1930 lines
51 KiB
Plaintext
1930 lines
51 KiB
Plaintext
The Information Systems Security Monitor
|
||
|
||
_______ /--------\ /--------\ \ /|
|
||
| | | | \ / |
|
||
| | | | \ / |
|
||
| \_______ \_______ | \ |
|
||
| \ \ | |
|
||
| | | | |
|
||
| | | | |
|
||
| \________/ \________/ | |
|
||
-------
|
||
Dedicated to the pursuit of security awareness............
|
||
=================================================================
|
||
Volume 2 Number 2 April 1992
|
||
=================================================================
|
||
////////////////////// In this Issue \\\\\\\\\\\\\\\\\\\\\\\\\\\
|
||
|
||
Choosing the Right Password
|
||
|
||
Comptroller General Decision on EDI
|
||
|
||
Security Hall of Fame
|
||
|
||
OAIS Employees Judge Student Contest
|
||
|
||
Cyberspace: A Hacker's Response
|
||
|
||
Quick Fix Security
|
||
|
||
Dear Clyde
|
||
|
||
Computer Speak
|
||
|
||
What's New
|
||
----------------------------------------------------------------
|
||
|
||
|
||
Hacker Lists Passwords Hackers Look For
|
||
Choosing the Right Password!
|
||
|
||
Imagine a hacker entering a system with your id and password
|
||
because you did not take the time to choose a good password, this
|
||
is something that can be completely prevented if people would take
|
||
a few minutes to choose a good password. You must be creative when
|
||
choosing a password not lazy. Since a password is usually the
|
||
first line of defense against unauthorized access to a computer
|
||
system, when the first line is broken the rest only take time. The
|
||
average user usually has a password that is easy to select and easy
|
||
to remember. Any word that is easy to select or is contained in
|
||
a dictionary is a poor and insecure selection for a password. The
|
||
reason this makes a poor selection is because these words are the
|
||
first ones an intruder will try when attempting to compromise your
|
||
system. For instance, if your name is Tom Smith and your logon id
|
||
is TSMITH your password should not contain any variation of these
|
||
two words (Tom & Smith). A hacker will try TSMITH, SMITHT,
|
||
TOMSMITH, SMITHTOM, TSMITH1, HTIMST, etc. before anything else.
|
||
As far as the length of a password goes its definitely the longer
|
||
the better. To demonstrate this point I give you the following
|
||
table:
|
||
|
||
# of Possible Average Time
|
||
Characters Combinations To Discover Example
|
||
|
||
1 36 6 min q
|
||
2 1,300 4 hrs bt
|
||
3 47,000 5 days tyu
|
||
4 1,700,000 6 months insw
|
||
5 60,000,000 19 years potnb
|
||
etc...
|
||
|
||
The greater the number of possibilities a hacker must sort through,
|
||
the better the chances of a password remaining undiscovered.
|
||
|
||
The best passwords are those that contain a combination of letters
|
||
and numbers or are a combination of two or more unrelated words
|
||
i.e. TREEFLOOR, TVBOOK, RADIOSHOE, etc. Another possibility is to
|
||
select the initials of your two grandmothers combined with the
|
||
number of times you have seen your favorite movie to come up with
|
||
a password that resembles PAWH07, 07WHPA, PA07WH, etc.
|
||
|
||
If you think that you have chosen a password that is hard to guess
|
||
or would take too much time to guess keep in mind that hackers have
|
||
automated the process. There have been programs written for the
|
||
sole purpose of guessing passwords, they take a list similar to the
|
||
one in this article and try each and every one of them
|
||
These are the types of passwords that are hard to guess and will
|
||
most likely not be found in any dictionary or word list. I am
|
||
enclosing a list of common passwords that most hackers have a
|
||
variation of, under no circumstances should you ever use a word
|
||
contained in this list. All forms of profanity should also be
|
||
included in this list.100
|
||
666
|
||
6969
|
||
aaa
|
||
abc
|
||
abel
|
||
academia
|
||
academic
|
||
academie
|
||
access
|
||
ada
|
||
adele
|
||
adeline
|
||
adelphe
|
||
admin
|
||
adrian
|
||
aerobic
|
||
aerobics
|
||
agathe
|
||
agnes
|
||
aide
|
||
aime
|
||
aimee
|
||
airplane
|
||
alain
|
||
alban
|
||
albanie
|
||
albany
|
||
albatros
|
||
albatross
|
||
albert
|
||
alex
|
||
alexander
|
||
alexandre
|
||
alf
|
||
algebra
|
||
algebre
|
||
alias
|
||
aliases
|
||
alice
|
||
alida
|
||
alix
|
||
alpha
|
||
alphabet
|
||
alphonse
|
||
ama
|
||
amadeus
|
||
amandine
|
||
ambroise
|
||
amedee
|
||
ami
|
||
amorphe
|
||
amorphous
|
||
amour
|
||
amy
|
||
an
|
||
analog
|
||
analogue
|
||
ananas
|
||
anchor
|
||
ancre
|
||
andre
|
||
andromache
|
||
andy
|
||
angele
|
||
angerine
|
||
anicet
|
||
animals
|
||
animaux
|
||
anne
|
||
annie
|
||
annonciation
|
||
anselme
|
||
answer
|
||
anthelme
|
||
antoine
|
||
antoine-marie
|
||
anvils
|
||
anything
|
||
aout
|
||
apollinaire
|
||
apolline
|
||
apotre
|
||
aquin
|
||
arc
|
||
aria
|
||
ariane
|
||
aristide
|
||
armand
|
||
armel
|
||
arnaud
|
||
arrow
|
||
arsene
|
||
arthur
|
||
ascension
|
||
asd
|
||
asm
|
||
assise
|
||
assomption
|
||
athena
|
||
athenes
|
||
atmosphere
|
||
aubin
|
||
aude
|
||
audrey
|
||
augustin
|
||
automne
|
||
autoroute
|
||
avent
|
||
avila
|
||
avion
|
||
avril
|
||
aymar
|
||
aymard
|
||
aztecs
|
||
aztecs
|
||
azur
|
||
azure
|
||
bacchus
|
||
badass
|
||
bailey
|
||
balance
|
||
banana
|
||
bananas
|
||
banane
|
||
bande
|
||
bandit
|
||
banks
|
||
banque
|
||
baptiste
|
||
barbara
|
||
barber
|
||
barbier
|
||
bariton
|
||
baritone
|
||
barnabe
|
||
barnard
|
||
bart
|
||
barthelemy
|
||
bartman
|
||
basic
|
||
basile
|
||
bass
|
||
