home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Tue Jul 30, 1996 Volume 8 : Issue 56
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.56 (Tue, Jul 30, 1996)
-
- File 1--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD (fwd)
- File 2--Re: "Blocking Software (CuD 8.53)
- File 3--Singapore officials censor U.S. newgroup posting
- File 4--Net-child porn ring apprehended, details from SJMN
- File 5--Net Porn: The Communism of the 1990s
- File 6--U.S. Official Warns OF "Electronic Pearl Harbor"
- File 7--BoS: WITAT 96 (Info-Tech Conference) (fwd)
- File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 30 Jul 1996 16:46:48 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 1--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD (fwd)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date: Tue, 30 Jul 1996 15:17:25 -0400
- From: CERT Bulletin <cert-advisory@cert.org>
- To--cert-advisory@cert.org
- Subject--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD
-
- =============================================================================
- CERT(sm) Vendor-Initiated Bulletin VB-96.12
- July 30, 1996
-
- Topic: "Trojan Horse" vulnerability via rz program
- Source: FreeBSD, Inc.
-
- To aid in the wide distribution of essential security information, the CERT
- Coordination Center is forwarding the following information from FreeBSD, Inc.
- FreeBSD, Inc. urges you to act on this information as soon as possible.
- FreeBSD, Inc. contact information is included in the forwarded text below;
- please contact them if you have any questions or need further information.
-
-
- =======================FORWARDED TEXT STARTS HERE============================
-
- =============================================================================
- FreeBSD-SA-96:17 Security Advisory
- Revised: Tue Jul 16 21:44:54 PDT 1996 FreeBSD, Inc.
-
- Topic: "Trojan Horse" vulnerability via rz program
-
- Category: ports
- Module: rzsz
- Announced: 1996-07-16
- Affects: All FreeBSD ports collections released before 2.1.5-RELEASE
- Corrected: ports collection as of 1996-07-06
- Source: rzsz shareware package
- FreeBSD only: no
-
- Patches: ftp://freebsd.org/pub/CERT/patches/SA-96:17/
-
- =============================================================================
-
- I. Background
-
- All existing versions of the rz program (a program for receiving
- files over serial lines using the Z-Modem protocol) are equipped
- with a feature that allows the sender of a file to request the
- execution of arbitrary commands on the receiver's side. The user
- using rz does not have any control over this feature.
-
- The workaround is to have rz never execute any command, and
- always pretend a successful execution.
-
- All FreeBSD users are encouraged to use the workaround provided.
- Since the intent of the Z-Modem protocol is to provide a reliable
- connection between systems of a vastly different architecture,
- the execution of local commands at request of the sending side
- cannot even be considered a useful feature at all.
-
-
- II. Problem Description
-
- The Z-Modem protocol specifies a mechanism which allows the
- transmitter of a file to execute an arbitrary command string
- as part of the file transfer. This is typically used to rename
- files or eliminate temporary files. A malicious "trusted" sender
- could send down a command that could damage a user's environment.
-
-
- III. Impact
-
- The rzsz package is an optional port that made be installed on
- some FreeBSD systems. This program is not installed by default.
- Systems without this program are not vulnerable.
-
- rz allows "Trojan Horse" type attacks against unsuspecting users.
- Since the rz executable does not run with special privileges,
- the vulnerability is limited to changes in the operating environment
- that the user could willingly perform.
-
- This vulnerability is a fundamental flaw in the Z-Modem protocol.
- Other operating systems and other implementations of the Z-Modem
- protocol may also suffer similar vulnerabilities.
-
- IV. Workaround
-
- Disable the rz program. If it has been installed, it would
- typically be found in /usr/local/bin.
-
- # chmod 000 /usr/local/bin/rz
- # ls -l /usr/local/bin/rz
- ---------- 1 root wheel 23203 Mar 4 23:12 /usr/local/bin/rz
-
-
- V. Solution(s)
-
- This feature is a relatively unknown part of the Z-Modem protocol.
- It is not critical to file transfers in general. The safest
- approach is to disable this feature in the receiving program.
-
- Any rzsz port that is obtained from the official ports collection
- after 1996-07-06 includes the following patch to disable this feature.
- This patch applies to rzsz v3.42, if you have an earlier version
- of the rzsz sources, please upgrade to the latest version first.
