home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Aug 23, 1992 Volume 4 : Issue 38
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Copy Editor: Etaion Shrdlu, III
- Archivist: Brendan Kehoe
- Shadow-Archivist: Dan Carosone
-
- CONTENTS, #4.38 (Aug 23, 1992)
- File 1--Retraction & apology to Ripco
- File 2--THE GARBAGE DUMP BBS Purges Adult Gifs
- File 3--Canada busts Pirate
- File 4--Lotus NYT As against Borland
- File 5--Secret Service -- the TV show
- File 6--"The Hacker Files" Comic Book
- File 7--ZEN AND THE ART OF THE INTERNET (Review 1)
- File 8--ZEN AND THE ART OF THE INTERNET (Review 2)
- File 9--CPSR Letter on Crypto Policy
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
- anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
- Date: Fri, 21 Aug 1992 11:41:44 -0600
- From: Evan.Hendricks@EFF.ORG(hendricks@washofc.cpsr.org)
- Subject: File 1--Retraction & apology to Ripco
-
- ((MODERATORS' NOTE: CuD #4.37 reported an inadvertent, but
- unfortunate, phrasing of a reference to Ripco BBS, in an article in
- Privacy Times. We contacted the editor, Evan Hendricks, who shared our
- concern. He indicated that, if CuD's version of events were correct,
- he would rectify the mistake. His response is below may be one reason
- why Privacy Times is judged by many as as a first-rate and reputable
- resource. His response should also be an example of integrity for
- other journalists.))
-
- The following retraction was printed in the Aug. 21, 1992 issue of
- Privacy Times
-
- ++++++++++++++++++++++++++++
-
- RETRACTION
-
- In the previous issue, Privacy Times reported incorrectly that a
- manual for breaking into TRW's credit bureau database was published on
- the Ripco bulletin board. In fact, Ripco officials refused to publish
- it. Our mistake was made worse by the fact that Ripco had been the
- previous victim of unwarranted government persecution after
- controversial matters were published on the board, sources said.
-
- Privacy Times apologizes for this mistake. We regret any misconceptions
- that this may have caused.
-
- ------------------------------
-
- Date: Thu, 20 Aug 92 15:46:13 MDT
- From: bbx!yenta!weenie@UNMVAX.CS.UNM.EDU(Dean Kerl)
- Subject: File 2--THE GARBAGE DUMP BBS Purges Adult Gifs
-
- FOR RELEASE AUGUST 17, 1992
-
- GARBAGE DUMP BBS PURGES ADULT GRAPHIC FILES
-
- DataSafe, owners and operators of The Garbage Dump Bulletin Board
- Service (BBS) in Albuquerque, NM and Denver, CO announce the immediate
- removal of all adult graphic files from its online service. This
- action was taken to free up system and personnel resources which will
- be used to enhance and expand current services such as DOS, Windows
- and OS/2 shareware downloadable files. Shareware files will be
- promoted as a primary product along with interactive chat, message
- areas and online multiplayer games.
-
- Simon Clement, VP of Marketing said, "These graphic files have never
- been an integral part of our business and this action will allow us to
- market to a much wider audience. We feel that this new market strategy
- will position us to serve more customers with better and more valuable
- services. We would like to encourage our customers to continue using
- our expanding services. Any customer who is dissatisfied with our
- market emphasis will be given a full refund, on request, for any time
- remaining on their account."
-
- The Garbage Dump BBS will continue to offer and promote uncensored
- Chat, E-mail, and Message Areas. This uncensored format allows for
- open discussion of a wide range of controversial topics including
- politics, consumer issues, freedom of speech, alternative lifestyles
- and current events.
-
- The Garbage Dump BBS can be reached via modem in Albuquerque, NM at
- (505)-294-5675 and in Denver, CO at (303)-457-1111. If you have any
- questions about our new policy or would like further information about
- our services, please contact Dean Kerl at (505)-294-4980 Voice.
-
- ------------------------------
-
- Date: 20 Aug 92 21:41:18 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 3--Canada busts Pirate
-
- Centre d'ordinateurs Microbec, a chain of four computer stores, has
- been handed the largest software-copyright fine in the province's
- history. The company was fined C$63,000 for selling computers loaded
- with illegal copies of the MS-DOS operating system.
