3752 lines
173 KiB
Plaintext
3752 lines
173 KiB
Plaintext
+=============================================================================+
|
|
| ## ## ## ###### ###### ###### ### ### ###### ###### ## ## ## |
|
|
| ## ### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## |
|
|
| ## ## ### ##### ## ## ###### ## ## ###### ## ## #### |
|
|
| ## ## ## ## ###### ## ## ## ## ## ## ## ## ## ## |
|
|
+=============================================##==============================+
|
|
| Jan 10, 1992|
|
|
| [ The Journal of Privileged Information ] |
|
|
| |
|
|
+-----------------------------------------------------------------------------+
|
|
| Issue 02 By: 'Above the Law' |
|
|
+-----------------------------------------------------------------------------+
|
|
| |
|
|
|Informatik--Bringing you all the information you should know... |
|
|
| and a lot you shouldn't... |
|
|
| |
|
|
+=============================================================================+
|
|
|
|
|
|
/* Introduction */
|
|
By the Informatik staff
|
|
|
|
|
|
|
|
Well, we're proud to present Issue #2 of Informatik Journal.
|
|
Issue #1 was very well received, and we hope to continue to get good reviews
|
|
>from our readers.
|
|
|
|
This issue once again includes articles on a variety of subjects
|
|
related to hacking and phreaking, along with a special report on HoHoCon
|
|
1991. Both of our editors were on hand at the Con, which was not to be
|
|
missed.
|
|
|
|
Please note, the Internet address "@shake" found in some releases of
|
|
Informatik #1 no longer exists, and the owner is not affiliated with this
|
|
journal, and mail should NOT be sent there. We are happy to announce that we
|
|
have obtained a permanent Internet address. The address is:
|
|
|
|
inform@doc.cc.utexas.edu
|
|
|
|
Please direct submissions, suggestions, and subscription requests to that
|
|
address. Our subscription and submissions policies are included in this
|
|
issue.
|
|
|
|
Informatik can also be obtained via FTP at the CUD archives, which
|
|
are at the following address:
|
|
|
|
ftp.cs.widener.edu
|
|
|
|
Informatik is in the directory /pub/cud/misc. Back issues of Informatik,
|
|
along with many other t-files, including Phrack, CUD, and NIA can be found
|
|
at the site.
|
|
|
|
|
|
Enjoy,
|
|
|
|
Mack Hammer & Sterling
|
|
[Editors]
|
|
|
|
|
|
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
*DISCLAIMER*
|
|
Informatik Journal is printed for informational purposes only. We
|
|
do not recommend or condone any illegal or fraudulent application of
|
|
the information found in this electronic magazine. As such, we
|
|
accept no liability for any criminal or civil disputes arising from
|
|
said information.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
===========================================
|
|
============== - CONTENTS - ===============
|
|
================ Issue 02 =================
|
|
======= Release date January 10, 1991 =====
|
|
===========================================
|
|
|
|
|
|
|
|
|
|
01) Issue #2 Introduction
|
|
By: Mack Hammer & Sterling
|
|
|
|
02) HoHoCon 1991
|
|
By: Mack Hammer
|
|
|
|
03) The HP3000's 'SECURITY/3000' system (part 1)
|
|
By: Sterling
|
|
|
|
04) Inside NORAD
|
|
By: Anonymous NORAD Insider
|
|
|
|
05) Magnetic Strip Technology
|
|
By: Count Zero
|
|
|
|
06) Tid-Bytes
|
|
By: the Informatik Staff
|
|
|
|
07) Hot Flashes--The Underground News Report
|
|
By: Various Sources
|
|
|
|
08) Submission and Subscription Information
|
|
By: the Informatik Staff
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
|
|
::*::*::*::*::*::*::*::*::*::*::*::*::*::*::*::
|
|
:*: :*:
|
|
:*: HohoCon '91: The Sordid Details :*:
|
|
:*: :*:
|
|
:*: by: Mack Hammer :*:
|
|
:*: :*:
|
|
::*::*::*::*::*::*::*::*::*::*::*::*::*::*::*::
|
|
|
|
|
|
|
|
December 27 - 29, 1991, Houston was invaded by some 80 plus hackers
|
|
and telecommunications enthusiasts from around the country. HohoCon '91 was
|
|
a marked success, unlike its predecessor, HohoCon '90. The con, sponsored by
|
|
NIA and dFx, was very well organized, with Drunkfux, Judge Dredd, and Lord
|
|
MacDuff taking the brunt of the organizing on their shoulders. Vision was
|
|
also acknowledged as one of the organizers, but was out of town and couldn't
|
|
make the Con.
|
|
|
|
The Con was held at the Airport Hilton near Intercontinental Airport
|
|
in Houston, Texas, and was a three-day event, although almost all of the
|
|
business was taken care of on Saturday the 28th. Thanks to the organizers'
|
|
securing an entire wing separate from the rest of the hotel and a large
|
|
conference room, the conferees went unmolested for the whole of the weekend.
|
|
|
|
Friday the 27th
|
|
~~~~~~~~~~~~~~~
|
|
Most of the guests started arriving during the afternoon of Friday
|
|
the 27th. After laying around/getting acquainted for most of the day,
|
|
Hunter (who provided valuable assistance with entertainment all weekend)
|
|
contacted Rogue, who provided spirits (at cost) for the night. After
|
|
bringing in some 300 dollars worth of hard liquor, the party began.
|
|
|
|
While the events that ensued that evening are somewhat foggy for
|
|
this writer, I will attempt to detail some of the highlights. Everyone
|
|
wandered in and out of the conference room (where the liquor was located)
|
|
and basically got smashed and swapped hacker war stories. It was then that
|
|
Doc Cypher made the unofficial introductory address of the Con. The entire
|
|
group cheered and jeered as Doc, in a drunken stupor, took a nostalgic look
|
|
back at some of the great NUIs, systems, services, etcetera that marked
|
|
hacking in the Eighties.
|
|
|
|
The party then moved to the room of MC Allah (who was passed out on
|
|
the bed after drinking beer all day and capping it off with some mixed
|
|
drinks that night). A VCR was set up, and a group of about 20 people
|
|
watched "Necromantic," a European porn flick featuring, you guessed it, the
|
|
dead. After the movie, everyone split up and either went to bed or drank
|
|
the night away, talking about the old times.
|
|
|
|
Saturday the 28th
|
|
~~~~~~~~~~~~~~~~~
|
|
The actual conference was scheduled to begin at noon on Saturday,
|
|
but due to massive hangovers, was postponed until 2 pm. At 2 pm somewhere
|
|
between 80 and 100 people made their way into the conference room to hear
|
|
speeches by various members of the hack/phreak community.
|
|
|
|
Drunkfux started things off with a few introductions and some
|
|
general announcements about the Con, and then introduced Bruce Sterling, the
|
|
first speaker. Bruce, the writer of several cyberpunk novels including his
|
|
most recent release, The Difference Engine (with William Gibson), was basically
|
|
the celebrity of the Con, and spoke as a member of the Austin Branch of the
|
|
Electronic Frontiers Foundation. As you should know, the EFF is concerned with
|
|
protecting the civil liberties of computer users and telecommunications
|
|
enthusiasts. Mail can be sent to the EFF at eff.org, or the Austin Branch can
|
|
be contacted at eff-a.tic.com.
|
|
|
|
The next speaker was Steve Ryan from World View Magazine. World
|
|
View is an electronic magazine which also concerns civil liberties,
|
|
especially those involving computers. One of the primary concerns of the
|
|
magazine's writers is freedom of speech, and Steve spoke about the
|
|
suspension of this right during the sixties, and warned that it may happen
|
|
again.
|
|
|
|
The guys from Phrack (Crimson Death and Dispater) then took the
|
|
podium and basically told the story of what had been going on with Phrack
|
|
over the last year or two. They explained the editorial conflict
|
|
surrounding Phrack 34, and gave everyone a short history of who had edited
|
|
Phrack when. Crimson Death and Dispater finally put to rest any controversy
|
|
concerning Phrack, and did an excellent job of clarifying the situation.
|
|
They also explained why Phrack has "sucked" as of late, blaming it on poor
|
|
submissions. Now that the editorship is once again on stable ground, we're
|
|
once again expecting big things from hacking's most famous electronic
|
|
publication.
|
|
|
|
Everyone's favorite ex-LODers, Chris (Erik Bloodaxe) and Scott (Doc
|
|
Holiday) were the next speakers. Now known as Comsec Data Security, and
|
|
trying to shake that evil hacker stigma, Scott and Chris have joined
|
|
corporate America as security consultants. The two explained that they
|
|
hadn't gotten an especially warm welcome from anyone already in the security
|
|
field, and that they had been blackballed by every trade organization.
|
|
Rather than taking advantage of the huge body of knowledge possessed by the
|
|
ex-hackers, established security experts and publications have chose to
|
|
ignore them due to their colored past. Furthermore, it seems that they have
|
|
also been spurned by much of the hacking community. Overall, the speech
|
|
provided an interesting look into the way the computer security field
|
|
operates, and was very reassuring to the hackers still on the other side of
|
|
the fence. Scott and Chris did report, however, that business was good.
|
|
They then shifted gears and reported on New York's MOD, perhaps the most
|
|
unpopular group in the history of hacking. First they reported on MOD's
|
|
activities in general, ie; the posting of personal information of other
|
|
hackers on IRC and Lutzifer, general harassment of many noted members of the
|
|
hacking community, and the destructions of private systems on various
|
|
networks. They then announced the best news of the day, five MOD members
|
|
(including Corrupt, Phiber Optik, and Outlaw) were raided on December 6.
|
|
|
|
After the Comsec guys finished their speech, Count Zero of RDT
|
|
presented a film, starring himself and the other RDT guys, exploring the
|
|
campus of MIT. The film included extensive footage of the steam tunnels
|
|
running under the campus, and a great shot of a physical plant employee.
|
|
|
|
After the MIT film, about a third of the attendees left, and the
|
|
conferees who remained saw the episode of "And Now It Can Be Told" about
|
|
hackers. Geraldo Rivera, along with just about everyone else on the show,
|
|
got a lot of boos and hisses from the crowd.
|
|
|
|
The conference then took about a four hour lull while everyone ate,
|
|
drank, and watched the pay-per-view channels for free (see Tid-Bytes for
|
|
more info). About 9 pm, Hunter and Rogue once again came through with the
|
|
liquor, and yet another night of revelry began. Everyone once again began
|
|
to indulge heavily in the alcohol, and most of the conferees staying in the
|
|
hotel found their way into the hallway, where a horrified couple was being
|
|
hustled from our wing. The couple, mistakenly assigned to the HohoCon wing
|
|
by the hotel staff, was quite amazed to find some 40 odd drunken and raucous
|
|
hackers partying in the hallways.
|
|
|
|
Just when things once again died down a bit, Hunter came through
|
|
once again, this time with a couple of strippers he picked up somewhere.
|
|
While the live performance put on by the strippers couldn't compare with
|
|
Necromantic, it was the main entertainment of the night. Eventually,
|
|
everyone ended up either going to bed or working on CDC File #200, and
|
|
HohoCon '91 was all but through.
|
|
|
|
Sunday the 29th
|
|
~~~~~~~~~~~~~~~
|
|
As always, there wasn't much going on Sunday, with most people
|
|
checking out and departing for home. Overall, it seems that HohoCon '91 was
|
|
a smashing success, and we're looking forward to next year.
|
|
|
|
|
|
Now... for the first annual...
|
|
|
|
|
|
:: Informatik HohoCon Awards ::
|
|
|
|
|
|
Least constructive use of time:
|
|
|
|
Crimson Death, for watching approximately six hours of pornos free of
|
|
charge on Saturday night.
|
|
|
|
Most disgusting drink:
|
|
|
|
Ronnie, who mixed rum, tequila, grenadine, blue Hawaiian mix, vodka, and
|
|
lime juice.
|
|
|
|
|
|
Hard-day's-night award:
|
|
|
|
M.C. Allah, for drinking all day, drinking most of the night, passing
|
|
out, and puking on his hotel room floor and Siegfried's foot.
|
|
|
|
Most distasteful video presentation:
|
|
|
|
Erik Bloodaxe, for showing the most vile porno known to man,
|
|
Necromantic.
|
|
|
|
Should have been drowned in the pool award:
|
|
|
|
Rou Tisten, the most annoying personality in the world and a voice to
|
|
match.
|
|
|
|
Hard Luck Award:
|
|
|
|
The whole crew from Memphis whose transmission went out in their truck.
|
|
I sure hope you made it home, guys.
|
|
|
|
I get paid for this? Award:
|
|
|
|
Wile E. Security Guard. For marching around our wing approximately
|
|
11,000 times and never saying ANYTHING about our raucous conduct.
|
|
|
|
Logistical genius Award:
|
|
|
|
The guy who put the Baptist-Revival-Worship-Meeting-Thing next to the
|
|
Con on Friday night.
|
|
|
|
|
|
|
|
:: Unofficial HohoCon '91 Guest List ::
|
|
|
|
|
|
Allanon Lord MacDuff
|
|
Amateur M.C. Allah
|
|
Analog Assassin Mack Hammer
|
|
Archangel Macross the Black
|
|
Battery Material Man
|
|
Beowulf Minor Threat
|
|
Black Night Misanthrope
|
|
Bryan O'Blivian Morpheus
|
|
Bundy Mustang
|
|
Cabbage Truck Nihilator
|
|
Chizz Omega
|
|
Circle Jerk Phaedrus
|
|
Colin Campbell Psionic Infiltrator
|
|
Count Zero Purple Hayes
|
|
Count Zero Rambo
|
|
Crimson Death Razorback
|
|
Cross Connect Rev. Scott Free
|
|
Cyndre The Grey Rogue Lord of the Swastika
|
|
Dark Piper Ronnie
|
|
Devereuax Rou Tisten
|
|
Dispater Search 'n Seizure
|
|
Doc Cypher Siegfried
|
|
Doc Holiday Snow Blind
|
|
Drunkfux Split
|
|
Elrond of Rivendell Spoink
|
|
Erik BloodAxe Sterling
|
|
Format C: Swamp Rat
|
|
Frosty Technysis
|
|
G.A. Ellsworth Terminator
|
|
Holistic Hacker Terry-Scientist of Confusion
|
|
Hunter The Brain
|
|
Informant The Butler
|
|
Jabba The Chairman
|
|
Joe Rockhead The Conflict
|
|
Johnny Rotten The Desert Fox
|
|
Judge Dredd The Master
|
|
Junk Master The Pope
|
|
Kable Borks The Prisinor
|
|
Knightlife White Knight
|
|
Loki Winter's Ice
|
|
|
|
|
|
Please note: This list was compiled mainly from a sign-in sheet passed
|
|
around at the conference on Saturday. If you missed being
|
|
on the list, we apologize.
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>*>
|
|
*> <*
|
|
<* The HP3000's 'SECURITY/3000' System (part 1) *>
|
|
*> <*
|
|
<* by Sterling *>
|
|
*> <*
|
|
<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<*<
|
|
|
|
|
|
|
|
SECURITY/3000 is a third party security package for use on HP 3000 series
|
|
computers. It replaces several commands and bundles several utility programs
|
|
to monitor system security. In part 1, I will try to provide an overview of
|
|
the obstacles that the SECURITY/3000 package presents for any would be
|
|
intruders, and discuss the usages of the LOGON system.
|
|
|
|
SECURITY/3000 is popular because it attempts to shore up the security
|
|
weaknesses found in the basic HP MPE Operating System. In order to insure user
|
|
ID integrity, HP's logon security system uses passwords. However, these
|
|
passwords provide only an illusion of security because:
|
|
|
|
* There is only one password for each level (user, group, or
|
|
account) of security. Thus, knowledge of this password
|
|
guarantees that level of security is penetrable.
|
|
|
|
* On many HP3000 systems, several users log on with the same
|
|
USERNAME.ACCTNAME which means they share the same
|
|
passwords--this reduces security and provides no auditability.
|
|
|
|
* Many users treat passwords as a dispensable nuisance, and
|
|
therefore readily reveal their passwords to unauthorized
|
|
persons.
|
|
|
|
* Passwords are stored in the system in clear text. Thus, they
|
|
may be readily found in job streams, discarded LISTDIR
|
|
listings, or on :SYSDUMP tapes.
|
|
|
|
SECURITY/3000 provides several new features:
|
|
|
|
USER ID INTEGRITY
|
|
~~~~~~~~~~~~~~~~~
|
|
In addition to conventional MPE passwords, SECURITY/3000 can use a system of
|
|
personal profile passwords -- answers to personal questions such as "WHAT IS
|
|
YOUR MOTHER'S MAIDEN NAME?", "WHAT IS YOUR FIRST LOVE'S NAME?", etc. Instead
|
|
of asking the same question all the time, SECURITY/3000 asks a random one out
|
|
of a number of questions (up to 30, user-configurable). And, instead of
|
|
keeping the answers stored in clear text, it encrypts them using a special
|
|
one-way encryption system, through which the answers cannot be decrypted by
|
|
anybody (not even VESOFT). By this, DP personnel are relieved of problems
|
|
associated with having readable passwords on the system.
|
|
|
|
Thus, passwords are automatically given a psychological security significance;
|
|
knowledge of all personal passwords is required to be sure of being able to
|
|
access the system, even though the user is asked only one at logon time; and,
|
|
passwords are made impossible to determine. Even voluntary disclosure is made
|
|
difficult. (The default questions can be configured with custom ones, or
|
|
SECURITY/3000 can be configured to instead prompt for a single question rather
|
|
than a random personal question).
|
|
|
|
Furthermore, SECURITY/3000 can be configured to differentiate users by session
|
|
name by expanding the USER ID to include session name in addition to user and
|
|
account name. This feature permits a better account structure by allowing
|
|
"generic" users to be created with user names describing the users' function
|
|
and session names identifying the user (e.g. JOHN,ENTRY.PAYROLL and
|
|
MARY,CLERK.AP). Thereby, several users could be set up under a common user
|
|
name but with different session names, and each one would have unique personal
|
|
profile answers, time and day restrictions, menu files, etc. SECURITY/3000
|
|
can therefore enforce the use of correct session name by requiring that a user
|
|
logs on using the same session name which was configured when added to the
|
|
security system.
|
|
|
|
In addition, SECURITY/3000 permits the system manager to configure a user with
|
|
a wildcard ("@") representing the session name and/or user name and/or account
|
|
name, which allows authorization of an Account Manager to log on as any valid
|
|
user in his account, or the System Manager to log on as any valid user on the
|
|
system, or an ordinary user to log on to several different accounts, etc.
|
|
This permits greater flexibility while still maintaining a high level of
|
|
security and providing positive user identification.
|
|
|
|
SECURITY/3000 may be activated for the entire system, for selected accounts,
|
|
for only certain users, or for only those logons to certain LDEVs (terminals,
|
|
DIAL-UPs, DS lines, etc.).
|
|
|
|
|
|
TIME OF DAY, DAY OF WEEK, AND TERMINAL RESTRICTIONS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Most security violations will not occur on Tuesday afternoon at 2:30 in the
|
|
middle of the company's payroll department; they will most likely be done in
|
|
the dead of night on a weekend across a telephone line. If the payroll
|
|
clerks work only on weekdays from 9 to 5 on terminals 31, 32, 33, and 35, any
|
|
attempt to access the PAYROLL account at any other time from any other place
|
|
is inherently a security violation. HP's logon security system does not
|
|
protect against this, but SECURITY/3000 does!
|
|
|
|
|
|
LOGON MENUS VS ':'
|
|
~~~~~~~~~~~~~~~~~~
|
|
After a user has logged on successfully, it is often undesirable, for reasons
|
|
of security and/or user-friendliness, for the user to converse with MPE by
|
|
typing MPE commands. Rather, one would want a menu of allowed commands and
|
|
programs the user is permitted to access to be displayed on the terminal;
|
|
then, the user could choose one of them.
|
|
|
|
Of course, restricting users from MPE (so that they never get a ':') vastly
|
|
improves system security because users are prevented from attempting to breach
|
|
security using various "holes" existing in MPE (e.g. :FCOPYing a file
|
|
containing a password to the terminal, reading passwords in :RELEASEd job
|
|
streams [a hole that doesn't exist if the supplied STREAMX utility is
|
|
installed] or even doing :LISTFs in sensitive groups and accounts).
|
|
|
|
This approach is far more common than the often-used method of blocking out
|
|
MPE commands by setting up UDC's with the same name, (which can be
|
|
circumvented with little effort, such as executing the commands from within
|
|
EDITOR or FCOPY) because it is far easier to implement and maintain a system
|
|
which INCLUDES the things a user is allowed rather than EXCLUDES the things a
|
|
user is not allowed.
|
|
|
|
|
|
VIOLATION REPORTING
|
|
~~~~~~~~~~~~~~~~~~~
|
|
Unlike HP's logon security system, which reports security violations only to
|
|
the system console, SECURITY/3000 reports them to the system console (in
|
|
inverse video, to distinguish them from ordinary console messages), prints a
|
|
user-definable memo to the system line printer, and logs them to its own log
|
|
file for future reference (thus providing a permanent record for further
|
|
interrogation). This "three-alarm" system makes sure that attempted security
|
|
violations are acted upon, not ignored. [supposedly]
|
|
|
|
|
|
AUDIT TRAIL
|
|
~~~~~~~~~~~
|
|
Although an Account Manager ID should be able to add, change, or remove user
|
|
security within his own account, there must be some means provided to keep
|
|
track of his actions. Under HP's logon security system, an Account Manager
|
|
ID can be used to create a fictitious user ID, log on to the system under it,
|
|
and do something that he shouldn't be doing without being afraid of getting
|
|
caught. With SECURITY/3000, all user additions, changes, and deletions are
|
|
logged to the SECURITY log file, thus allowing an auditor or System Manager
|
|
to determine who created, altered, or removed a given user ID.