basse
|
||
basson
|
||
bassoon
|
||
batch
|
||
batman
|
||
baudouin
|
||
beach
|
||
beater
|
||
beaute
|
||
beauty
|
||
beaver
|
||
beethoven
|
||
belier
|
||
beloved
|
||
benedicte
|
||
benoit
|
||
benz
|
||
beowulf
|
||
berkeley
|
||
berlin
|
||
berline
|
||
berliner
|
||
bernadette
|
||
bernard
|
||
bernardin
|
||
bertille
|
||
bertrand
|
||
beryl
|
||
beta
|
||
everly
|
||
bicameral
|
||
bienheureux
|
||
bienvenue
|
||
bishop
|
||
bitch
|
||
blaise
|
||
bob
|
||
boris
|
||
bradley
|
||
brian
|
||
brice
|
||
brigitte
|
||
broadway
|
||
bruno
|
||
bsd
|
||
bumbling
|
||
burgess
|
||
cad
|
||
cafe
|
||
calude
|
||
camarade
|
||
campanile
|
||
cancer
|
||
cantor
|
||
capricorne
|
||
cardinal
|
||
careme
|
||
carine
|
||
carmel
|
||
carmen
|
||
carole
|
||
carolina
|
||
caroline
|
||
carson
|
||
cartouche
|
||
cascades
|
||
casimir
|
||
cassis
|
||
castle
|
||
castle
|
||
cat
|
||
catherine
|
||
cayuga
|
||
cecile
|
||
celine
|
||
celtics
|
||
cendres
|
||
cerulean
|
||
challenger
|
||
change
|
||
chantal
|
||
charles
|
||
charlotte
|
||
charmant
|
||
charming
|
||
charon
|
||
chat
|
||
chateau
|
||
chem
|
||
chemin
|
||
chemistry
|
||
chess
|
||
chester
|
||
cheval
|
||
chevalier
|
||
chien
|
||
chou
|
||
christ
|
||
christian
|
||
christine
|
||
christophe
|
||
cible
|
||
cigar
|
||
cigare
|
||
citroen
|
||
claire
|
||
clarisse
|
||
class
|
||
classic
|
||
classique
|
||
claude
|
||
clemence
|
||
clement
|
||
clotilde
|
||
cluster
|
||
clusters
|
||
code
|
||
coeur
|
||
coffee
|
||
coke
|
||
colette
|
||
collins
|
||
come
|
||
computer
|
||
comrade
|
||
comrades
|
||
conception
|
||
condo
|
||
condom
|
||
connect
|
||
console
|
||
constant
|
||
constantin
|
||
conversion
|
||
cookie
|
||
cooper
|
||
corinne
|
||
cornelius
|
||
couscous
|
||
create
|
||
creation
|
||
creosote
|
||
crepin
|
||
cretin
|
||
criminal
|
||
croix
|
||
cshrc
|
||
cyrille
|
||
daemon
|
||
dame
|
||
damien
|
||
dancer
|
||
daniel
|
||
danny
|
||
dapper
|
||
data
|
||
dave
|
||
davy
|
||
deb
|
||
debbie
|
||
deborah
|
||
december
|
||
decembre
|
||
default
|
||
defoe
|
||
defunts
|
||
delphine
|
||
deluge
|
||
denis
|
||
denise
|
||
desperate
|
||
develop
|
||
device
|
||
dial
|
||
diane
|
||
didier
|
||
diet
|
||
dieter
|
||
dieu
|
||
digital
|
||
dimanche
|
||
dimitri
|
||
disc
|
||
discovery
|
||
disk
|
||
disney
|
||
dog
|
||
dominique
|
||
donald
|
||
donatien
|
||
dos
|
||
drought
|
||
duncan
|
||
dupond
|
||
dupont
|
||
durand
|
||
dwladys
|
||
eager
|
||
earth
|
||
easier
|
||
easy
|
||
eatme
|
||
eau
|
||
edges
|
||
edinbourg
|
||
edinburgh
|
||
edith
|
||
edmond
|
||
edouard
|
||
edwige
|
||
edwin
|
||
egghead
|
||
eiderdown
|
||
einstein
|
||
elephant
|
||
elisabeth
|
||
elisee
|
||
elizabeth
|
||
ella
|
||
ellen
|
||
email
|
||
emeline
|
||
emerald
|
||
emeraude
|
||
emile
|
||
emilie
|
||
emma
|
||
enclumes
|
||
endeavour
|
||
enemy
|
||
engin
|
||
engine
|
||
engineer
|
||
entreprise
|
||
enzyme
|
||
epiphanie
|
||
erenity
|
||
eric
|
||
ersatz
|
||
establish
|
||
estate
|
||
estelle
|
||
ete
|
||
eternity
|
||
etienne
|
||
euclid
|
||
euclide
|
||
eudes
|
||
eugenie
|
||
evelyn
|
||
evrard
|
||
extension
|
||
eymard
|
||
fabrice
|
||
facile
|
||
fairway
|
||
famille
|
||
felicia
|
||
felicie
|
||
felicite
|
||
fender
|
||
ferdinand
|
||
fermat
|
||
fernand
|
||
ferrari
|
||
fete
|
||
fevrier
|
||
fiacre
|
||
fidele
|
||
fidelite
|
||
fidelity
|
||
field
|
||
file
|
||
filet
|
||
fini
|
||
finite
|
||
firmin
|
||
fishers
|
||
flakes
|
||
fleche
|
||
fleur
|
||
fleurs
|
||
float
|
||
flocon
|
||
flocons
|
||
florent
|
||
florentin
|
||
flower
|
||
flowers
|
||
foolproof
|
||
football
|
||
foresight
|
||
format
|
||
forsythe
|
||
fourier
|
||
fraise
|
||
framboise
|
||
francine
|
||
francois
|
||
francoise
|
||
fred
|
||
frederic
|
||
friend
|
||
frighten
|
||
fulbert
|
||
fun
|
||
function
|
||
fungible
|
||
gabin
|
||
gabriel
|
||
gaetan
|
||
games
|
||
gardner
|
||
garfield
|
||
gaston
|
||
gateau
|
||
gatien
|
||
gatt
|
||
gauss
|
||
gautier
|
||
gemeaux
|
||
genevieve
|
||
geoffroy
|
||
george
|
||
georges
|
||
gerard
|
||
geraud
|
||
germain
|
||
germaine
|
||
gertrude
|
||
ghislain
|
||
gibson
|
||
gilbert
|
||
gildas
|
||
gilles
|
||
ginger
|
||
gisele
|
||
glacier
|
||
gnu
|
||
golf
|
||
golfer
|
||
gontran
|
||
gorgeous
|
||
gorges
|
||
gosling
|
||
gouge
|
||
goutte
|
||
graham
|
||
grahm
|
||
gras
|
||
gregoire
|
||
group
|
||
gryphon
|
||
gucci
|
||
guenole
|
||
guess
|
||
guest
|
||
guillaume
|
||
guitar
|
||
guitare
|
||
gumption
|
||
guntis
|
||
guy
|
||
gwladys
|
||
habib
|
||
hack
|
||
hacker
|
||
hal
|
||
hamlet
|
||
handily
|
||
happening
|
||
harmonie
|
||
harmony
|
||
harold
|
||
harvey
|
||
hawaii
|
||
hebrides
|
||
heinlein
|
||
helene
|
||
hello
|
||
help
|
||
henri
|
||
herbert
|
||
hermann
|
||
hermes
|
||
herve
|
||
hiawatha
|
||
hibernia
|
||
hidden
|
||
hippolyte
|
||
hiver
|
||
homework
|
||
honey
|
||
honore
|
||
honorine
|
||
horse
|
||
horus
|
||
hubert
|
||
hugues
|
||
humbert
|
||
hutchins
|
||
hyacinthe
|
||
hydrogen
|
||
ibm
|
||
ida
|
||
ignace
|
||
igor
|
||
imbroglio
|
||
imbroglio
|
||
immaculee
|
||
imperial
|
||
include
|
||
inconnue
|
||
ines
|
||
info
|
||
ingres
|
||
ingress
|
||
ingrid
|
||
inna
|
||
innocent
|
||
innocuous
|
||
internet
|
||
invite
|
||
irene
|
||
irenee
|
||
irishman
|
||
irlande
|
||
isabelle
|
||
isidore
|
||
isis
|
||
jacqueline
|
||
jacques
|
||
janvier
|
||
japan
|
||
japon
|
||
jean
|
||
jean-baptiste
|
||
jean-claude
|
||
jean-francois
|
||
jean-michel
|
||
jean-pierre
|
||
jean-yves
|
||
jeanclaude
|
||
jeanfrancois
|
||
jeanmichel