-
- The fine is not the worst of it for Microbec. When the Royal Canadian
- Mounted Police raided the company last October, they seized about 140
- computers carrying the illegal software as evidence. Since the
- company was convicted, the seized hardware will not be returned, said
- Allan Reynolds, manager of the Canadian Alliance Against Software
- Theft (CAAST), a Toronto-based group of major software vendors set up
- to fight software piracy. Reynolds said the value of the seized
- computers is "more than double the fine amount in terms of revenue
- value." (Reprinted from ST Report 8.33 with permission)
-
- ------------------------------
-
- Date: Thu, 20 Aug 92 11:49:51 PDT
- From: name_withheld@by.request
- Subject: File 4--Lotus NYT As against Borland
-
- In case you missed it, there was a full page ad by Lotus in the August
- 20 issue of the New York Times (Business section, p. 3) about their
- lawsuit against Borland. With a banner headline saying "There's
- nothing innovative about copying, parts of it read:
-
- On Friday, July 31, 1992, a U.S. District Court ruled that
- Borland's Quattro(r) and Quattro Pro(r) spreadsheets infringe the
- copyrights of Lotus(r) 1-2-3.
-
- In its ruling, the court concluded tht "...the Quattro programs
- derive from illicit copying," holding that "Lotus has sued" and
- "Borland is liable."
-
- Lotus goes for the jugular in the ad. In a large-print subhead, it
- announces: "_Lotus innovated. Borland copied," and another says: "Who
- should you trust?" The ad concludes:
-
- But perhaps most importantly, Borland lost what matters most to
- customers: credibility. For instance, Borland told the Court they
- needed to copy our menus to achieve macro compatibility with
- 1-2-3. Now they tell their customers that the 1-2-3 menus aren't
- critical to compatibility.
-
- So ask yourself: To what extent can you trust a company that
- values what is expedient over what is legal? And to what extent
- can you rely on the product it wants you to buy?
-
- Here's our advice: Choose the product, and the company, you can
- trust. Choose Lotus. After all, we're the best in the business at
- building innovative spreadsheets. Always hae been, always will
- be.
-
- Case closed.
- Lotus
-
-
- ------------------------------
-
- Date: 17 Aug 1992 12:24:24 -0400 (EDT)
- From: Stephen Tihor 212 998 3052 <TIHOR@ACFcluster.NYU.EDU>
- Subject: File 5--Secret Service -- the TV show
-
- Last night NBC broadcast an episode of "Secret Service" in NY at least
- that featured a straightforwards nut who wants to kill the President
- plot and then a rather confusing account of their high technology
- defense of a fuzzy city power system against sabotage by a fired
- employee.
-
- I hope someone taped it and caught the exact wording of the disclaimer
- at the end because it was hard to follow the logic and determine what
- was the original incident and what was Hollywoodisms.
-
- The piece was prefaced with a brief discussion some of the risks of
- power outages.
-
- The expert quickly diagnosed the problem as a VIRUS. Persistent
- references to virus in the context of a electric power control system
- seemed odd. Since they appeared to be running pre-existing VIRUS
- checking software on the system one might suspect the "main frame" was
- an IBM PC or Apple Macintosh running standard software rather than a
- real time control system or perhaps something larger and safer.
- Interesting references were made to viruses lurking WITHIN modems.
- Then they identified the source of the attacking codes as the local
- font storage in what appeared to be a old DECwriter dot matrix
- printer.
-
- With some external clues the agents attempt to confront the criminal
- in house, which is wired with many falling metal screen, sounds
- effects, and gas but which lacks reinforced walls. The culprit is
- classic middle aged computer geek who appears uncaring about possible
- loss of life although the agents do not mention to him the risk of a
- life sentence of death penalty of others die as a result of his
- sabotage. He refuses to help them disarm the problem.
-
- The expert has announced that this is a logic bomb and eventually
- realizes that since the bug code is not in the copy of the system on
- disk as long as they shutdown without writing memory to disk they can
- reboot bug free. So a brief deliberate blackout is used to save the
- city.
-
- I am obvious very curious about the TRUE FACTs of this can if the show
- plans to show such other SS triumphs in the war on electronic crime as
- almost destroying Steve Jackson Games.