|
|
|
|
|
|
ENFORCING REGULAR PASSWORD CHANGES BY OBSOLETING MPE PASSWORDS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
OBSOL, SECURITY/3000's MPE Password Obsolescence System, ensures that MPE
|
|
passwords are changed on a regular basis, which can be defined for each
|
|
password. Users are warned before a password will expire (configurable as to
|
|
the number of days) to get their password changed.
|
|
|
|
|
|
PERMITTING USERS TO CHANGE THEIR OWN MPE PASSWORDS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
MPE's security makes changing user passwords quite difficult. Since only an
|
|
Account Manager can change a user password, changing passwords is actually
|
|
discouraged! A user will feel reluctant to take the time to get hold of his
|
|
Account Manager to have his password changed (even if he, the user, suspects
|
|
it has been compromised); an Account Manager is very likely to put off
|
|
changing passwords if it means changing them for all 100 users in his account.
|
|
The SECURITY/3000 package contains "PASCHG" a program that allows users to
|
|
change their own passwords (not other users' unfortunately); this poses no
|
|
security threat; in fact, it actually improves security by making it easier
|
|
for users to get their own password changed.
|
|
|
|
|
|
ELIMINATING PASSWORDS IN JOB STREAMS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The requirement of keeping passwords in clear text in job streams is a big
|
|
security flaw because anyone with READ access to the job stream can read the
|
|
passwords, and any listing of the job contains the password. More
|
|
importantly, since changing a password means having to change every single job
|
|
that contains it, these passwords are virtually guaranteed never to be
|
|
changed.
|
|
|
|
STREAMX eliminates the need to embed passwords, lockwords, and other sensitive
|
|
information in job streams, while adding additional flexibility to jobs by
|
|
permitting parameter passing.
|
|
|
|
|
|
DIAL-UP, TERMINAL AND DS SECURITY
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Also desirable is the ability to put a password on a DIAL-UP line, DS line, or
|
|
terminal, regardless of the user trying to log on. That way, if a hacker
|
|
or "inside" violator attempted to log on to a DIAL-UP, he would have to know
|
|
the password for the DIAL-UP, which could be changed every day.
|
|
|
|
In addition, the high level of user authentication that the logon procedure in
|
|
SECURITY/3000 provides can be linked with the terminal and DIAL-UP security by
|
|
conditionally invoking the SECURITY/3000 logon security based on LDEV to which
|
|
a user is logging on.
|
|
|
|
This type of terminal security is provided by the TERMPASS utility.
|
|
|
|
|
|
AUTOMATIC LOGOFF OF INACTIVE USERS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Another threat to system security is a very common one: a user goes on a
|
|
break or to lunch without logging off. By this, a would-be thief could just
|
|
walk up to a terminal and use it--without even having to log on. There are
|
|
times when users forget to sign off even before going home for the day, (which
|
|
holds up system backups.
|
|
|
|
The LOGOFF utility allows automatic log off of terminals on which users have
|
|
been inactive for a given period of time.
|
|
|
|
|
|
|
|
Now that we have had a general overview of SECURITY/3000's many features, lets
|
|
take a much more detailed look into the logon security system.
|
|
|
|
|
|
WHAT HAPPENS AT LOGON TIME
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
With the Logon Security System if SECURITY/3000 invoked, whenever a user logs
|
|
on (before he gets the ':' prompt and after he types in his MPE passwords [if
|
|
he has any]), SESSION, TIME, DAY, and TERMINAL restrictions which may have
|
|
been placed on the user are verified--if the user is not within the allowed
|
|
time and day limits or if he is attempting to log on from a terminal he is not
|
|
authorized to use, he is denied access to the system (i.e. logged off), an
|
|
inverse-video message describing the failed logon attempt is sent to the
|
|
console, a memo is printed off the line printer, and an entry is logged to the
|
|
SECURITY log file.
|
|
|
|
If the user, for some reason, replies incorrectly to the original question, he
|
|
is given as many more chances as are configured (two by default); he is asked
|
|
to reply to the SAME QUESTION additional times--if he does not give the
|
|
correct answer on any of these attempts, he is logged off and the violation
|
|
reporting described above is done. If, however, he replies correctly to any
|
|
of the question prompts, he is allowed on the system.
|
|
|
|
Here is an example of the logon conversation:
|
|
|
|
:HELLO JOHN,CLERK.PAYROLL
|
|
|
|
WHERE WAS YOUR FATHER BORN? << incorrect answer entered >>
|
|
Error: The answer given was INCORRECT
|
|
WHERE WAS YOUR FATHER BORN? << now a correct answer is entered >>
|
|
Welcome! You are now signed on.
|
|
|
|
END OF PROGRAM
|
|
: << you have signed on successfully, you are now in MPE >>
|
|
|
|
An Account or System Manager can set up a special LOGON MENU for some or all
|
|
users. If this has been done, a menu will roll up on the screen immediately
|
|
after the logon question is answered.
|
|
|
|
At this point, the user should enter the number of the selection that he
|
|
wishes to invoke, or 'E' to exit. If he enters a selection number, that
|
|
selection is invoked, and, when it is done, the menu is redisplayed. When the
|
|
user types 'E', he is logged off the system.
|
|
|
|
|
|
How to ADD users to the Logon Security System
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Of course, before the system can ask users questions at logon time, it must
|
|
know the correct answers. So, the Account or System Manager must add each
|
|
user to the Logon Security System data base (ANSWER.DATA.SECURITY), specifying
|
|
the user name, account name, and session name (which comprise the "USER ID")
|
|
and time, day, and terminal restrictions, the menu file name (WHICH MUST HAVE
|
|
BEEN CREATED ALREADY) and then have the user input the answers to the personal
|
|
profile questions.
|
|
|
|
To enter users, log on as Account Manager (to add users under an account) or
|
|
System Manager (to add any user) and then
|
|
|
|
:RUN USER.PUB.SECURITY,ADD
|
|
|
|
Following are the items that this option prompts for:
|
|
(type '?' for help any time you don't know what to enter or how to enter it)
|
|
|
|
Enter user name:
|
|
|
|
Enter the MPE user name of the user to be added into the Logon Security
|
|
System. This user must exist in MPE already. Or you may enter an "@", which
|
|
means "any user" (or hit <return> to exit).
|
|
|
|
Enter account name:
|
|
|
|
You are asked this only if you are the System Manager; if you are an Account
|
|
Manager, this will default to your account name. You may enter an "@" which
|
|
means any account (or hit <return> to exit).
|
|
|
|
Enter session name:
|
|
|
|
The system permits securing users by session name as well as user name and
|
|
account name. Enter the session name which the user should use at logon or
|
|
hit <return> if the user will not use a session name, or enter an "@" if the
|
|
user may log on with different session names.
|
|
|
|
NOTE: This feature may be used to create a better account structure --
|
|
instead of creating MPE users by first name (JOHN, MARY, etc.) the
|
|
Account Manager can create "generic" user names based on the functions
|
|
existing within a department (CLERK, SUPER, MANAGER, etc.). When
|
|
several people share the same function, the Logon Security System will
|
|
differentiate them by session name which can be the person's first name.
|
|
Example of such logons are :HELLO MARY,MANAGER.PAYROLL and :HELLO
|
|
JOHN,CLERK.PAYROLL. The session name may be retrieved by your
|
|
application programs and then carried through your application system
|
|
along with the transaction record.
|
|
|
|
Enter user's real name:
|
|
|
|
This is the real name of the user (for instance, JOHN Q. DOE). This
|
|
information is used on the printed security violation memo and some log file
|
|
entries.
|
|
|
|
Enter the permitted terminal numbers:
|
|
|
|
Enter up to 30 logical device numbers on which the user is to be permitted to
|
|
log on, separated by commas (for instance, '220,55,73'). Hit <return> to
|
|
permit access by the user on all terminals. (See the "REMOTE" section of this
|
|
manual for details about putting a password on a dial-up, DS line, or other
|
|
terminal, regardless of where the user is logging on to.)
|
|
|
|
Enter the day-of-week access restrictions:
|
|
|
|
To permit the user to log on only on certain days of the week, enter a day of
|
|
the week (e.g. 'WEDNESDAY' means the user can log on only on Wednesdays) or
|
|
two days of the week separated by a '-' (e.g. 'MON-FRI' means the user can log
|
|
on only on Monday through Friday). Days may be spelled out or abbreviated to
|
|
3 characters. Hit <return> to permit access on all days.
|
|
|
|
Abbreviations allowed: 'SUN', 'MON', 'TUE', 'WED', 'THU', 'FRI', 'SAT'
|
|
|
|
Enter the time-of-day access restrictions:
|
|
|
|
To allow the user to log on only at certain times of the day, enter the
|
|
starting hour followed by a '-' followed by the ending hour (e.g. '9-17' means
|
|
that the user can sign on from 9 am to 5 pm). Hit <return> to permit access
|
|
at any time of day.
|
|
|
|
Enter the menu filename:
|
|
|
|
If you wish to set up a logon menu for this user, enter the name of the menu
|
|
file. THE MENU FILE MUST HAVE ALREADY BEEN CREATED (see "LOGON MENUS FOR
|
|
SECURITY AND CONVENIENCE" in this manual for details on how to set up a menu).
|
|
If you wish the user to instead be allowed to access MPE directly, just hit
|
|
<return>.
|
|
|
|
If you did not create the menu file already, hit <return> (for none), continue
|
|
entering the user info, and add the menu file later (see "How to CHANGE users
|
|
in the Logon Security System" later in this file).
|
|
|
|
Should the user be asked personal profile questions (Y/N)?
|
|
If you want the user to be asked a personal profile question at logon, type
|
|
'Y'. If you do not want a personal profile question to be asked (but still
|
|
have all other access restrictions apply), type 'N'.
|
|
|
|
The user is then added to the Logon Security System, a message is printed
|
|
acknowledging the addition of the user, and you are prompted for another user
|
|
(hit <return> to exit). Note that all successful user additions are logged to
|
|
the SECURITY log file.
|
|
|
|
NOTE: The ADD option requires Account/System Manager capability!
|
|
|
|
Following is an example of this option:
|
|
|
|
:RUN USER.PUB.SECURITY,ADD
|
|
SECURITY/ADD Version 0.5 (VESOFT (C) 1981) For help type '?'
|
|
|
|
Enter user name: CLERK
|
|
Enter account name: PAYROLL
|
|
Enter session name: JOHN
|
|
Enter user's real name: JOHN Q. DOE
|
|
Enter permitted terminal numbers: 34,35,36,37,50,52,53,54
|
|
Enter day of week access restrictions: MON-FRI
|
|
Enter time of day access restrictions: << <return> hit >>
|
|
Enter menu filename: CLERK.MENU.PAYROLL
|
|
Should the user be asked personal profile questions (Y/N)? Y
|
|
|
|
WHAT IS YOUR MOTHER'S MAIDEN NAME? << user answers, no echo >>
|
|
WHAT ELEMENTARY SCHOOL DID YOU GO TO? << user answers, no echo >>
|
|
WHERE WAS YOUR FATHER BORN? << user answers, no echo >>
|
|
WHAT IS YOUR FIRST LOVE'S NAME? << user answers, no echo >>
|
|
*** User has been added ***
|
|
|
|
Enter user name: << <return> hit to exit >>
|
|
|
|
Note that all successful user ADDs are logged to the SECURITY log file.
|
|
|
|
ANOTHER NOTE: Before starting the ADD option you may wish to get HELP.
|
|
To do so say
|
|
|
|
:FILE CICAT.PUB.SYS=USER.HELP.SECURITY
|
|
:HELP
|
|
|
|
IMPORTANT: Before this user attempts to log on, the Logon
|
|
Security System must be activated--see "ACTIVATING THE LOGON SECURITY
|
|
SYSTEM" later in this file.
|
|
|
|
|
|
How to CHANGE users in the Logon Security System
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
It may occur that an incorrect response was given to the ADD-time
|
|
configuration and personal profile questions or you may want to permit a user
|
|
to change his answers to the personal profile questions (which is all he is
|
|
permitted to do in this option); so to make changes to existing user profiles:
|
|
|
|
:RUN USER.PUB.SECURITY,CHANGE
|
|
|
|
The CHANGE option prompts you for: (type '?' for help at any prompt)
|
|
|
|
Enter user name:
|
|
|
|
Enter the user name of the user to be changed. If you are not an Account or
|
|
System Manager, this defaults to the logon user, (or hit <return> to exit).
|
|
|
|
Enter account name:
|
|
|
|
Enter the account of the user ID to be changed. If you are not System
|
|
Manager, this defaults to the logon account, (or hit <return> to exit).
|
|
|
|
Enter session name:
|
|
|
|
Enter the session name entered at user ADD time. If none was entered, hit
|
|
<return>.
|
|
|
|
This option now displays a menu of items corresponding to the configuration
|
|
and personal profile questions, and you are prompted for the item to be
|
|
changed. After you change an item, it continues to prompt you until you hit
|
|
<return>. (If the menu rolls off the screen, type 'R' to redisplay it.) An
|
|
Account or System Manager can change anything; an ordinary user can change
|
|
only his answers to the personal profile questions.
|
|
|
|
Following is an example of the CHANGE option:
|
|
|
|
:RUN USER.PUB.SECURITY,CHANGE
|
|
SECURITY/CHANGE Version 0.5 (VESOFT (C) 1981) For help type '?'
|
|
|
|
Enter user name: CLERK
|
|
Enter account name: PAYROLL
|
|
Enter session name: JOHN
|
|
|
|
R: Redisplay this menu
|
|
U: User info (user, account, session)
|
|
N: User's real name
|
|
T: Permitted terminal numbers
|
|
D: Day-of-week access restrictions
|
|
H: Time-of-day access restrictions
|
|
M: Menu file name
|
|
A: Ask personal profile questions?
|
|
1: WHAT IS YOUR MOTHER'S MAIDEN NAME:
|
|
2: WHERE WAS YOUR FATHER BORN:
|
|
3: WHAT ELEMENTARY SCHOOL DID YOU GO TO:
|
|
4: WHAT IS YOUR FIRST LOVE'S NAME:
|
|
|
|
Enter item number to change: M << change menu file name >>
|
|
Menu file name is now: PAYCLERK.MENU.PAYROLL
|
|
Enter NEW menu file name: PAYSUPER.MENU.PAYROLL
|
|
Enter item number to change: << <return> hit to exit >>
|
|
*** User has been changed ***
|
|
Enter user name: << <return> hit to exit >>
|
|
Note that all successful user CHANGEs are logged to the SECURITY log file.
|
|
|
|
|
|
How to COPY users in the Logon Security System
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
On some systems a certain user (System Manager, for example) may be required
|
|
to access more than one account and therefore may log on with more than one
|
|
user ID. This is where the copy option will save you time because it allows
|
|
an Account or System Manager to copy a given user's security configuration and
|
|
personal profile answers to a new user in the data base. An Account Manager
|
|
can copy only users within his account, whereas the System Manager can copy
|
|
users anywhere on the system. To enter copy mode, execute a:
|
|
|
|
:RUN USER.PUB.SECURITY,COPY
|
|
|
|
Following are the items that this option will ask for
|
|
(type '?' for help at any prompt)
|
|
|
|
Enter original user name:
|
|
|
|
The user name of the user to be copied. This user must exist in the data base
|
|
already, (or hit <return> to exit).
|
|
|
|
Enter original account name:
|
|
|
|
The account of the user to be copied.
|
|
If you are not System Manager, this defaults to the logon account.
|
|
(Hit <return> to exit.)
|
|
|
|
Enter original session name:
|
|
|
|
The session name with which the user is configured in the user data base (the
|
|
session name that was specified at ADD time). If no session name was
|
|
specified, hit <return>.
|
|
|
|
Enter new user name:
|
|
|
|
The user name to which the original user's security parameters (configuration
|
|
and personal profile answers) should be copied. This user must exist in MPE
|
|
already, (or hit <return> to exit).
|
|
|
|
Enter new account name:
|
|
|
|
The account to which the original user's security parameters should be copied.
|
|
This account must exist in MPE already. If you are not System Manager,
|
|
defaults to the logon account, (or hit <return> to exit).
|
|
|
|
Enter new session name:
|
|
|
|
The session name which the user should use at logon, or hit <return> if the
|
|
user will not use a session name.
|
|
|
|
Following is an example of the copy option:
|
|
|
|
:RUN USER.PUB.SECURITY,COPY
|
|
SECURITY/COPY Version 0.5 (VESOFT (C) 1981) For help type '?'
|
|
|
|
Enter original user ID
|
|
Enter user name: CLERK
|
|
Enter account name: PAYROLL
|
|
Enter session name: JOHN
|
|
|
|
Enter new user ID
|
|
Enter user name: CLERK
|
|
Enter account name: ORDER
|
|
Enter session name: JOHN
|
|
|
|
*** User information has been copied ***
|
|
|
|
Enter original user ID
|
|
Enter user name: << <return> hit to exit >>
|
|
|
|
Note that all successful user COPYs are logged to the SECURITY log file.
|
|
|
|
|
|
How to DELETE users from the Logon Security System
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
When you delete users from MPE, you should delete them from the Logon Security
|
|
System as well. Users must exist in MPE in order to be deleted from the Logon
|
|
Security System, so if you wish to delete a user from both, you should delete
|
|
him from the Logon Security System by using this option BEFORE doing a
|
|
:PURGEUSER. To do this:
|
|
|
|
:RUN USER.PUB.SECURITY,DELETE
|
|
|
|
This option prompts you for (type '?' for help at any prompt)
|
|
|
|
Enter user name:
|
|
|
|
The user name of the user to be deleted, (or hit <return> to exit).
|
|
|
|
Enter account name:
|
|
|
|
The account of the user to be deleted. If you are an Account Manager and not
|
|
the System Manager, this will default to the logon account, ( or hit <return>
|
|
to exit).
|
|
|
|
Enter session name:
|
|
|
|
The session name specified at user ADD time.
|
|
If none was specified, hit <return>.
|
|
|
|
NOTE: This option requires Account/System Manager capability!
|
|
|
|
Following is an example of the DELETE option:
|
|
|
|
:RUN USER.PUB.SECURITY,DELETE
|
|
SECURITY/DELETE Version 0.5 (VESOFT (C) 1981) For help type '?'
|
|
Enter user name: CLERK
|
|
Enter account name: PAYROLL
|
|
Enter session name: JOHN
|
|
*** User has been deleted ***
|
|
|
|
Enter user name: << <return> hit to exit >>
|
|
|
|
|
|
Note that all successful user DELETEs are logged to the SECURITY log file.
|
|
|
|
|
|
How to SET UP users who use MULTIPLE LOGON IDs
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Users are normally defined in the Logon Security System with the specific
|
|
session name, user name, and account name (user ID) with which they log on.
|
|
In some environments, a user may be authorized to use more than one user ID to
|
|
log on, depending on the function he is performing. For example, a user who
|
|
uses the Payroll, Accounts Payable, and General Ledger systems may log on with
|
|
three user IDs, i.e. JOHN,CLERK.PAYROLL, JOHN,CLERK.AP and JOHN,CLERK.GL. For
|
|
this, the COPY option of the USER.PUB.SECURITY program is useful because one
|
|
user may be set up with the proper security parameters and the information may
|
|
be COPYd to the other two user IDs.
|
|
|
|
It is also possible that an Account Manager will want to be allowed to log on
|
|
as any user in his account; or the System Manager will want to log on as any
|
|
user on the system. The Logon Security System permits you to set up a user
|
|
who is authorized to log on using many different user IDs by specifying "@"
|
|
as the session name and/or user name and/or account name.
|
|
|
|
For example, if you wanted to set up the System Manager, Mike, so that he
|
|
could log on as any user on the system, you could create a user called
|
|
|
|
MIKE,@.@
|
|
|
|
by responding to the prompts of the ADD option as follows:
|
|
|
|
Enter user name: @
|
|
Enter account: @
|
|
Enter session name: MIKE
|
|
|
|
|
|
If you wanted to set up the Account Manager of the PAYROLL account, Jane, so
|
|
that she could log on as any user in her account, you would create a user
|
|
called JANE,@.PAYROLL by responding to the ADD prompts as follows:
|
|
|
|
Enter user name: @
|
|
Enter account: PAYROLL
|
|
Enter session name: JANE
|
|
|
|
Jane would be allowed to log on using any valid user name in the account, and
|
|
the same personal profile and security restrictions would be used.
|
|
|
|
|
|
ACTIVATING THE LOGON SECURITY SYSTEM
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The Logon Security System may be imposed on the entire system, for selected
|
|
accounts, for only certain users, or for only logons to certain LDEVs
|
|
(terminals, dial-up lines, DS lines, etc.).
|
|
|
|
To activate the Logon Security System for selected accounts or users, the
|
|
Account or System Manager must set up an "OPTION LOGON" UDC that will invoke
|
|
the USER.PUB.SECURITY program. The UDC is stored in the file
|
|
SECURUDC.PUB.SECURITY
|
|
|
|
SECURUDC
|
|
OPTION LOGON, NOBREAK
|
|
comment
|
|
comment *******************************************
|
|
comment JCW is set 1717 by TERMPASS when $SECURITY
|
|
comment keyword is specified for the logon port.
|
|
comment Please see the TERMPASS.DOC.SECURITY.
