home *** CD-ROM | disk | FTP | other *** search
- ########## ########## ########## | COMPUTER SPIES
- ########## ########## ########## | by Mitchell Kapor
- #### #### #### |
- ######## ######## ######## |BUILDING BLOCKS AS STUMBLING BLOCKS
- ######## ######## ######## | A Commentary on the 15th NCSC
- #### #### #### | by Rebecca Mercuri
- ########## #### #### |
- ########## #### #### | THIS OLD DOS
- =====================================================================
- EFFector Online November 9, 1992 Issue 3.09
- A Publication of the Electronic Frontier Foundation
- ISSN 1062-9424
- =====================================================================
-
-
- Computer Spies
- by Mitchell Kapor
-
- Can a company lawfully eavesdrop on its employees' telephone calls? Not
- if they have an expectation of privacy. But, at least in most states,
- the employer can monitor conversations if it tells the workers that that
- is what it is going to do.
-
- That old legal issue surfaces in a new technological context in Silicon
- Valley, with disturbing consequences for your ability to defend key
- information assets. Take a look at how Borland International, a company
- that should know better after almost a decade on the leading edge of
- technology, may have hurt itself in a case involving an apparent theft of
- trade secrets.
-
- The allegations in the tangled legal affair are by now well known. On
- Sept. 1 Eugene Wang, a vice president of Borland's computer languages
- division, abruptly jumped ship to join competitor Symantec Corp. A
- pattern of suspicious behavior in Wang's final days suggested that
- perhaps he had traded Borland secrets along with his job. Borland had no
- proof, but it knew where to look. Borland executives opened Wang's MCI
- Mail account, where they found, they said, a number of messages that
- they believe prove Wang delivered Borland product plans, memos and other
- sensitive documents to Symantec. The evidence thus uncovered led to
- police searches of Wang's and Symantec Chief Executive Gordon Eubanks'
- homes and Symantec offices, to a pending criminal investigation of Wang
- and Eubanks and to a civil suit by Borland against Symantec.
-
- What has been scarcely addressed in newspaper coverage of these events
- is what this case means to the rapidly growing business of electronic
- mail.
-
- Let's back up and consider the law that protects electronic mail users,
- the federal Electronic Communications Privacy Act of 1986. The privacy
- act protects messages while in transmission on a public mail service
- such as MCI, as well as after messages are received and stored on that
- service.
-
- Borland and its attorneys, in a hurry to prove their suspicions about
- Wang, justified their intrusion into the mailbox as a property right:
- Borland was paying the bills for Wang's MCI account. "E-mail is like an
- in-box on someone's desk,' says Borland spokesman Steven Grady in
- defense of the search. "When they leave, it reverts to the corporation."
-
- Case closed? Not quite. Borland's metaphors fall apart when tested
- against the realities of electronic mail. Unlike in-boxes on an
- abandoned desk, E-mail requires a password, and it can be administered
- by a wholly separate communications company, like MCI. As it stands, in
- a criminal case Wang could challenge the legality of all the evidence
- collected on the basis of the messages found in his MCI account. He may
- also have grounds for a countersuit under the electronic privacy act and
- California law, which goes further in protecting individual privacy.
-
- It's easy to understand the anger Borland executives felt in discovering
- an apparent information hemorrhage. But the methods employed by Borland,
- which likes to flaunt its "barbarian" ways, may have been a little too
- barbarian by the standards of the federal statute. The one thing for
- sure is that all parties will be involved in a lengthy and expensive
- court battle to sort this out. The final result may be a draw between
- Borland and Symantec, and a new definition of privacy for the rest of
- corporate America.
-
- Borland could have strengthened its case against Wang if it had followed
- the recommendation of the Electronic Mail Association to announce its
- policies on electronic mail. As it was, a source says the Santa Cruz
- County District Attorney staff took potential violations of the
- electronic privacy act so seriously that they used a top computer-crime
- prosecutor from the San Francisco area to help write the search
- warrants.
-
- Despite Borland's hard-learned lessons, it continues to refuse to
- implement a formal E-mail privacy policy that declares just when
- electronic messages sent from company equipment are company property.
- Perhaps Borland is afraid that announcing such a policy would simply
- remind miscreants to erase incriminating E-mail files before they are
- found. If so, that's naive and shortsighted.
-
- Some companies may be reluctant to announce in advance that they are
- constantly snooping. So be it, but then they should refrain from
- scanning MCI in-boxes. Whatever they do, they have to confront the
- reality of the enormous power of digital media. In an age when a
- company's most valuable property may be intangible the source code for
- a software package, for example an E-mail account may amount to an
- unlocked door on a warehouse.
