home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Thu Apr 21, 1994 Volume 6 : Issue 36
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Suspercollater: Shrdlu Nooseman
-
- CONTENTS, #6.36 (Apr 21, 1994)
-
- File 1--conference announcement
- File 2--DEF CON ][ Late Night Hack Announcement #3
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 5 Apr 1994 18:29:06 -0700 (PDT)
- From: anonymous <cudigest@mindvox.phantom.com>
- Subject: File 1--conference announcement
-
- The Tenth International Conference on Information Security - IFIP
- SEC'94
-
- Organized by Technical Committee 11 of the International
- Federation for Information Processing, IFIP/TC 11 - in
- cooperation with the Special Interest Group on Information
- Security of the Dutch Computer Society - and hosted by the
- Caribbean Computer Society.
-
- I F I P S E C ' 9 4
-
- M A Y 2 3 - 2 7 , 1 9 9 4
-
- I T C P I S C A D E R A B A Y
-
- C U R A C A O
- D U T C H C A R I B B E A N
-
-
- I N T E R N A T I O N A L P R O G R A M
-
-
- * * *
-
- ** Five days, multiple parallel tracks, over sixty refereed unique
- presentations,ially invited speakers, dedicated tutorials workshops,
- working group sessions, lively panel discussions, and much, much
- more......
-
- * * *
-
- Dynamic Views on Information Security in Progress
-
- ***ABOUT IFIP'S TECHNICAL COMMITTEE 11
-
- The International Federation for Information Processing was established
- in 1960 under sponsorship of UNESCO. In 1984 the Technical Committee for
- Security and Protection in Information Processing Systems, Technical
- Committee 11, came into existence. Its aim is to increase the reliabil-
- ity and general confidence in information processing, as well as to act
- as a forum for security managers and others professionally active in the
- field of information processing security. Its scope encompasses the
- establishment of a frame of reference for security common to organiza-
- tions, professionals and the public; and the promotion of security and
- protection as essential parts of information processing systems.
-
- Eight working groups: Information Security Management, Small Systems
- Security, Database Security, Network Security, Systems Integrity and
- Control, Security Legislation, Information Security Education and IT
- Related Crime Investigations, all chaired by seasoned international
- experts, cover a major part of the actual TC 11 workload.
- +----------------------------------------------------------
-
- ***ABOUT THE TENTH INTERNATIONAL INFORMATION SECURITY CONFERENCE
-
- This event is the Tenth in a series of conferences on information secu-
- rity. Something to celebrate. The organizers have compiled a truly
- exceptional, unique, and especially upgraded conference in a setting
- suitable for celebrating its Tenth birthday. Over 75 sessions will cover
- just about all aspects of information security, on a senior and advanced
- level. The formal language of SEC'94 is English. The proceedings are
- published by Elsevier North Holland in its acclaimed series.
-
- There are evidently some astounding surprises within SEC'94. As key
- note's SEC'94 will feature major players. Ten invited speakers, doubt-
- less seasoned seniors in their field, will contribute with their vision
- of the future. Ranging from the legislative aspects of data privacy, to
- the international impact of the Clipper chip, and the dimensions of new
- cryptographic standards and applications. Global policy making and
- breaking in respect of the international harmonization efforts of infor-
- mation technology security evaluation criteria, and other most enticing
- issues are advocated during the various invited lectures.
-
-
- Within the framework of this conference a series of special lectures are
- built in, dedicated to one most important aspect. SEC'94 includes a UNIX
- system security workshop and a cryptology tutorial. Special sessions are
- devoted to information security in developing nations, and information
- security in the banking and financial industry. Two major full day mini
- conferences "IT Security Evaluation Criteria" and "Open Systems Network
- Security" are included in the program as well. SEC'94 offers a panel
- discussion of the editors of Elseviers Journal Computers and Security,
- IFIP TC 11's formal journal.
-
-
- ***ABOUT YOU
-
- Each of the past ten years you have shown IFIP and TC 11 in particular,
- your commitment to information security by attending the IFIP SEC
- conferences. The visitors and delegates to IFIP SEC are a broad audi-
- ence, from everywhere: The Pacific Rim, Europe, Africa, the North and
- Latin America's and the Far East. The level of authority/positions is as
- usual: within practical, management, legal and technical level, the
- delegate to IFIP SEC is considered the top grade. Anyone - directly and
- indirectly - involved and/or interested in information security, wher-
- ever she/or he may live, is IFIP SEC's audience. You certainly may not
- miss SEC'94!