|
|
comment *******************************************
|
|
comment
|
|
IF JCW<>1717 THEN
|
|
SETJCW SECURITYANSWER=0
|
|
CONTINUE
|
|
RUN USER.PUB.SECURITY,LOGON
|
|
IF SECURITYANSWER = 1 THEN
|
|
BYE
|
|
ENDIF
|
|
ENDIF
|
|
|
|
Because the Logon Security System is activated by a UDC, you can limit the
|
|
system's scope by setting the UDC at the level (either user, account, or
|
|
system) where it is appropriate. So to invoke the Logon Security System for
|
|
the logon account, the Account Manager can do the following:
|
|
|
|
WARNING: DO NOT PERFORM THE FOLLOWING UNLESS YOU HAVE AUTHORIZED
|
|
YOURSELF AS A USER (see "How to ADD users to the Logon
|
|
Security System" in this section). OTHERWISE, YOU MAY LOCK
|
|
UP YOUR ACCOUNT!
|
|
|
|
:SETCATALOG SECURUDC.PUB.SECURITY;ACCOUNT
|
|
|
|
(In spite of this warning, if you DID lock up your account, log on to some
|
|
other account, create the following file in your editor:
|
|
|
|
!JOB MGR/password.ACCOUNT/password << the locked-up account >>
|
|
!SETCATALOG;ACCOUNT
|
|
!EOJ
|
|
|
|
and :STREAM it.)
|
|
|
|
|
|
Once the SECURUDC is set, whenever a user who is affected by this UDC tries to
|
|
sign on, the Logon Security System is invoked and the time, day, and terminal
|
|
restrictions, etc., will be applied.
|
|
|
|
If the account or a user in the account has a logon UDC, that UDC should be
|
|
changed to do as its first command the execution of SECURUDC; e.g. if you
|
|
want to have a logon UDC that does a SHOWJOB, use the following UDC:
|
|
|
|
LOGONUDC
|
|
OPTION LOGON, NOBREAK
|
|
SECURUDC
|
|
SHOWJOB
|
|
***
|
|
|
|
Note that the UDC SECURUDC must have also been set for the user or account in
|
|
question, e.g.
|
|
|
|
:SETCATALOG MYUDC, SECURUDC.PUB.SECURITY
|
|
|
|
It is also recommended that you
|
|
|
|
:ALLOCATE USER.PUB.SECURITY
|
|
|
|
to speed things up when logging on, and also so that it will function during
|
|
backups.
|
|
|
|
|
|
LOGON MENUS FOR SECURITY
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Of course, by restricting users from MPE (so that they never get a ':') you
|
|
are vastly improving security on your system because users are prevented from
|
|
attempting to breach security using various "holes" existing in MPE
|
|
(e.g. :FCOPYing a file containing a password to the terminal, :SHOWCATALOGs,
|
|
or even doing :LISTFs in sensitive groups and accounts).
|
|
|
|
SECURITY/3000's menu subsystem implements this kind of closed system where you
|
|
specify what the user is allowed to do.
|
|
|
|
If you, the Account or System Manager, want to limit a user's access via a
|
|
menu, you must first build a file (the "menu file") in your editor describing
|
|
the menu (the user must have READ access to it).
|
|
A menu file consists of:
|
|
|
|
|
|
*HEADER Optionally, any number of '*HEADER' lines, which contain
|
|
text to be printed when the menu is invoked. A common use
|
|
for this is to print some form of menu identification, e.g.
|
|
|
|
*HEADER ****************************
|
|
*HEADER MAIN ACCOUNTS PAYABLE MENU
|
|
*HEADER ****************************
|
|
|
|
You may also put escape sequences to control the display
|
|
on a *HEADER line (e.g. <escape-H> <escape-J> to home the
|
|
cursor and clear the screen before displaying the menu).
|
|
|
|
|
|
*CAPTION Up to 24 selection descriptors. Each section descriptor
|
|
consists of one
|
|
'*CAPTION' line followed by a number of body lines.
|
|
The '*CAPTION' line defines what this selection should be
|
|
identified as on the menu, e.g.
|
|
|
|
*CAPTION INVOICE ADDITION
|
|
|
|
The body lines contain the commands to be executed when
|
|
the selection is chosen. A body line can be:
|
|
|
|
|
|
MPE Any MPE command or commands, including :RUN,
|
|
command :IF, :ELSE, and :ENDIF, e.g.
|
|
|
|
FILE D=DATA.PUB.AP
|
|
RUN INVADD.PUB.AP
|
|
LISTF XYZ.PUB;$NULL
|
|
IF CIERROR = 907 THEN
|
|
RUN UPDATE.PUB;PARM=1
|
|
ELSE
|
|
DISPLAY Update system in use
|
|
ENDIF
|
|
|
|
|
|
|
|
DISPLAY which causes the specified string to be
|
|
displayed to the terminal, e.g.
|
|
|
|
DISPLAY This system inoperative until Friday
|
|
DISPLAY Contact Joe Martin at ext. 283
|
|
|
|
|
|
VEMENU which invokes VEMENU with the specified menu file.
|
|
This permits "nested menus", e.g.
|
|
|
|
VEMENU NEWORDER.ENTRY.PURCH << menu file >>
|
|
|
|
|
|
USE which executes commands from the specified file,
|
|
e.g.
|
|
|
|
USE ENTRY.PROC.GL << file containing set of
|
|
file equations and
|
|
commands for entry of
|
|
GL information >>
|
|
|
|
|
|
EXIT which exits VEMENU and logs the user off the system.
|
|
|
|
Thus, a simple menu file may be created as follows:
|
|
|
|
:EDITOR
|
|
/ADD
|
|
1 *HEADER *************************************
|
|
2 *HEADER ACCOUNTS PAYABLE SYSTEM
|
|
3 *HEADER CHOOSE ONE OF THE FOLLOWING:
|
|
4 *HEADER *************************************
|
|
5 *HEADER
|
|
6 *CAPTION VENDOR MAINTENANCE
|
|
7 FILE APDB=APDB.DATABASE.AP
|
|
8 RUN AP010
|
|
9 *CAPTION INVOICE MAINTENANCE
|
|
10 FILE APDB=APDB.DATABASE.AP
|
|
11 RUN AP020
|
|
12 *CAPTION CHECK PRINTING
|
|
13 FILE STRMFILE=CHKPRINT.JOB.AP << job stream
|
|
14 RUN STREAMX.PUB.SECURITY;PARM=1 << which asks
|
|
15 *CAPTION ARCHIVE << for starting check # >>
|
|
16 DISPLAY Sorry, archive system not yet ready
|
|
17 DISPLAY -- see system management
|
|
18 *CAPTION GO TO ACCOUNTS RECEIVABLE MENU
|
|
19 VEMENU ARMENU.PUB.AR
|
|
/KEEP MAINMENU.PUB.PAYROLL
|
|
/EXIT
|
|
|
|
Then, add the user to the Logon Security System, entering the name of the menu
|
|
file when prompted for it; if the user has already been set up in the Logon
|
|
Security System, use the CHANGE option to change his menu file name to the
|
|
menu file he is to use. If you decide that a user should go directly into MPE
|
|
when he logs on instead of using a menu, just hit <return> when prompted for
|
|
the name of the menu file.
|
|
|
|
Whenever a user who is configured in the Logon Security System with a menu
|
|
file logs on, the menu contained in that file is displayed and he is asked to
|
|
choose a selection or hit 'E' to exit. When a selection is chosen, the
|
|
commands specified in the selection body are executed.
|
|
|
|
When that menu option has completed, the user is returned to the menu and
|
|
asked to choose another selection. This continues until either the user
|
|
enters 'E' or a selection chosen by the user executes an 'EXIT' command. When
|
|
the user exits the menu, he is automatically logged off. AT NO TIME IS THE
|
|
USER EVER LET INTO MPE!
|
|
|
|
Of course, different users can have different menu files. For instance, if
|
|
you have an Accounts Payable system--in which you have clerks who can add and
|
|
delete invoices; supervisors who can add and delete vendors as well as
|
|
invoices; and a manager who can add and delete vendors, add and delete
|
|
invoices, and print checks--you can have one menu file for clerks, another
|
|
menu file for supervisors, and a third for the manager. (Remember that if
|
|
several users share the same function, you can have them all use a common user
|
|
name and differentiate them by their session)
|
|
|
|
|
|
ATTEMPTED SECURITY VIOLATION LOGGING
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
When an attempted violation occurs, the Logon Security System makes it
|
|
possible to catch the violator "in the act" by immediately providing the
|
|
necessary information about the attempted security breach.
|
|
If a violation attempt occurs--meaning a user has responded incorrectly to a
|
|
logon question or has attempted to log on at an unauthorized time, on an
|
|
unauthorized day, or from an unauthorized terminal--the Logon Security System
|
|
will immediately:
|
|
|
|
* Send a descriptive message to the system console, in inverse
|
|
video, to distinguish it from other console messages
|
|
|
|
* Print a violation memo off the system line printer (device class
|
|
LP) or a designated printer (see "SETTING ATTEMPTED SECURITY
|
|
VIOLATION MEMO ROUTING PARAMETERS" in this section).
|
|
|
|
* Log an entry to the SECURITY log file.
|
|
|
|
LOG.DATA.SECURITY
|
|
|
|
This file is initially built as a 5,000-record circular file,
|
|
so if the file fills up, new entries will be appended while
|
|
the oldest entries are dropped.
|
|
|
|
This provides sufficient information for the System Manager to immediately
|
|
respond to the attempted security breach. The System Manager may also "hang"
|
|
the terminal at this point (while someone is waiting to be logged on) for a
|
|
while to give himself more time to respond, or to disable that device so that
|
|
additional logon attempts are disallowed.
|
|
|
|
|
|
How to LIST the security LOG FILE
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Information about all changes to user status (add, change, delete) and all
|
|
violation attempts are logged to the SECURITY/3000 log file with pertinent
|
|
information about the time and date of the action, terminal on which the
|
|
action took place, and the user who performed the action (including session
|
|
name). SECURITY/3000 may be configured to log all successful logons,
|
|
providing an excellent audit trail of system access.
|
|
|
|
The following violation messages are logged:
|
|
|
|
BAD USER Logon attempted by unauthorized user
|
|
BAD RESPONSE Question was answered incorrectly
|
|
BAD DAY Logon attempted on unauthorized day
|
|
BAD TIME Logon attempted at unauthorized time
|
|
BAD TERMINAL Logon attempted on unauthorized terminal
|
|
INVALID TERMINAL PASSWORD Invalid terminal password was entered
|
|
(see the "REMOTE" section of this
|
|
manual for details).
|
|
|
|
and the following update messages are logged:
|
|
|
|
Add Addition of a user to the Logon Security System
|
|
Change Change made to a user in the Logon Security System
|
|
Copy Security profile copies from one user to another
|
|
Delete User deleted from Logon Security System
|
|
|
|
and the following successful logon messages are optionally logged:
|
|
|
|
'SUCCESSFUL LOGON' Valid logon through LOGON SECURITY
|
|
'SUCCESSFUL TERMINAL LOGON' Valid logon through the TERMPASS
|
|
|
|
This file can be later listed to the terminal or line printer, and can be
|
|
cleared after review. An Account Manager can list messages in his account,
|
|
and the System Manager can list the entire file; (only the System Manager can
|
|
clear the file.) An ordinary user is not permitted to use this option.
|
|
|
|
:RUN USER.PUB.SECURITY,LISTLOG
|
|
|
|
When you run this option, you are prompted for whether the listing is to go to
|
|
the line printer (reply 'L') or to the terminal (reply 'T'). If the line
|
|
printer is selected, the log file is dumped (in a readable format) to the line
|
|
printer (device class LP). If the terminal is selected, the same printout is
|
|
generated except that users' real names are not printed.
|
|
|
|
To redirect the listing from the default (DEV=LP) to some other device or a
|
|
disc file, issue a file equation for SECLIST, e.g.
|
|
|
|
:FILE SECLIST=MYLOGLST;ACC=OUT;DEV=DISC;NOCCTL;REC=,,,ASCII;SAVE
|
|
|
|
Following is an example of the use of this option:
|
|
|
|
:RUN USER.PUB.SECURITY,LISTLOG
|
|
SECURITY/LISTLOG Version 0.5 (VESOFT (C) 1981) For help type '?'
|
|
|
|
Listing to (L)ine printer or (T)erminal: T
|
|
Type : Date Time Dev Logon Target user/
|
|
Violatn type
|
|
Add :20JUL85 5:17PM 33 DON,MANAGER.PAYROLL ENTRY.PAYROL
|
|
Violat:21JUL85 9:23AM 117 READER,LABOR.PAYROLL BAD USER
|
|
Violat:21JUL85 9:23AM 117 SALLY,ENTRY.PAYROLL BAD RESPONSE
|
|
Change:21JUL85 10:17AM 25 BILL,MANAGER.SYS ENTRY.PAYROL
|
|
Violat:24JUL85 2:33PM 117 R1,ENTRY.PAYROL BAD DAY
|
|
Violat:26JUL85 1:54PM 103 R1,ENTRY.PAYROL BAD TERMINAL
|
|
Logon :26JUL85 2:00PM 25 ENTRY.PAYROL SUCCESSFUL LOGON
|
|
*** Log file has been printed ***
|
|
|
|
|
|
How to CLEAR the security LOG FILE
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Of course you may have good reason to clear the SECURITY log so:
|
|
|
|
:RUN USER.PUB.SECURITY,CLEARLOG
|
|
|
|
to clear the log file.
|
|
|
|
This option will not prompt you for any input.
|
|
|
|
NOTE: This option can be used by the System Manager only.
|
|
|
|
A sample run of this option follows:
|
|
:RUN USER.PUB.SECURITY,CLEARLOG
|
|
SECURITY/CLEARLOG Version 0.5 (VESOFT (C) 1981) For help type '?'
|
|
|
|
*** Log file has been cleared ***
|
|
|
|
|
|
CONFIGURING SECURITY/3000
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Several configuration options (described below) may be specified in the
|
|
security configuration file,
|
|
|
|
SECURMGR.PUB.SECURITY
|
|
|
|
This file is created at installation time with default values, which may be
|
|
modified as described in the options below.
|
|
|
|
|
|
DISALLOWING CONCURRENT SESSIONS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
As you may know, MPE allows several users with an identical user/account name
|
|
(e.g. USER.PAYROLL) to be logged on simultaneously. A user is therefore
|
|
permitted to be logged on to more than one terminal and have more than one
|
|
session running concurrently, which may be undesirable.
|
|
|
|
As one of our users pointed out, "No individual could fully control the
|
|
activity on two terminals at a time and hence while on one terminal,
|
|
unauthorized use could be made of the other."
|
|
|
|
The Logon Security System may be configured to disallow more than one session
|
|
with a given user ID to be logged on concurrently. Remember that we consider
|
|
session name to be part of the user ID, so JOE,USER.GL and MARY,USER.GL are
|
|
recognized as being different, even though the MPE user name is the same.
|
|
|
|
With concurrent sessions disallowed, if someone attempts to log on with a user
|
|
ID exactly the same as a user who is already logged on, he is not let on the
|
|
system. Furthermore, a message is sent to the already-logged-on terminal to
|
|
let that user know that someone is attempting a secondary logon.
|
|
|
|
To disallow concurrent sessions, add the following line to the SECURMGR file:
|
|
|
|
CONCURRENT-SESSION=NO
|
|
|
|
Of course we would rather allow concurrent sesseons, so change it to:
|
|
|
|
CONCURRENT-SESSION=YES
|
|
|
|
By default, concurrent sessions are permitted.
|
|
|
|
|
|
ELIMINATING SESSION NAME CHECK
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
SECURITY/3000 differentiates users by session name by expanding the user ID to
|
|
include session name in addition to user and account name. This feature
|
|
permits a better account structure by allowing "generic" users to be created
|
|
with user names describing the users' function and session names identifying
|
|
the individual user (e.g. JOHN,ENTRY.PAYROLL and MARY,CLERK.AP). Thereby,
|
|
several users could be set up under a common user name but with different
|
|
session names, and each one would have unique personal profile answers, time
|
|
and day restrictions, menu files, etc.
|
|
|
|
SECURITY/3000 therefore enforces the use of correct session name by requiring
|
|
that a user log on using the same session name with which he was configured
|
|
when added to the security system. If he was configured with a session name
|
|
of JOHN, for example, and tries to log on using no session name or a different
|
|
session name, he will not be recognized as an authorized user and therefore
|
|
will not be let on the system.
|
|
|
|
For those who do not wish to enforce session name or set up "generic" users
|
|
and would rather use MPE's approach of optional session name, it is possible
|
|
to instruct the Logon Security System to ignore the session name at logon by
|
|
adding the following to the SECURMGR file:
|
|
|
|
SESSION-NAME=OFF
|
|
|
|
However, if you choose not to enforce session name, all users must have been
|
|
set up in the Logon Security System with the session name the same as the user
|
|
name or with a session name of '@'. For example, if you are adding a user who
|
|
should log on as JOHN.PAYROLL, he must be set up at ADD time with a user name
|
|
of 'JOHN', an account name of 'PAYROLL' and a session name of 'JOHN' or '@'.
|
|
When he logs on, however, he should not use the session name but rather just
|
|
JOHN.PAYROLL.
|
|
|
|
(When SESSION-NAME=OFF, the SECURITY data base is checked for an authorized
|
|
user with a session name which is the same as the user name.)
|
|
|
|
By default, session name is a valid part of the user ID.
|
|
|
|
|
|
DISABLING A TERMINAL ON WHICH AN ATTEMPTED VIOLATION HAS OCCURED
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
If a user is unsuccessful in logging on (either by not responding properly to
|
|
personal profile question, attempting to log on at an unauthorized time or
|
|
day, etc.), it is often desirable to "hang" that user's terminal so that he is
|
|
unable to attempt further logons.
|
|
|
|
To do this, determine the time in seconds for which you would like the
|
|
terminal hung and then add a line to the SECURMGR file in the format:
|
|
|
|
PAUSE=numseconds
|
|
|
|
where 'numseconds' is the number of seconds for which the terminal will be
|
|
hung. Then, when a user has an unsuccessful logon attempt, he will be hung
|
|
for the amount of time specified.
|
|
|
|
By default, 'numseconds'=0, which means that the user will not be hung at all.
|
|
|
|
|
|
SPECIFYING NUMBER OF ATTEMPTS TO ANSWER QUESTION AT LOGON
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
You may specify the number of attempts users are allowed to answer the
|
|
question at logon by adding a line to the SECURMGR file in the format:
|
|
|
|
TIMES=attempts
|
|
|
|
where 'attempts' is the number of times the question will be asked.
|
|
|
|
By default, 'attempts'=2.
|
|
|
|
|
|
LOGGING SUCCESSFUL LOGONS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
You may wish to know who is logging on through the dial-up line, or whether a
|
|
particular logon is being utilized. For how to log successful logons which
|
|
come through your dial-in lines or are specific to a port.
|
|
|
|
You may enable SECURITY/3000 to log successful logons which pass through the
|
|
USER program by adding a line to the SECURMGR.PUB.SECURITY file in the format:
|
|
|
|
LOG-LOGON=ON
|
|
|
|
This keyword will be seen by the LOGON security program and cause all
|
|
successful logons to be written to the LOG.DATA.SECURITY file for later
|
|
review. No other configuration is required and this keyword may be added or
|
|
removed at any time. When the log file is reviewed later the message:
|
|
|
|
SUCCESSFUL LOGON
|
|
|
|
will be displayed.
|
|
|
|
|
|
SETTING ATTEMPTED SECURITY VIOLATION MEMO ROUTING PARAMETERS
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The security violation memo which is generated when a violation attempt has
|
|
occurred is a useful tool for immediately taking corrective action.
|
|
|
|
You may change the memo parameters--device to which the memo is routed, outpri
|
|
of the memo, and number of copies to generate--by adding a line to the
|
|
SECURMGR file in the format:
|
|
|
|
DEV=device,outpri,copies
|
|
|
|
where
|
|
|
|
'device' is the device to which the memo is routed.
|
|
'outpri' is the output priority with which the memo will be
|
|
generated.
|
|
'copies' is the number of copies of the memo which will be printed.
|
|
|
|
Therefore, if you want the memo routed to a special printer in the DP
|
|
Auditor's office where someone will be able to take immediate investigative
|
|
action, declare this on the 'device' parm. If you want to give the memo top
|
|
priority to ensure that it is printed right away, specify an outpri of 13; if
|
|
you want to defer printing the memo, specify an outpri of 1, which will cause
|
|
the memo to remain in the spooler for later printing or purging.
|
|
|
|
If you do not declare a 'DEV=' line in the SECURMGR file, the memo will be
|
|
created with default attributes (dev=LP, outpri=8, copies=1).
|
|
|
|
If you do not want the security violation memo at all (but will still have the
|
|
attempted violation console message and log file entry), do not declare a
|
|
'DEV=' line in the SECURMGR file, and add this file equation:
|
|
|
|
:FILE SECLIST=$NULL
|
|
|
|
to SECURUDC (the UDC which invokes the Logon Security System before the
|
|
command which :RUNs USER.PUB.SECURITY.)
|
|
|
|
|
|
HOW SECURITY VIOLATIONS ARE REPORTED
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Whenever an attempted violation occurs, a security memo is printed to the line
|
|
printer; the default format of it is:
|
|
|
|
TO: SYSTEM MANAGER
|
|
|
|
FROM: SECURITY/3000
|
|
|
|
RE: SECURITY VIOLATION
|
|
|
|
WE WOULD LIKE TO CALL TO YOUR ATTENTION THE FACT THAT THERE WAS A
|
|
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvv VIOLATION BY:
|
|
|
|
USER: uuuuuuuu
|
|
ACCOUNT: aaaaaaaa
|
|
GROUP: gggggggg
|
|
SESSION NAME: ssssssss
|
|
USER NAME: nnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
|
|
LOGICAL DEVICE: lll
|
|
ON wwwwwwwwwwwwwwwwwwwwwwwwwww
|
|
|
|
PLEASE INVESTIGATE.