-
- The electronic privacy act's procedures may need streamlining, and the
- Borland case may be the ratchet that makes the adjustments. By the time
- Borland could have obtained court authorization to examine Wang's
- electronic mail, some of the messages might have been deleted by MCI's
- automated five-day cleanup function. New legislation requires fine-
- tuning in the light of the complexities of real world situations in
- order to be effective for the purposes for which it was originally
- designed. But the lesson here is that corporations must begin to adjust
- their own policies to fit the technologies they use.
-
- from Forbes Magazine November 9 1992
-
- Mitch Ratcliffe, editor-at-large for MacWEEK, provided research assistance
- for this column.
-
- -==--==--==-<>-==--==--==-
-
- BUILDING BLOCKS TO SYSTEM SECURITY
-
- By Rebecca Mercuri
- (mercuri@gradient.cis.upenn.edu)
-
- A Report from the 15th National Computer Security Conference
- October 13 -16, Baltimore, Maryland.
-
-
- I attended the 15th National Computer Security Conference with the hope
- of coming away with some solutions for the security problems I had
- encountered over the past few years. I left with a longer list of
- problems, and the vague feeling that our industry has become remiss in
- providing us with answers that we can use, or has answers and is either
- incapable or unwilling to yield them publicly.
-
- Let me state clearly here that this comment does not reflect negatively
- on the conference organizers. They performed their task well, creating a
- superbly orchestrated event that covered a broad spectrum of
- topics. Indeed, "rookies" were liberally mixed on panels with esteemed
- "greybeards" and many women (sans beards) were in evidence as session
- chairs and presenters (although I was somewhat dismayed to note that
- females appeared to constitute less than 10% of the attendees, lower
- than in the computing community in general). The breadth and extent of
- the conference does not allow one reporter to describe it fully, so I
- offer these remarks merely as comment and commentary, perhaps to
- stimulate discussion.
-
- The conference had an international flavor. The keynote was by Roland
- Hueber (Directorate General of the Commission of the European
- Communities) and the closing plenary on International Harmonization
- serving as bookends. There were repeated calls for cooperation in
- developing global security standards, with the primary advantages of
- such appearing to be in commerce. In the wake of the cold war, there
- seems to be a spirit of openness in this regard. I offer the
- speculation that it may be foolhardy to enter into conformity of thought
- and solutions. Diversity, particularly in commerce, inspires
- creativity. Monopoly, or single-mindedness, often leaves one at risk of
- exploitation by a strong central power, or of attack by those who are
- close enough or who understand the system well enough to side-track it
- We may need "fault-tolerant" and "diversified" answers.
-
- It is useful to juxtapose thoughts about covert channels with those
- about encryption systems. For the uninitiated, covert channels are
- created when internal intermittent polling is performed in an effort to
- conceal illicit data collection activities. Bob Morris provided the
- statistic that 1/10 of a bit per second is enough to expose a key in
- approximately 1 month. This is at current processing rates, but one can
- extrapolate out the Silicon Valley curve and surmise that our current
- key encryption systems will be inadequate within the end of the century
- (if not now, perhaps).
-
- In the quest for security tools one encounters the debate on provability
- and formal top level specification. With respect to covert channels,
- Virgil Gligor referred to "formal top level specification as an
- unmitigated waste of time," saying that data structures and source may
- not map to the top level, there may not be enough relevant details
- provided, and excessive false illegal flows may occur. Earl Boebert
- stated that formal proving methods have worth in analysis of
- specifications, but have failed utterly in spec/code, code/object, and
- code/behavior correspondence. Still, formal methods have their
- supporters, most notably SRI, as indicated by John Rushby,
- one of their directors (who also publicly revealed that there had been a
- major successful break-in at the lab last month). Interestingly, the
- panel on Intrusion Detection was chaired by SRI's Teresa Lunt, who
- discussed the use of expert systems to encode vulnerabilities, attack
- methods and known suspicious behaviors. Steve Snapp expressed the
- divide and conquer approach, saying that there may be no single
- generalizable model of intrusion, and that static, incidence/existence,
- and data driven methods should all be used.
-
- The matter of viruses was explored throughout various sessions. The
- general consensus of opinion seemed to be that rigorous procedures and
- policies need to be implemented so that recovery is possible to some
- level following contamination or invasion.
-
- In the talks I attended, no clear method for handling the recovery from
- a "new" virus (that can not be eradicated with existing software) was
- offered. This was not consoling to someone who had just last week left a
- client's law office with the admonishment "don't use any of the text
- files that you've created in the last 6 months until I can find out what
- the new virus strain is that appears to have adhered to some unknown
- quantity of them." Here too, the standardization on certain operating
- systems and environments (such as Microsoft Windows(TM)), and uniform
- acceptance of specific tools (such as the legal community's reliance on
- Word Perfect(TM)) encourages the proliferation of attacks that could
- potentially disable large sectors of the user base.