-
-
- ***SOMETHING EXTRA
-
- The organizers wanted to do something extra for this Tenth event.
- Besides compiling a unique conference program, its length was extended
- to FIVE days, extra tracks are added, the delegate admission is reduced,
- special student admission rate are available, Worldwide rebated air-
- travel and discounted hotel accommodation can be obtained, and those not
- yet being a member of the World's largest and most influencial computer
- society are being offered a free of charge membership for 1994! And
- that's not all! Yet, some surprises are saved for the event itself.
-
- IFIP TC 11's SEC'94 welcomes you to Curacao,
- BONBINI !
-
- A W A R D S
- Technical Committee 11 of IFIP presents during its 10th event two pres-
- tigeous awards. The Kristian Beckman Award and the Best Paper Award.
- The Kristian Beckman Award has been established by IFIP TC 11 to com-
- memorate the first chairman of the committee, Kristian Beckman from
- Sweden, who was also responsible for promoting its founding in 1983/84.
- This award is granted annually to a successful nominee and is presented
- at the annual IFIP Security Conference. The objective of the award is to
- publicly recognize an individual - not a group or organization - who has
- significantly contributed to the development of information security,
- especially achievements with an international perspective.
-
- To celebrate the tenth annual conference the organizers have decided
- also to present a Best Paper Award. The award will be presented to the
- individual with the most significant paper at SEC'94. The audience
- itself will be selecting this presentation/individual.
-
- ------------------------------------------------------------------
-
-
- P R O G R A M
-
- ***INVITED PRESENTATIONS***
-
- Computer based cryptanalysis: man versus machine approach by Dr. N.
- Balasubramanian, former director of the Joint Cipher Bureau/ Crypto-
- graphic Services of the Department of Defense of the Government of
- India.
-
- Establishing a CERT: Computer Emergency Response Team by Kenneth A. van
- Wyk, manager Assist team, Defense Information Security Agency of the
- Department of Defense, United States
-
- Privacy aspects of data travelling along the new 'highway' by Wayne Mad-
- sen, scientist Computer Science Corp., United States
-
- Issues in designing and implementing a practical enterprise security
- architecture by Ross Paul, manager information security, the Worldbank,
- United States
-
- (key note's and other invited speakers to be announced by special bulletin)
-
- IFIP TC 11 position paper in discussion: Security Evaluation Criteria by
- H. Schoone, Netherlands
-
- Special TC 11 Working group sessions:
- 11.8 Computer Security Education, chair: Em. Prof. Dr. Harold Highland
- 11.1 IT Security Management, chair: Prof. S.H. von Solms (S. Africa)
- 11.5 System Integrity and Control, chair: William List (UK)
-
- Special Appearance: Information Warfare: waging and winning conflict in
- cyberspace by Winn Schwartau (US)
-
- Panel discussion: Panel discussion of the editors of Elseviers Journal
- Computers and Security chaired by John Meyer, Elsevier (UK), editor
-
- Extended UNIX tutorial: Unix meets Novell Netware by Kevin H. Brady,
- Unix Systems Lab. (US)
-
- Extended virus tutorial: Technologically enabled crime:shifting para-
- digms for the year 2000 by Sara Gordon (US)
-
- Viruses: What can we really do ? by Prof. Henry Wolfe (New Zealand)
-
- Future trends in virus writing by Vesselin V. Bontchev
- (Bulgaria/Germany)
-
- Viral Tidings by A. Padgett Peterson (US)
-
- Integrity checking for anti viral purposes by Yisrael Radai (Israel)
-
- Special appearance: *title to be announced* Prof. Eugene Spafford (US)
-
-
- ***REFEREED PRESENTATIONS***
-
- Operations Security: the real solution to the problem - A. Don Temple
- (US)
-
- Security in virtual reality: virtual security - Amund Hunstad (Sweden)
-
- Prohibiting the exchange attack calls for hardware signature - Prof.