|
|
|
|
where
|
|
|
|
'uuuuuuuu' represents the user name
|
|
'aaaaaaaa' represents the account name
|
|
'gggggggg' represents the group name
|
|
'ssssssss' represents the session name
|
|
'lll' represents the logical device number
|
|
'nnnnnnnnnnnnnnnnnnnnnnnnnnnnnn' represents the user's real name
|
|
'wwwwwwwwwwwwwwwwwwwwwwwwwww' represents the time and date when
|
|
the violation (attempt!) occurred
|
|
'vvvvvvvvvvvvvvvvvvvvvvvvvvv' represents the type of violation
|
|
(BAD USER, BAD DAY, BAD TIME,
|
|
BAD TERMINAL, or BAD RESPONSE).
|
|
|
|
By using the above abbreviations ('uuuuuuuu', 'aaaaaaaa', etc.),
|
|
you can modify the memo format as you please. The format is stored in
|
|
|
|
MEMOFORM.DATA.SECURITY
|
|
|
|
NOTE: If you have :HEADON on your LP, the header on the memo will
|
|
indicate the user name (in this case, the violator!) on it, and
|
|
the operator may deliver this memo to the violator!
|
|
|
|
|
|
HOW THE QUESTIONS FILE IS MAINTAINED
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The personal profile questions that are asked at logon time of all users in
|
|
the system are not fixed by SECURITY/3000; they can be set up with custom
|
|
questions--up to 30 of them (remember, only ONE of the questions, at random,
|
|
will be asked at logon time). The questions are stored in the editor-format
|
|
file called
|
|
|
|
QUESTION.DATA.SECURITY
|
|
|
|
When SECURITY/3000 is installed from VESOFT, there are already some sample
|
|
questions in this file, so it may not be changed at all.
|
|
|
|
So, if you want to add a question to the file, just do the following:
|
|
|
|
:EDITOR
|
|
/TEXT QUESTION.DATA.SECURITY
|
|
/ADD
|
|
6 HOW LONG DID YOU LIVE IN THE PLACE WHERE YOU WERE BORN?
|
|
7 //
|
|
/KEEP
|
|
/EXIT
|
|
|
|
If you must delete a question from the file, do:
|
|
|
|
:EDITOR
|
|
/TEXT QUESTION.DATA.SECURITY
|
|
/REPLACE 6
|
|
6 HOW LONG DID YOU LIVE IN THE PLACE WHERE YOU WERE BORN?
|
|
6 DELETED << you type >>
|
|
/KEEP
|
|
/EXIT
|
|
|
|
Again, NEVER execute an actual DELETE command!
|
|
|
|
You may want to have only ONE question in the file--this question will be the
|
|
only one asked at logon time. Therefore, if you would like to use an MPE-like
|
|
password rather than personal profile questions, you can have the one question
|
|
in the file be
|
|
|
|
Enter USER password:
|
|
|
|
which looks just like
|
|
MPE's password prompt; but don't forget that the passwords in SECURITY/3000's
|
|
Logon Security System, unlike MPE passwords, are stored in one-way encrypted
|
|
format.
|
|
|
|
If the QUESTION file is empty (zero records, not just only 'DELETED' records),
|
|
no questions will be asked at logon time; this is useful in case you do not
|
|
want SECURITY/3000's personal profile questions, but only its other features.
|
|
Remember that you can impose the questions on only selected users by answering
|
|
'N' to the "Should the user be asked personal profile questions?" prompt when
|
|
you ADD the user.
|
|
|
|
NOTE: The maximum number of questions is 30.
|
|
|
|
|
|
ACCESSING THE USER PROFILE DATA BASE
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Information about all the users you have authorized in the Logon Security
|
|
System (i.e. answers, permitted terminal numbers, permitted times of day/days
|
|
of week, real user names, etc.) is stored in the IMAGE data base
|
|
|
|
ANSWER.DATA.SECURITY
|
|
|
|
To write reports against this data base (e.g. show the user names and the
|
|
permitted days of week for all users, sorted by user ID), merely access this
|
|
data base with QUERY or any of your programs. Of course, the personal profile
|
|
answers are one-way encrypted, and therefore cannot be determined.
|
|
|
|
Note that you can open the data base through QUERY in READ mode only! Also,
|
|
as an added security feature, you may change the data base password (as
|
|
follows) and SECURITY/3000 will still be able to (magically!) access the data
|
|
base:
|
|
|
|
:HELLO MANAGER.SECURITY,DATA
|
|
:RUN DBUTIL.PUB.SYS
|
|
>>SET ANSWER PASSWORD 1=password
|
|
>>EXIT
|
|
|
|
|
|
CONCLUSION: PART 1
|
|
~~~~~~~~~~~~~~~~~~~
|
|
That's it for the particulars on how the LOGON portion of SECURITY/3000
|
|
works. In Part 2, I will discuss various utilities and security logs
|
|
associated with SECURITY/3000.
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
/\ /\
|
|
/ \ / \
|
|
/ / \
|
|
/ Inside NORAD \ /\
|
|
/\ / \ / \
|
|
/ \ by: Anonymous / \
|
|
/ \ \
|
|
_ _ /_ _ _ _ _ _ \_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _\_ _
|
|
|
|
|
|
|
|
|
|
|
|
Note: The information below was compiled through research and personal
|
|
interviews with Air Force personnel who were stationed at NORAD
|
|
Headquarters. The officers that we talked wished for their names to
|
|
be withheld.
|
|
|
|
Aerospace Defense Structure
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The military defense of North America is a joint effort of the United
|
|
States and Canada. All forces directly assigned to aerospace defense by the
|
|
two nations are organized as the North American Air Defense Command (NORAD).
|
|
The major elements of NORAD are the Canadian Forces Air Defence Command
|
|
(CFADC), the U.S. Air Force's Air Defense Command (USAD ADC), and the U.S.
|
|
Army's Air Defense Command (ARADCOM). Headquarters of NORAD, USAF ADC, and
|
|
ARADCOM are in Colorado Springs, Colorado. While the CFADC headquarters are in
|
|
St. Hubert, Quebec.
|
|
The primary jobs of NORAD is to serve as an early warning system in the
|
|
event of nuclear attack. NORAD is primarily concerned with the detection,
|
|
identification, and tracking of hostile bombers, ballistic missiles, and space
|
|
vehicles.
|
|
|
|
Defense Against Manned Bombers
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Defense against manned bombers includes ground-based and airborne radars
|
|
to warn of the approach of hostile aircraft; supersonic fighter-interceptor
|
|
aircraft capable of operating in any type of weather, and surface-to-air
|
|
interceptor missiles. Detection and tracking of bombers is accomplished by
|
|
ground-based radars located along the Arctic Circle from the Aleutians to
|
|
Greenland and, in greater concentrations, in southern Canada and the United
|
|
States. Radar equipped aircraft on continuous patrol off the Atlantic and
|
|
Pacific coasts extend surveillance seaward.
|
|
Any aircraft detected must of course be identified. Flights penetrating
|
|
designated Air Defense Identification Zones (ADIZ) must be identified by
|
|
correlating their flight plans submitted in advance with the precise position
|
|
of the aircraft or, when this fails, through visual identification by
|
|
interceptor aircraft. The simplest method of identification is to interrogate
|
|
an electronic coding device, called Identification Friend of For (IFF), located
|
|
in the aircraft, which replies to the interrogation with a known password. If
|
|
the airborne object is hostile, it will be destroyed by fighter-interceptor jet
|
|
aircraft using nuclear or conventional armament or by unmanned surface-to-air
|
|
missiles such as BOMARC or NIKE.
|
|
Integration of the defense systems against the manned bomber is
|
|
accomplished by the electronic supersystem called Semi-Automatic Ground
|
|
Environment (SAGE). In SAGE, computers receive and store data, solve problems,
|
|
and display solutions to the detection station display screens. This allows
|
|
air defense commanders to follow the battle situation and direct appropriate
|
|
defense weapons.
|
|
If interceptors or missiles are launched or committed against the target,
|
|
the computer, with operator assistance, transmits information to and guides
|
|
them to the hostile object. Interceptors are equipped with an automatic pilot,
|
|
which can ge guided from the ground by means of data link. In the event the
|
|
SAGE system should become inoperative, its functions would be taken over by
|
|
BUIC, the Back-up Interceptor Control system, with widely dispersed automated
|
|
control centers.
|
|
|
|
Defense Against Ballistic Missiles
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Defense against ballistic missiles presents more difficult problems than
|
|
defense against manned bombers. An extensive network known as the Ballistic
|
|
Missile Early Warning System (BMWES), runs through Alaska, Canada, Greenland,
|
|
and the British Isles, is used to detect and relay information about inbound
|
|
missiles. A similar network is planned to cover the southern portion of the
|
|
continent. In the event that an inbound missiles is detected, NORAD directs
|
|
the use of antiballistic-missile weaponry.
|
|
|
|
Defense Against Attack Through Space
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Although space vehicles are note currently employed for offensive military
|
|
usage at the present, the possibility is certainly there. One of NORAD's
|
|
primary responsibilities is to monitor any space born vehicles.
|
|
The number of man made objects in orbit above the Earth numbers in the
|
|
thousands. Continuous surveillance of these objects in space is performed by
|
|
NORAD's Space Detection and Tracking System (SPADATS). SPADATS consists of two
|
|
primary elements, the U.S. Navy's Space Surveillance (SPASUR) System--an
|
|
electronic fence of high-powered transmitters and receivers extending across
|
|
the southern United States--and the U.S. Air Force's SPACETRACK system.
|
|
SPACETRACK consists of a worldwide network of radars, space-probing cameras,
|
|
and communications. An operational control center with a central
|
|
data-processing facility called the Space Defense Center, located at NORAD
|
|
headquarters, serves to integrate the entire network.
|
|
|
|
|
|
NORAD Headquarters
|
|
~~~~~~~~~~~~~~~~~~
|
|
In 1966, operations began in the new Combat Operations Center deep inside
|
|
a mountain in Colorado. The center is located outside Colorado Springs at the
|
|
Cheyenne Mountain Air Force Base. The complex is set inside tunnels that have
|
|
been carved deep into the heart of the mountain itself. The entire structure
|
|
is situated atop huge, 3-foot diameter springs to absorb nuclear shock waves.
|
|
The headquarters was designed to survive a 1 megaton nuclear blast, but since
|
|
this was designed to deter 1960's nuclear technology, it is questionable
|
|
whether or not it would withstand attack by today's "smart" bombs, which could
|
|
put a missile right in the front door.
|
|
Every day, over a thousand people go to work the day shift at NORAD,
|
|
commuting up from near by Peterson Air Force Base. Upon arrival at the center,
|
|
they walk past the station's concertina wire topped twelve foot fences, which
|
|
are surprisingly non-electrified. The exterior is constantly patrolled and
|
|
observed by the Air Force Elite Security Forces, each armed to the teeth with
|
|
9mm pistols and M-16's. Scores of German Shepherd attack dogs are used as an
|
|
added bit of security. Above the main tunnel entrance, is a sign that reads:
|
|
"Use of Deadly Force Authorized by all Personnel."
|
|
The interior of the base, built to survive a nuclear attack, is completely
|
|
self-contained. Backup power is available in case of a power failure, and
|
|
provides uninterupted power for lighting as well as computer systems. The base
|
|
also contains food and water supplies for all personnel for over 30 days. The
|
|
base itself is entirely shielded with lead and reinforced concrete, which
|
|
augments the natural protection provided by the mountain. Huge blast doors
|
|
provide the only entrances and exits to the base.
|
|
Of course, the base is equipped with state-of-the-art communications
|
|
systems, with full time links to all nuclear weapons sites in both the U.S. and
|
|
Canada. The base is also linked into all major news and civil defense agencies
|
|
to accept and release up-to-the-minute information on global military affairs.
|
|
Surprisingly, however, the base is not equipped with today's most powerful
|
|
mainframes and supercomputers. Many of the systems are somewhat archaic, as any
|
|
upgrade would cause massive redesign of weapons and defense systems.
|
|
|
|
Conclusion
|
|
~~~~~~~~~~
|
|
One may wonder about the usefulness of this unique command post in the
|
|
interior of a mountain in light of current global events. With the evaporation
|
|
of central government in the Soviet Union, and the decreased likelihood of
|
|
another global war, a huge nuclear arsenal is beginning to seem worthless.
|
|
However, with the capability to monitor global military situations at all times,
|
|
and the ability to deter possible conflict, it still provides a valuable service
|
|
to all of North America, if not the world. Better safe than sorry.
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
*******************************************************************************
|
|
* *
|
|
* Card-O-Rama: Magnetic Stripe Technology and Beyond *
|
|
* *
|
|
* or *
|
|
* *
|
|
* "A Day in the Life of a Flux Reversal" *
|
|
* *
|
|
* *
|
|
* *
|
|
* by: ..oooOO Count Zero OOooo.. yRDTy 11/22/91 *
|
|
* *
|
|
*******************************************************************************
|
|
|
|
---A production of : -=Restricted -=Data -=Transmissions :
|
|
: :
|
|
: "Truth is cheap, but information costs." :
|
|
|
|
Look in your wallet. Chances are you own at least 3 cards that have
|
|
magnetic stripes on the back. ATM cards, credit cards, calling cards,
|
|
frequent flyer cards, ID cards, passcards,...cards, cards, cards! And chances
|
|
are you have NO idea what information is on those stripes or how they are
|
|
encoded. This detailed document will enlighten you and hopefully spark your
|
|
interest in this fascinating field. None of this info is 'illegal'...but
|
|
MANY organizations (government, credit card companies, security firms,
|
|
etc.) would rather keep you in the dark. Also, many people will IMMEDIATELY
|
|
assume that you are a CRIMINAL if you merely "mention" that you are
|
|
"interested in how magnetic stripe cards work." Watch yourself, ok? Just
|
|
remember that there's nothing wrong with wanting to know how things work,
|
|
although
|
|
in our present society, you may be labelled a "deviant" (or worse, a <gasp>
|
|
"hacker!").
|
|
|
|
Anyway, I will explain in detail how magstripes are encoded and give
|
|
several examples of the data found on some common cards. I will also cover the
|
|
technical theory behind magnetic encoding, and discuss magnetic encoding
|
|
alternatives to magstripes (Wiegand, barium ferrite). Non-magnetic card
|
|
technology (bar code, infrared, etc.) will be described. Finally, there will
|
|
be an end discussion on security systems and the ramifications of emergent
|
|
"smartcard" and biometric technologies.
|
|
|
|
*DISCLAIMER*
|
|
|
|
Use this info to EXPLORE, not to EXPLOIT. This text is presented for
|
|
informational purposes only, and I cannot be held responsible for anything you
|
|
do or any consequences thereof. I do not condone fraud, larceny, or any other
|
|
criminal activities.
|
|
|
|
*A WARNING*
|
|
|
|
I've noticed lately a few "books" and "magazines" for sale that were
|
|
FILLED with PHILES on a variety of computer topics. These philes were
|
|
originally released into the Net with the intention of distributing them for
|
|
FREE. HOWEVER, these philes are now being PACKAGED and sold FOR PROFIT. This
|
|
really pisses me off. I am writing this to be SHARED for FREE, and I ask no
|
|
payment. Feel free to reprint this in hardcopy format and sell it if you must,
|
|
but NO PROFITS must be made. Not a f**king DIME! If ANYONE reprints this
|
|
phile and tries to sell it FOR A PROFIT, I will hunt you down and make your
|
|
life miserable. How? Use your imagination. The reality will be worse.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
** MAGSTRIPE FIELDS, HEADS, ENCODING/READING **
|
|
|
|
|
|
Whew! I'll get down to business now. First, I am going to explain the
|
|
basics behind fields, heads, encoding and reading. Try and absorb the THEORY
|
|
behind encoding/reading. This will help you greatly if you ever decide to
|
|
build your own encoder/reader from scratch (more on that later).
|
|
FERROMAGNETIC materials are substances that retain magnetism after an external
|
|
magnetizing field is removed. This principle is the basis of ALL magnetic
|
|
recording and playback. Magnetic POLES always occur in pairs within magnetized
|
|
material, and MAGNETIC FLUX lines emerge from the NORTH pole and
|
|
terminate at the SOUTH. The elemental parts of MAGSTRIPES are ferromagnetic
|
|
particles about 20 millionths of an inch long, each of which acts like a tiny
|
|
bar magnet. These particles are rigidly held together by a resin binder.
|
|
The magnetic particles are made by companies which make coloring pigments
|
|
for the paint industry, and are usually called pigments. When making the
|
|
magstripe media, the elemental magnetic particles are aligned with their
|
|
North-South axes parallel to the magnetic stripe by means of an external
|
|
magnetic fields while the binder hardens.
|
|
|
|
These particles are actually permanent bar magnets with TWO STABLE
|
|
POLARITIES. If a magnetic particle is placed in a strong external magnetic
|
|
field of the opposite polarity, it will FLIP its own polarity (North becomes
|
|
South, South becomes North). The external magnetic field strength required to
|
|
produce this flip is called the COERCIVE FORCE, or COERCIVITY of the particle.
|
|
Magnetic pigments are available in a variety of coercivities (more on that
|
|
later on).
|
|
|
|
An unencoded magstripe is actually a series of North-South magnetic
|
|
domains (see Figure 1). The adjacent N-S fluxes merge, and the entire stripe
|
|
acts as a single bar magnet with North and South poles at its ends.
|
|
|
|
|
|
Figure 1: N-S.N-S.N-S.N-S.N-S.N-S.N-S.N-S <-particles in stripe
|
|
---------
|
|
represented as-> N-----------------------------S
|
|
|
|
|
|
However, if a S-S interface is created somewhere on the stripe, the fluxes
|
|
will REPEL, and we get a concentration of flux lines around the S-S interface.
|
|
(same with N-N interface) ENCODING consists of creating S-S and N-N
|
|
interfaces, and READING consists of (you guessed it) detecting 'em. The S-S
|
|
and N-N interfaces are called FLUX REVERSALS.
|
|
|
|
|
|
||| ||| <-flux lines
|
|
Figure 2: N------------N-N-S-S-----------------S
|
|
--------- flux lines -> ||| |||
|
|
|
|
|
|
The external magnetic field used to flip the polarities is produced by a
|
|
SOLENOID, which can REVERSE its polarity by reversing the direction of CURRENT.
|
|
An ENCODING head solenoid looks like a bar magnet bent into the shape of a ring
|
|
so that the North/South poles are very close and face each other across a tiny
|
|
gap. The field of the solenoid is concentrated across this gap, and when
|
|
elemental magnetic particles of the magstripe are exposed to this field, they
|
|
polarize to the OPPOSITE (unlike poles attract). Movement of the stripe past
|
|
the solenoid gap during which the polarity of the solenoid is REVERSED will
|
|
produce a SINGLE flux reversal (see Figure 3). To erase a magstripe, the
|
|
encoding head is held at a CONSTANT polarity and the ENTIRE stripe is moved
|
|
past it. No flux reversals, no data.
|
|
|
|
|
|
|
|
|
|
| | <----wires leading to solenoid
|
|
| | (wrapped around ring)
|
|
/-|-|-\
|
|
/ \
|
|
Figure 3: | | <----solenoid (has JUST changed polarity)
|
|
|
|
--------- \ /
|
|
\ N S / <---gap in ring.. NS polarity across gap
|
|
N----------------------SS-N-------------------------S
|
|
^^
|
|
<<<<<-direction of stripe movement
|
|
|
|
S-S flux reversal created at trailing edge of solenoid!
|
|
|
|
|
|
So, we now know that flux reversals are only created the INSTANT the
|
|
solenoid CHANGES its POLARITY. If the solenoid in Figure 3 were to remain at
|
|
its current polarity, no further flux reversals would be created as the
|
|
magstripe moves from right to left. But, if we were to change the solenoid
|
|
gap polarity from NS to *SN*, then (you guessed it) a *N-N* flux reversal would
|
|
instantly be created. Just remember, for each and every reversal in solenoid
|
|
polarity, a single flux reversal is created (commit it to memory..impress your
|
|
friends..be a tech weenie!). An encoded magstripe is therefore just a series
|
|
of flux reversals (NN followed by SS followed by NN ...).
|
|
|
|
DATA! DATA! DATA! That's what you want! How the hell are flux reversals
|
|
read and interpreted as data? Another solenoid called a READ HEAD is used to
|
|
detect these flux reversals. The read head operates on the principle of
|
|
ELECTROMAGNETIC RECIPROCITY: current passing through a solenoid produces a
|
|
magnetic field at the gap, therefore, the presence of a magnetic field at the
|
|
gap of a solenoid coil will *produce a current in the coil*! The strongest
|
|
magnetic fields on a magstripe are at the points of flux reversals. These are
|
|
detected as voltage peaks by the reader, with +/- voltages corresponding to
|
|
NN/SS flux reversals (remember, flux reversals come in 2 flavors).
|
|
See Figure 4.
|
|
|
|
|
|
magstripe---> -------NN--------SS--------NN---------SS------
|
|
|
|
Figure 4: voltage-----> .......+.........-.........+...........-.....
|
|
---------
|
|
---------- -------------
|
|
peak readout--> | | | |
|
|
--------| |----------| |----
|
|
|
|
|
|
The 'peak readout' square waveform is critical. Notice that the voltage
|
|
peak remains the same until a new flux reversal is encountered.