-
- Losses seem to be tied heavily to the bottom line. In banking, it may
- not be advantageous to implement a $10M or more security system that
- still does not assure total impenetrability when insurance coverage can
- be obtained at a cost of $1M (even if this price only remains low until
- there is a hit).
-
- In health care, as described in Deborah Hamilton's award-winning paper,
- the bottom line may indeed be one or more people's lives. As true with
- drug approvals, it is easy to see that holding back an inadequately
- tested computer system may cost more lives than providing it while
- make improvements and corrections. How does one weigh security,
- reliability and verifiability issues when there is a crying need for
- access to the developing technology? We are faced with a moral dilemma
- without a governing body to set policies.
-
- The area of privacy was eloquently addressed by Attorney Christine
- Axsmith who said that our reasonable expectations of privacy, as
- expressed by the 4th Amendment, protect people, not just places. But she
- went on to say that with regard to the computer industry, the Privacy
- Act and other legislation efforts still suffer from a lack of court
- rulings necessary to define their interpretations. Will our efforts to
- improve security undermine privacy?
-
- Curt Symes (from IBM) stated that "we'll all be using smart cards in the
- future, for a higher level of authentication." Does this mean that I
- will eventually be required to be bioidentified (DNA, fingerprint,
- retinal scan, voiceprint) in order to obtain access to my own data and
- research? A chilling thought.
-
- In conclusion, to paraphrase Peter Neumann, perhaps the conference theme
- "Information Systems Security: Building Blocks to the Future" should be
- read not as "building-blocks" (the small bricks), but as "building
- BLOCKS" or obstacles to our future as security professionals. There is a
- sense of urgency now -- many of us need more than a foundation of toy
- blocks, requiring true solutions which appear to not be forthcoming.
- What we don't want are systems and design structures that are so
- cumbersome as to impede computational progress. Discussion may be
- fruitful, but let us put our noses to the grindstone and provide
- functional tools and answers, rather than guidelines and assertions.
- While some are working in this direction, many others are needed.
-
- NCSC '92 -- Comment and Commentary
- Copyright (c) 1992 by Rebecca Mercuri. All Rights Reserved.
- Reposting and/or reprint not granted without prior written permission
- from the author. Address questions, response and corrections to:
- mercuri@gradient.cis.upenn.edu
-
-
- -==--==--==-<>-==--==--==-
-
-
- THIS OLD DOS
-
-
- Hi, I'm Bob Wheeler Dealer, and welcome to This Old DOS. Last week you
- may remember we renovated the Charles Babbage Family computer. We
- upgraded their antique CPM to the IBM operating system known as MS DOS.
- And this week on This Old DOS, we're continuing our renovation by
- installing a brand new operating system, supposed to be real easy to
- use, called Windows. And boy am I excited. So let's go around back and
- see how Norm is doing with it.
-
- Bob: Hi Norm; how's it going?
-
- Norm: Oh, hi Bob. Well as you can see I'm about to install Windows on
- our old machine.
-
- Bob: No glass in these Windows, huh Norm? Ha ha.
-
- Norm: Ha ha. That's right, just a handful of floppy disks. This is an
- attempt at making an IBM PC work *a little bit more* like an Apple
- Macintosh. Instead of typing commands, you just move a lot of little
- pictures around on a screen.
-
- Bob: I can't wait. Sounds simple enough; let's take a whack at it.
-
- Norm: Well, ok, the first thing we do is install these disks. Pop them
- in the computer and follow the uh directions on the screen. Here you
- try (sound of hard drive grinding). That's it.
-
- Bob: Simple enough.
-
- Norm: Ok, Bob, now the machine wants to know if you want to modify your
- config.sys or change your autoexec.bat to automatically load when the
- machines boots up. What do you want to do?
-
- Bob: What's a config.sys? I don't anything about this stuff.
-
- Norm: Never mind, it's ok Bob, I'll take care of it. There. Now to be
- really state of the art, we've got to upgrade our microprocessor (sound
- of sawing). That's the computer chip inside inside so that these
- Windows will work fast enough. Otherwise, you know, you might as well
- go out and get a cup of coffee while the screen draws pretty pictures,
- heh heh. So let me get one of these uh 486 chips. We've got a crane
- here. Hey fellas.. fellas! You wanna load that puppy here inta place?
- Careful! (sound of machinery) Don't bend the pins! There, all snapped
- in.
-
- Bob: All right, now we're ready to open Windows, right?
-
- Norm: Not on your life, Bob. While we're at it we're building an
- extention onto the memory board for those fat, greedy programs that
- gobble the stuff up. I'll just hammer a few of these 4 megabyte chips
- into place (bang bang). There, now we've got 16 megabytes on board.