|
||
jeanne
|
||
jeanpierre
|
||
jeanyves
|
||
jerome
|
||
jessica
|
||
jester
|
||
jeudi
|
||
jixian
|
||
joel
|
||
johnny
|
||
joseph
|
||
joshua
|
||
jour
|
||
judas
|
||
judicael
|
||
judith
|
||
juggle
|
||
juillet
|
||
juin
|
||
jules
|
||
julia
|
||
julien
|
||
julienne
|
||
juliette
|
||
jumeaux
|
||
jupiter
|
||
juste
|
||
justin
|
||
justine
|
||
kathleen
|
||
kermit
|
||
kernel
|
||
kevin
|
||
key
|
||
kirkland
|
||
kiwi
|
||
knight
|
||
ladle
|
||
lambda
|
||
lamination
|
||
landry
|
||
lapin
|
||
larissa
|
||
larkin
|
||
larry
|
||
laurent
|
||
lazare
|
||
lazarus
|
||
lea
|
||
lebesgue
|
||
lee
|
||
leger
|
||
leland
|
||
leon
|
||
leonce
|
||
leroy
|
||
lewis
|
||
library
|
||
licorne
|
||
light
|
||
lion
|
||
lisa
|
||
lisp
|
||
loch
|
||
lock
|
||
lockout
|
||
louis
|
||
louise
|
||
lourdes
|
||
love
|
||
luc
|
||
lucie
|
||
lucien
|
||
lumiere
|
||
lundi
|
||
lune
|
||
lydie
|
||
macintosh
|
||
mack
|
||
madeleine
|
||
madelene
|
||
maggot
|
||
magic
|
||
magique
|
||
mai
|
||
mail
|
||
maint
|
||
malcolm
|
||
malcom
|
||
manager
|
||
mangue
|
||
marc
|
||
marcel
|
||
marcelle
|
||
marcellin
|
||
mardi
|
||
marguerite
|
||
marie
|
||
marie-madeleine
|
||
marietta
|
||
mariette
|
||
marina
|
||
marius
|
||
mark
|
||
markus
|
||
mars
|
||
marthe
|
||
martial
|
||
martin
|
||
martine
|
||
martinien
|
||
marty
|
||
marvin
|
||
master
|
||
math
|
||
mathilde
|
||
matthias
|
||
matthieu
|
||
maurice
|
||
maxime
|
||
medard
|
||
melaine
|
||
mellon
|
||
memory
|
||
mercredi
|
||
mercure
|
||
mercury
|
||
meres
|
||
merlin
|
||
metro
|
||
mets
|
||
mgr
|
||
michael
|
||
michel
|
||
michelle
|
||
mike
|
||
minimum
|
||
minsky
|
||
mit
|
||
modem
|
||
modeste
|
||
mogul
|
||
moguls
|
||
monique
|
||
mont
|
||
moose
|
||
morley
|
||
morts
|
||
mouse
|
||
mozart
|
||
mutant
|
||
nadege
|
||
nagel
|
||
naissance
|
||
nancy
|
||
napoleon
|
||
narcisse
|
||
nasa
|
||
natacha
|
||
nathalie
|
||
nationale
|
||
nativite
|
||
navette
|
||
nepenthes
|
||
neptune
|
||
ness
|
||
nestor
|
||
net
|
||
network
|
||
new
|
||
news
|
||
newton
|
||
next
|
||
nicolas
|
||
nina
|
||
ninon
|
||
nobody
|
||
noel
|
||
norbert
|
||
notre
|
||
novembre
|
||
noxious
|
||
nuclear
|
||
nutrition
|
||
nyquist
|
||
oceanography
|
||
ocelot
|
||
october
|
||
octobre
|
||
odette
|
||
odile
|
||
odilon
|
||
office
|
||
olive
|
||
olivetti
|
||
olivia
|
||
olivier
|
||
open
|
||
operator
|
||
oracle
|
||
orca
|
||
orwell
|
||
osiris
|
||
outlaw
|
||
oxford
|
||
pacific
|
||
pacifique
|
||
pad
|
||
padoue
|
||
painless
|
||
pakistan
|
||
pam
|
||
paper
|
||
papers
|
||
papiers
|
||
paques
|
||
parfait
|
||
pascal
|
||
pass
|
||
password
|
||
pat
|
||
paterne
|
||
patrice
|
||
patricia
|
||
patrick
|
||
paul
|
||
paule
|
||
paulin
|
||
peche
|
||
pecheur
|
||
pecheurs
|
||
peggy
|
||
pelagie
|
||
pencil
|
||
penguin
|
||
penis
|
||
pentecote
|
||
peoria
|
||
percolate
|
||
peres
|
||
persimmon
|
||
persona
|
||
pete
|
||
peter
|
||
peugeot
|
||
peur
|
||
philip
|
||
philippe
|
||
phoenix
|
||
phone
|
||
pierre
|
||
pizza
|
||
plane
|
||
playboy
|
||
plover
|
||
pluto
|
||
pluton
|
||
plymouth
|
||
poire
|
||
poisson
|
||
poissons
|
||
polynomial
|
||
pomme
|
||
pondering
|
||
porc
|
||
pork
|
||
porsche
|
||
poster
|
||
power
|
||
praise
|
||
precious
|
||
prelude
|
||
presence
|
||
presto
|
||
prevision
|
||
prince
|
||
princeton
|
||
printemps
|
||
prisca
|
||
priv
|
||
private
|
||
privs
|
||
professor
|
||
profile
|
||
program
|
||
prosper
|
||
protect
|
||
protozoa
|
||
prudence
|
||
pub
|
||
public
|
||
pumpkin
|
||
puppet
|
||
quentin
|
||
qwerty
|
||
rabbit
|
||
rainbow
|
||
raindrop
|
||
raissa
|
||
raleigh
|
||
rameaux
|
||
random
|
||
raoul
|
||
rap
|
||
rascal
|
||
raymond
|
||
reagan
|
||
really
|
||
rebecca
|
||
regional
|
||
reine
|
||
remi
|
||
remote
|
||
renaud
|
||
renault
|
||
rene
|
||
reponse
|
||
requin
|
||
reseau
|
||
richard
|
||
rick
|
||
ripple
|
||
risc
|
||
rje
|
||
robert
|
||
robot
|
||
robotics
|
||
rochester
|
||
rodent
|
||
rodolphe
|
||
rodrigue
|
||
roger
|
||
roi
|
||
roland
|
||
rolande
|
||
rolex
|
||
romain
|
||
romano
|
||
romaric
|
||
romeo
|
||
romuald
|
||
ronald
|
||
root
|
||
rosalie
|
||
rose
|
||
rosebud
|
||
roseline
|
||
rosemary
|
||
roses
|
||
rosine
|
||
ruben
|
||
rules
|
||
ruth
|
||
sabine
|
||
sacre
|
||
sade
|
||
sagittaire
|
||
sainte
|
||
sal
|
||
sales
|
||
salome
|
||
samedi
|
||
samson
|
||
sandrine
|
||
saturn
|
||
saturne
|
||
saturnin
|
||
saxon
|
||
scamper
|
||
scheme
|
||
school
|
||
scorpion
|
||
scott
|
||
scotty
|
||
sebastien
|
||
secret
|
||
security
|
||
seigneur
|
||
sensor
|
||
septembre
|
||
serenity
|
||
serge
|
||
service
|
||
sesame
|
||
severin
|
||
sex
|
||
sharc
|
||
shark
|
||
sharks
|
||
sharon
|
||
sheffield
|
||
sheldon
|
||
shell
|
||
shiva
|
||
shivers
|
||
shuttle
|
||
sidoine
|
||
signature
|
||
silvere
|
||
simon
|
||
simple
|
||
simpsons
|
||
singer
|
||
single
|
||
smile
|
||
smiles
|
||
smooch
|
||
smother
|
||
snatch
|
||
snoopy
|
||
soap
|
||
socrate
|
||
socrates
|
||
solange
|
||
somebody
|
||
sophie
|
||
sossina
|
||
sourire
|
||
souris
|
||
souvenir
|
||
sparrows
|
||
spit
|
||
spring
|
||
springer
|
||
squires
|
||
stanislas
|
||
strangle
|
||
stratford
|
||
student
|
||
stuttgart
|
||
subway
|
||
succes
|
||
success
|
||
summer
|
||
sun
|
||
super
|
||
superuser
|
||
support
|
||
supported
|
||
surfer
|
||
suzanne
|
||
swearer
|
||
sylvain
|
||
sylvere
|
||
sylvestre
|
||
sylvie
|
||
symmetry
|
||
sys
|
||
sysadmin
|
||
system
|
||
tangerine
|
||
tanguy
|
||
tape
|
||
target
|
||
tarragon
|
||
tatiana
|
||
taureau
|