|
|
|
|
Now, how can we encode DATA? The most common technique used is known as
|
|
Aiken Biphase, or 'two-frequency coherent-phase encoding' (sounds impressive,
|
|
eh?). First, digest the diagrams in Figure 5.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 5: ---------- ---------- ----------
|
|
|
|
--------- | | | | | | <- peak
|
|
|
|
a) | |--------| |--------| | readouts
|
|
|
|
|
|
* 0 * 0 * 0 * 0 * 0 *
|
|
|
|
|
|
----- ----- ----- ----- ----- -
|
|
| | | | | | | | | | |
|
|
b) | |----| |----| |----| |----| |----|
|
|
|
|
* 1 * 1 * 1 * 1 * 1 *
|
|
|
|
----- ---------- ----- ----- -
|
|
| | | | | | | | |
|
|
|
|
c) | |----| |--------| |----| |----|
|
|
|
|
|
|
* 1 * 0 * 0 * 1 * 1 *
|
|
|
|
|
|
There ya have it. Data is encoded in 'bit cells,' the frequency of which
|
|
is the frequency of '0' signals. '1' signals are exactly TWICE the frequency
|
|
of '0' signals. Therefore, while the actual frequency of the data passing
|
|
the read head will vary due to swipe speed, data density, etc, the '1'
|
|
frequency will ALWAYS be TWICE the '0' frequency. Figure 5C shows exactly how
|
|
'1' and '0' data exists side by side.
|
|
|
|
We're getting closer to read DATA! Now, we're all familiar with binary
|
|
and how numbers and letters can be represented in binary fashion very easily.
|
|
There are obviously an *infinite* number of possible standards, but thankfully
|
|
the American National Standards Institute (ANSI) and the International
|
|
Standards Organization (ISO) have chosen 2 standards. The first is
|
|
|
|
|
|
** ANSI/ISO BCD Data format **
|
|
|
|
This is a 5-bit Binary Coded Decimal format. It uses a 16-character set,
|
|
which uses 4 of the 5 available bits. The 5th bit is an ODD parity bit, which
|
|
means there must be an odd number of 1's in the 5-bit character..the parity bit
|
|
will 'force' the total to be odd. Also, the Least Significant Bits are read
|
|
FIRST on the strip. See Figure 6.
|
|
|
|
The sum of the 1's in each case is odd, thanks to the parity bit. If the
|
|
read system adds up the 5 bits and gets an EVEN number, it flags the read
|
|
as ERROR, and you gotta scan the card again. (yeah, I *know* a lot of you
|
|
out there *already* understand parity, but I gotta cover all the bases...not
|
|
everyone sleeps with their modem and can recite the entire AT command set
|
|
at will, you know ;). See Figure 6 for details of ANSI/ISO BCD.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 6: ANSI/ISO BCD Data Format
|
|
---------
|
|
|
|
* Remember that b1 (bit #1) is the LSB (least significant bit)!
|
|
* The LSB is read FIRST!
|
|
* Hexadecimal conversions of the Data Bits are given in parenthesis (xH).
|
|
|
|
--Data Bits-- Parity
|
|
b1 b2 b3 b4 b5 Character Function
|
|
|
|
0 0 0 0 1 0 (0H) Data
|
|
1 0 0 0 0 1 (1H) "
|
|
0 1 0 0 0 2 (2H) "
|
|
1 1 0 0 1 3 (3H) "
|
|
0 0 1 0 0 4 (4H) "
|
|
1 0 1 0 1 5 (5H) "
|
|
0 1 1 0 1 6 (6H) "
|
|
1 1 1 0 0 7 (7H) "
|
|
0 0 0 1 0 8 (8H) "
|
|
1 0 0 1 1 9 (9H) "
|
|
0 1 0 1 1 : (AH) Control
|
|
1 1 0 1 0 ; (BH) Start Sentinel
|
|
0 0 1 1 1 < (CH) Control
|
|
1 0 1 1 0 = (DH) Field Separator
|
|
0 1 1 1 0 > (EH) Control
|
|
1 1 1 1 1 ? (FH) End Sentinel
|
|
|
|
|
|
***** 16 Character 5-bit Set *****
|
|
10 Numeric Data Characters
|
|
3 Framing/Field Characters
|
|
3 Control Characters
|
|
|
|
|
|
The magstripe begins with a string of Zero bit-cells to permit the
|
|
self-clocking feature of biphase to "sync" and begin decoding.
|
|
A "Start Sentinel" character then tells the reformatting process where to start
|
|
grouping the decoded bitstream into groups of 5 bits each. At the end of the
|
|
data, an "End Sentinel" is encountered, which is followed by an "Longitudinal
|
|
Redundancy Check (LRC) character. The LRC is a parity check for the sums of
|
|
all b1, b2, b3, and b4 data bits of all preceding characters. The LRC
|
|
character will catch the remote error that could occur if an individual
|
|
character had two compensating errors in its bit pattern (which would fool the
|
|
5th-bit parity check).
|
|
|
|
The START SENTINEL, END SENTINEL, and LRC are collectively called "Framing
|
|
Characters", and are discarded at the end of the reformatting process.
|
|
|
|
|
|
** ANSI/ISO ALPHA Data Format **
|
|
|
|
Alphanumeric data can also be encoded on magstripes. The second ANSI/ISO
|
|
data format is ALPHA (alphanumeric) and involves a 7-bit character set with
|
|
64 characters. As before, an odd parity bit is added to the required 6 data
|
|
bits for each of the 64 characters. See Figure 7.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 7:
|
|
--------- ANSI/ISO ALPHA Data Format
|
|
|
|
* Remember that b1 (bit #1) is the LSB (least significant bit)!
|
|
* The LSB is read FIRST!
|
|
* Hexadecimal conversions of the Data Bits are given in parenthesis (xH).
|
|
|
|
|
|
------Data Bits------- Parity
|
|
b1 b2 b3 b4 b5 b6 b7 Character Function
|
|
|
|
0 0 0 0 0 0 1 space (0H) Special
|
|
1 0 0 0 0 0 0 ! (1H) "
|
|
0 1 0 0 0 0 0 " (2H) "
|
|
1 1 0 0 0 0 1 # (3H) "
|
|
0 0 1 0 0 0 0 $ (4H) "
|
|
1 0 1 0 0 0 1 % (5H) Start Sentinel
|
|
0 1 1 0 0 0 1 & (6H) Special
|
|
1 1 1 0 0 0 0 ' (7H) "
|
|
0 0 0 1 0 0 0 ( (8H) "
|
|
1 0 0 1 0 0 1 ) (9H) "
|
|
0 1 0 1 0 0 1 * (AH) "
|
|
1 1 0 1 0 0 0 + (BH) "
|
|
0 0 1 1 0 0 1 , (CH) "
|
|
1 0 1 1 0 0 0 - (DH) "
|
|
0 1 1 1 0 0 0 . (EH) "
|
|
1 1 1 1 0 0 1 / (FH) "
|
|
|
|
0 0 0 0 1 0 0 0 (10H) Data (numeric)
|
|
1 0 0 0 1 0 1 1 (11H) "
|
|
0 1 0 0 1 0 1 2 (12H) "
|
|
1 1 0 0 1 0 0 3 (13H) "
|
|
0 0 1 0 1 0 1 4 (14H) "
|
|
1 0 1 0 1 0 0 5 (15H) "
|
|
0 1 1 0 1 0 0 6 (16H) "
|
|
1 1 1 0 1 0 1 7 (17H) "
|
|
0 0 0 1 1 0 1 8 (18H) "
|
|
1 0 0 1 1 0 0 9 (19H) "
|
|
|
|
0 1 0 1 1 0 0 : (1AH) Special
|
|
1 1 0 1 1 0 1 ; (1BH) "
|
|
0 0 1 1 1 0 0 < (1CH) "
|
|
1 0 1 1 1 0 1 = (1DH) "
|
|
0 1 1 1 1 0 1 > (1EH) "
|
|
1 1 1 1 1 0 0 ? (1FH) End Sentinel
|
|
0 0 0 0 0 1 0 @ (20H) Special
|
|
|
|
1 0 0 0 0 1 1 A (21H) Data (alpha)
|
|
0 1 0 0 0 1 1 B (22H) "
|
|
1 1 0 0 0 1 0 C (23H) "
|
|
0 0 1 0 0 1 1 D (24H) "
|
|
1 0 1 0 0 1 0 E (25H) "
|
|
0 1 1 0 0 1 0 F (26H) "
|
|
1 1 1 0 0 1 1 G (27H) "
|
|
0 0 0 1 0 1 1 H (28H) "
|
|
1 0 0 1 0 1 0 I (29H) "
|
|
0 1 0 1 0 1 0 J (2AH) "
|
|
1 1 0 1 0 1 1 K (2BH) "
|
|
0 0 1 1 0 1 0 L (2CH) "
|
|
1 0 1 1 0 1 1 M (2DH) "
|
|
0 1 1 1 0 1 1 N (2EH) "
|
|
1 1 1 1 0 1 0 O (2FH) "
|
|
0 0 0 0 1 1 1 P (30H) "
|
|
1 0 0 0 1 1 0 Q (31H) "
|
|
0 1 0 0 1 1 0 R (32H) "
|
|
1 1 0 0 1 1 1 S (33H) "
|
|
0 0 1 0 1 1 0 T (34H) "
|
|
1 0 1 0 1 1 1 U (35H) "
|
|
0 1 1 0 1 1 1 V (36H) "
|
|
1 1 1 0 1 1 0 W (37H) "
|
|
0 0 0 1 1 1 0 X (38H) "
|
|
1 0 0 1 1 1 1 Y (39H) "
|
|
0 1 0 1 1 1 1 Z (3AH) "
|
|
|
|
1 1 0 1 1 1 0 [ (3BH) Special
|
|
0 0 1 1 1 1 1 \ (3DH) Special
|
|
1 0 1 1 1 1 0 ] (3EH) Special
|
|
0 1 1 1 1 1 0 ^ (3FH) Field Separator
|
|
1 1 1 1 1 1 1 _ (40H) Special
|
|
|
|
***** 64 Character 7-bit Set *****
|
|
* 43 Alphanumeric Data Characters
|
|
* 3 Framing/Field Characters
|
|
* 18 Control/Special Characters
|
|
|
|
|
|
The two ANSI/ISO formats, ALPHA and BCD, allow a great variety of data to be
|
|
stored on magstripes. Most cards with magstripes use these formats, but
|
|
occasionally some do not. More about those later on.
|
|
|
|
|
|
** Tracks and Encoding Protocols **
|
|
|
|
Now we know how the data is stored. But WHERE is the data stored on the
|
|
magstripe? ANSI/ISO standards define *3* Tracks, each of which is used for
|
|
different purposes. These Tracks are defined only by their location on the
|
|
magstripe, since the magstripe as a whole is magnetically homogeneous. See
|
|
Figure 8.
|
|
|
|
|
|
Figure 8:
|
|
--------- <edge of card>
|
|
_________________________________________________________________
|
|
| ^ ^ ^
|
|
|------------------| 0.223"--|---------|-------------------------
|
|
| | | 0.353" | ^
|
|
|..................|.........|.........| 0.493" |
|
|
| Track #1 0.110" | | |
|
|
|............................|.........|... <MAGSTRIPE>
|
|
| | | |
|
|
|............................|.........|... |
|
|
| Track #2 0.110" | |
|
|
|......................................|... |
|
|
| | |
|
|
|......................................|... |
|
|
| Track #3 0.110" |
|
|
|.......................................... |
|
|
| |
|
|
|------------------------------------------------------------------
|
|
|
|
|
| <body of card>
|
|
|
|
|
|
|
|
|
You can see the exact distances of each track from the edge of the card, as
|
|
well as the uniform width and spacing. Place a magstripe card in front of you
|
|
with the magstripe visible at the bottom of the card. Data is encoded from
|
|
left to right (just like reading a book, eh?). See Figure 9.
|
|
|
|
|
|
Figure 9:
|
|
--------- ANSI/ISO Track 1,2,3 Standards
|
|
|
|
Track Name Density Format Characters Function
|
|
--------------------------------------------------------------------
|
|
1 IATA 210 bpi ALPHA 79 Read Name & Account
|
|
2 ABA 75 bpi BCD 40 Read Account
|
|
3 THRIFT 210 bpi BCD 107 Read Account &
|
|
*Encode* Transaction
|
|
|
|
|
|
*** Track 1 Layout: ***
|
|
|
|
| SS | FC | PAN | Name | FS | Additional Data | ES | LRC |
|
|
|
|
SS=Start Sentinel "%"
|
|
FC=Format Code
|
|
PAN=Primary Acct. # (19 digits max)
|
|
FS=Field Separator "^"
|
|
Name=26 alphanumeric characters max.
|
|
Additional Data=Expiration Date, offset, encrypted PIN, etc.
|
|
ES=End Sentinel "?"
|
|
LRC=Longitudinal Redundancy Check
|
|
|
|
|
|
*** Track 2 Layout: ***
|
|
|
|
| SS | PAN | FS | Additional Data | ES | LRC |
|
|
|
|
SS=Start Sentinel ";"
|
|
PAN=Primary Acct. # (19 digits max)
|
|
FS=Field Separator "="
|
|
Additional Data=Expiration Date, offset, encrypted PIN, etc.
|
|
ES=End Sentinel "?"
|
|
LRC=Longitudinal Redundancy Check
|
|
|
|
|
|
*** Track 3 Layout: ** Similar to tracks 1 and 2. Almost never used.
|
|
Many different data standards used.
|
|
|
|
|
|
Track 2, "American Banking Association," (ABA) is most commonly used. This
|
|
is the track that is read by ATMs and credit card checkers. The ABA designed
|
|
the specifications of this track and all world banks must abide by it. It
|
|
contains the cardholder's account, encrypted PIN, plus other discretionary
|
|
data.
|
|
|
|
Track 1, named after the "International Air Transport Association," contains
|
|
the cardholder's name as well as account and other discretionary data. This
|
|
track is sometimes used by the airlines when securing reservations with a
|
|
credit card; your name just "pops up" on their machine when they swipe your
|
|
card!
|
|
Since Track 1 can store MUCH more information, credit card companies are trying
|
|
to urge retailers to buy card readers that read Track 1. The *problem* is that
|
|
most card readers read either Track 1 or Track 2, but NOT BOTH! And the
|
|
installed base of readers currently is biased towards Track 2. VISA USA is at
|
|
the front of this 'exodus' to Track 1, to the point where they are offering
|
|
Track 1 readers at reduced prices through participating banks. A spokesperson
|
|
for
|
|
VISA commented:
|
|
"We think that Track 1 represents more flexibility and the
|
|
potential to deliver more information, and we intend to
|
|
build new services around the increased information."
|
|
|
|
What new services? We can only wait and see.
|
|
|
|
Track 3 is unique. It was intended to have data read and WRITTEN on it.
|
|
Cardholders would have account information UPDATED right on the magstripe.
|
|
Unfortunately, Track 3 is pretty much an orphaned standard. Its *original*
|
|
design was to control off-line ATM transactions, but since ATMs are now on-line
|
|
ALL THE TIME, it's pretty much useless. Plus the fact that retailers and banks
|
|
would have to install NEW card readers to read that track, and that costs $$.
|
|
|
|
Encoding protocol specifies that each track must begin and end with a length
|
|
of all Zero bits, called CLOCKING BITS. These are used to synch the self-
|
|
clocking feature of biphase decoding. See Figure 10.
|
|
|
|
Figure 10: end sentinel
|
|
start sentinel | longitudinal redundancy check
|
|
| | |
|
|
000000000000000 SS.................ES LRC 0000000000000000
|
|
leading data, data, data trailing
|
|
clocking bits clocking bits
|
|
(length varies) (length varies)
|
|
|
|
THAT'S IT!!! There you have the ANSI/ISO STANDARDS! Completely explained.
|
|
Now, the bad news. NOT EVERY CARD USES IT! Credit cards and ATM cards will
|
|
follow these standards. BUT, there are many other types of cards out there.
|
|
Security passes, copy machine cards, ID badges, and EACH of them may use a
|
|
PROPRIETARY density/format/track-location system. ANSI/ISO is REQUIRED for
|
|
financial transaction cards used in the international interbank network. All
|
|
other cards can play their own game.
|
|
|
|
The good news. MOST other cards follow the standards, because it's EASY to
|
|
follow a standard instead of WORKING to make your OWN! Most magstripe cards
|
|
other than credit cards and ATM cards will use the same Track specifications,
|
|
and use either BCD or ALPHA formats.
|
|
|
|
|
|
** A Bit About Magstripe Equipment **
|
|
|
|
"Wow, now I know how to interpret all that data on magstripes! But...
|
|
waitasec, what kind of equipment do I need to read the stripes?
|
|
Where can I buy a reader? I don't see any in Radio Shack!!"
|
|
|
|
Sorry, but magstripe equipment is hard to come by. For obvious reasons,
|
|
card readers are not made commonly available to consumers. How to
|
|
build one is the topic for another phile (and THIS phile is already too long!).
|
|
|
|
Your best bets are to try and scope out Electronic Surplus Stores and flea
|
|
markets. Don't even bother trying to buy one directly from a manufacturer,
|
|
since they will immediately assume you have "criminal motives." And as for
|
|
getting your hands on a magstripe ENCODER...well, good luck! Those rare
|
|
beauties are worth their weight in gold. Keep your eyes open and look around,
|
|
and MAYBE you'll get lucky! A bit of social engineering can go a LONG way.
|
|
|
|
There are different kinds of magstripe readers/encoders. The most common
|
|
ones are "swipe" machines: the type you have to physically slide the card
|
|
through.
|
|
Others are "insertion" machines: like ATM machines they 'eat' your card, then
|
|
regurgitate it after the transaction. Costs are in the thousands of dollars,
|
|
but like I said, flea markets and surplus stores will often have GREAT deals
|
|
on these things. Another problem is documentation for these machines. If you
|
|
call the manufacturer and simply ask for 'em, they will probably deny you the
|
|
literature. "Hey son, what are you doing with our model XYZ swipe reader? That
|
|
belongs in the hands of a 'qualified' merchant or retailer, not some punk kid
|
|
trying to 'find out how things work!" Again, some social engineering may be
|
|
required. Tell 'em you're setting up a new business. Tell 'em you're working
|
|
on a science project. Tell 'em anything that works!
|
|
|
|
2600 Magazine recently had a good article on how to build a machine that
|
|
copies magstripe cards. Not much info on the actual data formats and encoding
|
|
schemes, but the device described is a start. With some modifications, I bet
|
|
you could route the output to a dumb terminal (or through a null modem cable) in
|
|
order to READ the data. Worth checking out the schematics.
|
|
|
|
As for making your own cards, just paste a length of VCR, reel-to-reel, or
|
|
audio cassette tape to a cut-out posterboard or plastic card. Works just as
|
|
good as the real thing, and useful to experiment with if you have no expired or
|
|
'dead' ATM or calling cards lying around (SAVE them, don't TOSS them!).
|
|
|
|
|
|
|
|
** Examples of Data on Magstripes **
|
|
|
|
The real fun in experimenting with magstripe technology is READING cards to
|
|
find out WHAT THE HELL is ON them! Haven't you wondered? The following cards
|
|
are the result of my own 'research'. Data such as specific account numbers and
|
|
names has been changed to protect the innocent. None the cards used to make
|
|
this list were stolen or acquired illegally.
|
|
|
|
Notice that I make careful note of 'common data'; data that I noticed was
|
|
the same for all cards of a particular type. This is highlighted below the
|
|
data with asterisks (*). Where I found varying data, I indicate it with "x"'s.
|
|
In those cases, NUMBER of CHARACTERS was consistent (the number of "x"'s equals
|
|
the number of characters...one to one relationship).
|
|
|
|
I still don't know what some of the data fields are for, but hopefully I
|
|
will be following this phile with a sequel after I collect more data. It ISN'T
|
|
easy to find lots of cards to examine. Ask your friends, family, and co-workers
|
|
to help! "Hey, can I, um, like BORROW your MCI calling card tonite? I'm
|
|
working on an, um, EXPERIMENT. Please?" Just...be honest! Also, do some
|
|
trashing. People will often BEND expired cards in half, then throw them out.
|
|
Simply bend 'em back into their normal shape, and they'll usually work (I've
|
|
done it!). They may be expired, but they're not ERASED!
|
|
-------------------------------------------------------------------------------
|
|
-=Mastercard=- Number on front of card -> 1111 2222 3333 4444
|
|
Expiration date -> 12/99
|
|
|
|
Track 2 (BCD,75 bpi)-> ;1111222233334444=99121010000000000000?
|
|
***
|
|
|
|
Track 1 (ALPHA,210 bpi)-> %B1111222233334444^PUBLIC/JOHN?
|
|
*
|
|
Note that the "101" was common to all MC cards checked, as well as the "B".
|
|
-------------------------------------------------------------------------------
|
|
-=VISA=- Number on front of card -> 1111 2222 3333 4444
|
|
Expiration date -> 12/99
|
|
|
|
Track 2 (BCD,75 bpi)-> ;1111222233334444=9912101xxxxxxxxxxxxx?
|
|
***
|
|
Track 1 (ALPHA,210 bpi)-> %B1111222233334444^PUBLIC/JOHN^9912101xxxxxxxxxxxxx?
|
|
*
|
|
|
|
Note that the "101" was common to all VISA cards checked, as well as the "B".
|
|
Also, the "xxx" indicates numeric data that varied from card to card, with no
|
|
apparent pattern. I believe this is the encrypted pin for use when cardholders
|
|
get 'cash advances' from ATMs. In every case, tho, I found *13* digits of the
|
|
stuff.