- Reinhard Posch/Wolfgang Mayerwieser (Austria)
-
- Towards secure open systems - Dr. Paul Overbeek (Netherlands)
-
- A security officer's workbench - Prof. Dennis Longley/Lam For Kwok (Aus-
- tralia/ Hong Kong)
-
- An introduction to Citadel: a secure crypto co-processor for worksta-
- tions - Dr. Elaine Palmer (US)
-
- On the calculation and its proof data for PI 10-9th - Shengli Cheng et
- al (P.R. of China)
-
- Securenet: a network oriented intelligent intrusion prevention and
- detection system - Ass. Prof. Dimitris Gritzalis et al (Greece)
-
- A methodology for the design of security plans - Drs. Fred de Koning
- (Netherlands)
-
- An open architecture for security functions in workstations - Stefan
- Santesson (Sweden)
-
- Security systems based on exponentiation primitives, TESS - Prof. Thomas
- Beth (Germany)
-
- The structure and functioning of the COST privacy enhanced mail system -
- Prof. Sead Muftic, Nada Kapidzic, Alan Davidson (Sweden)
-
- The need for a new approach to information security - Dr. Jean Hitchings
- (UK) A Practical database encryption system - Prof. C. Chang/Prof. D.
- Buehrer (Taiwan, ROC)
-
- Security analysis and strategy of computer networks - Jie Feng et al
- P.R.o. China)
-
- Information Security: legal threats and opportunities - Dr. Ian Lloyd
- (Scotland)
-
- Secure communication in LAN's using a hybrid encryption scheme - Prof.
- Mahmoud El-Hadidi, Dr. Nadia Hegazi, Heba Aslan (Egypt)
-
- Secure Network Management - Bruno Studer (Switzerland)
-
- Ramex: a prototype expert system for computer security risk analysis and
- management - Prof. Peter Jarratt, Muninder Kailay (UK)
-
- The need for decentralization and privacy in mobile communications net-
- works - D.I. Frank Stoll (Germany)
-
- Is lack of quality software a password to information security problems
- ? - Dr. Peter Fillery, Nicholas Chantler (Western Australia)
-
- Smart: Structured, multi-dimensional approach to risk taking for opera-
- tional information systems - Ing. Paul van Dam, et al. (Netherlands)
-
- IT Audit: the scope, relevance and the impact in developing countries -
- Dr. K. Subramanian (India)
-
- Program structure for secure information flow - Dr. Jingsha He (US)
-
- Security, authentication and policy management in open distributed sys-
- tems - Ralf Hauser, Stefano Zatti (Switzerland/Italy)
-
- A cost model for managing information security hazards - Love Ekenberg,
- Subhash Oberoi, Istvan Orci (Sweden)
-
- Corporate computer crime management: a research perspective - Dr. James
- Backhouse (UK)
-
- A high level security policy for health care establishments - Prof.
- Sokratis Katsikas, Ass. Prof. Dimitris Gritzalis, et al (Greece)
-
- Moss: a model for open system security - Prof. S.H. von Solms, Dr. P van
- Zyl, Dr. M. Olivier (South Africa)
-
- The risk-based information system design paradigm - Dr. Sharon Fletcher
- (US) Evaluation of policies, state of the art and future research direc-
- tions in database security - Dr. Guenther Pernul, Dr. A.M. Tjoa (Aus-
- tria)
-
- Exploring minimal ban logic proofs of authentication protocols - Anish
- Maturia, et al (Australia)
-
- Security concepts for corporate networks - Prof. Rolf Oppliger, Prof.
- Dieter Hogrefe (Switzerland)
-
- The security process - Jeanette Ohlsson (Sweden)
-
- On the security of lucas function - Dr. C.S. Laih (Taiwan RoC)
-
- Security considerations of content and context based access controls -
- Donald Marks, Leonard Binns, Peter Sell, John Campbell (US)
-
- Anonymous and verifiable databases: towards a practical solution - Prof.
- Jennifer Seberry, Dr. Yuliang Zheng, Thomas Hardjono (Australia)
-
- A decentralized approach for authorization - Prof. Waltraud Gerhardt,
- Burkhard Lau (Netherlands)
-
- Applying security criteria to a distributed database example - Dr.
