I noticed in the recent FIDOSTAT that someone has created some
|
||
"REMOVE_??????" echoes. If these people are the same ones who
|
||
are using Message trackers for CPR purposes, I strongly suggest
|
||
they be thrown out and replacements elected.
|
||
|
||
Until next time, they'll just continue to return my messages!
|
||
Carl Morris
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
========================================================================
|
||
Fidonews Information
|
||
========================================================================
|
||
|
||
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
|
||
|
||
Editors: Donald Tees, Sylvia Maxwell
|
||
Editors Emeritii: Thom Henderson, Dale Lovell,
|
||
Vince Perriello, Tim Pozar
|
||
Tom Jennings
|
||
"FidoNews" BBS
|
||
FidoNet 1:1/23
|
||
BBS +1-519-570-4176, 300/1200/2400/14400/V.32bis/HST(DS)
|
||
|
||
more addresses:
|
||
Don -- 1:221/192, don@exlibris.tdkcs.waterloo.on.ca
|
||
Sylvia- 1:221/194, max@exlibris.tdkcs.waterloo.on.ca
|
||
|
||
(Postal Service mailing address)
|
||
FidoNews
|
||
128 Church St.
|
||
Kitchener, Ontario
|
||
Canada
|
||
N2H 2S4
|
||
|
||
voice: (519) 570-3137
|
||
|
||
Fidonews is published weekly by and for the members of the FIDONET
|
||
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
|
||
of individual articles contributed by their authors or their
|
||
authorized agents. The contribution of articles to this compilation
|
||
does not diminish the rights of the authors. Opinions expressed in
|
||
these articles are those of the authors and not necessarily those of
|
||
FidoNews.
|
||
FidoNews 12-21 Page: 16 22 May 1995
|
||
|
||
|
||
Authors retain copyright on individual works; otherwise FidoNews is
|
||
Copyright 1995 Donald Tees. All rights reserved. Duplication
|
||
and/or distribution permitted for noncommercial purposes only. For use
|
||
in other circumstances, please contact the original authors, or the eds.
|
||
|
||
OBTAINING COPIES: The most recent issue of FidoNews in electronic
|
||
form may be obtained from the FidoNews BBS via manual download or
|
||
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
|
||
PRINTED COPIES may be obtained by sending SASE to the above paper-mail
|
||
address.
|
||
|
||
INTERNET USERS: FidoNews is available via FTP from ftp.fidonet.org,
|
||
in directory ~ftp/pub/fidonet/fidonews.
|
||
|
||
Anyone interested in getting a copy of the INTERNET GATEWAY FAQ may
|
||
freq GISFAQ.ZIP from 1:133/411.0, or send an internet message to
|
||
fidofaq@gisatl.fidonet.org. No message or text or subject is
|
||
necessary. The address is a keyword that will trigger the automated
|
||
response. People wishing to send inquiries directly to David Deitch
|
||
should now mail to fidonet@gisatl.fidonet.org rather than the
|
||
previously listed address.
|
||
|
||
SUBMISSIONS: You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission requirements are contained in the file
|
||
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
|
||
from 1:1/23 as file "ARTSPEC.DOC". Please read it.
|
||
|
||
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
||
trademarks of Tom Jennings, and are used with permission.
|
||
|
||
"the pulse of the cursor is the heartbeat of fidonet"...
|
||
-- END
|
||
----------------------------------------------------------------------
|
||
|