|
|
-------------------------------------------------------------------------------
|
|
-=Discover=- Number on front of card -> 1111 2222 3333 4444
|
|
Expiration date -> 12/99
|
|
|
|
Track 2 (BCD,75 bpi)-> ;1111222233334444=991210100000?
|
|
********
|
|
|
|
Track 1 (ALPHA,210 bpi)-> %B1111222233334444^PUBLIC/JOHN___^991210100000?
|
|
********
|
|
Note, the "10100000" and "B" were common to most DISCOVER cards checked.
|
|
I found a few that had "10110000" instead. Don't know the significance.
|
|
Note the underscores after the name JOHN. I found consistently that the name
|
|
data field had *26* charaters. Whatever was left of the field after the name
|
|
was "padded" with SPACES. Soo...for all of you with names longer than 25
|
|
(exclude the "/") characters, PREPARE to be TRUNCATED! ;)
|
|
-------------------------------------------------------------------------------
|
|
-=US Sprint FON=- Number on front of card -> 111 222 3333 4444
|
|
|
|
Track 2 (BCD,75 bpi)-> ;xxxxxx11122233339==xxx4444xxxxxxxxxx=?
|
|
*
|
|
|
|
Track 1 (ALPHA,210 bpi)-> %B^ /^^xxxxxxxxxxxxxxxxx?
|
|
*
|
|
|
|
Strange. None of the cards I check had names in the Track 1 fields. Track 1
|
|
looks unused, yet it was always formatted with field separators. The "xxx"
|
|
stuff varied from card to card, and I didn't see a pattern. I know it isn't
|
|
a PIN, so it must be account data.
|
|
-------------------------------------------------------------------------------
|
|
-=Fleet Bank=- Number on front of card -> 111111 222 3333333
|
|
Expiration date -> 12/99
|
|
|
|
Track 2 (BCD,75 bpi)-> ;1111112223333333=9912120100000000xxxx?
|
|
****
|
|
|
|
Track 1 (ALPHA,210 bpi) ->
|
|
%B1111112223333333^PUBLIC/JOHN___^9912120100000000000000xxxx000000?
|
|
* ****
|
|
|
|
Note that the "xxx" data varied. This is the encrypted PIN offset. Always 4
|
|
digits (hrmmm...). The "1201" was always the same. In fact, I tried many
|
|
ATM cards from DIFFERENT BANKS...and they all had "1201".
|
|
-------------------------------------------------------------------------------
|
|
(Can't leave *this* one out ;)
|
|
-=Radio Shack=- Number on front of card -> 1111 222 333333
|
|
NO EXPIRATION data on card
|
|
|
|
Track 2 (BCD,75 dpi)-> ;1111222333333=9912101?
|
|
*******
|
|
|
|
Note that the "9912101" was the SAME for EVERY Radio Shack card I saw. Looks
|
|
like when they don't have 'real' data to put in the expiration date field, they
|
|
have to stick SOMETHING in there.
|
|
-------------------------------------------------------------------------------
|
|
|
|
Well, that's all I'm going to put out right now. As you can see, the major
|
|
types of cards (ATMs, CC) all follow the same rules more or less. I checked
|
|
out a number of security passcards and timeclock entry cards..and they ALL had
|
|
random stuff written to Track 2. Track 2 is by FAR the MOST utilized track on
|
|
the card. And the format is pretty much always ANSI/ISO BCD. I *did* run
|
|
into some hotel room access cards that, when scanned, were GARBLED. They most
|
|
likely used a character set other than ASCII (if they were audio tones, my
|
|
reader would have put out NOTHING...as opposed to GARBLED data). As you can
|
|
see, one could write a BOOK listing different types of card data. I intended
|
|
only to give you some examples. My research has been limited, but I tried to
|
|
make logical conclusions based on the data I received.
|
|
|
|
|
|
|
|
** Cards of All Flavors **
|
|
|
|
People wanted to store A LOT of data on plastic cards. And they wanted that
|
|
data to be 'invisible' to cardholders. Here are the different card
|
|
technologies that were invented and are available today.
|
|
|
|
HOLLERITH - With this system, holes are punched in a plastic or paper card and
|
|
read optically. One of the earliest technologies, it is now seen
|
|
as an encoded room key in hotels. The technology is not secure,
|
|
but cards are cheap to make.
|
|
|
|
BAR CODE - The use of bar codes is limited. They are cheap, but there is
|
|
virtually no security and the bar code strip can be easily damaged.
|
|
|
|
INFRARED - Not in widespread use, cards are factory encoded by creating a
|
|
"shadow pattern" within the card. The card is passed through a
|
|
swipe
|
|
or insertion reader that uses an infrared scanner. Infrared card
|
|
pricing is moderate to expensive, and encoding is pretty secure.
|
|
Infrared scanners are optical and therefore vulnerable to
|
|
contamination.
|
|
|
|
PROXIMITY - Hands-free operation is the primary selling point of this card.
|
|
Although several different circuit designs are used, all proximity
|
|
cards permit the transmission of a code simply by bringing the card
|
|
near the reader (6-12"). These cards are quite thick, up to
|
|
0.15" (the ABA standard is 0.030"!).
|
|
|
|
WIEGAND - Named after its inventor, this technology uses a series of small
|
|
diameter wires that, when subjected to a changing magnetic field,
|
|
induce a discrete voltage output in a sensing coil. Two rows of
|
|
wires are embedded in a coded strip. When the wires move past
|
|
the read head, a series of pulses is read and interpreted as binary
|
|
code. This technology produces card that are VERY hard to copy
|
|
or alter, and cards are moderately expensive to make. Readers
|
|
based on this tech are epoxy filled, making them immune to weather
|
|
conditions, and neither card nor readers are affected by external
|
|
magnetic fields (don't worry about leaving these cards on top of
|
|
the television set...you can't hurt them!). Here's an example of
|
|
the layout of the wires in a Wiegand strip:
|
|
|
|
||| || || | ||| | || || | || || | | ||
|
|
| | | | | | |||| || |||| ||
|
|
|
|
The wires are NOT visible from the outside of the card, but if
|
|
your card is white, place it in front of a VERY bright light source
|
|
and peer inside. Notice that the spacings between the wires is
|
|
uniform.
|
|
|
|
BARIUM FERRITE - The oldest magnetic encoding technology (been around for 40
|
|
yrs!) it uses small bits of magnetized barium ferrite that are
|
|
placed inside a plastic card. The polarity and location of
|
|
the "spots" determines the coding. These cards have a short
|
|
life cycle, and are used EXTENSIVELY in parking lots (high
|
|
turnover rate, minimal security). Barium Ferrite cards are
|
|
ONLY used with INSERTION readers.
|
|
|
|
There you have the most commonly used cards. Magstripes are common because
|
|
they are CHEAP and relatively secure.
|
|
|
|
|
|
** Magstripe Coercivity **
|
|
|
|
Magstripes themselves come in different flavors. The COERCIVITY of the
|
|
magnetic media must be specified. The coercivity is the magnetic field
|
|
strength required to demagnetize an encoded stripe, and therefore determines
|
|
the encode head field strength required to encode the stripe. A range of media
|
|
coercivities are available ranging from 300 Oersteds to 4,000 Oe. That boils
|
|
down to HIGH-ENERGY magstripes (4,000 Oe) and LOW-ENERGY magstripes (300 Oe).
|
|
|
|
REMEMBER: since all magstripes have the same magnetic remanence regardless of
|
|
their coercivity, readers CANNOT tell the difference between HIGH and LOW
|
|
energy stripes. Both are read the same by the same machines.
|
|
|
|
LOW-ENERGY media is most common. It is used on all financial cards, but its
|
|
disadvantage is that it is subject to accidental demagnetization from contact
|
|
with common magnets (refrigerator, TV magnetic fields, etc.). But these cards
|
|
are kept safe in wallets and purses most of the time.
|
|
|
|
HIGH-ENERGY media is used for ID Badges and access control cards, which are
|
|
commonly used in 'hostile' environments (worn on uniform, used in stockrooms).
|
|
Normal magnets will not affect these cards, and low-energy encoders cannot
|
|
write to them.
|
|
|
|
|
|
** Not All that Fluxes is Digital **
|
|
|
|
Not all magstripe cards operate on a digital encoding method. SOME cards
|
|
encode AUDIO TONES, as opposed to digital data. These cards are usually
|
|
used with old, outdated, industrial-strength equipment where security is not an
|
|
issue and not a great deal of data need be encoded on the card. Some subway
|
|
passes are like this. They require only expiration data on the magstripe, and
|
|
a short series of varying frequencies and durations are enough. Frequencies
|
|
will vary with the speed of swiping, but RELATIVE frequencies will remain the
|
|
same (for instance, tone 1 is twice the freq. of tone 2, and .5 the freq of
|
|
tone 3, regardless of the original frequencies!). Grab an oscilloscope to
|
|
visualize the tones, and listen to them on your stereo. I haven't experimented
|
|
with these types of cards at all.
|
|
|
|
|
|
** Security and Smartcards **
|
|
|
|
Many security systems utilize magstripe cards, in the form of passcards and
|
|
ID cards. It's interesting, but I found in a NUMBER of cases that there was
|
|
a serious FLAW in the security of the system. In these cases, there was a
|
|
code number PRINTED on the card. When scanned, I found this number encoded on
|
|
the magstripe. Problem was, the CODE NUMBER was ALL I found on the magstripe!
|
|
Meaning, by just looking at the face of the card, I immediately knew exactly
|
|
what was encoded on it. Ooops! Makes it pretty damn easy to just glance at
|
|
Joe's card during lunch, then go home and pop out my OWN copy of Joe's access
|
|
card! Fortunately, I found this flaw only in 'smaller' companies (sometimes
|
|
even universities). Bigger companies seem to know better, and DON'T print
|
|
ALL of the magstripe data right on card in big, easily legible numbers. At
|
|
least the big companies *I* checked. ;)
|
|
Other security blunders include passcard magstripes encoded ONLY with the
|
|
owner's social security number (yeah, real difficult to find out a person's
|
|
SS#...GREAT idea), and having passcards with only 3 or 4 digit codes.
|
|
|
|
Smartcard technology involves the use of chips embedded in plastic cards,
|
|
with pinouts that temporarily contact the card reader equipment. Obviously,
|
|
a GREAT deal of data could be stored in this way, and unauthorized duplication
|
|
would be very difficulty. Interestingly enough, not much effort is being put
|
|
into smartcards by the major credit card companies. They feel that the tech
|
|
is too expensive, and that still more data can be squeezed onto magstripe
|
|
cards in the future (especially Track 1). I find this somewhat analogous to
|
|
the use of metallic oxide disk media. Sure, it's not the greatest (compared
|
|
to erasable-writable optical disks), but it's CHEAP..and we just keep improving
|
|
it. Magstripes will be around for a long time to come. The media will be
|
|
refined, and data density increased. But for conventional applications, the
|
|
vast storage capabilities of smartcards are just not needed.
|
|
|
|
|
|
** Biometrics: Throw yer cards away! **
|
|
|
|
I'd like to end with a mention of biometrics: the technology based on reading
|
|
the physical attributes of an individual through retina scanning, signature
|
|
verification, voice verification, and other means. This was once limited to
|
|
government use and to supersensitive installations. However, biometrics will
|
|
soon acquire a larger market share in access control sales because much of its
|
|
development stage has passed and costs will be within reach of more buyers.
|
|
Eventually, we can expect biometrics to replace pretty much ALL cards..because
|
|
all those plastic cards in your wallet are there JUST to help COMPANIES
|
|
*identify* YOU. And with biometrics, they'll know you without having to read
|
|
cards. I'm not paranoid, nor do I subscribe to any grand 'corporate
|
|
conspiracy', but I find it a bit unsettling that our physical attributes will
|
|
most likely someday be sitting in the cool, vast electronic databases of
|
|
the CORPORATE world. Accessible by anyone willing to pay. Imagine CBI and TRW
|
|
databases with your retina image, fingerprint, and voice pattern online for
|
|
instant, convenient retrieval. Today, a person can CHOOSE NOT to own a credit
|
|
card or a bank card...we can cut up our plastic ID cards! Without a card, a
|
|
card reader is useless and cannot identify you. Paying in cash makes you
|
|
invisible! However, with biometrics, all a machine has to do is watch...
|
|
.listen...and record. With government/corporate America pushing all the
|
|
buttons.. "Are you paying in cash?...thank you...please look into the camera.
|
|
Oh, I see your name is Mr. Smith...uh, oh...my computer tells me you haven't
|
|
paid your gas bill....afraid I'm going to have to keep this money and credit
|
|
your gas account with it....do you have any more cash?...or would you rather
|
|
I garnish your paycheck?" heh heh
|
|
|
|
|
|
** Closing Notes (FINALLY!!!!) **
|
|
|
|
Whew...this was one MOTHER of a phile. I hope it was interesting, and I hope
|
|
you distribute it to all you friends. This phile was a production of
|
|
"Restricted Data Transmissions"...a group of techies based in the Boston area
|
|
that feel that "Information is Power"...and we intend to release a number of
|
|
highly technical yet entertaining philes in the coming year....LOOK FOR THEM!!
|
|
Tomorrow I'm on my way to Xmascon '91.....we made some slick buttons
|
|
commemorating the event...if you ever see one of them (green wreath..XMASCON
|
|
1991 printed on it)..hang on to it!...it's a collector's item.. (hahahah)
|
|
Boy, I'm sleepy...
|
|
|
|
Remember.... "Truth is cheap, but information costs!"
|
|
|
|
But -=RDT is gonna change all that... ;) set the info FREE!
|
|
|
|
Peace.
|
|
|
|
..oooOO Count Zero OOooo..
|
|
|
|
Usual greets to Magic Man, Brian Oblivion, Omega, White Knight, and anyone
|
|
else I ever bummed a cigarette off.....
|
|
|
|
Comments, criticisms, and discussions about this phile are welcome. I can be
|
|
reached at
|
|
count0@world.std.com
|
|
count0@spica.bu.edu
|
|
count0@atdt.org
|
|
|
|
Magic Man and I are the sysops of the BBS "ATDT"...located somewhere in
|
|
Massachusetts. Great message bases, technical discussions...data made
|
|
flesh...electronic underground.....our own Internet address (atdt.org)...
|
|
.field trips to the tunnels under MIT in Cambridge.....give it a call..
|
|
..mail me for more info.. ;)
|
|
|
|
ATDT------(???)YOU-WISH
|
|
(You're not paranoid if they're REALLY out to get you... ;)
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
|
|
-/- -/-
|
|
/-/ *> TID-BYTES <* /-/
|
|
-/- -/-
|
|
/-/ by the Informatik Staff /-/
|
|
-/- -/-
|
|
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
|
|
|
|
Tid-Bytes is a standing column of miscellaneous bits of information.
|
|
|
|
|
|
|
|
Some FYI
|
|
~~~~~~~~
|
|
Ever wonder why Rolling Rock Beer has that mysterious "33" printed on the
|
|
back of the bottle? Well apparently there are two stories concerning this
|
|
strange number. The OFFICIAL story: The number 33 stands for two things, 1)
|
|
The year that Prohibition was repealed (1933), and 2) the number of words in
|
|
the legend printed above the 33 on cans and bottles. The REAL story is that
|
|
the bold "33" is nothing more than an accident. During the initial design of
|
|
the beer's label, someone scribbled a large "33" to point out the extreme
|
|
length of the legend. This copy made it to the printers and the note was
|
|
included in the final printing.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Interesting Books
|
|
~~~~~~~~~~~~~~~~~
|
|
|
|
"Automated Crime Information Systems" by J. Van Duyn
|
|
|
|
This 142-page hardcover book provides a complete introduction to all existing
|
|
and planned systems of automated criminal records-gathering and dissemination
|
|
in the United States. Includes the latest information on such topics as: The
|
|
FBI's criminal history and ID programs; NCIC; federal/state co-op efforts;
|
|
useful software applications for law enforcement; legality of stored
|
|
information, DNA analysis, and more. The book is $22.95 from TAB Professional
|
|
and Reference Books, Blue Ridge Summit, PA 17294-0850. The Order Number of
|
|
the book is 3503.
|
|
|
|
|
|
"Deception Detection--Winning the Polygraph Game" by Charles Clifton
|
|
|
|
In this 145 page book the author explains the theory behind polygraphs, and
|
|
gives countermeasures to turn the results to your favor by several methods.
|
|
It is available for $15.00 from Paladin Press, PO Box 1307, Boulder, CO 80306.
|
|
|
|
|
|
"Engineer's Trade Secrets of Radio" by James R. Cunningham
|
|
|
|
Brimming with information on AM/FM, Ham, broadcast transmitters, antennas,
|
|
signal enhancement schemes, this 140-page book is a must for radio electronic
|
|
enthusiasts (legal or otherwise). Note that some projects described in the
|
|
book are not legal in the United States. Order for $19.95 from CRB Research
|
|
Books, Inc., PO Box 56, Commack, NY 11725.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Pay-Per-View the Discount Way
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
If you've ever had a burning desire to watch those expensive movies on the
|
|
pay channels at hotels, but have never had the cash to indulge, here's the
|
|
solution. Simply disconnect the input coax (the one hooked up to the wall)
|
|
>from the "control box" on top of the T.V. Then disconnect the patch cable
|
|
between the T.V. and control box from the T.V. Connect the input cable to
|
|
the now vacant cable input on the T.V., then patch the cable box into itself
|
|
with the short cable. The high channels on the T.V. tuner should now be
|
|
showing the pay-per-view movies free of charge. One warning, the cables may
|
|
have a short shield over the end of the connector to prevent removal. In
|
|
this case, needle nose pliers or a similar tool is required to remove them.
|
|
Be sure to pack one in your shave kit!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)
|
|
)%( )%(
|
|
(%) > Hot Flashes < (%)
|
|
)%( )%(
|
|
(%) The Underground News Report (%)
|
|
)%( )%(
|
|
(%) Edited by: the Informatik Staff (%)
|
|
)%( )%(
|
|
(%) January 1992 (%)
|
|
)%( )%(
|
|
(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
===================================
|
|
Computer Civil Liberties Conference
|
|
===================================
|
|
|
|
First Announcement of
|
|
THE SECOND CONFERENCE ON COMPUTERS, FREEDOM, AND PRIVACY
|
|
L'Enfant Plaza Hotel, Washington DC March 18-20, 1992
|
|
|
|
(A longer, complete, electronic version of this announcement is available
|
|
by sending a request with any title and any message to cfp2-info@eff.org.)
|
|
|
|
(The printed announcement (brochure) is available -- see end of this notice.)
|
|
|
|
The rush of computers into our workplaces, homes, and institutions is
|
|
drastically altering how we work and live, how we buy and sell, and with whom
|
|
we communicate. Computers are obliterating traditional political and
|
|
organizational boundaries, making time zones irrelevant, and bridging diverse
|
|
cultures. They are fundamentally changing our culture, values, laws,
|
|
traditions, and identities.
|
|
|
|
The turmoil of the changes calls into question many old assumptions about
|
|
privacy, freedom of speech, search and seizure, access to personal and
|
|
governmental information, professional responsibilities, ethics,
|
|
criminality, law enforcement, and more. The only way to sort out these
|
|
issues and arrive at a consensus for action is to acknowledge that we don't
|
|
know the answers -- and then, with reason and good will, to find the
|
|
answers through discussion and education. That's why the Conference on
|
|
Computers, Freedom, and Privacy was founded in 1991.
|
|
|
|
The Computers, Freedom, and Privacy Conference is unique. It has no
|
|
"agenda for change". It seeks only to bring together people from all the
|
|
major communities and interest groups that have a stake in the new world being
|
|
shaped by information technology, so that they may share their ideas, ideals,
|
|
concerns and experiences.
|
|
|
|
At the first conference, hundreds of people from the fields of law,
|
|
computer science, law enforcement, business, public policy, government,
|
|
education, research, marketing, information providing, advocacy and a host of
|
|
others met for several days. It was the first time such a diverse group had
|
|
ever assembled, and the exchange of ideas and points of view was electric.
|
|
|
|
The conference is "single-track" -- all participants attend all the
|
|
sessions. A morning of tutorials at the beginning of the conference will help
|
|
participants get up to speed in specific "hot" areas. The conference sessions
|
|
themselves take up timely and, at times, thorny issues. Each session aims for
|
|
a balance of perspectives in order to assist diverse groups appreciate the
|
|
views of others. A brief examination of the long list of sponsoring and
|
|
supporting organizations will reveal that this respect for diverse outlooks is
|
|
built into the conference from the ground up.
|
|
|
|
The question is no longer whether information technologies will change
|
|
our world. They are, now. The real question is how we, as citizens and
|
|
professionals, will respond to and manage that change. Those at the Second
|
|
Conference on Computers, Freedom, and Privacy will lead the way.
|
|
|
|
Sponsors: Association for Computing Machinery, Special Interest Groups on
|
|
Computers and Society, Communications, Security, Audit, and Control
|
|
|
|
Host: Department of Electrical Engineering and Computer Science
|
|
The George Washington University
|
|
|
|
Patrons: Bell Atlantic Computer Security Institute
|
|
Department of Energy* Dunn & Bradstreet
|
|
Equifax Hayes Microcomputer Products, Inc.