-
- ------------------------------
-
- Date: Fri, 21 Aug 92 09:18:22 MDT
- From: gambit@unijak.label.com(queen's gambit)
- Subject: File 6--"The Hacker Files" Comic Book
-
- _The Hacker Files_, if you've missed them, is the name of a new DC
- comic book. At $1.95 each, I plunked down my six bucks and took the
- first three of the 24 page monthly back to my digs and zap through
- them between hacks. Reading took a lot less time than I thought. I
- should have watched a double showing of Ishtar instead.
-
- The premise of the story, which is continued in serial form from one
- issue to the next, is that a virus has invaded Arpanet and threatens
- the Pentagon's computer system and could trigger a nuclear set-to. No
- matter that the collapse of Russia stretches the credibility of the
- Dr. Strangelove plot. The hacker-not-cracker hero is Jack Marshall, a
- scruffy looking peacenik who dresses in a t-shirt with a prominent
- peace sign, jeans, and an army shirt-as-jacket. He's been dismissed
- from his last company, Digitronix, under mysterious circumstances and
- was black-balled from the industry. Digitronix, coincidentally,
- installed the Pentagon's computers, and Jack Marshall, coincidentally,
- wrote the operating system for it before his dismissal. Not
- coincidentally, there's friction between Marshall and the Digitronix
- crowd when he pops on the scene. Not coincidentally, this friction
- may or may not have something to do with the plot in coming issues.
- Marshall, handle of "Hacker," calls a few of his younger hacker
- friends (Sue Denim and Dr. Zen) to help track down the virus planter.
- Was it some curious kids? Was it Digitronix? Was it some nasty foreign
- government? Do we really care?
-
- I'm not sure who _The Hacker Files- is aimed at. It presents a rather
- sympathetic view of hackers, so it's probably aimed at a younger,
- techno-sophisticated audience. The unfolding of the plot is too slow
- and twisted to hold the attention of the MTV generation, and pre-teens
- would probably find the story line incomprehensible. The dialogue in
- the book is R-rated, with "bullshits" and "goddamns" liberally
- sprinkled in. The graphics include unnecessary snapshot scenes of
- houses and neighborhoods that probably are intended for a touch of
- realism, but do nothing but take up space. At 12 cents a page, the
- space could be better used. The ads every few pages are distracting.
- Simulated computer screens showing what the characters see on the
- screen abound, but they don't add anything except maybe some vicarious
- thrill for kids. The story line needs a stronger set of ideas
- describing hackers and their activities and some coherent purpose in
- using a hacker as hero or villain. The characters, except for the
- youngest hackers, aren't either exciting or sympathetic, and like
- Gertrude Stein said about Oakland, after three issues there just ain't
- no there there.
-
- As I see it, the "to be continued" format is just a device to entice
- readers to get the next issue, but it's is as lame and drawn out as
- the first three, the promised "conclusion" in the fourth issue will be
- the last.
-
- ------------------------------
-
- Date: 20 Aug 1992 09:46:11 U
- From: "Anne" <harwell@SMTPGATE.TECHRSCS.PANAM.EDU>
- Subject: File 7--ZEN AND THE ART OF THE INTERNET (Review 1)
-
- ((MODERATORS' NOTE: The following two posts review ZEN AND THE ART OF
- THE INTERNET: A BEGINNER'S GUIDE, by Brendan P. Kehoe. Englewood
- Cliffs (N.J.): Prentice-Hall. 122 pp. $22 (paper).))
-
- Brendan Kehoe's _Zen and the Art of the Internet: A Beginner's Guide_
- is an eminently usable handbook of information and tips for navigating
- the Internet. Despite its title, beginners aren't the only ones who
- can benefit from it. The novice will enjoy it as a guided tour of the
- net; more experienced netters will find it a valuable resource as an
- all-in-one-place source for tips and tricks.
-
- Although some of his examples do betray an excessive fondness for
- Unix, Kehoe stays for the most part platform-neutral, so anyone can
- benefit from this book. All the basics are covered: email, FTP,
- Usenet and Telnet; plus some of everybody's favorite fun things, such
- as Finger, Ping, Talk and WHOIS.
-
- One of the more interesting sections is Chapter 4, which is given over
- entirely to explaining Usenet. Besides describing what Usenet is ("a
- set of machines that exchange articles"), it also tells what Usenet is
- not ("an organization," "the Internet," "fair"). Here the author
- really seems to swing into his own; he's obviously very comfortable in
- the world of newsgroups and this is some of his best writing. Although
- the entire book is readable and easy to comprehend, it's fun in the
- Usenet chapter. Perhaps echoing the anarchy of Usenet itself, Kehoe's
- prose takes on a slightly more freewheeling bent, and his advice,
- never heavy-handed, becomes more lively.