||
taylor
|
||
tech
|
||
telephone
|
||
temptation
|
||
tennis
|
||
tentation
|
||
terminal
|
||
terre
|
||
test
|
||
thailand
|
||
thailande
|
||
thecle
|
||
theodore
|
||
theophile
|
||
therese
|
||
thibault
|
||
thibaut
|
||
thierry
|
||
thomas
|
||
tiger
|
||
tigre
|
||
toggle
|
||
tomate
|
||
tomato
|
||
topography
|
||
tortoise
|
||
tortue
|
||
toussaint
|
||
toxic
|
||
toyota
|
||
trails
|
||
transfer
|
||
transfiguration
|
||
travail
|
||
trivial
|
||
trombone
|
||
tty
|
||
tuba
|
||
tubas
|
||
tuttle
|
||
ulrich
|
||
umesh
|
||
unhappy
|
||
unicorn
|
||
unix
|
||
unknown
|
||
uranus
|
||
urbain
|
||
urchin
|
||
util
|
||
utility
|
||
uucp
|
||
valentin
|
||
vasant
|
||
venceslas
|
||
vendredi
|
||
venus
|
||
ver
|
||
veronique
|
||
verseau
|
||
vertige
|
||
vertigo
|
||
vianney
|
||
vicky
|
||
victoire
|
||
victor
|
||
victorien
|
||
vierge
|
||
village
|
||
vincent
|
||
virgin
|
||
virginia
|
||
virginie
|
||
virus
|
||
visitation
|
||
visitor
|
||
viviane
|
||
vivien
|
||
volvo
|
||
wargames
|
||
warren
|
||
water
|
||
weenie
|
||
whatever
|
||
whatnot
|
||
whiting
|
||
whitney
|
||
wholesale
|
||
wilfried
|
||
will
|
||
william
|
||
willie
|
||
winston
|
||
wisconsin
|
||
wizard
|
||
wombat
|
||
woodwind
|
||
word
|
||
work
|
||
wormwood
|
||
wyoming
|
||
xavier
|
||
xaviere
|
||
xfer
|
||
xmodem
|
||
xyz
|
||
yaco
|
||
yang
|
||
yin
|
||
yosemite
|
||
yves
|
||
yvette
|
||
zap
|
||
zimmerman
|
||
zita
|
||
zmodem
|
||
zzz
|
||
|
||
Written by "The Butler", a hacker at heart, a Systems Administrator
|
||
in real life who enjoys learning as much as possible about any
|
||
given system including how to circumvent its security measures. He
|
||
has written articles for various hacker magazines that deal with
|
||
computer security. He currently administers a PC Network for a
|
||
medium size business (250 people). He also lectures to various
|
||
groups including Local EDP Auditors Association, User Groups, and
|
||
Private Corporations on how to protect their systems from hackers
|
||
like himself but who use their knowledge for mischievous purposes.
|
||
|
||
|
||
========================end of article========================
|
||
|
||
|
||
Dear Clyde Responses to
|
||
questions for
|
||
those who are
|
||
searching for
|
||
the truth.
|
||
|
||
Send your comments or questions to Clyde c/o the AIS Security
|
||
Branch in Parkersburg, Room 1011, or leave them in Clyde's mailbox
|
||
located on the Security bulletin boards throughout the Parkersburg
|
||
office.
|
||
|
||
Dear Clyde,
|
||
What is the proper way to dispose of diskettes which are no longer
|
||
able to be used? Are there security concerns here?
|
||
Peggy
|
||
Dear Peggy,
|
||
Yes there are security concerns as the data stored on the diskettes
|
||
may still be readable, if someone wants to take the effort to
|
||
retrieve it. Therefore the diskettes should be disposed of
|
||
properly. Any method of destroying the diskette can be used.
|
||
Cutting it up as you do a credit card that is no longer to be used
|
||
is one method. However the important thing is to make certain the
|
||
disk surface, that is the inner contents of the envelope or plastic
|
||
case, is destroyed.
|
||
|
||
(Note: I personally prefer giving the disk several good whacks with
|
||
my sword and lance to render it unusable.)
|
||
|
||
|
||
Clyde ....... Sir Clyde?
|
||
Rumor has it that Clyde is to be recognized for his continuing
|
||
efforts in the arena of computer security by being knighted. There
|
||
will be more on this in the next issue, stay tuned.
|
||
|
||
========================end of article========================
|
||
|
||
...........................................................
|
||
A Journey Behind (further behind) . . .
|
||
.
|
||
. . . . . ..
|
||
.
|
||
. The Dark Side of CYBERSPACE . . ..
|
||
. .
|
||
. . . . . .
|
||
.
|
||
Hackers in Their Illusive World: . A Response .
|
||
. .
|
||
|
||
...........................................................
|
||
|
||
A Response by: Dispater
|
||
Editor in Chief of Phrack Inc. Magazine
|
||
InterNet: phracksub@stormking.com
|
||
|
||
First of all, I would like to thank Kim Clancy for providing me
|
||
with the opportunity to reply to her article in the previous issue
|
||
of the ISSM. I find myself agreeing with her on more issues than
|
||
not. I read her piece on Cyberspace... Most of the article was
|
||
good, but I felt unclear about what she was saying in the section
|
||
titled "The Dark Side." So I have attempted to present a few
|
||
things from this hacker's viewpoint and make a few points where I
|
||
have disagreed with her. The ">" indicates Kim's previous
|
||
writings.
|
||
|
||
>...What is scary to me in regard to some of the avenues is
|
||
>the ability for individuals to get to so many different
|
||
>types of information...
|
||
|
||
What scares me are the kinds of people who have access to
|
||
the most personal parts of our lives compiled into data
|
||
bases (like Information America) that are for sale to anyone
|
||
who wants to pay the money or has the "power" to access it.
|
||
Why does the government need to know my unlisted phone number? Is
|
||
it really any insurance agency's right to know that I have a son
|
||
or daughter that is about to turn age 16, and will soon need to buy
|
||
auto insurance? I think I have the right not to be bothered by an
|
||
onslaught of people that think they have something I want to
|
||
purchase from them. If you really enjoy junk mail and computerized
|
||
telephone sales calls you can thank these kinds of databases.