-
- *** rz.c.orig Sat Jul 6 17:34:26 1996
- --- rz.c Sat Jul 6 17:44:52 1996
- ***************
- *** 1020,1039 ****
- --- 1020,1045 ----
- case ZCOMMAND:
- cmdzack1flg = Rxhdr[ZF0];
- if (zrdata(secbuf, 1024) == GOTCRCW) {
- + #ifdef BIG_SECURITY_HOLE
- void exec2();
-
- if (cmdzack1flg & ZCACK1)
- stohdr(0L);
- else
- stohdr((long)sys2(secbuf));
- + #else
- + stohdr(0L);
- + #endif
- purgeline(); /* dump impatient
- questions */
- do {
- zshhdr(4,ZCOMPL, Txhdr);
- }
- while (++errors<20 && zgethdr(Rxhdr) !=
- ZFIN);
- ackbibi();
- + #ifdef BIG_SECURITY_HOLE
- if (cmdzack1flg & ZCACK1)
- exec2(secbuf);
- + #endif
- return ZCOMPL;
- }
- zshhdr(4,ZNAK, Txhdr); goto again;
-
- =============================================================================
- FreeBSD, Inc.
-
- Web Site: http://www.freebsd.org/
- Confidential contacts: security-officer@freebsd.org
- PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc
- Security notifications: security-notifications@freebsd.org
- Security public discussion: security@freebsd.org
-
- Notice: Any patches in this document may not apply cleanly due to
- modifications caused by digital signature or mailer software.
- Please reference the URL listed at the top of this document
- for original copies of all patches if necessary.
- =============================================================================
-
- ========================FORWARDED TEXT ENDS HERE=============================
-
- If you believe that your system has been compromised, contact the CERT
- Coordination Center or your representative in the Forum of Incident Response
- and Security Teams (FIRST).
-
- We strongly urge you to encrypt any sensitive information you send by email.
- The CERT Coordination Center can support a shared DES key and PGP. Contact
- the CERT staff for more information.
-
- Location of CERT PGP key
- ftp://info.cert.org/pub/CERT_PGP.key
-
-
- CERT Contact Information
- - ------------------------
- Email cert@cert.org
-
- Phone +1 412-268-7090 (24-hour hotline)
- CERT personnel answer 8:30-5:00 p.m. EST
- (GMT-5)/EDT(GMT-4), and are on call for
- emergencies during other hours.
-
- Fax +1 412-268-6989
-
- Postal address
- CERT Coordination Center
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh PA 15213-3890
- USA
-
- CERT publications, information about FIRST representatives, and other
- security-related information are available from[-1z
- http://www.cert.org/
- ftp://info.cert.org/pub/
-
- CERT advisories and bulletins are also posted on the USENET newsgroup
- comp.security.announce
-
- To be added to our mailing list for CERT advisories and bulletins, send your
- email address to
- cert-advisory-request@cert.org
-
-
- CERT is a service mark of Carnegie Mellon University.
-
- This file: ftp://info.cert.org/pub/cert_bulletins/VB-96.12.freebsd
-
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6.2
-
- iQCVAwUBMf4jb3VP+x0t4w7BAQH8OwP+LUNb+2PueYArBM8OEqXz1s/8O64pPngY
- ar8A6e9aCL/GjOltw+cuVPlqqefEPqsOVa2UZZTezZlv1+AkXgdUhr47L7Tc9kEH
- KARlnuiFAMvWPN3rMZqcU7zT7x5jgMsHxM4bIA48SARKStACBdVnFWpLg7h6+utm
- U1o1DPizbS0=
- =DcYg
- -----END PGP SIGNATURE-----
-
- ------------------------------
-
- Date: Thu, 18 Jul 96 13:54 PDT
- From: Michael Gersten <michael@STB.INFO.COM>
- Subject: File 2--Re: "Blocking Software (CuD 8.53)
-
- In regard to Vladimir Nuri's post of Jul 9th on blocking software:
-
- Vladimir, you are correct that this is an infancy of an industry,
- and that they cannot be expected to have all the answers yet.
-
- And you are correct that people out there are willing to pay for
- something that works.
-
- And you are correct that much of the question is one of judgement
- calls, which is not the problem.
-
- The problem is when sites are blocked without indending to be blocked.
- When a service decides to block site X, and blocks either every web
- page from that machine, or every page that has the same first three
- letters.
-
- The problem is when a service claims to only block X type of page,
- but actually blocks type Y.
-
- The problem is that there is no ability for the market to make
- any type of informed decision. Would you pay $X per month, to
- be told that a cetain service was provided to you, with no
- ability to even determine what service was ACTAULLY performed?