-
- _Zen_ is also crammed with factoids that are great to know, but
- sometimes hard to remember, such as directions for telnetting into the
- Naval Observatory Automated Data Service and listings of email
- gateways to. For the beginner, these are great guideposts for learning
- what's what; the veteran will appreciate having a ready reference to
- favorite services.
-
- Like most people, I had to learn net behavior the hard way, but maybe
- future generations will be spared this trauma by reading the section
- on netiquette. Although having a more aware crop of newbies entering
- the net may not be as amusing to the old timers, it has the potential
- for freeing up substantial chunks of bandwidth that were previously
- occupied by flames sent to the clueless ones.
-
- One feature of the book that could still stand some improvement is the
- appearance of the printed text itself. According to Kehoe, it was
- output on a 300 dpi laser. In the mid-1980's that was a great "taking
- control of our own property" kind of statement, but now it's easy to
- get much higher-quality text out of felt that a book of this quality
- deserved more attractive typefaces and higher-res output, such as what
- could have easily been obtained from a Linotronic imagesetter.
-
- However, this is a minor qualm and no reason for missing _Zen and the
- Art of the Internet_. It's a book to keep handy by the computer,
- whether you are a hardened veteran or a net.virgin. Although clearly
- slanted towards the novice, there's lots here for everyone. I wish I'd
- had it by my side when I first got on the net; it would have saved
- asking a million clueless FAQs.
-
- Anne Harwell
- harwell@panam.edu
-
- ------------------------------
-
- Date: Wed, 20 Aug 92 18:01:31 CDT
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu)
- Subject: File 8--ZEN AND THE ART OF THE INTERNET (Review 2)
-
- _Zen and the Art of the Internet: A Beginner's Guide_ (ZAI) is a
- deceptively subtle title. As Anne Harwell observes in her review in
- the previous post, Kehoe has taken the most common problems and needs
- of new internet riders and organized them in nine chapters, five
- appendixes, a helpful glossary and a (all to brief) bibliography. Ms.
- Harwell is an experienced cyber-surfer, administrator, and postmaster,
- and not readily pleased. That she finds the book helpful is a
- compelling endorsement.
-
- Kehoe's title is more than a cute wordplay on the similarly titled
- "Zen and the Art of Motorcycle Maintenance." It evokes an imagery and
- analogue between the art of Zen, a belief that we fulfill ourselves
- and understand the universe through self-mastery and mediation, and
- the passion and mastery required to function in the Internet. The
- Internet (or "net") is a system of interlinked computer systems
- connected into a packet switching (data block transfer) network. It
- enables users in different locations to communicate with each other by
- connecting to a host computer, such as a university mainframe or
- public access system, by addressing their "mail" with a unique address
- to a recipient on the other end. Uses of the Internet include sending
- and receiving electronic mail, ftp file transfers, telnet services
- allowing access to remote systems, and inter-relay chat (IRC). The
- increase in computer access at universities and the proliferation
- especially of Unix-based public access systems such as The Well or
- Mindvox have dramatically increased public access to The Net.
- Internet's popularity and accessability make Kehoe's volume both
- timely and important both for new users and even for experienced
- net-travellers.
-
- ZAI offers not only the basics for roaming around Internet, but
- provides a helpful reference source of tips and addresses for others.
- Beginning with network basics, Kehoe describes the concept of
- networking and summarizes how connections are made. A condensed
- chapter on electronic mail addresses explains how they are
- logically constructed, how to read domain and account names, and
- tricks for correcting bounced mail. He emphasizes to readers that
- Usenet *is not* the same as internet (the former is a process for
- exchanging posts for a mass audience, the latter is the computer
- networking systems that carry the posts). His explanation of Usenet
- hierarchies, gateways, and "netiquette" should be invaluable to
- newcomers.