|
||
|
||
>I am not stating that I think information should be
|
||
>shielded from individuals.
|
||
|
||
The more diverse sources of information we can all access, the
|
||
better off society will become. If we look at the past we can see
|
||
how accuracy in books was improved drastically by the creation of
|
||
the printing press. The scribes of kings and church figures were
|
||
no longer relied upon as authorities of various subject matter.
|
||
Information was made cheap and easily possessed by the common man.
|
||
Therefore if someone disagreed with some book that was printed, he
|
||
and his guild could write their version of what THEY found to be
|
||
true. This promoted truth, accuracy, a deluge of human
|
||
interaction, and free thought.
|
||
|
||
>...I once went to a presentation about hackers. The
|
||
>presenter told a story about a mother who took her child's
|
||
>computer modem out into the driveway and ran over it after
|
||
>her son had been arrested for hacking...
|
||
|
||
What was the parent doing while her child was hacking?
|
||
Another thing we need to clarify is the use of the word
|
||
"child." These are not often children. There is a certain
|
||
level of mental development that must occur first. I don't
|
||
know much about child psychology, but I'd say that most kids
|
||
under the age of 13 would have a bit of difficult time
|
||
understanding computer networking. Most people in the
|
||
computer underground are at least 16. If they are not
|
||
16 years old almost every sysop I know, kicks them off the
|
||
system. The young person should be allowed to explore in areas the
|
||
parent might not agree with as long as he/she is willing to
|
||
talk about it with the parent afterward. Why are required to
|
||
water down and censor all information so that is safe and
|
||
easily understandable to the "little children?" If there is
|
||
a 12 year old that has network access and is reading USENET's
|
||
ALT.SEX.BONDAGE, I think there is a greater problem involved than
|
||
the type of information the nets carry!!
|
||
|
||
>While hackers spend time developing their skills and
|
||
>learning how to master cyberspace they also use cyberspace
|
||
>to share information about what they have learned.
|
||
|
||
This is the great benefit of getting involved. Everyone
|
||
should own a computer because of this reason.
|
||
|
||
>Information has been found on how to steal long distance
|
||
>phone calls from the phone company, how to make a pipe bomb
|
||
>and how to perform satanic rituals before sitting down to
|
||
>hack.
|
||
|
||
It is not illegal to know how to do any of the previously
|
||
mentioned things. As you mention later the information can
|
||
also be found in such places like libraries. We need to
|
||
keep a few things in perspective here. MOST of the
|
||
information readily available on phone phreaking is so out
|
||
dated, one couldn't hope to implement the use of such
|
||
knowledge without most surely getting caught in an ESS(Electronic
|
||
Switching System environment. Most of the United State's
|
||
telephones are on such a system.
|
||
|
||
Secondly, most of the information available on explosives is
|
||
very crude. Most of it isn't worth the time it took to
|
||
download. Actually there is more information available in
|
||
the library on that subject than in all the data bases in
|
||
the world. I personally think this kind of thing is simply
|
||
stupid. I will not print that kind of thing in Phrack.
|
||
That kind of information is typed in from books, by people
|
||
who don't have anything else to do.
|
||
|
||
In regards to "satanic rituals", it is difficult to make any
|
||
comments about this because in all my years of calling BBS's
|
||
and talking to other hackers, I have never seen such an
|
||
animal. I have seen *THREE* articles on the Wiccan religion
|
||
which is similar to white witchcraft, but it's not even
|
||
close to anything satanic. However, other than this
|
||
minuscule tidbit in cyberspace, the only things I've seen
|
||
were things that were written as pranks and for joke
|
||
purposes. It amazes me that if one person has written
|
||
something or done something it is representative of the
|
||
whole community. This is definitely not a responsible
|
||
conclusion. If some people would just open their eyes to
|
||
reality, they would not see a computer underground filled
|
||
with "satanic, child molesting anarchists".
|
||
|
||
>I hesitate to write the above because I don't want people
|
||
>to avoid the technology. Everything I have found is in
|
||
>most libraries, but the accessibility of it through
|
||
>computers makes it much easier to obtain.
|
||
|
||
You hesitate with good reason and you are correct about all
|
||
that information being already in your local library. The
|
||
problem boils down to "digital censorship." Some people are
|
||
saying it's OK for a library to have the aforementioned
|
||
information, but it's NOT OK for it to be on my computer's
|
||
hard drive.
|
||
|
||
In regards to that argument I say it is much easier to get
|
||
the information from a library than the computer. Let's
|
||
take a look at they facts. First of all, most libraries are
|
||
FREE. On the other hand the average computer system
|
||
(386/33) costs around $1500. Your typical 8th grader
|
||
doesn't usually have that kind of cash.
|
||
|
||
The problem is that reality and virtual reality is the same
|
||
for some of us. We will promptly ignore silly rules like
|
||
"it's ok for some people to know certain things, but it's
|
||
not ok for me to know the same bit of information."
|
||
In the information age we are all becoming much more aware
|
||
of each other's presence. We are finding out that we are
|
||
all very different. We each have some ideas that can
|
||
easily shock others. These ideas can and are being
|
||
challenged by the other people we interact with. Therefore,
|
||
we should NEVER take the step back into the "electronic dark
|
||
age."
|
||
|
||
The really funny thing about all this is, everyone in the
|
||
United States IS a part of cyberspace, even though most of
|
||
them don't want to recognize this fact. If your name is on
|
||
a computer somewhere, you are in cyberspace! So you'd
|
||
better become aware of your existence. Use it to learn and
|
||
question why its there!
|
||
========================end of article========================
|
||
|
||
OAIS Employees Volunteer to Judge Student Contest
|
||
|
||
Every October, the Computer Learning Foundation, a non-profit
|
||
educational foundation serving the United States and Canada, hosts
|
||
Computer Learning Month. During that month, among other numerous
|
||
activities, the foundation hosts numerous contests designed to
|
||
encourage students, educators, and community members to explore new
|
||
areas of using technology and to share their knowledge with others.
|
||
These contests for students provide parents and teachers with an
|
||
activity children can do today to begin thinking and learning about
|
||
what it means to be a responsible user of technology. One of this
|
||
year's contests was a student writing contest focusing on Adult
|
||
Attitudes on the Value of Technology and Ethical Issues. Students
|
||
were to interview one parent and one other adult, write a summary
|
||
of their opinions on the value of technology in our lives and the
|
||
ethical issues involved with using technology, then the students
|
||
evaluated what they thought of the comments and opinions expressed
|
||
by the adults they interviewed.
|
||
The Bureau of the Public Debt participated in this program with
|
||
several OAIS employees, Gretchen Bergmann, Kim Clancy, Bill Dobson,
|
||
Zephery Ellerson, Joe Kordella, Gary Smith, and Ed Alesius,
|
||
volunteering their time to judge the students entries.
|
||
While the use of a computer was not required to create the
|
||
critique many submissions showed an adept usage of various word
|
||
processing, desktop publishing and graphics software.
|
||
This interchange between the professional environment and schools
|
||
proved to be very enlightening. It is refreshing to see a group
|
||
dedicate its effort to a much needed task, keeping schools up with
|
||
technology and its responsible use.
|
||
|
||
========================end of article========================
|
||
QUICK FIX SECURITY
|
||
|
||
The following is a listing of some easy to do security controls
|
||
that help a lot....
|
||
|
||
1. Set modem to answer after 4-5 rings.
|
||
2. Select a dial-up number from a different prefix or out of order
|
||
from the rest of your office.