-
- It's one thing if the services were to provide you with a list
- of "Here's all the sites that were blocked by you this month".
-
- It's something else for a service to claim, "Yes, we're valuable.
- Keep sending us money. We provide no proof of quality of service".
-
- And then the first investigative report shows that the actual
- provided service does not agree with the claimed service.
-
- In short, the complaint is one of truth in advertising.
-
- ------------------------------
-
- Date: Fri, 19 Jul 1996 13:00:31 -0500
- From: Declan McCullagh <declan@well.com>
- Subject: File 3--Singapore officials censor U.S. newgroup posting
-
- This move by Singapore to censor a newsgroup posting is a good
- example of the overbreadth of government censorship. It's a
- bait-and-switch maneuver: say you're going after porn but censor
- "offensive" speech.
-
- Of course, this gives the lie to the Singapore government's
- assertion that "we are not censoring discussion groups."
-
- Some excerpts from the recent regulations requiring the registration
- of political or social groups: "Political and religious
- organisations are free to conduct discussions provided they guard
- against breaking the law or disrupting social harmony.
-
- The regulations ban contents that "tend to bring the Government into
- hatred or contempt," are "pornographic," or "depict or propagate
- sexual perversions such as homosexuality, lesbianism, and
- paedophilia."
-
- I have more information on the regulations at:
- http://www.eff.org/pub/Global/Singapore/
- http://www.cs.cmu.edu/~declan/international/
-
- -Declan
-
- ---
-
- Singapore Internet Regulators Take First Action, Censor Posting
-
- July 19, 1996
- AP-Dow Jones News Service
-
- SINGAPORE -- In its first action since assuming powers this week to
- police the Internet, the Singapore Broadcasting Authority has yanked
- off a newsgroup's posting that criticized some lawyers, a newspaper
- reported Friday.
-
- The SBA acted on a complaint by an unidentified law firm, which said
- the contents of the anonymous posting defamed some of its lawyers in
- Singapore, according to a report in the Straits Times newspaper Friday.
-
- The newspaper said the posting on the newsgroup was apparently made
- by a disgruntled client who claimed he lost a case even though his
- lawyers told him he could win it. The client also questioned the
- ability of the lawyers who belongs to one of the oldest firms in
- Singapore, the Straits Times said.
-
- Under new SBA regulations that came into effect Monday, the
- government agency has the power to ask Internet service providers to
- remove material that it considers objectionable. A
- government-appointed panel of prominent citizens decides what is
- objectionable.
-
- The Straits Times said the posting is believed to have been made from
- the U.S., which means the SBA, in keeping with its own rules, will
- not be able to take action against the offender.
-
- The SBA says its rules are mainly directed against pornography,
- anti-government or seditious views, racially motivated slurs and
- articles that could inflame religious passions.
-
- Since Monday, Internet providers, political parties that maintain Web
- sites, groups and individuals who run discussion sites on politics
- and religion, and on-line newspapers are deemed to have become
- automatically licensed. This means refusal to follow the SBA rules
- will result in fines. The amounts are yet to be determined.
-
- ------------------------------
-
- Date: Fri, 26 Jul 1996 19:55:55 -0700 (PDT)
- From: Declan McCullagh <declan@eff.org>
- Subject: File 4--Net-child porn ring apprehended, details from SJMN
-
- [Forwarded from c-r. --Declan]
-
-
- // declan@eff.org // I do not represent the EFF // declan@well.com //
-
-
- Sender: madavis@deliberate.com (Marilyn Davis)
-
- Yesterday and today the front page of the SJMN ran a story about a
- net-porn ring that was apprehended.
-
- I'll type some of it for your consideration.
-
- If it wasn't for the internet, only one child molester would have been
- caught instead of 16.
-
- Marilyn Davis
-
-
- ----- some of the article ----
-
- Net-porn ring traded stories at 'pedo party'
-
- Suspects recruited family members, papers indicate
-
- By Brandon Bailey
- Mercury News Staff Writer
-
- It was a horrifying "summit," authorities said: Three out-of-state men
- accused of belonging to an Internet child-pronography ring got
- together last April at the home of a fourth in Santa Rosa.
-
- At the meeting the members of the so-called Orchid Club allegedly
- traded stories about pre-teen girls they had molested and photographed
- in sexually explicit poses, authorities say. They even showed off a
- large poster mounted with photos of eight girls who appeared to be no
- older than 10. Investigators called it a "victim board."