- Marshall Abrams, Michael Joyce (US)
-
- A comparison of international information security standards based on
- documentary micro-analysis - Prof. William Caelli, Em. Prof. John Car-
- roll (Australia/Canada)
-
- Security in EDI between bank and its client - Pauli Vahtera, Heli Salmi
- (Finland)
-
- Secure information exchange in organizations - D.I. Ralph Holbein
- (Switzerland) A framework for information system security management -
- Helen James, Patrick Forde (Australia)
-
- The security of computer system management - Xia Ling et al
- (P.R.o.China) Development of security policies - Jon Olnes (Norway)
-
- Factors affecting the decision to report occurances of computer abuse -
- John Palmer (Western Australia)
-
- Secure managable remote access for network and mobile users in an open
- on-line transaction processing environment - Dr. James Clark (Singapore)
-
-
- * * *
- Session lay-out:
-
- Monday May 23: plenary only Tuesday May 24 - Thursday May 26: four
- parallel tracks Friday May 25: plenary only
-
- * * *
- Registration:
- Sunday afternoon May 22 at the conference venue
- Monday morning May 23 at the conference venue
-
-
- * * *
- Terms and conditions:
- The conference registration/admission fee amounts US $ 1,295 for regular
- registrations per individual. However, if you are a member of a national
- computer society you may be eligible for a discount. Late charges and
- cancellations: Registration received after May 1, 1994are charged with
- an extra late charge of 10 %. Substitutions may be made at any time,
- though please advise us of a change of name. If you find it necessary to
- cancel the place, please telephone the conference office immediately and
- ask for a cancellation number. Confirm in writing quoting the cancella-
- tion number. Provided written notice is received by May 1, 1994, afull
- refund will be given less a 15 % administration charge. It is regretted
- that cancellations received after May 1, 1994 are liable for the full
- registration fee. Payment: the registration fees are immediately due
- upon registration, and all cheques should be made payable to the High
- Tech Port Curacao Foundation, accompanying the signed registration form.
- Alternatively registrations by fax and electronic mail are accepted,
- provided the payment for the full amount in US dollars is released by
- wiretransfer in favor of the High Tech Port Curacao Foundation within
- one week after the registration. Fax and/or email registrations must be
- completed before May 1, 1994. If payment is not received within stated
- period the registration is automatically cancelled and voided. Forms not
- signed or correctly filled in are not valid registrations. Conference
- registration fees should be paid in US dollars only, to prevent exces-
- sive exchange charges. It is possible to pay by credit card, however a
- surcharge of 25 % is levied due to local monetary restrictions and poli-
- cies. Immediately after registration you will receive a confirmation by
- fax or email. Included in the conference fee is the admittance to all
- sessions of all tracks of the conference, the lunches during tuesday,
- wednesday, thursday and friday, coffee and tea during the intermissions,
- a welcome cocktail at your hotel, one admission ticket per delegate to
- the formal conference banquet, and a copy of the handout of the confer-
- ence proceedings. Registrations made after May 1, 1994 are on space
- available basis only. If you apply for a discount the registration form
- and payment must be received before May 1, 1994. All other services
- ordered are separately billed, payable upon receipt of the respective
- order confirmation.
-
-
-
-
-
-
-
-
-
-
-
- * * *
-
- Curacao is a tourist destination in high demand, we advise you to make
- your flight and hotel accommodation reservations well in advance !!!
-
-
- * * *
-
- FAX THE FORM BELOW TO: IFIP SEC'94 SECRETARIAT +599 9652828
-
- OR AIRMAIL TO: IFIP SEC'94 SECRETARIAT POSTOFFICE BOX 4 0 6 6 WILLEMSTAD
- - CURACAO NETHERLANDS ANTILLES CARIBBEAN
-
- OR EMAIL TO: < TC11@IAIK.TU-GRAZ.AC.AT >
-
- ------------------------------cut-here--------------------------------
-
-
- IFIP TC 11 SEC'94 CONFERENCE REGISTRATION
-
- (one form per individual, copy for multiple registrations)
-
- Please register the following individual for IFIP SEC'94:
-
- Surname:
-
- First name:
-
- Title:
-
- Organization:
-
- Job title:
-
- Mail address:
-
- Post/zip code:
-
- Country:
-
- Telephone:
-
- Telefax:
-
- Email:
-
- ** If you are a member of a national computer society, use this priority
- registration by fax or email, and wiretransfer the applicable amount,
- you are entitled to a rebated admission rate. Instead of US $ 1,295, you
- pay only US $ 1,165.