-
- ZAI's overview of ftp and telnet are especially helpful. One of the
- most common "frequent asked questions" (FAQs) received by CuD is, "how
- can I ftp back issues?" Kehoe explains, step-by-step, how one uses ftp
- and telnet. He also provides the addresses of a number of useful sites
- for accessing help files, security documents, and other information of
- use both to novices and professionals. His summary of "things you'll
- hear about" is a list of people, common terms, or sites that, if read
- and remembered, will allow a novice to appear to be a seasoned user
- almost immediately.
-
- Readers should not be deceived by Kehoe's easy-going and often
- humorous style. Beneath the captivating prose is a serious purpose:
- Kehoe successfully brings to life a primer in netology, and he
- collapses considerable information into a short space. When finished
- with the book, one will be able to distinguish between Z files and Gif
- files, roam around archie with confidence, and log on to anonymous
- ftp.
-
- In the third edition, it would be helpful if some topics were
- expanded. Additional addresses could be included of those sites that
- have established longevity, Electronic digests such as Telecom Digest
- and Cu-Digest might be mentioned, and a chapter on Bitnet, a
- widely-used system among academics, might be included. It would also
- be helpful to include a separate chapter on IRC, a growing interactive
- communication procedure. If the publisher doesn't balk at the
- expansion, a longer glossary and an expanded bibliography would also
- be helpful (or at least explicit pointers to them).
-
- These suggestions aside, ZAI, although a bit pricey at $22, is still a
- good value, and the average reader will take away far more than from
- books twice the size (or cost). It would make a nifty classroom aid
- and should be required reading for anybody before being turned loose
- on the nets. In fact, it should be required reading for us all.
-
- ------------------------------
-
- Date: Mon, 17 Aug 1992 14:48:18 EDT
- From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
- Subject: File 9--CPSR Letter on Crypto Policy
-
- CPSR Letter on Crypto Policy
-
- The following is the text of a letter Computer Professionals for
- Social Responsibility (CPSR) recently sent to Rep. Jack Brooks,
- chairman of the House Judiciary Committee. The letter raises several
- issues concerning computer security and cryptography policy. For
- additional information on CPSR's activities in this area, contact
- banisar@washofc.cpsr.org. For information concerning CPSR generally
- (including membership information), contact cpsr@csli.stanford.edu.
-
- ====================================================
-
- August 11, 1992
-
- Representative Jack Brooks
- Chairman
- House Judiciary Committee
- 2138 Rayburn House Office Bldg.
- Washington, DC 20515-6216
-
- Dear Mr. Chairman:
-
- Earlier this year, you held hearings before the Subcommittee on
- Economic and Commercial Law on the threat of foreign economic
- espionage to U.S. corporations. Among the issues raised during the
- hearings were the future of computer security authority and the
- efforts of government agencies to restrict the use of new
- technologies, such as cryptography.
-
- As a national organization of computer professionals interested
- in the policies surrounding civil liberties and privacy, including
- computer security and cryptography, CPSR supports your efforts to
- encourage public dialogue of these matters. Particularly as the
- United States becomes more dependent on advanced network technologies,
- such as cellular communications, the long-term impact of proposed
- restrictions on privacy-enhancing techniques should be carefully
- explored in a public forum.
-
- When we had the opportunity to testify before the Subcommittee on
- Legislation and National Security in May 1989 on the enforcement of
- the Computer Security Act of 1987, we raised a number of these issues.
- We write to you now to provide new information about the role of the
- National Security Agency in the development of the Digital Signature
- Standard and the recent National Security Directive on computer
- security authority. The information that we have gathered suggests
- that further hearings are necessary to assess the activities of the
- National Security Agency since passage of the Computer Security Act of
- 1987.
-
- The National Security Agency
- and the Digital Signature Standard
-
- Through the Freedom of Information Act, CPSR has recently learned
- that the NSA was the driving force behind the selection and
- development of the Digital Signature Standard (DSS). We believe that
- the NSA's actions contravene the Computer Security Act of 1987. We
- have also determined that the National Institute of Standards and
- Technology (NIST) attempted to shield the NSA's role in the
- development of the DSS from public scrutiny.
-
- The Digital Signature Standard will be used for the
- authentication of computer messages that travel across the public
- computer network. Its development was closely watched in the computer
- science community. Questions about the factors leading to the
- selection of the standard were raised by a Federal Register notice, 56
- Fed. Reg. 42, (Aug 30, 1991), in which NIST indicated that it had
- considered the impact of the proposed standard on "national security
- and law enforcement," though there was no apparent reason why these
- factors might be considered in the development of a technical standard
- for communications security.