-
- The summit, which the host reportedly labeled a "pedo party," is
- described in court documents that shed further light on a federal
- indictmend issued this week in San Jose. All told, the indictment
- charges 16 men with an international conspiracy to produce and
- exchange homemade child pornography over the Internet.
-
- The documents suggest a parent's nightmare
-
- [skipping a bunch]
-
- But officials also said much of their case is built on old-fashioned
- detective work. They interviewed victims and suspects who led them
- to more suspects.
-
- How case unfolded
-
- It began with what Monterey County sheriff's Lt. Dave Allard called
- child molestation "in the more traditional sense." A mother in the
- Monterey County town of Greenfied reported on April 5 that her
- 6-year-old daughter had beeen touched inappropriately during a slumber
- party at the nearby home of Ronald Riva, a well-known father of four
- who inadvertently became the linchpin of the federal investigation.
-
- Sheriff's investigators interviewed Riva, 38, who once worked as a
- state prison guard but more recently earned a living driving farm
- trucks in the Salinas Valley. They also talked with other girls who
- attended the party, which was hosted by Riva's 8-year-old daughter.
- Monterey County prosecutor Edward Hazel said some of those girls led
- detectives to more victims.
-
- Local authorities arreste Rival on April 7 and eventually charged him
- with molesting five girls, ages 4 to 10, some of them repeatedly over
- the last five years. None of those children was his own. Officials
- say the molestations occurred under circumstances they characterize as
- psychological manipulation, rather than physical coercion.
-
- [some skipped]
-
- But the case didn't end there. According to an investigator's
- affidavit, one of the girls told of a second man who helped fondle and
- photograph her at Riva's house. With the consent of Riva'wife,
- deputies say they searched Riva's computer files and found some of
- those photos. After talking with Riva and his wife, investigators
- identified the second man as Melton Lee Myers of Santa Rosa, who was
- convicted on two counts of child molestation in the '70s.
-
- April 22 arrest
-
- Monterey County deputies arrested Myers on April 22. Just two days
- before, according to the federal affidavits, Myers had hosted the
- videotaped "pedo party" for three other alleged Orchid Club members at
- his home.
-
- Federal investigators say they later learned from computer files that
- Riva had chatted on the Internet about planning to attend that meeting
- and about the possibility ...
-
- [some skipped]
-
- In Riva's computer, for example, investigators found records of
- Internet chat sessions in which Riva and someone named Billyj
- described ... With a subpoena to the commericial Intrnet service that
- Billyj used for e-mail, agents identified him as Paul Laney, 34.
-
- After agents found him at home in Yuba City, ... led them to other
- Internet contacts.
-
- Authorities say they moved quickly to locate other members of the
- group -- in Oklahoma, Mississippi, Massachusetts, Michigan, Illinois,
- Minnesota, Kansas and Washington. Officials said two suspects
- cooperated ... Three other suspects haven't been identified but are
- believed to live in Finland, Australia and Canada.
-
- [rest skipped]
-
- ------------------------------
-
- Date: Fri, 26 Jul 1996 21:13:52 -0700 (PDT)
- From: Declan McCullagh <declan@well.com>
- Subject: File 5--Net Porn: The Communism of the 1990s
-
- [Bob Chatelle has an interesting essay about child pornography (below
- namd as the "Communism of the 90s") and the limits of free expression
- somewhere near <http://world.std.com/~kip/>. --Declan]
-
-
- ---------- Forwarded message ----------
- Date--Fri, 26 Jul 1996 11:00:18 -0400
- From--Noah Robischon <noah@pathfinder.com>
-
- >From this week's Village Voice
-
- Who Opened Their E-mail?
-
- It's the Kiddie Porn Crusaders
-
- by ANNETTE FUENTES
-
- Don't look now, but some FBI suits may be lurking around the chat
- room or, worse, secretly surveilling your e-mail and other private
- cyberspace communications. And chances are it's all in the name of
- fighting child pornography.
-
- That's what two New York City women learned recently when each
- received certified mail from the U.S. Justice Department. The
- letters, dated May 20, explained that "between the dates of August
- 1, 1995 and August 26, 1995, electronic communications involving you
- or persons using your America Online username were intercepted."
-
- The letters listed six targeted AOL account numbers and their
- respective screen names, like Cyberqueer, Yngcumlvr, and Borntocum
- none of which had any connection to the women.