-
- If you send this by fax to the Conference secretariat, a signature is
- necessary, here::
- I understand and agree to abide by the conditions as set out in the
- conference brochure, also printed elsewhere in this document.
-
- Date:
-
- If you send this form by email, a signature is not necessary. In that
- case the date of receipt of the wiretransfer of the applicable amount is
- the date of registration.
-
-
- CONFERENCE PAYMENT
-
- I will remit by wiretransfer US $ _________ in favor of the High Tech
- Port Curacao Foundation, bank account number 11.592652.5570.004 with
- CITco Bank NV, Curacao, Netherlands Antilles, immediately.
-
- Wiretransfer reference: IFIP SEC'94
-
- ABA nr. of the CITco Bank (this is not the account number, but the
- banks' correspondents number): 021004823.
-
- US corresponding bank: Republic National Bank, New York.
-
- Upon receipt of the applicable amount by the High Tech Port Curacao
- Foundation I will receive within 24 hours by fax a confirmation and an
- invoice marked "fees paid".
-
-
- ADDITIONAL
-
- I apply for the 1994 free of charge membership of the ACM (valid only if
- you are not a member, yet)
-
- Mark yes > > <
-
- I have a special request:
-
-
-
-
-
-
-
-
-
-
-
- (insert your request here)
-
- * * *
-
- HOTEL INFORMATION
- The Curacao Caribbean Hotel (tel: +599-9625000 fax: 599-9625846) as well
- as the Sonesta Hotel (tel: +599-9368800 fax: +599-9627502, in the US
- call tollfree 1.800.477.4556) are beach front hotels at walking distance
- of the conference center. Special roomrates start at US $ 112 per single
- room/night, including tax, services, full breakfast. Roomrates based on
- double, triple and quad are available. Various other hotels on request.
-
- AIR TRANSPORT
- There are daily non-stop flights from Miami operated by American Air-
- lines, daily non-stop wide body flights from Amsterdam (Netherlands)
- operated by KLM, daily non-stop flights from Marquetia Aeropuerto Inter-
- nacional de Caracas (Venezuela), Santa Fe de Bogota (Colombia), and
- various Caribbean islands, all operated by regional carriers. Special
- promotional fares are by KLM, TAP Air Portugal, and American Airlines.
- Contact your tarvel agency for more information.
-
- * * *
-
- Curacao is tropical. Year-round an average temp. of 90 F/35 C. A con-
- stant tradewind makes it very pleasant. You do not need a jacket or
- coat!
-
- Make your flight and hotel reservation as soon as possible !!!
-
-
- * * *
-
- Come enjoy Dutch Caribbean hospitality soon ! SEC'94 also encompasses a
- great after hours social program, typical Caribbean style.
-
- ORGANIZING CHAIR:
- Dr. F. Bertil Fortrie (chairman SEC'94)
- Leon Strous (vice chairman SEC'94)
- Corinne Bor LLM (general secretary SEC'94)
-
- ------------------------------
-
- Date: 26 Mar 94 15:00:26 -0500
- From: Conal.Garrity@F8004.N282.Z1.FIDONET.ORG(Conal Garrity)
- Subject: File 2--DEF CON ][ Late Night Hack Announcement #3
-
- Updated Last : 3.11.1994 (I appologise for spelling errors.. the WP died)
- Late Night Hack Announcement #3
-
-
- What's this? This is an updated announcement and invitation to DEF CON II,
- a convention for the "underground" elements of the computer culture. We try
- to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
- Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
- Groups, CypherPunks, Futurists, Artists, Etc..
-
- WHO: You know who you are, you shady characters.
- WHAT: A convention for you to meet, party, and listen to some speeches
- that you would normally never hear.
- WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)
- WHERE: Las Vegas, Nevada @ The Sahara Hotel
-
- So you heard about DEF CON I, and want to hit part II? You heard about the
- parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
- check it out in person? Load up your laptop muffy, we're heading to Vegas!