-
- In August 1991, CPSR filed a FOIA request with the National
- Institute of Standards and Technology seeking all documentation
- relating to the development of the DSS. NIST denied our request in
- its entirety. The agency did not indicate that they had responsive
- documents from the National Security Agency in their files, as they
- were required to do under their own regulations. 15 C.F.R. Sec.
- 4.6(a)(4) (1992). In October 1991, we filed a similar request for
- documents concerning the development of the DSS with the Department of
- Defense. The Department replied that they were forwarding the request
- to the NSA, from whom we never received even an acknowledgement of our
- request.
-
- In April 1992, CPSR filed suit against NIST to force disclosure
- of the documents. CPSR v. NIST, et al., Civil Action No. 92-0972-RCL
- (D.D.C.). As
-
- a result of that lawsuit, NIST released 140 out of a total of 142
- pages. Among those documents is a memo from Roy Saltman to Lynn
- McNulty which suggests that there were better algorithms available
- than the one NIST eventually recommended for adoption. If that is so,
- why did NIST recommend a standard that its own expert believed was
- inferior?
-
- Further, NIST was required under Section 2 of the Computer
- Security Act to develop standards and guidelines to "assure the
- cost-effective security and privacy of sensitive information in
- federal systems." However, the algorithm selected by NIST as the DSS
- was purposely designed to minimize privacy protection: its use is
- limited to message authentication. Other algorithms that were
- considered by NIST included both the ability to authenticate messages
- and the capability to incorporate privacy-enhancing features. Was
- NSA's interest in communication surveillance one of the factors that
- lead to the NIST decision to select an algorithm that was useful for
- authentication, but not for communications privacy?
-
- Most significantly, NIST also disclosed that 1,138 pages on the
- DSS that were created by the NSA were in their files and were being
- sent back to the NSA for processing. Note that only 142 pages of
- material were identified as originating with NIST. In addition, it
- appears that the patent for the DSS is filed in the name of an NSA
- contractor.
-
- The events surrounding the development of the Digital Signature
- Standard warrant further Congressional investigation. When Congress
- passed the Computer Security Act, it sought to return authority for
- technical standard-setting to the civilian sector. It explicitly
- rejected the proposition that NSA should have authority for developing
- technical guidelines:
-
- Since work on technical standards represents virtually
- all of the research effort being done today, NSA would
- take over virtually the entire computer standards job
- from the [National Institute of Standards and
- Technology]. By putting the NSA in charge of developing
- technical security guidelines (software, hardware,
- communications), [NIST] would be left with the
- responsibility for only administrative and physical
- security measures -- which have generally been done
- years ago. [NIST], in effect, would on the surface be
- given the responsibility for the computer standards
- program with little to say about the most important part
- of the program -- the technical guidelines developed by
- NSA.
-
- Government Operation Committee Report at 25-26, reprinted in 1988 U.S.
- Code Cong. and Admin. News at 3177-78. See also Science Committee
- Report at 27, reprinted in 1988 U.S.C.A.N. 3142.
-
- Despite the clear mandate of the Computer Security Act, NSA does,
- indeed, appear to have assumed the lead role in the development of the
- DSS. In a letter to MacWeek magazine last fall, NSA's Chief of
- Information Policy acknowledged that the Agency "evaluated and
- provided candidate algorithms including the one ultimately selected by
- NIST." Letter from Michael S. Conn to Mitch Ratcliffe, Oct. 31, 1991.
- By its own admission, NSA not only urged the adoption of the DSS -- it
- actually "provided" the standard to NIST.
-
- The development of the DSS is the first real test of the
- effectiveness of the Computer Security Act. If, as appears to be the
- case, NSA was able to develop the standard without regard to
- recommendations of NIST, then the intent of the Act has clearly been
- undermined.
-
- Congress' intent that the standard-setting process be open to
- public scrutiny has also been frustrated. Given the role of NSA in
- developing the DSS, and NIST's refusal to open the process to
- meaningful public scrutiny, the public's ability to monitor the
- effectiveness of the Computer Security Act has been called into
- question.
-
- On a related point, we should note that the National Security
- Agency also exercised its influence in the development of an important
- standard for the digital cellular standards committee. NSA's
- influence was clear in two areas. First, the NSA ensured that the
- privacy features of the proposed standard would be kept secret. This
- effectively prevents public review of the standard and is contrary to
- principles of scientific research.