-
- "I was horrified," said Elizabeth Ewen. "At first I didn't
- understand what it was all about. I didn't recognize any of the
- screen names."
-
- Ewen, a professor at SUNY Old Westbury, called the assistant U.S.
- attorney who'd signed the letter, John David Kuchta, in Virginia. He
- told her the rationale for the surveillance was child porn. She told
- him she felt her privacy and civil rights had been violated.
-
- "He said, 'Don't worry, you were just caught up in the net. You
- didn't do anything criminal, and you should support what we're
- doing,' " Ewen recalled.
-
- Two days after Ewen got her letter, a friend of hers got the same
- thing. Margaret S. (she asked that her last name not be used), an
- educator in the Queens library system, was stunned to learn that
- almost a year after the fact, the FBI was disclosing that they'd
- been spying on her travels through cyberspace.
-
- "I don't expect total privacy online the same way I know the
- telephone isn't really private," she said. "But how often will the
- government raise the specter of child porn to justify this? We're
- just supposed to forget our civil rights in the name of it."
-
- Margaret e-mailed AOL with a message of outrage. In return she got
- a form letter from Jean Villanueva, a vice president for corporate
- communications, stating that AOL had merely complied with a court
- order obtained by the Justice Department when it "monitored" the
- e-mail of six AOL subscribers. It was part of Justice's campaign,
- "Innocent Images," Villanueva wrote. In closing, he referred
- members to a special Justice Department hotline set up to deal with
- AOL subscribers like Margaret and Ewen, innocents caught in the web.
- (By deadline, AOL had not responded to several calls seeking
- comment.)
-
- Margaret called the hotline, left a message, and two weeks later got
- a call back from Tonya Fox at Justice. Fox told her there were some
- 840 other AOL subscribers like her who'd accidentally stumbled into
- the FBI's cyber wiretaps. "She kept telling me over and over that I
- was 'clean,' that I shouldn't worry," Margaret said. "She also
- said if I wanted to read the file on my surveillance, I should get a
- lawyer."
-
- How Ewen and Margaret were scooped up by the FBI they can't figure
- out. If one of them tripped into FBI surveillance of a suspected
- pornographer, did she then lead the feds to her friend through their
- e-mail correspondence? ACLU associate director Barry Steinhardt says
- that while it's legal for the government armed with a warrant to
- surveil the e-mail and other private cyber communications of
- suspected criminals, it is not legal to extend the surveillance to
- unrelated communications of innocent bystanders who chance into chat
- rooms or read electronic bulletin boards while a suspect is also
- present.
-
- "What has happened here is the most intrusive form of e-mail
- interception," Steinhardt said. "The government can get a
- subpoena to intercept real-time e-mail, which is the equivalent of
- phone wiretapping. They can also use a variety of devices to
- retrieve stored e-mail." But, adds Steinhardt, what is legal and
- what should be lawful are two different things.
-
- Mike Godwin, an attorney with the San Francisco'based Electronic
- Frontier Foundation, a civil liberties organization, warns that as
- government expands its reach into cyberspace, such incursions into
- private lives will pose a greater threat to civil liberties than
- simple phone taps. "It was necessary for law enforcement to learn
- how to narrow the scope of wiretapping, but here you have this
- technology where you're always making copies, always storing
- material somewhere," Godwin said. "It makes it very easy to get
- even deleted files that stay around for a while. That's not true
- about telephone calls."
-
- Justin Williams, chief of the Justice Department's criminal division
- in Alexandria, Virginia, could not comment on the particular
- investigation that snared Ewen and Margaret. But he insisted that
- what happened to them "was not a surveillance."
-
- "You wouldn't say their e-mail was read," Williams said. "It
- could be they were surfing the Internet and happened into a
- particular room where by chance there is an [individual] under
- electronic surveillance."
-
- Williams said their hotline received 160 calls from AOL subscribers
- such as Ewen and Margaret. While the statute regulating government
- surveillance Title III requires Justice to notify the targets of
- eavesdropping, notifying innocent bystanders is discretionary, he
- said.
-
- Williams could not say how many such online surveillances the
- Justice Department is conducting. But ACLU lawyer Steinhardt says in
- the past year, the government's pursuit of child porn in cyberspace
- has reached a fever pitch.
-
- "Most online surveillance by the government is now centered on
- child porn," he said. "It has people assigned to child porn
- investigations who are fascinated by the use of the Internet to
- distribute it. They're no longer going after the producers who
- actually abuse children. They're going after consumers. It's easier,
- splashier."