-
- Here is what Three out of Three people said about last years convention:
-
- "DEF CON I, last week in Las Vegas, was both the strangest and the best
- computer event I have attended in years." -- Robert X. Cringely, Info World
-
- "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas
-
- "Soon we were at the hotel going through the spoils: fax sheets, catalogs,
- bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.
- The documents disappeared in seconds." -- Gillian Newson, New Media Magazine
-
- DESCRIPTION:
-
- Last year we held DEF CON I, which went over great, and this year we are
- planning on being bigger and better. We have expanded the number of
- speakers to included midnight tech talks and additional speaking on Sunday.
- We attempt to bring the underground into contact with "legitimate" speakers.
- Sure it's great to meet and party with fellow hackers, but besides that we
- try to provide information and speakers in a forum that can't be found at
- other conferences.
-
- While there is an initial concern that this is just another excuse for the
- evil hackers to party and wreak havok, it's just not the case. People come
- to DEF CON for information and for making contacts. We strive to distinguish
- this convention from others in that respect.
-
- WHAT'S NEW THIS YEAR:
-
- This year will be much larger and more organized (hopefully) than last year.
- We have a much larger meeting area, and have better name recognition.
- Because of this we will have more speakers on broader topics. Expect
- speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new
- things expected include:
-
- o An Internet connection with sixteen ports will be there, _BUT_ will only
- provide serial connections because terminals are too hard to ship. So
- bring a laptop with communications software if you want to connect to the
- network. Thanks to cyberlink communications for the connection.
-
- o There will be door prizes, and someone has already donated a Cell Phone
- and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict.
-
- o Dr. Ludwig will present his virus creation awards on Sunday.
-
- o A bigger and better "Spot The Fed" contest, which means more shirts to
- give away.
-
- o More room, we should have tables set up for information distribution.
- If you have anything you want distributed, feel free to leave it on the
- designated tables. Yes, this year there will be a true 24 hour
- convention space.
-
- o A 24 hour movie / video suite where we will be playing all type of
- stuff.
- VHS Format. Mail me with suggested titles to show, or bring your own.
- We'll use a wall projector when not in use by speakers.
-
- o Midnight Tech Talks on Friday and Saturday night to cover the more
- technical topics and leave the days free for more general discussions.
-
- WHO IS SPEAKING:=============================================================
-
- This list represents almost all of the speakers verified to date. Some
- people do not want to be announced until the event for various reasons, or
- are waiting for approval from employers. A speaking schedule will go out
- in the next announcement.
-
-
- Phillip Zimmerman, Notorious Cryptographer & author of PGP.
-
- Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and
- "Computer Viruses, Artificial Life and Evolution"
-
- Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.
-
- Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer.
-
- The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle.
-
- Judi Clark, Computer Professionals for Social Responsibility.
-
- Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.
-
- To be Announced, The Software Publishers Association, Topic to be Announced.
-
- Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.
-
- Mark Lotter, Cellular Enthusiest, Hacking Cell Phones.
-
- Lorax, The Lighter Side of VMBs.
-
- Peter Shipley, Unix Stud, Q&A on Unix Security.
-
- George Smith, Crypt Newsletter, Virus Topic to be Announced.
-
- Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc.
-
- John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.
-
- Red Five & Hellbender, Madmen With a Camcorder, Who Knows?
-
- Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned..
-
- There should be a few round table discussions on Virus, Cellular, Unix and
- something else surrounding the industry.
-
- I'll name the rest of the the speakers as they confirm. I'm still working on
- a few (Two?) people and groups, so hopefully things will work out and I can
- pass the good news on in the next announcement, or over our List Server.
-
- ============================================================================
-
- WHERE THIS THING IS:
-
- It's in Las Vegas, the town that never sleeps. Really. There are no clocks
- anywhere in an attempt to lull you into believing the day never ends. Talk
- about virtual reality, this place fits the bill with no clunky hardware. If
- you have a buzz you may never know the difference. It will be at the Sahara
- Hotel. Intel is as follows:
-
- The Sahara Hotel: 1.800.634.6078
-
- Room Rates: Single/Double $55, Tripple $65, Suite $120
- (Usually $200) + 8% tax
-
- Transportation: Shuttles from the airport for cheap.