|
|
John Gilmore Mitchell Kapor
|
|
National Institutes of Health* National Science Foundation*
|
|
*applied for
|
|
|
|
Co-sponsors and cooperating organizations:
|
|
American Civil Liberties Union
|
|
Association for Computing Machinery
|
|
Special Interest Group on Software Engineering
|
|
Association of Research Libraries
|
|
Computer Professionals for Social Responsibility
|
|
Electronic Frontier Foundation
|
|
Federal Library and Information Center Committee
|
|
First Amendment Congress
|
|
Institute for Electrical and Electronics Engineers-USA
|
|
Committee on Communications and Information Policy
|
|
Library and Information Technology Association
|
|
Privacy International
|
|
U. S. Privacy Council
|
|
The WELL (Whole Earth 'Lectronic Link)
|
|
|
|
STEERING COMMITTEE
|
|
|
|
Lance J. Hoffman (General Chair), The George Washington University
|
|
Michael F. Brewer, Dun and Bradstreet
|
|
Paul Clark (chair, Operations Committee), Trusted Information Systems
|
|
Dorothy Denning (chair, Tutorials Committee), Georgetown University
|
|
Peter Denning (chair, Program Committee), George Mason University
|
|
David Farber, University of Pennsylvania
|
|
Craig Feied, The George Washington University Medical Center
|
|
Mike Gibbons, FBI
|
|
Mitchell Kapor, Electronic Frontier Foundation
|
|
Jane Kirtley, Reporters Committee for Freedom of the Press
|
|
Lu Kleppinger (chair, Finance Committee), The George Washington University
|
|
C. Dianne Martin, The George Washington University
|
|
John McMullen (chair, Scholarship Committee), McMullen & McMullen, Inc.
|
|
Lynn McNulty, NIST
|
|
Ronald Plesser, Piper and Marbury
|
|
Molly Raphael, D.C. Public Library
|
|
Mark Rotenberg, CPSR Washington Office
|
|
James Sylvester, Bell Atlantic
|
|
Jim Warren, Autodesk and MicroTimes
|
|
Fred Weingarten, Computing Research Association
|
|
|
|
WEDNESDAY, MARCH 18, 1992
|
|
|
|
PRE-CONFERENCE TUTORIALS
|
|
|
|
Group A: 9:00 a.m.
|
|
|
|
Making Information Law and Policy
|
|
Jane Bortnick, Congressional Research Service, Library of Congress
|
|
|
|
Information policy is made (or not made) by a bewildering array of
|
|
government officials and agencies. This tutorial gives a road map through
|
|
this maze of laws, regulations, practices, etc.
|
|
|
|
Getting on the Net
|
|
Mitchell Kapor, Electronic Frontier Foundation
|
|
|
|
Practical issues of access to the Internet for the nontechnical end-user,
|
|
including basic services (email, USENET, ftp), PC and Mac-based network
|
|
applications, and net-speak.
|
|
|
|
Communications and Network Evolution
|
|
Sergio Heker, JVNCNet
|
|
|
|
The underlying technical infrastructure for the Internet, for persons not
|
|
deeply immersed in the technology. Possible future technologies and
|
|
projects, and what privacy and freedom problems they may bring.
|
|
Private Sector Privacy
|
|
Jeff Smith, Georgetown University
|
|
|
|
An introduction to laws, rules, and practices regarding personal
|
|
information gathered and stored by private organizations such as direct
|
|
marketers, hospitals, etc.
|
|
|
|
Group B: 10:30 a.m.
|
|
|
|
Constitutional Law for Nonlawyers
|
|
Harvey Silverglate, Silverglate & Good
|
|
|
|
An overview of Constitutional law with special emphasis on the First,
|
|
Fourth, and Fifth Amendments and the application of their principles in the
|
|
information age.
|
|
|
|
Computer Crime
|
|
Don G. Ingraham, Alameda County District Attorney's Office
|
|
|
|
Investigation, search, seizure, and evidence requirements for pursuing
|
|
computer crime. For computer users, owners, sysops, and investigators and
|
|
attorneys unfamiliar with computer crime practices.
|
|
|
|
Modern Telecommunications: Life after Humpty Dumpty
|
|
Richard S. Wolff, Bellcore
|
|
|
|
Roles and relationships of the key players in telecommunications,
|
|
developments in communications technology, and new services. Signaling
|
|
System 7, ISDN, and advanced intelligent network features.
|
|
|
|
International Privacy Developments
|
|
David Flaherty, University of Western Ontario
|
|
|
|
Privacy-related developments within the European community, OECD, and the
|
|
United Nations, and how they affect the United States. Comparison of
|
|
privacy regulations here and abroad.
|
|
|
|
CONFERENCE PROGRAM
|
|
|
|
1:00-2:00 p.m. KEYNOTE ADDRESS:
|
|
Al Neuharth, Chairman, The Freedom Forum and Founder, USA Today
|
|
"Freedom in Cyberspace: New Wine in Old Flasks?"
|
|
|
|
The differing legal and regulatory constraints on publishers of
|
|
newspapers, owners of television stations, and the telephone service
|
|
providers imply that some dogfights will occur and some tough decisions
|
|
will have to be made to balance privacy and freedom in the coming decade,
|
|
since the old wine of 1970's-era regulation will not fit into the new
|
|
flasks of 21st Century. Mr. Neuharth, a self-proclaimed S.O.B., will give
|
|
us a peek at his vision of what the future holds.
|
|
|
|
2:30 pm - 4 pm Who logs on?
|
|
* Chair: Robert Lucky, AT&T Bell Laboratories
|
|
* Panel: Linda Garcia, Office of Technology Assessment
|
|
* Alfred Koeppe, New Jersey Bell
|
|
* Brian Kahin, Harvard University
|
|
|
|
4:30 pm - 6 pm Ethics, Morality, and Criminality
|
|
* Chair: J. Michael Gibbons, Federal Bureau of Investigation
|
|
* Panel: Scott Charney, U. S. Dept. of Justice
|
|
* James Settle, Federal Bureau of Investigation
|
|
* Mike Godwin, Electronic Frontier Foundation
|
|
* Emory Hackman, Esq. (former president, Capital Area Sysops
|
|
Association)
|
|
* Don Delaney, New York State Police
|
|
|
|
6:00 pm - 7:30 pm RECEPTION
|
|
9:00 pm BIRDS OF A FEATHER SESSIONS
|
|
|
|
THURSDAY, MARCH 19, 1992
|
|
|
|
9:00 am - 10:30 am For Sale: Government Information
|
|
* Chair: George Trubow, John Marshall Law School
|
|
* Panel: Dwight Morris, Los Angeles Times Washington Bureau
|
|
* Ken Allen, Information Industry Association
|
|
* Patricia Glass Schuman, American Library Association
|
|
* Evan Hendricks, Privacy Times
|
|
* Fred Weingarten, Computing Research Association
|
|
* Franklin S. Reeder, Office of Management and Budget
|
|
* Costas Torreagas, Public Technology, Inc.
|
|
* Robert R. Belair, Kirkpatrick and Lockhart
|
|
|
|
10:45 am - 12:15 pm Free Speech and the Public Telephone Network
|
|
* Chair: Jerry Berman, ACLU Information Technology Project
|
|
* Panel: Henry Geller, The Markle Foundation
|
|
* Eli Noam, Columbia University
|
|
* John Podesta, Podesta Associates
|
|
|
|
12:15 pm - 1:45 pm Luncheon with Address: Bruce Sterling
|
|
"Speaking for the Unspeakable"
|
|
|
|
Mr. Sterling will gamely attempt to publicly present the points of view
|
|
of certain elements of the "computer community" who are not represented at
|
|
CFP-2. He will speak up for those who, in his words, are too "venal,
|
|
violent, treacherous, power-mad, suspicious or meanspirited to receive (or
|
|
accept) an invitation to attend.
|
|
|
|
2:00 pm - 3:30 pm Who's in Your Genes?
|
|
* Chair: Phil Reilly, Shriver Center for Mental Retardation
|
|
* Panel: John Hicks, FBI Laboratory
|
|
* Tom Marr, Cold Spring Harbor Laboratory
|
|
* Paul Mendelsohn, Neurofibromatosis, Inc.
|
|
* Peter Neufeld, Esq.
|
|
* Madison Powers, Kennedy Center for Ethics,
|
|
Georgetown University
|
|
|
|
3:45 pm - 5:15 pm Private Collection of Personal Information
|
|
* Chair: Ron Plesser, Piper and Marbury
|
|
* Panel: Janlori Goldman, Privacy and Technology Project, ACLU
|
|
* John Baker, Equifax
|
|
* James D. McQuaid, Metromail
|
|
* James Rule, SUNY-Stony Brook
|
|
* Mary Culnan, Georgetown University
|
|
* P. Michael Neugent, Citicorp
|
|
|
|
5:15 pm - 6:45 pm EFF Awards Reception
|
|
9:00 pm Birds of a Feather Sessions
|
|
|
|
FRIDAY, MARCH 20, 1992
|
|
|
|
9:00 am - 10:30 am Privacy and intellectual freedom in the digital library
|
|
* Chair: Marc Rotenberg, Computer Professionals for Social Responsibility
|
|
* Panel: Robert A. Walton, CLSI, Inc.
|
|
* Gordon M. Conable, Monroe (MI) County Library System
|
|
* Jean Armour Polly, Liverpool (NY) Public Library
|
|
|
|
10:45 am - 12:15 pm Computers in the Workplace: Elysium or Panopticon?
|
|
* Chair: Alan F. Westin, Columbia University
|
|
* Panel: Gary Marx, MIT
|
|
* Mark DiBernardo, National Association of Manufacturers
|
|
* Kristina Zahorik, Subcommittee on Employment and
|
|
Productivity, U. S. Senate Labor Committee
|
|
|
|
12:15 pm - 1:30 pm Lunch (on your own)
|
|
|
|
1:30 pm - 3:00 pm Who Holds the Keys?
|
|
* Chair: Dorothy Denning
|
|
* Panel: Jim Bidzos, RSA Data Security
|
|
* David Bellin, Pratt Institute
|
|
* John Gilmore, Cygnus Support
|
|
* Whitfield Diffie, SunSoft, Inc.
|
|
|
|
3:00 pm - 4:15 pm Public Policy for the 21st Century
|
|
Co-chairs: Peter J. Denning, George Mason University
|
|
Lance J. Hoffman, George Washington University
|
|
|
|
|
|
GENERAL INFORMATION
|
|
|
|
Registration
|
|
|
|
Please register for the conference by returning the Conference
|
|
Registration Form (below) along with the appropriate payment -- check,
|
|
Visa, or Mastercard. Registration fee includes conference materials,
|
|
Thursday luncheon, and receptions. The registration is $295 for ACM
|
|
members and $350 for nonmembers, $65 for full-time students. Tutorials,
|
|
$95 ($35 students).
|
|
|
|
Premium for Early Registration
|
|
|
|
While they last, a limited number of premiums are available to early
|
|
registrants on a first-come, first-served basis. Early registrants will
|
|
receive by mail a voucher which they can exchange at the conference for one
|
|
of a number of premiums. These include:
|
|
|
|
Videotapes of CFP-1 sessions
|
|
Audiotapes of CFP-1 sessions
|
|
Proceedings of CFP-1
|
|
Computers Under Attack: Intruders, Worms, and Viruses
|
|
by Peter Denning, editor
|
|
Rogue Programs: Viruses, Worms, and Trojan Horses
|
|
by Lance Hoffman, editor
|
|
"Citizen Rights and Access to Electronic Information"
|
|
by Dennis Reynolds, editor
|
|
The Cuckoo's Egg by Cliff Stoll
|
|
The Difference Engine by Bruce Sterling and William Gibson
|
|
Confessions of an S.O.B. by Al Neuharth
|
|
Cyberpunk by Katie Hafner and John Markoff
|
|
|
|
CONSIDER REGISTERING BY FAXING THE REGISTRATION FORM BELOW OR TELEPHONING
|
|
IF YOU ARE INTERESTED IN ONE OF THESE PREMIUMS. THEY WON'T LAST LONG!
|
|
|
|
Registration Scholarships
|
|
|
|
Full-time students and others wishing to apply for one of a limited
|
|
number of registration scholarships should send a request to the address
|
|
listed in the complete announcement, copies of which are available as
|
|
described elsewhere in this shorter electronic notice.
|
|
|
|
Hotel Accomodations
|
|
|
|
The 1992 Computers, Freedom, and Privacy Conference will be held at the
|
|
Loew's L'Enfant Plaza Hotel, Washington, DC. One of the finest hotels in
|
|
the city, it is just ten minutes from Washington National Airport, five
|
|
minutes from Capitol Hill. The world-renowned Smithsonian Institution
|
|
Museums are located within a few blocks.
|
|
|
|
To qualify for the conference rate of $105 single or $110 double, call
|
|
the hotel reservation line (below) and identify yourself as a CFP-2
|
|
participant. To ensure a room at the L'Enfant Plaza, reservations should
|
|
be made by February 10, 1992. After this date, rooms will be released to
|
|
the public. Hotel reservations: (800) 243-1166; (202) 484-1000 (local).
|
|
|
|
Transportation
|
|
|
|
As a participant in CFP-2, you are eligible for discounted rates as
|
|
follows: 40% off unrestricted coach fares and 5% off the lowest available
|
|
fares on specified carriers (all rules and restrictions apply). To receive
|
|
the best rate available call GW Travel (below) and make your reservations
|
|
early. Seats may be limited. Please mention that you are attending the
|
|
CFP-2 Conference. (Code C-6) GW Travel: (800) 222-1223; (301) 897-8001
|
|
(local).
|
|
|
|
Accreditation
|
|
|
|
The Second Conference on Computers, Freedom, and Privacy has been
|
|
approved by The George Washington University Medical Center for Category One
|
|
Continuing Medical Education Units.
|
|
|
|
Refund Policy
|
|
|
|
Refund requests received in writing by February 28, 1992 will be honored.
|
|
A $50 cancellation fee will apply. No refunds will be made after this
|
|
date; however, you may send a substitute in your place.
|
|
|
|
REGISTRATION FORM
|
|
|
|
YOU CAN NOT REGISTER BY ELECTRONIC MAIL. YOU MAY REGISTER BY MAIL, BY FAX,
|
|
OR BY PHONE. YOU CAN PRINT THIS REGISTRATION FORM OUT, FILL IT IN, AND
|
|
MAIL OR FAX IT. OR YOU CAN REQUEST A PRINTED BROCHURE FROM THE "BY MAIL"
|
|
ADDRESS BELOW, WHICH WILL HAVE A PRINTED ONE-PAGE REGISTRATION FORM IN IT.
|
|
YOU CAN ALSO OBTAIN THIS PRINTED BROCHURE BY ELECTRONICALLY MAILING A SHORT
|
|
REQUEST WITH YOUR NAME AND (POSTAL) MAIL ADDRESS TO cfp2@seas.gwu.edu.
|
|
|
|
* * * * * REGISTRATION FORM * * * * *
|
|
|
|
By mail: Conferences & Institutes, The George Washington University,
|
|
2003 G St. N.W., Washington, D. C. 20052
|
|
By fax (24 hrs., with credit card): Send registration form to (202)
|
|
994-7048
|
|
By phone (with credit card): (202) 994-7238 (9 a.m. to 5 p.m., EST)
|
|
Name:______________________________________________________
|
|
Title:_____________________________________________________
|
|
Affiliation: ______________________________________________
|
|
Mailing address: __________________________________________
|
|
City ____________________________ State _____ Zip _________
|
|
Country (if not USA): _____________________________________
|
|
Telephone: ________________________________________________
|
|
FAX number: _______________________________________________
|
|
E-Mail address: ___________________________________________
|
|
|
|
PRIVACY NOTE: This information will not be sold, rented, loaned, exchanged,
|
|
or used for any purpose other than official CFP-2 activities. A roster
|
|
will be distributed to attendees. Please indicate your preference:
|
|
____ Print all information above ______ Print name only
|
|
____ Print only name, affiliation, ______ Omit all above information
|
|
city, state, zip
|
|
|
|
REGISTRATION FEES:
|
|
Conference fee (check one) ___ ACM member ($295) ___ Non-member ($350)
|
|
[includes conference materials, Thursday luncheon, and receptions]
|
|
|
|
____ Student (full-time/valid ID):___ $65 (no lunch) ___ $30 (lunch)
|
|
|
|
|
|
Tutorial fee _____ Tutorial (half-day, 1 or 2 sessions, $95)
|
|
(Pick 2, 75 min. each) _____ Student (half-day, 1 or 2 sessions, $35)
|
|
|
|
Group A 9:00 a.m.
|
|
____ T(1) Making Information Law and Policy
|
|
____ T(2) Getting on the Net
|
|
____ T(3) Communications and Network Evolution
|
|
____ T(4) Private Sector Privacy
|
|
|
|
Group B 10:30 a.m.
|
|
____ T(5) Constitutional Law for Non-lawyers
|
|
____ T(6) Computer Crime
|
|
____ T(7) Modern Telecommunications
|
|
____ T(8) International Privacy Developments
|
|
|
|
Please check method of payment: Amount enclosed: $________
|
|
____ Visa _____ MasterCard ____ Check (payable to
|
|
The George Washington University)
|
|
Credit card number: ______________________________________
|
|
Expiration date: _________________________________________
|
|
Name on card: ____________________________________________
|
|
Signature: _______________________________________________
|
|
For Continuing Medical Education accreditation, give state and medical #:
|
|
* * * * END OF FORM * * * * *
|
|
|
|
The complete announcement will be mailed to you in printed form via the
|
|
postal service if you request one by telephone, fax, electronic mail, or
|
|
regular mail from
|
|
|
|
CFP - 2
|
|
Office of Conferences and Institutes
|
|
The George Washington University
|
|
2003 G St. NW
|
|
Washington DC 20052
|
|
|
|
phone (202) 994-7238
|
|
fax (202) 994-7048
|
|
email cfp2@seas.gwu.edu
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
=====================
|
|
Voice of God Silenced
|
|
=====================
|
|
Popular Communications, Oct 1991
|
|
|
|
New York City Police detectives with the assistance of FCC agents,
|
|
arrested two New York City residents who had allegedly been interfering with
|
|
police radio communications.
|
|
Based on complaints filed by the NYPD, Engineers from the FCC's New York
|
|
City office, using mobile radio direction finding equipment, traced the source
|
|
of the interference to the residence of Noel Wo, New York, NY. Mr. Wo who
|
|
called himself the "Voice of God," challenged anyone to locate him, and
|
|
threatened to "blow away" anyone who tried to catch him.
|
|
Radio transmitting equipment allegedly used to transmit taunts, music,
|
|
and idle chatter over police emergency radio frequencies, were seized during
|
|
a search of his apartment and that of a second suspect, David Yung, New York,
|
|
NY. Both defendants were arrested and charged with obstructing governmental
|
|
administration. Other state and federal charges are pending.
|
|
-------------------------------------------------------------------------------
|
|
|
|
================================
|
|
Fraudulent Fax Gets Forger Freed
|
|
================================
|
|
San Francisco Chronicle, Dec 18, 1991
|
|
|
|
Jean Paul Barrett, a convict serving 33 years for forgery and fraud in
|
|
the Pima County jail in Tuscon, Arizona, was released on 13Dec91 after receipt
|
|
of a forged fax ordering his release. It appears that a copy of a legitimate
|
|
release order was altered to bear HIS name. Apparently no one noticed that
|
|
the faxed document lacked an originating phone number or that there was no
|
|
"formal" cover sheet. The "error" was discovered when Barrett failed to show
|
|
up for a court hearing.
|
|
The jail releases about 60 people each day, and faxes have become
|
|
standard procedure. Sheriff's Sergeant Rick Kastigar said "procedures are
|
|
being changed so the error will not occur again."