- Narly, man!
-
- Bob: All right, let her rip, Norm.
-
- Norm: Not so fast, Bob! Those big Windows programs need lots and lots
- of storage space. Charles talked to his banker and decided to spring for
- that 200 megabyte beauty there. Hand me that..uh
-
- Bob: You mean this thing here? (groaning and grunting)
-
- Norm: Yeah, that's the hard drive. Ah, thanks. And they want to do
- multimedia.. you know sound, graphics, computer games... the latest --
- so we'll add on a new super VGA monitor..
-
- Bob: Something else?
-
- Norm: A CD ROM drive..
-
- Bob: Something else? More stuff?
-
- Norm: Yeah, we have a sound board and special speakers if you want that
- great sound.
-
- Bob: This .. this isn't so simple anymore!
-
- Norm: Well, we're just about ready to go. That's about it.
-
- Bob: All right now, with all this preparation Norm, this had better be
- great.
-
- Norm: Well, I hope so, let's (sound of drive grinding) load up Word
- Perfect, Lotus 1.-2-3, Excel, and FileMaker Pro and watch her rip!
- (beep.. crash). Oh-oh.
-
- Bob: What happened? What happened?
-
- Norm: Well, it looks like a system crash.
-
- Bob: Oh no!
-
- Norm: Don't worry! We can fix this thing. We can fix it.
-
- Bob: What do we do now, give up?
-
- Norm: No, Never! We drop everything and start over. That's the American
- Way. You keep changing stuff until you find what's wrong.
-
- Bob: Now, how long is this gonna take? I haven't got all weeks to..?
-
- Norm: Don't worry! We'll I'll have this thing running like top, Bob.
- In the mean time you can go back in my shop there and use my Mac.
-
- Bob: All right, you keep working at it Norm. We're out of time folks.
- Join us tomorrow for the start of our new 50-part series: "How to
- install and maintain a Local Area Network." Until then, bye bye for
- This Old DOS!
-
- (c) Copyright National Public Radio (R) 1992. The segment by NPR's Ira
- Plato was originally broadcast on National Public Radio's "Talk of the
- Nation" on September 11, 1992 and is used with permission of National
- Public Radio. Any unauthorized duplication is prohibited.
-
-
- -==--==--==-<>-==--==--==-
-
-
- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
-
- If you support our goals and our work, you can show that support by
- becoming a member now. Members receive our bi-weekly electronic
- newsletter, EFFector Online, the @eff.org newsletter
- and special releases and other notices on our activities. But because
- we believe that support should be freely given, you can receive these
- things even if you do not elect to become a member.
-
- Our memberships are $20.00 per year for students, $40.00 per year for
- regular members. You may, of course, donate more if you wish.
-
- Our privacy policy: The Electronic Frontier Foundation will never, under
- any circumstances, sell any part of its membership list. We will, from
- time to time, share this list with other non-profit organizations whose
- work we determine to be in line with our goals. If you do not grant
- explicit permission, we assume that you do not wish your membership
- disclosed to any group for any reason.
-
- ---------------- EFF MEMBERSHIP FORM ---------------
-
- Mail to: The Electronic Frontier Foundation, Inc.
- 155 Second St. #39
- Cambridge, MA 02141
-
- I wish to become a member of the EFF I enclose:$__________
- $20.00 (student or low income membership)
- $40.00 (regular membership)
- $100.00(Corporate or company membership.
- This allows any organization to
- become a member of EFF. It allows
- such an organization, if it wishes
- to designate up to five individuals
- within the organization as members.)
-
- I enclose an additional donation of $
-
- Name:
-
- Organization:
-
- Address:
-
- City or Town:
-
- State: Zip: Phone:( ) (optional)
-
- FAX:( ) (optional)
-
- Email address:
-
- I enclose a check [ ] .
- Please charge my membership in the amount of $
- to my Mastercard [ ] Visa [ ] American Express [ ]
-
- Number:
-
- Expiration date:
-
- Signature:
-
- Date:
-
- I hereby grant permission to the EFF to share my name with
- other non-profit groups from time to time as it deems
- appropriate [ ] .
- Initials:
-
- Your membership/donation is fully tax deductible.
- =====================================================================
- EFFector Online is published by
- The Electronic Frontier Foundation
- 155 Second Street, Cambridge MA 02141
- Phone: +1 617 864 0665 FAX: +1 617 864 0866
- Internet Address: eff@eff.org
- Reproduction of this publication in electronic media is encouraged.
- Signed articles do not necessarily represent the view of the EFF.
- To reproduce signed articles individually, please contact the authors
- for their express permission.
- =====================================================================
- This newsletter is printed on 100% recycled electrons.
-
- Downloaded From P-80 International Information Systems 304-744-2253
-