-
- NOTE: Please make it clear you are registering for the DEF CON II
- convention to get the room rates. Our convention space price is
- based on how many people register. Register under a false name if
- it makes you feel better, 'cuz the more that register the better for
- my pocket book. No one under 21 can rent a room by themselves, so
- get your buddy who is 21 to rent for you and crash out. Try to contact
- people on the Interactive Mailing List (More on that below) and
- hook up with people. Don't let the hotel people get their hands on
- your baggage, or there is a mandatory $3 group baggage fee. Vegas
- has killer unions.
-
- OTHER STUFF:
-
- I'll whip up a list of stuff that's cool to check out in town there so if for
- some reason you leave the awesome conference you can take in some unreal
- sites in the city of true capitalism. If anyone lives in Las Vegas, I
- would appreciate it if you could send a list of some cool places to check out
- or where to go to see the best shows and I'll post it in the next
- announcement or in the program
-
- -o I am asking for people to submit to me any artwork, pictures, drawings,
- logos, etc. that they want me to try and include in this years program.
- I am tring to not violate any copywrite laws, but wat cool shit. Send
- me your art or whatever and I'll try and use it in the program, giving you
- credit for the work, of course. Please send it in .TIF format if it has
- more than eight bit color. The program will be eight bit black and white,
- -o in case you want to make adjustments on your side.
-
- *** NEW MAILING LIST SERVER ***
-
- We've finally gotten Major Dommo List Serv software working (Kinda) and it
- is now ready for testing. MTV spent alot of time hacking this thing to work
- with BSDi, and I would like to thank him. The purpose of the list is to
- allow people interested in DEF CON II to chat with one another. It would
- be very sueful for people over 21 who want to rent hotel space, but split
- costs with others. Just mention you have room for 'x' number of people, and
- I'm sure you'll get a response from somone wanting to split costs. Someone
- also suggested that people could organize a massive car caravan from Southern
- Ca. to the Con. My attitude is that the list is what you make of it. Here
- are the specifics:
-
- Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to
- technical problems, etc. I'll do another mass mailing to everyone letting
- them know that the list is up and how to access it. Sorry for the delay!
-
-
- MEDIA:
-
- Some of the places you can look for information from last year include:
-
- New Media Magazine, September 1993
- InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
- Gray Areas Magazine, Vol 2, #3 (Fall 1993)
- Unix World, ???,
- Phrack #44
-
- COST:
-
- Cost is whatever you pay for a hotel room split however many ways, plus
- $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
- color name tag (We're gonna make it niftier this year) and your foot in the
- door. There are fast food places all over, and there is alcohol all over
- the place but the trick is to get it during a happy hour for maximum
- cheapness.
-
- ============================================================================
-
- I wanted to thank whoever sent in the anonymous fax to Wired that
- was printed in issue 1.5 Cool deal!
-
- =============================================================================
-
- FOR MORE INFORMATION:
-
- For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com
- in /pub/defcon. There are digitized pictures, digitized speeches and text
- files with the latest up to date info available.
-
- For email users, you can email dtangent@defcon.org for more information.
-
- For non-net people call:
-
- ---- A L L I A N C E ----
- SysOp Metalhead
- One Thousand One Hundred Megabytes Online
- 612.251.8596 USRobotics 16.8 Dual Standard
- Synchronet Multinode BBS Software
- International Informational Retrieval Guild (IIRG) Distro Site
- Electronic Frontier Foundation (EFF) MEMBER
- American Bulletin Board Association (ABBA) MEMBER
- -----------------------------------------------------------------------
- o 200+ Message bases. No post call ratio. Nope, not ever.
- o FidoNet [1:282/8004]
- o CyberCrime international [69:4612/2]
- o International Networked message ECHO areas:
- UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch,
- TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS
- BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King,
- Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE
- LIVING, POLITICS, POETRY, RACISM, and too many more to mention
- o Computer Underground Magazines, History, Updates & Text
- o DEF CON Mirrior Archive
- o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site
- o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org)
- o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change)
- -----------------------------------------------------------------------
-
- For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
- Seattle, WA, 98112
-
- For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.