|
||
3. Use call back features.
|
||
4. Use proprietary software for your communications e.g.,
|
||
PC Anywhere IV.
|
||
5. Use special modems for encryption and access control e.g.,
|
||
Leemah Datacom.
|
||
6. Disconnect after a certain period of inactivity.
|
||
7. Do not allow certain userids' to have dial-up access.
|
||
8. Use caller id and call tracking.
|
||
9. Display a blank screen when a connection is made so the user
|
||
has no clue what they have connected to.
|
||
|
||
========================end of article========================
|
||
|
||
COMPUTER SPEAK
|
||
COMPUTER TERMS AND THEIR MEANINGS
|
||
access n. The ability of a subject to view, change, or
|
||
communicate with an object in a computer system. Typically, access
|
||
involves a flow of information between the subject and the object
|
||
(for example, a user reads a file, a program creates a directory).
|
||
cyberspace n. The world that is created by the connection of
|
||
computers. Travels thru this environment can be vast and undefined
|
||
just as space travel can be. This is the environment Cyberpunks
|
||
call home.
|
||
database n. A collection of data items processible by one or more
|
||
programs.
|
||
phreaking v. The art and science of cracking the phone network
|
||
(so as, for example, to make free long-distance calls). By
|
||
extension, security-cracking in any other context (especially, but
|
||
not exclusively, on communications networks).
|
||
virtual reality n. 1. Computer simulations that use 3-D graphics
|
||
and devices such as the Dataglove to allow the user to interact
|
||
with the simulation. 2. A form of network interaction incorporating
|
||
aspects of role-playing games, interactive theater, improvisational
|
||
comedy, and "true confessions' magazines. In a virtual reality
|
||
session, interaction between the participants is written like a
|
||
shared novel.
|
||
Phrack Inc. Magazine n. An electronically published and
|
||
distributed magazine that focuses on technical issues.
|
||
|
||
========================end of article========================
|
||
|
||
Comptroller General Decision on EDI
|
||
|
||
The Comptroller General of the United States has issued a decision
|
||
that electronic data interchange (EDI) technologies, with
|
||
enhancements such as message authentication and digital signatures,
|
||
can create valid legal contractual obligations between the U.S.
|
||
Government and the party with whom the agency contracts.
|
||
|
||
Digest
|
||
Contracts formed using Electronic Data Interchange technologies may
|
||
constitute valid obligations of the government for purposes of 31 U.S.C.
|
||
1501, so long as the technology used provides the same degree of
|
||
assurance and certainty as traditional "paper and ink" methods of
|
||
contract formation.
|
||
|
||
Decision
|
||
By letter dated September 13, 1991, the Director, Computer Systems
|
||
Laboratory, National Institute of Standards and Technology (NIST), asked
|
||
whether federal agencies can use Electronic Data Interchange (EDI)
|
||
technologies, such as message authentication codes and digital
|
||
signatures, to create valid contractual obligations that can be recorded
|
||
consistent with 31 U.S.C. 1501. For the reasons stated below, we
|
||
conclude that agencies can create valid obligations using properly
|
||
secured EDI systems.
|
||
|
||
Background
|
||
EDI is the electronic exchange of business information between
|
||
parties, usually via a computer, using an agreed upon format. EDI
|
||
is being used to transmit shipping notices, invoices, bid requests, bid
|
||
quotes and other messages. Electronic contracting is the use of
|
||
EDI technologies to create contractual obligations. EDI allows the
|
||
parties to examine the contract, usually on video monitors, but
|
||
sometimes on paper facsimiles, store it electronically (for example on
|
||
magnetic tapes, on discs or in special memory chips), and recall
|
||
it from storage to review it on video monitors, reproduce it on paper or
|
||
even mail it via electronic means. Using EDI technologies, it is
|
||
possible for an agency to contract in a fraction of the time that
|
||
traditional practices take.
|
||
As NIST pointed out in its request, the "paperless" nature of the
|
||
technology has raised the question of whether electronic contracts
|
||
constitute obligations which may be recorded against the government.
|
||
NIST is in the process of developing standards for electronic signatures
|
||
to be used in various applications,*1 including the formation of
|
||
contracts, but has been advised that section 1501 imposes a barrier to
|
||
the use of electronic technologies by federal agencies in this regard.
|
||
|
||
Discussion
|
||
Section 1501 establishes the criteria for recording obligations
|
||
against the government. The statute provides, in pertinent part, as
|
||
follows:
|
||
"(a) An amount shall be recorded as an obligation of the United
|
||
States Government only when supported by documentary evidence of-
|
||
|
||
(1) a binding agreement between an agency and another person
|
||
(including an agency) that is--
|
||
|
||
(A) in writing, in a way and form, and for a purpose
|
||
authorized by law. . . ."
|
||
|
||
31 U.S.C. 1501(a) (1) (A).
|
||
|
||
Under this provision, two requirements must be satisfied: first, the
|
||
agreement must bind both the agency and the party with whom the agency
|
||
contracts; second, the agreement must be in writing.
|
||
|
||
Binding Agreement
|
||
The primary purpose of section 1501 (a) (1) is "to require that there
|
||
be an offer and an acceptance imposing liability on both parties." 39
|
||
Comp. Gen. 829, 831 (1960) (emphasis in original). Hence the government
|
||
may record an obligation under section 1501 only upon evidence that both
|
||
parties to the contract willfully express the intent to be bound. As
|
||
explained below, EDI technology provides both the agency and the
|
||
contractor the means to electronically "sign" a contract.
|
||
A signature traditionally has provided such evidence. See generally
|
||
65 Comp. Gen. 806, 810 (1986). Because of its uniqueness, the
|
||
handwritten signature is probably the most universally accepted evidence
|
||
of an agreement to be bound by the terms of a contract. See 65 Comp.
|
||
Gen. at 810. Courts, however, have demonstrated a willingness to accept
|
||
other notations, not necessarily written by hand. See, e.g., Ohl & Co.
|
||
v. Smith Iron Works, 288 U.S. 170, 176 (1932) (initials); Zacharie v.
|
||
Franklin, 37 U.S. (12 Pet.) 151, 161-62 (1838) (a mark);Benedict v.
|
||
Lebowitz, 346 F. 2d 120 (2nd Cir. 1965) (typed name); Tabas v. Emergency
|
||
Fleet Corporation, 9 F.2d 648, 649 (E.D. Penn. 1926) (typed, printed or
|
||
stamped signatures); Berryman v. Childs, 98 Neb. 450, 153 N.W. 486, 488
|
||
(1915) (a real estate brokerage used personalized listing contracts which
|
||
had the names of its brokers printed on the bottom of the contract in the
|
||
space where a handwritten signature usually appears).
|
||
As early as 1951, we recognized that a signature does not have to be
|
||
handwritten and that "any symbol adopted as one's signature when affixed
|
||
with his knowledge and consent is a binding and legal signature. B-
|
||
104590, Sept. 12, 1951. Under this theory, we approved the use of
|
||
various signature machines ranging from rubber stamps to electronic
|
||
encryption devices. See 33 Comp. Gen. 297 (1954); B-216035, Sept. 20,
|
||
1984. For example, we held that a certifying officer may adopt and use
|
||
an electronic symbol generated by an electronic encryption device to sign
|
||
vouchers certifying payments. B-216035, supra. The electronic symbol
|
||
proposed for use by certifying officers, we concluded, embodied all of
|
||
the attributes of a valid, acceptable signature: it was unique to the
|
||
certifying officer, capable of verification, and under his sole control
|
||
such that one might presume from its use that the certifying officer,
|
||
just as if he had written his name in his own hand, intended to be bound.