-
- The NSA was also responsible for promoting the development of a
- standard that is less robust than other standards that might have been
- selected. This is particularly problematic as our country becomes
- increasingly dependent on cellular telephone services for routine
- business and personal communication.
-
- Considering the recent experience with the DSS and the digital
- cellular
-
- standard, we can anticipate that future NSA involvement in the
- technical standards field will produce two results: (1) diminished
- privacy protection for users of new communications technologies, and
- (2) restrictions on public access to information about the selection
- of technical standards. The first result will have severe
- consequences for the security of our advanced communications
- infrastructure. The second result will restrict our ability to
- recognize this problem.
-
- However, these problems were anticipated when Congress first
- considered the possible impact of President Reagan's National Security
- Decision Directive on computer security authority, and chose to
- develop legislation to promote privacy and security and to reverse
- efforts to limit public accountability.
-
- National Security Directive 42
-
- Congressional enactment of the Computer Security Act was a
- response to President Reagan's issuance of National Security Decision
- Directive ("NSDD") 145 in September 1984. It was intended to reverse
- an executive policy that enlarged classification authority and
- permitted the intelligence community broad say over the development of
- technical security standards for unclassified government and
- non-government computer systems and networks. As noted in the
- committee report, the original NSDD 145 gave the intelligence
- community new authority to set technical standards in the private
- sector:
-
- [u]nder this directive, the Department of Defense (DOD)
- was given broad new powers to issue policies and
- standards for the safeguarding of not only classified
- information, but also other information in the civilian
- agencies and private sector which DOD believed should be
- protected. The National Security Agency (NSA), whose
- primary mission is one of monitoring foreign
- communications, was given the responsibility of
- managing this program on a day-to-day basis.
-
- H. Rep. No. 153 (Part 2), 100th Cong., 1st Sess. 6 (1987). The
- legislation was specifically intended to override the Presidential
- directive and to "greatly restrict these types of activities by the
- military intelligence agencies ... while at the same time providing a
- statutory mandate for a strong security program headed up by [NIST], a
- civilian agency." Id. at 7.
-
- President Bush issued National Security Directive ("NSD") 42 on
- July 5, 1990. On July 10, 1990, Assistant Secretary of Defense Duane
- P. Andrews testified before the House Subcommittee on Transportation,
- Aviation, and Materials on the contents of the revised NSD. The
- Assistant Secretary stated that the "the new policy is fully compliant
- with the Computer Security Act of 1987 (and the Warner Amendment) and
- clearly delineates the responsibilities within the Federal Government
- for national security systems."
-
- On August 27, 1990, CPSR wrote to the Directorate for Freedom of
- Information of the Department of Defense and requested a copy of the
- revised NSD, which had been described by an administration official at
- the July hearing but had not actually been disclosed to the public.
- CPSR subsequently sent a request to the National Security Council
- seeking the same document. When both agencies failed to reply in a
- timely fashion, CPSR filed suit seeking disclosure of the Directive.
- CPSR v. NSC, et al., Civil Action No. 91-0013-TPJ (D.D.C.).
-
- The Directive, which purports to rescind NSDD 145, was recently
- disclosed as a result of this litigation CPSR initiated against the
- National Security Council.
-
- The text of the Directive raises several questions concerning the
- Administration's compliance with the Computer Security Act:
-
- 1. The new NSD 42 grants NSA broad authority over "national security
- systems." This phrase is not defined in the Computer Security Act and
- raises questions given the expansive interpretation of "national security"
- historically employed by the military and intelligence agencies and the
- broad scope that such a term might have when applied to computer
- systems within the federal government.
-
- If national security now includes international economic activity, as
- several witnesses at your hearings suggested, does NSD 42 now grant NSA
- computer security authority in the economic realm? Such a result would
- clearly contravene congressional intent and eviscerate the distinction
- between civilian and "national security" computer systems.
-
- More critically, the term "national security systems" is used
- throughout the document to provide the Director of the National
- Security Agency with broad new authority to set technical standards.
- Section 7 of NSD 42 states that the Director of the NSA, as "National
- Manager for National Security Telecommunications and Information
- Systems Security," shall
-
- * * *
-
- c. Conduct, *approve*, or endorse research and
- development of techniques and equipment to secure
- national security systems.