-
- A DEF CON Mailing list is maintained, and the latest announcements are mailed
- automatically to you. If you wish to be added to the list just send email
- to dtangent@defcon.org. We also maintain a chat mailing list where people
- can talk to one another and plan rides, talk, whatever. If you request to
- be on this list your email address will be shown to everyone, just so you
- are aware.
-
- =============================================================================
-
- (Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption
- Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full
- documentation. Get CrAzY.)
-
-
- VIRUS CREATION AWARDS:
-
- Announcing
- The
- Second International Virus Writing Contest
- Sponsored by
- American Eagle Publications, Inc. P.O. Box 41401
- Tucson, AZ 85717 USA
- and
- The Crypt Infosystems BBS
- +1 (818) 683-0854
-
- *** The Goal ***
-
- The purpose of this contest is to write a fully functional computer virus that
- entertains people with political satire. Viruses will be judged on the basis
- of originality, creativity, functionality, and political incorrectness.
-
- *** Eligibility ***
-
- Anyone who can write a computer virus is eligible.
-
- *** Contest Dates ***
-
- The contest is underway from January 1, 1994 until June 30, 1994. Your
- submissions must be received by June 30 to qualify. The winner of the
- contest will be announced at the DEFCON conference in Las Vegas, July 22-24,
- 1994. If you can be present, an official award will be bestowed on you at
- that time.
-
- *************************************************************
-
- Details
-
- *************************************************************
-
- The philosopher Friedrik Nietzsche once said that if you want to kill
- something, you must laugh at it--and laugh at it deeply. So there should be
- little wonder that political satire is as old as politics itself.
-
- Is there something going on in the political arena that you abhor, that makes
- you sick, that is just plain wrong? Well, here's your chance to make a
- mockery of it. I've always had this idea that if someone wrote a sufficiently
- witty virus that really addressed the issues the way the people (not the
- press, not the politicians) saw them, it might just get passed around by
- people voluntarily.
-
- Let's find out.
-
- Write a virus that is itself a political satire. I don't mean a virus that
- simply displays a message. I mean a living entity whose every move--whose
- every action--is politically motivated. If you need more than one virus to
- make your point--perhaps two viruses working together, or something like that,
- that is fine.
-
- -----------------------------------------------------------
- Let me give you a simple example: The Political Correctness Virus
-
- This virus is a spoof on the "political correctness" movement--which is just
- a form of self-imposed censorship--that is sweeping american intellectual
- circles, particularly colleges and universities.
-
- This virus is a memory resident boot sector virus which maintains a list of
- politically incorrect words on your computer system. It also hooks the
- keyboard interrupt and monitors every keystroke you make. If you type a
- politically incorrect word into the computer, the PCV springs into action.
-
- Politically incorrect words are ranked at three different offense levels.
- When the PCV encounters such a word, it determines what offense level that
- word is, and acts accordingly.
-
- The least offensive words merely register a beep. More offensive words cause
- a beep to sound for 10 seconds. The most offensive words cause a siren to
- sound for two minutes, locking the system for that duration. If you turn the
- computer off before the two minutes are up, the virus will stop the boot
- process for five minutes, with sirens, when you turn it back on. If you allow
- the siren to complete, then you can proceed.
-
- The virus has two different word lists, both stored in an encrypted and
- compressed format. The list is selected at random when the system is
- infected, after which it cannot be changed. The first list is the "proper"
- list of political correctness no-no's. For example, a word like "sodomite" is
- among the worst possible offenses. The second list is an inverted list of
- no-no's. This list trys to force you to use "sodomite" by flagging words
- like "gay" and "homosexual" as no-no's.
-
- If you allow the PCV to live in your system for three months without getting
- a single flag, you are given the supreme honor of viewing the word list
- assigned to you and adding a word to it. If you get more than 3000 flags in
- a lifetime, the virus will force you to enter a politically correct word
- before allowing you to start the computer, since you are obviously unwilling
- to submit to its censorship.
-
- The virus also uses powerful means to prevent disinfection, so that, once you
- get it, you can't get rid of it
-
- ------------------------------
-
- End of Computer Underground Digest #6.36
- ************************************
-
-
-