|
||
EDI technology offers other evidence of an intent to be bound with the
|
||
same attributes as a handwritten signature. We conclude that EDI systems
|
||
using message authentication codes which follow NIST's Computer Data
|
||
Authentication Standard (Federal Information Processing Standard (FIPS)
|
||
113*2 or digital signatures following NIST's Digital Signature Standard,
|
||
as currently proposed, can produce a form of evidence that is acceptable
|
||
under section 1501.
|
||
Both the message authentication code and the digital signature are
|
||
designed to ensure the authenticity of the data transmitted. They
|
||
consist of a series of characters that are cryptographically linked to
|
||
the message being transmitted and correspond to no other message. There
|
||
are various ways in which a message authentication code or digital
|
||
signature might be generated. For example, either could be generated
|
||
when the sender inserts something known as a "smart card"*3 into a system
|
||
and inputs the data he wants to transmit. Encoded on a circuit chip
|
||
located on the smart card is the sender's private key. The sender's
|
||
private key is a sequence of numbers or characters which identifies the
|
||
sender, and is constant regardless of the transmission. The message
|
||
authentication code and the digital signature are functions of the
|
||
sender's private key and the data just loaded into the system. The two
|
||
differ primarily in the cryptographic methodology used in their
|
||
generation and verification.
|
||
After loading his data into the system, the sender notifies the system
|
||
that he wants to "sign" his transmission. Systems using message
|
||
authentication codes send a copy of the data to the chip on the smart
|
||
card; the chip then generates the message authentication code by applying
|
||
a mathematical procedure known a cryptographic algorithm. Systems using
|
||
digital signatures will send a condensed version of the data to the smart
|
||
card, which generates the digital signature by applying another
|
||
algorithm, as identified in NIST's proposed standard. The card returns
|
||
the just-generated message authentication code or digital signature to
|
||
the system, which will transmit it and the data to the recipient.
|
||
Under either approach, when an offeror or a contracting officer
|
||
notifies the system that he wants to "sign" a contract being transmitted,
|
||
he is initiating the procedure for generating a message authentication
|
||
code or digital signature with the intention of binding his company or
|
||
agency, respectively, to the terms of the contract.*4 The code or the
|
||
digital signature evidences that intention, as would a handwritten or
|
||
other form of signature. Both, generated using the sender's private key,
|
||
are unique to the sender; and, the sender controls access to and use of
|
||
his "smart card," where his key is stored.
|
||
They are also verifiable. When the recipient receives the contract,
|
||
either on his computer monitor or in paper facsimile, it will carry,
|
||
depending on which approach is used, a notation which constitutes the
|
||
message authentication code or the digital signature of the sender,
|
||
necessary information to validate the code or the signature and, usually,
|
||
the sender's name. The recipient can confirm the authenticity of the
|
||
contract by entering the data that he just received and asking his system
|
||
to verify the code or the digital signature. The system will then use
|
||
the information provided by the sender and either verify or reject it.*5
|
||
Both approaches use a key to verify the message just received; however,
|
||
the digital signature requires application of a different key from that
|
||
used to verify a message authentication code. The change of any data
|
||
included in the message as transmitted will result in an unpredictable
|
||
change to the message authentication code or the digital signature.
|
||
Therefore, when they are verified, the recipient is virtually certain to
|
||
detect any alteration.
|
||
|
||
Writing
|
||
To constitute a valid obligation under section 1501(a)(1)(A), a
|
||
contract must be supported by documentary evidence "in writing." As NIST
|
||
pointed out, some have questioned whether EDI, because of the paperless
|
||
nature of the technology, fulfills this requirement. We conclude that it
|
||
does.
|
||
Prior to the enactment of section 1501, originally section 1311 of the
|
||
Supplemental Appropriations Act of 1955, *6 there was no "clean cut
|
||
definition of obligations." H.R. Rep. No. 2266, 83rd Cong., 2d Sess. 50
|
||
(1954). Some agencies had recorded questionable obligations, including
|
||
obligations based on oral contracts, in order to avoid withdrawal and
|
||
reversion of appropriated funds. See 51 Comp. Gen. 631, 633 (1972).
|
||
Section 1501 was enacted not to restrict agencies to paper and ink in the
|
||
formation of contracts, but because, as one court noted, "Congress was
|
||
concerned that the executive might avoid spending restrictions by
|
||
asserting oral contracts." United States v. American Renaissance Lines,
|
||
494 F.2d 1059, 1062 (D.C. Cir. 1974), cert, denied, 419 U.S. 1020 (1974).
|
||
The purpose of section 1501 was to require that agencies submit evidence
|
||
that affords a high degree of certainty and lessens the possibility of
|
||
abuse. See H.R. Rep. No. 2266 at 50.
|
||
While "paper and ink" offers a substantial degree of integrity, it is
|
||
not the only such evidence. Some courts, applying commercial law (and
|
||
the Uniform Commercial Code in particular), have recognized audio tape
|
||
recordings, for example, as sufficient to create contracts. See e.g.,
|
||
Ellis Canning Company v. Bernstein, 348 F. Supp. 1212 (D. Colo. 1972).
|
||
The court, citing a Colorado statute, stated that the tape recording of
|
||
the terms of a contract is acceptable because it is a "reduction to
|
||
tangible form." *7 Id. at 1228. In a subsequent case, a federal Court
|
||
of Appeals held that an audio tape recording of an agreement between the
|
||
Gainesville City Commission and a real estate developer was sufficient to
|
||
bind the Commission. Londono v. City of Gainesville, 768 F.2d 1223 (11th
|
||
Cir. 1985). The court held that the tape recording constituted a "signed
|
||
writing." Id. at 1228.
|
||
In our opinion, EDI technology, which allows the contract terms to be
|
||
examined in human readable form, as on a monitor, stored on electronic
|
||
media, recalled from storage and reviewed in human readable form, has an
|
||
integrity that is greater than an audio tape recording and equal to that
|
||
of a paper and ink contract. Just as with paper and ink, EDI technology
|
||
provides a recitation of the precise terms of the contract and avoids the
|
||
risk of error inherent in oral testimony which is based on human
|
||
memory.*8 Indeed, courts, under an implied-in-fact contract theory, have
|
||
enforced contracts on far less documentation than would be available for
|
||
electronic contracts. See Clark v. United States, 95 U.S. 539 (1877).
|
||
See also Narva Harris Construction Corp. v. United States, 574 F.2d 508
|
||
(Ct. Cl. 1978).
|
||
For the purpose of interpreting federal statutes, "writing" is defined
|
||
to include "printing and typewriting and reproductions of visual symbols
|
||
by photographing, multigraphing, mimeographing, manifolding, or
|
||
otherwise." 1 U.S.C. 1 (emphasis added). Although the terms of
|
||
contracts formed using EDI are stored in a different manner than those of
|
||
paper and ink contracts, they ultimately take the form of visual symbols.
|
||
We believe that it is sensible to interpret federal law in a manner to
|
||
accommodate technological advancements unless the law by its own terms
|
||
expressly precludes such an interpretation, or sound policy reasons exist
|
||
to do otherwise. It is evident that EDI technology had not been
|
||
conceived nor, probably, was even anticipated at the times section 1501
|
||
and the statutory definition of "writing" were enacted. Nevertheless, we
|
||
conclude that, given the legislative history of section 1501 and the
|
||
expansive definition of writing, section 1501 and 1 U.S.C. 1 encompass
|
||
EDI technology.