-
- d. Review and *approve* all standards, techniques,
- systems, and equipment, related to the security of
- national security systems.
-
- * * *
-
- h. Operate a central technical center to evaluate and
- *certify* the security of national security
- telecommunications and information systems.
-
- (Emphasis added)
-
- Given the recent concern about the role of the National Security
- Agency in the development of the Digital Signature Standard, it is our
- belief that any standard-setting authority created by NSD 42 should
- require the most careful public review.
-
- 2. NSD 42 appears to grant the NSA new authority for information
- security. This is a new area for the agency; NSA's role has
- historically been limited to communications security. Section 4 of
- the directive provides as follows:
-
- The National Security Council/Policy Coordinating
- Committee (PCC) for National Security Telecommuni-
- cations, chaired by the Department of Defense, under the
- authority of National Security Directives 1 and 10,
- assumed the responsibility for the National Security
- Telecommunications NSDD 97 Steering Group. By
- authority of this directive, the PCC for National Security
- Telecommunications is renamed the PCC for National
- Security Telecommunications and Information Systems,
- and shall expand its authority to include the
- responsibilities to protect the government's national
- security telecommunications and information systems.
-
- (Emphasis added).
-
- Thus, by its own terms, NSD 42 "expands" DOD's authority to
- include "information systems." What is the significance of this new
- authority? Will it result in military control of systems previously
- deemed to be civilian?
-
- 3. NSD 42 appears to consolidate NSTISSC (The National Security
- Telecommunications and Information Systems Security Committee)
- authority for both computer security policy and computer security
- budget determinations.
-
- According to section 7 of the revised directive, the National
- Manager for NSTISSC shall:
-
- j. Review and assess annually the national security
- telecommunications systems security programs and
- budgets of Executive department and agencies of the U.S.
- Government, and recommend alternatives, where
- appropriate, for the Executive Agent.
-
- NSTISSC has never been given budget review authority for federal
- agencies. This is a power, in the executive branch, that properly
- resides in the Office of Management and Budget. There is an
- additional concern that Congress's ability to monitor the activities
- of federal agencies may be significantly curtailed if this NSTISSC, an
- entity created by presidential directive, is permitted to review
- agency budgets in the name of national security.
-
- 4. NSD 42 appears to weaken the oversight mechanism established
- by the Computer Security Act. Under the Act, a Computer Systems
- Security and Privacy Advisory Board was established to identify
- emerging issues, to inform the Secretary of Commerce, and to report
- findings to the Congressional Oversight Committees. Sec. 3, 15 U.S.C.
- Sec. 278g-4(b).
-
- However, according to NSD 42, NSTISSC is established "to consider
- technical matters and develop operating policies, procedures,
- guidelines, instructions, and standards as necessary to implement
- provisions of this Directive." What is the impact of NSTISSC
- authority under NSD 42 on the review authority of the Computer Systems
- Security and Privacy Advisory Board created by the Computer Security
- Act?
-
- Conclusion
-
- Five years after passage of the Computer Security Act, questions
- remain about the extent of military involvement in civilian and
- private sector computer security. The acknowledged role of the
- National Security Agency in the development of the proposed Digital
- Signature Standard appears to violate the congressional intent that
- NIST, and not NSA, be responsible for developing security standards
- for civilian agencies. The DSS experience suggests that one of the
- costs of permitting technical standard setting by the Department of
- Defense is a reduction in communications privacy for the public. The
- recently released NSD 42 appears to expands DOD's security authority
- in direct contravention of the intent of the Computer Security Act,
- again raising questions as to the role of the military in the nation's
- communications network.
-
- There are also questions that should be pursued regarding the
- National Security Agency's compliance with the Freedom of Information
- Act. Given the NSA's increasing presence in the civilian computing
- world, it is simply unacceptable that it should continue to hide its
- activities behind a veil of secrecy. As an agency of the federal
- government, the NSA remains accountable to the public for its
- activities.
-
- We commend you for opening a public discussion of these important
- issues and look forward to additional hearings that might address the
- questions we have raised.
-
-
- Sincerely,
-
-
-
- Marc Rotenberg,
- Director
- CPSR Washington Office
-
- ------------------------------
-
- End of Computer Underground Digest #4.38
- ************************************
-