308 lines
13 KiB
Plaintext
308 lines
13 KiB
Plaintext
THIS IS COMSEC BULLETIN #1, FEBRUARY 17, 1990. FOR FURTHER
|
||
INFORMATION, CONTACT THE COMSEC BBS (202) 334-1304 OR CALL OUR
|
||
OFFICE AT (301) 670-0512 AND LEAVE A MESSAGE.
|
||
|
||
About the Bulletin
|
||
|
||
The COMSEC Bulletin is published to provide a means of informing
|
||
COMSEC Association members of the business of the association. It
|
||
is published on a random basis with news that can affect members.
|
||
Please note, the 'COMSEC Journal', which will be the association's
|
||
premier publication, will be published quarterly and should not be
|
||
confused with the bulletin.
|
||
|
||
The association wants to thank all of our members for their
|
||
patience during the associations transition. We hope that you will
|
||
be satisfied with your membership in the coming year.
|
||
|
||
|
||
What's Inside
|
||
|
||
- Surveillance Expo '89
|
||
- Annual COMSEC membership meeting
|
||
- Using a Spectrum Analyzer
|
||
- Audio Tapes Available
|
||
- Washington DC COMSEC Chapter News
|
||
- S&L's Phone Bugged
|
||
- Membership Certificates and Cards
|
||
- Advertising
|
||
- TECHNET Data Systems - First COMSEC Corporate Sponsor
|
||
- Call to all writers
|
||
- Competitive Intelligence
|
||
- Hacker enters GRUMMAN Corp computer
|
||
|
||
|
||
|
||
Surveillance EXPO '89
|
||
|
||
For those of our members who weren't able to make it to
|
||
Surveillance Expo '89 we missed you. Needless to say the Expo was a
|
||
rousing success with exhibitors and speakers that represented the
|
||
entire spectrum of the security field. The Association is glad to
|
||
have been one of the cornerstones that made this years Expo happen
|
||
and we have already begun making preparations for the next Expo to
|
||
be held 28-30 November, 1990. Mark that date on your calendars and
|
||
plan to attend.
|
||
|
||
|
||
|
||
Annual COMSEC Membership Meeting
|
||
|
||
The annual COMSEC membership meeting was held on December 13, 1989
|
||
following the last Expo seminar of the day. Although participation
|
||
could have been better , a majority of the board of the directors
|
||
were present enabling us to make decisions that will affect the
|
||
association for the following year.
|
||
|
||
A number of topics were covered that all of the association members
|
||
should be aware of. For those of you who were unable to attend they
|
||
will be covered briefly.
|
||
|
||
The first topic that was covered was membership goals for the
|
||
coming year. Currently the association has a small but growing
|
||
number of members. In order to provide reasonable membership
|
||
benefits, cover the associations overhead and increase the name
|
||
recognition of the association we have to increase the number of
|
||
members that the association has. A number of ideas were floored
|
||
that may help. It was first suggested that we limit our recruitment
|
||
of new members to the Washington, DC area. Its a matter of simple
|
||
logistics.
|
||
|
||
Since a large portion of our members reside in the DC area and the
|
||
national chapter has its offices in the area the recruitment of new
|
||
members can be closely monitored. However this means that members
|
||
outside of the DC area would suffer. Because of this the board
|
||
decided that a 75/25% split of effort would be used to recruit new
|
||
members with the majority of effort occurring in the Washington
|
||
area.
|
||
|
||
The next topic covered was the formation of local chapters. The
|
||
Association is proud to note that the first local chapter has been
|
||
established in the Washington area. The local chapter president is
|
||
Mike Brumbaugh (phone 703-739-8313) and he has some interesting
|
||
ideas. The first meeting of the Washington chapter will be in the
|
||
month of April. If you are interested in attending please give him
|
||
a call.
|
||
|
||
The discussion covered then covered the possibility of starting
|
||
other local chapters. A number of inquiries have been made but
|
||
other than this there has been no progress. The major problem is
|
||
finding individuals that are motivated enough to start a chapter.
|
||
Its a difficult task and it takes a special kind of person to
|
||
undertake the responsibilities and headaches associated with
|
||
forming a local chapter. Because of the responsibilities associated
|
||
with starting a local chapter it was decided that each local
|
||
chapter president would also automatically become a member of the
|
||
board of directors and would not be affected by the rule that board
|
||
members cannot miss more than two consecutive board meetings.