|
||
Accordingly, agencies may create valid obligations using EDI systems
|
||
which meet NIST standards for security and privacy.
|
||
|
||
|
||
|
||
Comptroller General
|
||
of the United States
|
||
Sept. 13, 1990
|
||
|
||
General Counsel
|
||
U.S. General Accounting Office
|
||
441 G. Street, N.W.
|
||
Washington, D.C. 20548
|
||
|
||
Dear Sir:
|
||
|
||
As you know, National Institute of Standards and Technology (NIST) has
|
||
cooperated with the Department of Treasury and the General Accounting
|
||
Office to develop an electronic certification system wherein a
|
||
cryptographic Message Authentication Code (MAC) is used in place of a
|
||
written signature to bind a certifying officer to a payment order.
|
||
Several other agencies have expressed their interest in using this or a
|
||
similar system as a substitute for a written signature. In fulfillment
|
||
of our responsibilities under the Computer Security Act of 1987, NIST is
|
||
now in the process of developing a public key based Digital Signature
|
||
Standard (DSS) which is specifically designed for electronic signature
|
||
applications and will provide at least the same degree of security as the
|
||
MAC approach. We have attached the DSS Federal Register Announcement and
|
||
draft DSS which is now issued for public comment.
|
||
|
||
We have often been told that legal impairments exist which prevent
|
||
agencies from implementing electronic signatures to bind the federal
|
||
government. The specific statute cited is 31 U.S.C. 1501. Before
|
||
formally recommending these standards for contracting and financial
|
||
management applications, I would like to request a General Accounting
|
||
Office decision as to whether NIST standards such as Federal Information
|
||
Processing Standard (FIPS) 113 and a finalized DSS may be used throughout
|
||
the federal government to record obligations under 31 U.S.C. 1501. If
|
||
you need any further information in order to make your decision please
|
||
feel free to contact Miles Smid, (301) 975-2938, of my staff.
|
||
|
||
Sincerely,
|
||
|
||
James H. Burrows
|
||
Director, Computer Systems Laboratory
|
||
|
||
Enclosures
|
||
|
||
*1 The Congress has mandated that NIST (formally the National Bureau of
|
||
Standards) establish minimum acceptable practices for the security and
|
||
privacy of sensitive information in federal computer systems. Computer
|
||
Security Act of 1987, Pub. L. No. 100-235, section 2, 101 Stat. 1724
|
||
(1988).
|
||
|
||
*2 FIPS 113 adopts American National Standards Institute (ANSI) standard
|
||
X9.9 for message authentication. It outlines the criteria for the
|
||
cryptographic authentication of electronically transmitted data and for
|
||
the detection of inadvertent and/or intentional modifications of the
|
||
data. By adopting the ANSI standard, FIPS 113 encourages private sector
|
||
applications of cryptographic authentication; the same standard is being
|
||
adopted by many financial institutions for authenticating financial
|
||
transactions.
|
||
|
||
*3 A smart card is the size of a credit card. It contains one or more
|
||
integrated circuit chips which function as a computer.
|
||
|
||
*4 NIST officials advise us that technology using message authentication
|
||
codes and digital signatures will be available to both contractors and
|
||
contracting officers for use in government contracting.
|
||
|
||
*5 For the sake of simplicity, this example does not describe the
|
||
complicated system of controls used to ensure that (1) no human knows the
|
||
sender's private key and (2) the information received from the sender for
|
||
validating the message authentication code or digital signature is
|
||
correct and accurate.
|
||
|
||
*6 Pub. L. No. 663, 68 Stat. 800, 830 (1954).
|
||
|
||
*7 Other courts, interpreting the laws of other states, have held that a
|
||
tape recording is not acceptable. See Sonders v. Roosevelt, 102 A.D.2d
|
||
701, 476 N.Y.S.2d 331 (1984); Roos v. Aloi, 127 Misc.2d 864, 487 N.Y.S.2d
|
||
637 (N.Y. Sup. Ct. 1985).
|
||
|
||
*8 Of course, just as with any contract or other official document, an
|
||
agency must take appropriate steps to ensure the security of the
|
||
document, for example, to prevent fraudulent modification of the terms.
|
||
Agencies should refer to NIST standards in this regard. See, e.g., FIPS
|
||
113 (regarding message authentication codes). In addition, agencies
|
||
should refer to the GSA regulations regarding the maintenance of
|
||
electronic records, see 41 C.F.R. 201-45.2, and to the Federal Rules of
|
||
Evidence with regard to managing electronic records to ensure
|
||
admissibility, see generally Department of Justice Report, "Admissibility
|
||
of Electronically Filed Federal Records as Evidence," Systems Policy
|
||
Staff, Justice Management Division (October 1990).
|
||
|
||
|
||
|
||
========================end of article========================
|
||
|
||
Security Hall of Fame Established
|
||
|
||
Clyde's Computer Security Hall of Fame is being established to
|
||
recognize those who contribute above and beyond the normal call of
|
||
duty in their performance of contributing to the advancement and
|
||
enhancement of Public Debt's computer security program.
|
||
The first inductee to this much sought honor is Bob Settles. Bob
|
||
came to Public Debt immediately upon his graduation from college
|
||
in 1964. Apart from a two year stint in Vietnam, his first 18 years
|
||
were spent with the Internal Audit Staff. Then, in 1982, he was
|
||
selected to manage the AIS Security Branch and has served in that
|
||
capacity ever since. During his tenure as manager, the Branch's
|
||
responsibilities have grown steadily to keep pace with the emphasis
|
||
placed on information systems security throughout the Government.
|
||
Public Debt's security program is now among the most highly
|
||
regarded in the Treasury Department.
|
||
Bob has recently accepted a Computer Specialist position with the
|
||
Treasury Department at its main office in Washington, D.C.
|
||
Bob epitomized the best in seasoned management and his departure
|
||
will be keenly felt. We wish him the best in his new position!
|
||
|
||
========================end of article========================
|
||
|
||
What's New?
|
||
|
||
ISSM's gain recognition in international publication
|
||
The Public Debt Computer Security Program and the ISSM's received
|
||
international recognition when an article written by Kim Clancy and
|
||
Joe Kordella was published in ISPNews in the Jan/Feb 1992 edition.
|
||
The article presented the role computer security plays in the
|
||
protection of critical information assets of Public Debt in an
|
||
environment of rapid technological change. It stressed that the
|
||
ISSM's are key players in the implementation of the security
|
||
program.
|
||
|
||
New Security Branch Manager Selected
|
||
The selection of Kim Clancy as the Security Branch Manager
|
||
completes the consolidation of the Branch in Parkersburg. Kim was
|
||
previously a security analyst in the AIS Security Branch. Prior
|
||
to that, she was a computer security analyst for the State of
|
||
Arizona, for over three years. She was also a computer systems
|
||
security officer in the United States Air Force.
|
||
|
||
========================end of article========================
|
||
|
||
The AIS Security Branch runs an Electronic BBS. Give us a call at
|
||
(304) 420-6083. An electronic version of the ISSM is posted on the
|
||
board and can be downloaded. Articles in the electronic version
|
||
may include more detail in that we are not limited by space
|
||
constraints as we are in the paper copy.
|
||
|
||
The ISSM is a quarterly publication of the Department of Treasury,
|
||
Bureau of the Public Debt, AIS Security Branch, 200 3rd Street,
|
||
Parkersburg, WV 26101 (304) 420-6368
|
||
|
||
Editors: Kim Clancy
|
||
Joe Kordella
|
||
Ed Alesius
|
||
Mary Clark
|
||
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|