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
====================================
|
|
Data Looted from SSA and FBI Systems
|
|
====================================
|
|
Associated Press, Dec 18, 1991
|
|
|
|
Associated Press writer Joseph Neff reports from Newark, NJ that eighteen
|
|
private investigators and Social Security Administration employees in nine
|
|
states were charged Wednesday with buying and selling confidential data
|
|
>from SSA and FBI computers. The information included earnings histories and
|
|
criminal records. The private investigators, many advertising in legal
|
|
journals, sold the information to companies. If convicted on all counts, the
|
|
defendants face maximum sentences of 20 to 150 years and multimillion dollar
|
|
fines.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
====================================
|
|
Taurus Poised to Clear Final Hurdles
|
|
====================================
|
|
Financial Times, Dec 19, 1991
|
|
|
|
The UK government appeared yesterday to have overcome legal obstacles to
|
|
the introduction of Taurus, the London Stock exchange's much delayed computer
|
|
settlement system. After more of a year of effort by the Department of Trade
|
|
and Industry lawyers, formal regulations were laid before parliament which
|
|
would create the legal framework necessary for Taurus. At the same time a
|
|
safeguard for personal shareholders, which had been built into the Taurus
|
|
system at the request of ministers has been dropped.
|
|
Investors would have had to quote confidential 13-digit personal
|
|
authorization codes before being able to deal in their shares. This
|
|
requirement has now been judged too cumbersome for the small amount of extra
|
|
security it would have bought. Instead shareholders will be able to tell the
|
|
registrars who maintain their shareholders only to transfer their shares after
|
|
they receive written instructions. This extra level of security will be
|
|
available only to investors who specifically request it.
|
|
The legal changes tabled yesterday are needed because share certificates
|
|
and transfer forms, currently required by law to give evidence of title and
|
|
enable a change of title to take place, will cease to be produced under the
|
|
new, paperless system of share ownership and dealing.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
==========================================================
|
|
Computer Database of Former E. German State Police (Stasi)
|
|
==========================================================
|
|
Source unknown, Winter 1991
|
|
|
|
An unverified report indicates that a German private detective agency that was
|
|
thought to be operated by former Stasi members bought a computer database
|
|
containing the names and salaries of 97,058 members of the Stasi in 1989. The
|
|
detective agency then pressed charges against the computer specialist who sold
|
|
them the information. The charges are not indicated, although they may be
|
|
under the strict (West) German privacy laws. If so, Stasi support for privacy
|
|
is new. In addition to their prying into the lives of (East) German citizens,
|
|
the Stasi had agents actively hacking into West German systems, including
|
|
Berlin's drivers license agency.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
==============================================
|
|
Recent Novell Software Contains a Hidden Virus
|
|
==============================================
|
|
John Markoff, New York Times, Dec 20, 1991
|
|
|
|
The nation's largest supplier of office-network software for personal
|
|
computers has sent a letter to approximately 3,800 customers warning that it
|
|
inadvertently allowed a software virus to invade copies of a disk shipped
|
|
earlier this month.
|
|
The letter, sent on Wednesday to customers of Novell Inc., a Provo, Utah,
|
|
software publisher, said the diskette, which was mailed on Dec. 11, had been
|
|
accidentally infected with a virus known by computer experts as "Stoned 111."
|
|
A company official said yesterday that Novell had received a number of
|
|
reports from customers that the virus had invaded their systems, although
|
|
there had been no reports of damage.
|
|
But a California-based computer virus expert said that the potential for
|
|
damage was significant and that the virus on the Novell diskette frequently
|
|
disabled computers that it infected.
|
|
|
|
'Massive Potential Liabilities'
|
|
|
|
"If this was to get into an organization and spread to 1,500 to 2,000
|
|
machines, you are looking at millions of dollars of cleanup costs," said
|
|
John McAfee, president of McAfee & Associates, a Santa Clara, Calif. antivirus
|
|
consulting firm. "It doesn't matter that only a few are infected," he said.
|
|
"You can't tell. You have to take the network down and there are massive
|
|
potential liabilities." Mr. McAfee said he had received several dozen calls
|
|
>from Novell users, some of whom were outraged.
|
|
|
|
The Novell incident is the second such case this month. On Dec. 6, Konami
|
|
Inc., a software game manufacturer based in Buffalo Grove, 111. wrote
|
|
customers that disks of its Spacewrecked game had also become infected with an
|
|
earlier version of the Stoned virus. The company said in the letter that it
|
|
had identified the virus before a large volume of disks had been shipped to
|
|
dealers.
|
|
|
|
Source of Virus Unknown
|
|
|
|
Novell officials said that after the company began getting calls earlier
|
|
this week, they traced the source of the infection to a particular part of
|
|
their manufacturing process. But the officials said they had not been able to
|
|
determine how the virus had infected their software initially.
|
|
Novell's customers include some of nation's largest corporations. The
|
|
software, called Netware, controls office networks ranging from just two or
|
|
three machines to a thousand systems.
|
|
"Viruses are a challenge for the marketplace," said John Edwards,
|
|
director of marketing for Netware systems at Novell. "But we'll keep up our
|
|
vigilance. He said the virus had attacked a disk that contained a help
|
|
encyclopedia that the company had distributed to its customers.
|
|
|
|
Servers Said to Be Unaffected
|
|
|
|
Computer viruses are small programs that are passed from computer to
|
|
computer by secretly attaching themselves to data files that are then copied
|
|
either by diskette or via a computer network. The programs can be written to
|
|
perform malicious tasks after infecting a new computer, or do no more than
|
|
copy themselves from machine to machine.
|
|
In its letter to customers the company said that the Stoned 111 virus
|
|
would not spread over computer networks to infect the file servers that are
|
|
the foundation of networks. File servers are special computers with large
|
|
disks that store and distribute data to a network of desktop computers.
|
|
The Stoned 111 virus works by attaching itself to a special area on a
|
|
floppy diskette and then copying itself into the computer's memory to infect
|
|
other diskettes.
|
|
But Mr. McAfee said the program also copied itself to the hard disk of a
|
|
computer where it could occasionally disable a system. In this case it is
|
|
possible to lose data if the virus writes information over the area where a
|
|
special directory is stored.
|
|
Mr. McAfee said that the Stoned 111 virus had first been reported in
|
|
Europe just three months ago. The new virus is representative of a
|
|
class of programs known as "stealth" viruses, because they mask their
|
|
location and are difficult to identify. Mr. McAfee speculated that
|
|
this was why the program had escaped detection by the company.
|
|
|
|
Steps Toward Detection
|
|
|
|
Novell has been moving toward adding new technology to its software to
|
|
make it more difficult for viruses to invade it, Mr. Edwards said. Recently,
|
|
the company licensed special digital-signature software that makes it
|
|
difficult for viruses to spread undetected. Novell plans to add this new
|
|
technology to the next major release of its software, due out at the end of
|
|
1992.
|
|
In the past, courts have generally not held companies liable for damages
|
|
in cases where a third party is responsible, said Susan Nycum, a Palo Alto,
|
|
Calif., lawyer who is an expert on computer issues. "If they have been
|
|
prudent it wouldn't be fair to hold them liable," she said. "But ultimately it
|
|
may be a question for a jury."
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
======================
|
|
GTE Sells Sprint Stake
|
|
======================
|
|
USA Today, Jan 3, 1992
|
|
|
|
GTE said it is selling its 19% stake in long-distance phone company US Sprint
|
|
to majority owner United Telecommunications for $530 million. The sale ends a
|
|
partnership in which GTE and United Telecom combined their long distance
|
|
subsidiaries to create US Sprint in 1986. United Telecom said it will adopt
|
|
the Sprint name after completion of the deal, expected by the end of this
|
|
month. United Telecom Chairman WIlliam Esrey said the deal achieves a
|
|
long-time goal of total ownership of Sprint.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
====================
|
|
Caller ID in Chicago
|
|
====================
|
|
USA Today, Jan 3, 1992
|
|
|
|
Caller ID -- a service that reveals caller's number before the phone is
|
|
answered -- became available to most Chicago area Illinois Bell customers.
|
|
About 5,000 of 1.8 million eligible bought service, which costs an extra $6.50
|
|
monthly.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
==============================================
|
|
When the Phone Rings, You'll See Who's Calling
|
|
==============================================
|
|
Craig Crossman, Knight-Ridder Newspapers, Dec 26, 1991
|
|
|
|
Q. I have the new Caller ID service that displays the phone number of an
|
|
incoming call before I answer the phone. The problem is that it only displays
|
|
the number. I want to know if there is any way I can have my computer look up
|
|
the name of the person who's calling?
|
|
A. The problem with Caller ID is that it gives only the number, date and
|
|
time of an incoming call. You still don't know who the caller is.
|
|
A new product called Caller ID+Plus does just what you described and more.
|
|
It incorporates Rochelle Communications' ANI-32 Caller ID Computer Adaptor and
|
|
a special data base program that can run at the same time you are running other
|
|
programs. The 21/2-inch adapter plugs into your computer's serial port.
|
|
The provided telephone cable plugs into a standard modular phone jack. A
|
|
"T" adapter is also included, which gives you another jack to hook your
|
|
telephone into.
|
|
When an incoming call is detected, the program instantly compares the
|
|
detected phone number to your data base of up to 65,000 contacts. When a match
|
|
is detected, you are presented with all of the person's data that you have on
|
|
file, such as name, title, business and address, in a window.
|
|
The program has many capabilities. For example, you can store notes about
|
|
the call as well as notes from previous telephone conversations. You can also
|
|
display a log of all of the previous calls received from or made to the caller
|
|
including date, time and duration. All of this data is instantly displayed on
|
|
your screen before you pick up the phone.
|
|
Currently, you must manually enter names, addresses and telephone numbers
|
|
into your computer. Rochelle is planning a product that will take advantage of
|
|
commercially available telephone directories on CD-ROM. A single CD-ROM can
|
|
encompass every name, telephone number and address in the United States.
|
|
Caller ID+Plus requires an IBM PC or compatible with one available RS-232
|
|
serial port. It sells for $295. [Rochelle Communications Inc., (800) 542-8808
|
|
or (512) 794-0088]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
===============================================
|
|
Seized Computer Reveals Sophisticated Operation
|
|
===============================================
|
|
Mark Magnier, Journal of Commerce Nov 26, 1991
|
|
|
|
SINGAPORE -- Three U.S. software companies seized two personal computers
|
|
and various financial records in late October and early November, as part of
|
|
the raids against alleged software pirates Ong Seow Pheng and Tan Pui Fun in
|
|
Singapore.
|
|
Jeffrey Siebach, regional counsel of Lotus Development Corp., one of the
|
|
companies pursuing the case, says he received a call a few days after the raid
|
|
>from Ong's attorney.
|
|
"His lawyer called us and said, `We need all his books back because his
|
|
business has ground to a halt." After I picked my jaw up, I said, "You've got
|
|
to be kidding," Siebach said. "These guys don't see it as a moral issue at
|
|
all."
|
|
Only when the three U.S. software companies -- Lotus, Digital Research Inc.
|
|
and Novell Inc. -- turned on one of the personal computers did they realize how
|
|
sophisticated the operation was.
|
|
"We were amazed, to tell you the truth," said Siebach, who is also regional
|
|
vice president for the Business Software Alliance, an industry trade group that
|
|
initiates raids and lawsuits against pirates worldwide.
|
|
The first thing they were greeted with was a computer display that said,
|
|
"Welcome to the Ong Family of Businesses." A further search found over 450
|
|
computerized financial spread sheets with detailed sales and accounting
|
|
figures. These are being analyzed by Coopers & Lybrand, international
|
|
accountants.
|
|
Ong also had a detailed knowledge of and worked around BSA activities. For
|
|
instance, he knew the software alliance was concerned with business software
|
|
but not video game software, so its business software manuals were printed
|
|
offshore in Indonesia while its game manuals were printed in Singapore, Siebach
|
|
said. The group is investigating whether Ong had an interest in the printing
|
|
operations as well.
|
|
Ong would also write to retailers and suppliers telling them to be careful
|
|
because the alliance was active in their area, or telling suppliers to ship
|
|
only when he gave the green light.
|
|
He also had worked into his financial plan a contingency for getting
|
|
caught, Siebach said. He figured that the maximum fine in Singapore was the
|
|
equivalent of $59,172 (S$100,000) and calculated that the alliance normally
|
|
settled for damages and attorneys fees, so he had worked out a figure.
|
|
"He was ready for this," Siebach said. "It was a cost of doing business."
|
|
Ong is said to have been operating since at least 1988. As outlined, he
|
|
would acquire legitimate copies of a full range of software programs and video
|
|
games from U.S. mail-order outlets.
|
|
The original manuals were then sent to Indonesia, where they were illegally
|
|
copied and air-freighted back to Singapore as "technical manuals" for local and
|
|
regional distribution.
|
|
He sold the manuals along with a master copy to his retail customers, which
|
|
allowed them to copy off the master. One theory is that this saved him import
|
|
duties. Technical manuals face no Singapore import duties. Computer disks do.
|
|
Sources say he was able to maintain control by threatening to cut retailers
|
|
out of the lucrative trade and his access to the latest releases if they
|
|
crossed him.
|
|
The attorney adds that the operation appeared to enjoy strong loyalty from
|
|
its customers in part because of the low prices, but also because he could get
|
|
the product to market in some cases even before the legitimate dealers.
|
|
Siebach said he talked to one game distributor who had exclusive rights for
|
|
a new game that he planned to launch. Ong reportedly launched it before the
|
|
authorized dealer at a lower price, subsequently killing the authorized
|
|
dealer's market.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
==============================================
|
|
Computer Viruses Carry Threat to U.S.
|
|
Security, Military Admits its Systems Infected
|
|
==============================================
|
|
Bill Husted, The Atlanta Constitution, Nov 23, 1991
|
|
|
|
Military computers, including some used during the Persian Gulf War, were
|
|
infected by computer viruses that had the potential to destroy information or
|
|
bring a computer to a halt. Although the viruses proved to be more of a
|
|
nuisance than a disaster, they could have destroyed information used by
|
|
military commanders to make life-or-death battlefield decisions, Jim Christy,
|
|
director of computer crime investigation for the Air Force Office of Special
|
|
Investigation, said Friday.
|
|
Computer viruses - secretive programs designed to be electronic vandals
|
|
that damage data - are a continuing and increasing problem for the military,
|
|
Mr. Christy said. And, he added, there is the real fear that an enemy could
|
|
attack America using computer viruses capable of crippling communications and
|
|
computer systems.
|
|
There are unsubstantiated rumors that during the Gulf War viruses may have
|
|
spread to weapons that rely on computers to guide them. A virus attack on
|
|
these specialized computer systems would be very difficult. But some computer
|
|
experts, including Dr. David Stang, president of the National Computer Security
|
|
Association, said they heard rumors that the patriot missile - the high-tech
|
|
hero of the Gulf War - was infected by viruses.
|
|
The military acknowledged Friday that some of its computers - machines
|
|
identical to personal computers that are the workhorses of American business
|
|
- were infected. But Mr. Christy declined comment on whether any computer-
|
|
controlled weapon systems were affected. Mr. Christy would not say how many
|
|
military computers were infected during the war. But specialized defense and
|
|
computer publications say viruses were detected on thousands of computers.
|
|
Viruses are an increasing problem for all branches of the military, Mr.
|
|
Christy said. He said viruses discovered during the Gulf War probably weren't
|
|
planted by enemy agents. Instead, they may have come from something as
|
|
innocent as a computer game.
|
|
|
|
UNCONTROLLED SOFTWARE
|
|
"You have to remember that during Desert Shield, people were bringing
|
|
their own software from home, plus a lot of people went out and bought it," he
|
|
said. "It was a unique war. You could go out on the street and buy your own
|
|
software. And, to help morale, commanders were allowing their people to play
|
|
[computer] games."
|
|
Computer viruses are small programs that hide in another computer program
|
|
until they have a chance to duplicate themselves and move to a new computer.
|
|
While no apparent harm was done by viruses detected during the Gulf War, the
|
|
potential for disaster was great, Mr. Christy said.
|
|
"During Desert Storm, commanders made life-or-death decisions based on
|
|
information in a computer," he said. "I think it [the problems with military
|
|
computers] heightened the awareness of the viruses among Air Force commanders.
|
|
People didn't realize how necessary computers were to fight a war." And the
|
|
risk remains that viruses could be used as a weapon against military
|
|
computers, Mr. Christy said.
|
|
"I'm not sure it hasn't happened," he said. "It is awful hard to prove
|
|
intent. . . . We have so many viruses in the Air Force and some of them may be
|
|
intentional."
|
|
|
|
HOW AN ATTACK WOULD WORK
|
|
He said viruses, used by a terrorist or a foreign power, could sit and
|
|
wait for a remote signal before they do their work. "If you wanted to cripple
|
|
all the computer systems at one time, you'd wait for a certain time, and do
|
|
things like kill all of the Air Force traffic control computers," he said.
|
|
"People's lives would be at stake. Obviously an orchestrated attack would be
|
|
devastating."
|
|
Mr. Christy said computer viruses are a growing problem for the military.
|
|
"If you had asked me about it two or three years ago, I would have said that
|
|
the risk from virus was insignificant," he said. "We had two or three cases
|
|
of virus in the Air Force. But last year [they were so numerous] we had to
|
|
make an arbitrary decision that we would no longer investigate viruses [as a
|
|
crime]. We had found that in 100 percent of the cases, it was someone who had
|
|
unwittingly introduced the virus into the system."
|
|
He said, however, that while virus infections are not routinely prosecuted,
|
|
they are not ignored. A lot of the effort goes into finding ways to protect
|
|
military systems against a virus attack.
|
|
|
|
HACKERS CAN BE CULPRITS
|
|
Viruses are sometimes placed in military computers by hackers - computer
|
|
hobbyists who use their skills to break into computer systems. Hackers - who
|
|
use home computers and telephone lines to communicate with the Air Force
|
|
computer system - "routinely try to break in," Mr. Christy said. "I see
|
|
reports weekly about attempts to break into multiple systems."
|
|
The hackers have broken into computers containing unclassified
|
|
information, he said. It isn't all that difficult to do. Mr. Christy said
|
|
that he and his staff had broken into hundreds of Air Force computer systems
|
|
during exercises to test security.
|
|
Mr. Christy said that if a hacker placed a virus in any Air Force
|
|
computer, however, it might find its way into computers containing classified
|
|
information. Because of the potential that viruses have to cripple
|
|
computer-based weapons systems and disrupt civilian and military
|
|
communications, the Army has hired at least two private firms to develop ways
|
|
to defend against the viruses and to find out how to use computer viruses as
|
|
offensive weapons.
|
|
|
|
[ Editor's note: *SIGH* Isn't this the kind of sensationalistic journalism that
|
|
makes you want to toss your cookies? Some bored servicemen
|
|
discover that their IBM XT clone is infected with the "Stoner"
|
|
virus, causing them to lose their only copy of "Tetris" and
|
|
suddenly the press decides it must be a plot by 'mad hackers'
|
|
to shut down the Patriot Missile's targeting computer. ]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
=============================
|
|
Convicted Spy Granted Hearing
|
|
=============================
|
|
Associated Press, Jan 7, 1992
|
|
|
|
WASHINGTON (AP) A post-trial hearing will be held for an Air Force sergeant
|
|
who may not have understood the espionage charge to which he pleaded guilty,
|
|
the Air Force disclosed Tuesday. The proceeding Friday relates to the court
|
|
martial of Sgt. Jeffrey M. Carney, who admitted helping East German agents spy
|
|
on U.S. diplomats and military commanders in Berlin. He was sentenced Dec. 3 to
|
|
38 years in prison. Chief Trial Judge James Heupel ordered the court session.
|
|
The inquiry in a military courtroom at Andrews Air Force Base in Maryland
|
|
is
|
|
to ensure that Carney understood the espionage charge and his guilty plea to
|
|
it, the Air Force said in a statement. Carney also admitted copying classified
|
|
documents and passing them to the East Germans. He pleaded guilty to desertion
|
|
and conspiracy to commit espionage in addition to espionage.
|
|
Carney was a linguist and communications specialist at Tempelhof Central
|
|
Airport in Berlin, assigned to an electronics security group. In April 1984, he
|
|
was transferred to Goodfellow Air Force Base in Texas, a base for training
|
|
intelligence and communications specialists.
|
|
He deserted in 1985, defecting to East Germany. There, he intercepted,
|
|
translated and transcribed telephone calls of U.S. military commanders and
|
|
embassy officials stationed in Berlin, the Air Force said. Carney was arrested
|
|
last April 22 at his residence in what used to be the Soviet sector of Berlin.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
==================
|
|
PC Virus Blackmail
|
|
==================
|
|
Information Week, Dec 16, 1991
|
|
|
|
A bizarre British court case involving computer viruses has pointed up
|
|
the vulnerability of users with careless policies on PC software. Hearing the
|
|
case of a U.S. scientist accused of computer blackmail late last month, the
|
|
court granted a stay after lawyers successfully argued that the defendant,
|
|
Joseph Popp, 41, was mentally ill. Popp was facing 11 charges of damaging
|
|
computer systems and attempting to obtain a total of 6 million pounds ($10.7
|
|
million) through blackmailing numerous medical institutes worldwide around
|
|
Christmas 1989.
|
|
Popp is alleged to have mailed more than 20,000 floppy disks to the
|
|
research institutes. He promoted the disks as containing valuable information
|
|
about AIDS. But the disks themselves contained a software virus, which has
|
|
since also been dubbed AIDS. When users tried to access the disk, they got
|
|
messages demanding 200 pounds (about $350) to eradicate the virus that had just
|
|
infected their systems.
|
|
Popp was extradited to the United Kingdom, where a chorus of scientists
|
|
>from universities and research institutes claimed that their software had been
|
|
damaged when the disks were loaded onto their systems.
|
|
One organization that fell foul of the virus was the Imperial Cancer
|
|
Research Fund in London. Dr. Ron Catterall, director of the fund's computer
|
|
research unit, was called as a witness for the prosecution. Catterall was
|
|
smart: He loaded the disk onto his stand alone PC rather than the network, and
|
|
warned other users as he discovered the virus. `It took a long time to find
|
|
out what was going on, and to clean up my machine,' he said. `It eventually
|
|
started overwriting the hard disk.'
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Informatik Submission & Subscription Policy
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Informatik is an ongoing electronic journal, and thus we are faced with
|
|
the ever present need for a steady influx of new material. If you have an
|
|
area of interest or expertise that you would like to write about, please do
|
|
not hesitate to contribute! We depend on reader submissions, especially for
|
|
the "Hot Flashes" news reports. We do ask that any submissions fit the
|
|
following guidelines...
|
|
|
|
General Content
|
|
~~~~~~~~~~~~~~~
|
|
Material for Informatik should concern information of interest to the
|
|
computer underground community. Examples of this include, but are by no
|
|
means limited to hacking and phreaking, governmental agencies, fraud,
|
|
clandestine activity, abuse of technology, recent advances in computing
|
|
or telecommunications technology, and other of information not readily
|
|
available to the public. Please include a title and author name.
|
|
|
|
Text Format
|
|
~~~~~~~~~~~
|
|
* standard ASCII test
|
|
* 79 characters per line
|
|
* no TAB codes
|
|
* no special or system specific characters
|
|
* mixed case type
|
|
|
|
News submissions
|
|
~~~~~~~~~~~~~~~~
|
|
* Submit only recent news items
|
|
* Include the headline or title of the article
|
|
the author's name (if given)
|
|
the publication of origin
|
|
the date of publication
|
|
|
|
Subscription policy
|
|
~~~~~~~~~~~~~~~~~~~
|
|
We are happy to provide an Internet based subscription service to our
|
|
readers. To be on our mailout list, send mail to our Internet address,
|
|
"inform@doc.cc.utexas.edu" and include the word subscription in the subject
|
|
of your message. If you requested a subscription before, you need to reply
|
|
again, because the old subscription list was deleted by MH.
|
|
|
|
|
|
/* End; Issue 02 */
|
|
|
|
|