|
||
|
||
It was also decided that the minimum number of people required to
|
||
start a local chapter would be increased from 5 to 10. It was felt
|
||
that the more people involved in the initial formation of the local
|
||
chapter the better the chances of success.
|
||
|
||
Another topic discussed was the possibility of the COMSEC
|
||
association joining forces with the National Computer Security
|
||
Association. The Board of Directors and the director of NCSA
|
||
believe that both organizations would profit from a merging of
|
||
resources. The board plans on discussing this option further during
|
||
the first meeting of FY90. This meeting will be held the 3rd
|
||
Saturday of January. Subsequent board meetings will be held the 3rd
|
||
Saturday of the first month of a calendar quarter: January, April,
|
||
July and October.
|
||
|
||
The final item of discussion was the status of the COMSEC Journal.
|
||
The journal will be the cornerstone of the association and will
|
||
provide timely articles of interest to all members of the
|
||
association. Currently a number of articles are in the works for
|
||
the March issue. These articles include Telecommunication network
|
||
security problems and a story about a hacker who broke into a major
|
||
telecommunications network. There might be an article on STU III if
|
||
we can get it in time for publication. The association has also
|
||
approached a number of companies to inquire if they might be
|
||
interested in submitting articles for publication.
|
||
|
||
Finally, the association is attempting to compile a listing of
|
||
companies/ individuals involved in providing specialized security
|
||
services. One of the concerns is how to provide a listing that
|
||
holds some credibility. Members suggestions are welcomed and will
|
||
be provided to the board of directors for consideration.
|
||
|
||
Possibilities include a certification or training program.
|
||
|
||
Overall the annual meeting was a success and the next meeting will
|
||
even be better. Plan on being there.
|
||
|
||
|
||
|
||
Using a Spectrum Analyzer
|
||
|
||
The association received an interesting call a few weeks ago from
|
||
someone who was attempting to use a spectrum analyzer to locate an
|
||
clandestine listening device.
|
||
|
||
The problem with any specialized piece of equipment is that the
|
||
user must be aware of the limitations of the equipment that they
|
||
are using and also apply a little thought to how to systematically
|
||
locate a transmitter once there is a positive indication that it
|
||
exists.
|
||
|
||
In this particular case a spectrum analyzer with a audio speaker
|
||
must be utilized. Without a speaker the operator of the analyzer
|
||
cannot tell whether they are looking at a signal that is caused by
|
||
RF interference, a genuine signal put out by commercial transmitter
|
||
or a clandestine transmitter that is located in the room or
|
||
building.
|
||
|
||
Remember, in this particular instance we are discussing only one of
|
||
many means that some type of device may be utilized to listen to a
|
||
conversation in a room.
|
||
|
||
First, place a sound source in the room you are checking. Your
|
||
analyzer should also be located nearby since most transmitters of
|
||
this type have a limited range. You should then go slowly through
|
||
the frequency range to locate a signal source transmitting the same
|
||
audio that the sound source is transmitting. If you should find
|
||
that there is a transmitter located nearby, the sound source can be
|
||
moved in the room to see where it is best picked up by the
|
||
transmitter. At this point a physical search would have to be done.
|
||
|
||
|
||
|
||
|
||
Audio Tapes Available
|
||
|
||
Audio tapes of all the seminars given at EXPO 89' are available to
|
||
COMSEC members. They can be obtained by contacting:
|
||
Audio Archives International
|
||
3043 Foothill Blvd
|
||
Suite #2
|
||
Crescenta, CA 91214
|
||
|
||
|
||
|
||
Washington DC COMSEC Chapter News
|
||
|
||
The first meeting of the DC chapter will be April 1990. Mike
|
||
Brumbaugh is looking for help in setting up a successful chapter
|
||
and meeting. If you are interested in helping him, mike can be
|
||
reached at 703-739-8313. Mike said that details of the first
|
||
meeting will be sent to members as they become available.
|
||
|
||
|
||
|
||
S & L'S Phone Bugged
|
||
|
||
The Washington Post noted in a recent article that the phone used
|
||
by California state S&L examiners had been bugged. The phone, which
|
||
was supposed to be a private line, had been tampered with so the
|
||
investigators calls could be monitored from other phones in the
|
||
building. (Editors note: I'm not sure bugged is the correct word,
|
||
jury rigged sounds more like it. Besides who, in their right mind
|
||
would pass sensitive information of any type in the same building
|
||
they are working in.) Private Investigators were called in to track
|
||
down were the calls were being monitored from but were unable to
|
||
because the key to the phone room could not be found! When they
|
||
returned two days later the phone lines had been returned to
|
||
normal. The bugged phone was cited as one of the ways that Lincoln
|
||
Savings & Loan attempted to frustrate regulators.