-
- Splashy and messy for those who happen to be in the wrong cyber
- place, if only for a nanosecond. For Ewen, the witch-hunt has begun
- again.
-
- "Child porn will become the communism of the '90s," she said.
-
- ------------------------------
-
- Date: Mon, 22 Jul 1996 23:49:05 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 6--U.S. Official Warns OF "Electronic Pearl Harbor"
-
- U.S. OFFICIAL WARNS OF "ELECTRONIC PEARL HARBOR"
- Deputy U.S. Attorney General Jamie Gorelick told a Senate
- subcommittee last week that the possibility of "an electronic Pearl
- Harbor" is a very real danger for the U.S. She noted in her
- testimony that the U.S. information infrastructure is a hybrid
- public/private network, and warned that electronic attacks "can
- disable or disrupt the provision of services just as readily as --
- if not more than -- a well-placed bomb." On July 15 the Clinton
- Administration called for a President's Commission on Critical
- Infrastructure Protection, with the mandate to identify the nature
- of threats to U.S. infrastructure, both electronic and physical, and
- to work with the private sector in devising a strategy for
- protecting this infrastructure. At an earlier hearing, subcommittee
- members were told that about 250,000 intrusions into Defense
- Department computer systems are attempted each year, with about a
- 65% success rate. (BNA Daily Report for Executives 17 Jul 96 A22)
-
- ------------------------------
-
- Date: Thu, 11 Jul 1996 18:53:58 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 7--BoS: WITAT 96 (Info-Tech Conference) (fwd)
-
- ---------- Forwarded message ----------
- Date: Thu, 11 Jul 1996 17:04:20 -0400 (EDT)
- From: Marvin V. Zelkowitz <mvz@cs.UMD.EDU>
-
- (My apologies if you received several of these.)
-
- WORKSHOP ANNOUNCEMENT - WITAT '96
-
- Third Annual Workshop on Information Technology - Assurance and Trustworthiness
- September 3-5, 1996
- Columbia Hilton, Columbia, MD
-
- Co-sponsored by Aerospace Computer Security Associates,
- National Institute of Standards and Technology, and
- University of Maryland Institute for Advanced Computer Studies
-
- -- Are you sure your information is adequately protected?
-
- -- How do you know that your privacy is being guarded?
-
- -- Can your customers trust you?
-
- The Workshop on Information Technology Assurance and Trustworthiness (WITAT)
- investigates and promotes promising methods of gaining assurance in
- information technology.
-
- WITAT '96 is the third in a series of annual workshops addressing the
- assurance and trustworthiness. The first workshop identified and analyzed
- crucial issues on assurance in IT systems and provided input to the
- development of policy guidance for determining the type and level of
- assurance appropriate in a given environment. The participants came to the
- consensus that no one technique can provide comprehensively adequate
- assurance. The second workshop built upon the first by making recommendations
- based on the issues and problems identified.
-
- Building upon the results of the previous two workshops, WITAT '96 recognizes
- the existence and emergence of numerous methods to obtain assurance. However,
- the relative value, promise, and applicability of each is unclear for
- specific systems. These will be discussed through the presentation of
- alternative assurance approaches to assurance stakeholders and producers,
- receiving immediate feedback from a diverse audience, reviewing reaction to
- presented approaches and creating a strategy for moving ahead.
-
- Information on WITAT '96, costs, and registration information can be found at
- WWW address: http://aaron.cs.umd.edu/witat/witat96.html.
-
- Send mail to witat-info@cs.umd.edu for a copy of the complete call for
- participation, including fees, and registration form.
-
- WORKSHOP COMMITTEE
-
- Marshall Abrams The MITRE Corp. Diana Akers The MITRE Corp.
- Maryam Alavi Univ. of Maryland Lynn Ambuel Natl. Security Agency
- Karen Ferraiolo Arca Systems, Inc. Jay Kahn The MITRE Corp.
- *Douglas Landoll Arca Systems, Inc. Carolyn Wichers BDM
- Jeff Williams Arca Systems, Inc. Marvin Zelkowitz Univ. of Maryland
- * - Workshop Chair
-
- REGISTRATION
-
- Costs: Tutorial (Sept. 3) $110.00 (includes lunch)
- Workshop (Sept. 4-5) $120.00 (includes lunches)
-
- Location: Columbia Hilton, 5485 Twin Knolls Road, Columbia, MD. 410-997-1060.
-
-
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.56
- ************************************
-
-
-