|
||
|
||
|
||
|
||
Hacker, Age 15, Enters GRUMMAN Corporation Computer System
|
||
|
||
A youth from Levittown, New York gained access to the computer that
|
||
Grumman uses to handle military customers including the Pentagon.
|
||
|
||
Grumman stated that all the material that the youth had gained
|
||
access to was recovered and he was caught because Grumman's own
|
||
computers detected his illegal entry into the system.
|
||
|
||
|
||
|
||
Membership Certificates and Cards
|
||
|
||
Membership certificates and cards will be sent to all members in
|
||
the months of January and February. The association wants to
|
||
apologize to all our members for the delay. For those of you that
|
||
received the membership cards with a expiration date of 1-1-90, you
|
||
may send them back and we'll send you a new one with a correct
|
||
date.
|
||
|
||
|
||
|
||
Advertising
|
||
|
||
Both the COMSEC BULLETIN and the COMSEC JOURNAL will accept paid
|
||
advertising. This will allow both publications to increase their
|
||
scope and provide even more pages per issue. If you are interested
|
||
in placing any type of advertising in either publication contact
|
||
the COMSEC Association at 301-670-0512.
|
||
|
||
|
||
|
||
TECHNET DATA SYSTEMS - First COMSEC Corporate Sponsor
|
||
|
||
Technet Data Systems has become the COMSEC Associations first
|
||
corporate sponsor. Technet is a small corporation that provides
|
||
computer services ranging from installation of small and large
|
||
systems to troubleshooting existing systems. Located in the
|
||
Washington, DC area the have provided a wide range of services to
|
||
large and small corporations. TECHNET also will custom build a
|
||
system to fit in your price range.
|
||
|
||
They can be reached at 703-471-8714 or by writing :
|
||
44901 Falcon Place
|
||
Suite 110
|
||
Sterling, VA 22170
|
||
|
||
|
||
|
||
Call To Writers
|
||
|
||
COMSEC members, you can now enhance your professional prestige and
|
||
even give your company a plug by authoring a article for
|
||
publication in the COMSEC JOURNAL. The association is seeking
|
||
individuals who can speak authoritatively on different aspects of
|
||
the security field and wish to become involved. If you are one of
|
||
those professionals with a knack for writing let the association
|
||
know.
|
||
|
||
|
||
|
||
Competitive Intelligence
|
||
|
||
For those of us who believe that corporate spying has gone the way
|
||
of the EDSEL, think again. Todays term of competitive intelligence
|
||
may sound nicer but major corporations still spend large sums to
|
||
stay one step ahead of their competition.
|
||
|
||
Most companies simply employ improved telecommunications and
|
||
computer systems to evaluate their competitors but others have gone
|
||
as far as hiring ex-FBI agents to uncover information. The
|
||
undercover work may be as straightforward as reading the other guys
|
||
employee publications or as complicated as analyzing all of a
|
||
competitors operations. One major US corporation has admitted that
|
||
they have sent their personnel to count smokestacks, delivery
|
||
trucks and employees cars at a rival facility. A spokesperson for
|
||
the corporation stated "This type of information can help you
|
||
determine how well your rival is doing." One of this competitive
|
||
intelligence firms most prized intelligence coups was a competitors
|
||
in-house phone book, which was used to reconstruct and estimate the
|
||
competitions pricing structure.
|
||
|
||
Here are a few examples of major corporations that utilize
|
||
information on their competitors.
|
||
|
||
* AT&T has an 800-man world-wide network of employees who
|
||
monitor competitors sales teams, trade publications and
|
||
research papers for the latest developments. This
|
||
information is fed into a data base, analyzed and then
|
||
supplied to key management on a daily basis.
|
||
|
||
* Kraft Inc analyzes point-of-purchase scanner data to get
|
||
not only price information but also product features and
|
||
promotional programs. Kraft has also gone to the extreme
|
||
of hiring consultants to interview competitors under the
|
||
guise of "independent market research."
|
||
|