2615 lines
110 KiB
Text
2615 lines
110 KiB
Text
|
.oO Phrack 50 Oo.
|
||
|
|
||
|
Volume Seven, Issue Fifty
|
||
|
|
||
|
15 of 16
|
||
|
|
||
|
|
||
|
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by disorder/alhambra PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
|
||
|
|
||
|
Intro: As usual there are literally hundreds of interesting articles
|
||
|
that could be put here. I have tried to narrow the focus to
|
||
|
hacker/security related stuff only. Enjoy.
|
||
|
|
||
|
Sources: Access All Areas mail list:
|
||
|
echo "help" | mail majordomo@access.org.uk
|
||
|
CSP (run by Frosty):
|
||
|
|
||
|
Computer Underground Digest:
|
||
|
echo "subscribe cu-digest" | mail cu-digest-request@weber.ucsd.edu
|
||
|
Cyberwire Dispatch:
|
||
|
echo "subscribe" | mail cwd-l-request@cyberwerks.com
|
||
|
Defcon Stuff:
|
||
|
echo "subscribe" | mail majordomo@dis.org
|
||
|
Half a dozen other mail lists, elite people who forward me
|
||
|
neat shit, and various news type web pages.
|
||
|
|
||
|
|
||
|
Phrack World News #50 -- Index
|
||
|
|
||
|
01. Computer Attack Slows Service at New York Times' Web Site
|
||
|
02. [Chinese Hacker Convicted]
|
||
|
03. Phone 'Super Scanner' Alert
|
||
|
04. Computer Hacking Whiz Pleads Guilty To Electronic Break-And-Enter
|
||
|
05. Hackers release two upcoming U2 songs on Internet
|
||
|
06. Computer Crime Prompts New Parole Restrictions
|
||
|
07. [Evil Hacker SYN-Flood's WebCom]
|
||
|
08. German Police Seek 12 After Raids On Computer Gang
|
||
|
09. The tale of the Russian Hacker
|
||
|
10. Expert Warns Of Lax Security On Web
|
||
|
11. [Man pleads guilty to writing AOL hacking soft]
|
||
|
12. Hackers Hack Crack, Steal Quake
|
||
|
13. Hackers Sabotage Blair's Internet Image
|
||
|
14. Police looking into hacking of Government web site
|
||
|
15. Programmer Accused Of Breaking Into California State Contract Data
|
||
|
16. [Australian Phone Worker Rigs Radio Contest]
|
||
|
17. Hacker challenges `dark side' book
|
||
|
|
||
|
01. The 1997 Summer Security Conference
|
||
|
02. Hacking In Progress
|
||
|
03. Defensive Information Warfare And Systems Assurance
|
||
|
04. Second International Workshop on Enterprise Security
|
||
|
05. DEF CON V Convention Announcement #1.00 (02.26.97)
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Computer Attack Slows Service at New York Times' Web Site
|
||
|
author:
|
||
|
source: The Wall Street Journal Interactive Edition
|
||
|
date: November 7, 1996
|
||
|
|
||
|
Numerous World Wide Web sites offering political information found
|
||
|
themselves overwhelmed by requests for election information from Tuesday
|
||
|
night. But the New York Times' Web site also had to deal with waves of
|
||
|
requests for access apparently generated by a computer hacker.
|
||
|
|
||
|
Nancy Nielsen, a New York Times Co. spokeswoman, noted that the attacks
|
||
|
-- which continued Wednesday -- only slowed the Times' computers, which
|
||
|
were still able to serve a record number of users on Tuesday.
|
||
|
|
||
|
The attack was similar to a September incident that virtually paralyzed
|
||
|
Public Access Networks Corp., or Panix, an Internet-access provider that
|
||
|
hosts nearly a thousand corporate Web sites. In that incident, a computer
|
||
|
hacker bombarded the service's computers with requests to send information.
|
||
|
|
||
|
Such attacks, presumably generated by malicious computer programs, work
|
||
|
by sending repeated requests -- sometimes more than a hundred per second --
|
||
|
seeking to establish a connection to send or receive information. The
|
||
|
requests contain fake Internet addresses, which the site's computers waste
|
||
|
valuable resources attempting to establish contact with. This process
|
||
|
prevents the computers from handling legitimate requests from Internet
|
||
|
users for access.
|
||
|
|
||
|
Such attacks are, in effect, similar to campaigns used by some activist
|
||
|
groups to flood a politician's switchboard with phone calls. So much time
|
||
|
is spent sorting out the bogus calls -- in this case, the hacker's false
|
||
|
requests for an electronic "handshake" with a site's machines -- that the
|
||
|
legitimate ones can't get through. The attacks can be differentiated from
|
||
|
heavy volume on a site because of the fake Internet addresses and the
|
||
|
regularity with which such requests come in.
|
||
|
|
||
|
Attacks such as the ones directed at Panix and the New York Times
|
||
|
underscore a key vulnerability of the Internet.
|
||
|
|
||
|
"This is the first major attack of a kind that I believe to be the final
|
||
|
Internet security problem," said William Cheswick, an Internet security
|
||
|
expert at the Bell Laboratories unit of Lucent Technologies Inc., in the
|
||
|
wake of the attack on Panix.
|
||
|
|
||
|
Mr. Cheswick, who assisted Panix during the attacks, said at the time
|
||
|
that while there had been a few previous reports of such incidents, the
|
||
|
Panix episode was the most severe.
|
||
|
|
||
|
Internet computers have no quick way of distinguishing a bogus request
|
||
|
for information from a real one, Mr. Cheswick noted. While upgrades to the
|
||
|
software controlling these computers could ease the problem, hackers could
|
||
|
respond with even more intensive attacks.
|
||
|
|
||
|
"There's going to be the usual arms race" between better security
|
||
|
measures and hackers, Mr. Cheswick predicts.
|
||
|
|
||
|
Panix tried to find the source of the attack by working backward through
|
||
|
the labyrinthine network of phone lines and specialized "router" computers
|
||
|
that form the Internet. But there is no easy way to trace such hackers, Mr.
|
||
|
Cheswick noted.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: (none) [Chinese Hacker Convicted]
|
||
|
author: Magdalen Chow
|
||
|
source: South China Morning Post
|
||
|
|
||
|
Computer hacker who enjoyed free access to the Internet by using other
|
||
|
people's accounts was fined HK$125,000 (about US$16,000) in Hong Kong
|
||
|
Monday.
|
||
|
|
||
|
Judge Gareth Lugar-Mawson also ordered David Yip Shu-chew, 27, to pay
|
||
|
HK$40,400 in compensation to Hong Kong Star Internet Ltd. and HK$404
|
||
|
to one of the people whose accounts he had used.
|
||
|
|
||
|
The judge said he would not order Yip to pay the costs of approximately
|
||
|
HK$2.6 million incurred in the prosecution and investigation of the case,
|
||
|
but threatened him with jail if he misused the Internet again.
|
||
|
|
||
|
Yip is the first person to be charged with accessing a computer with
|
||
|
criminal or dishonest intent under the Crimes Ordinance.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Phone 'Super Scanner' Alert
|
||
|
source: The London Telegraph
|
||
|
date: 12th November 1996
|
||
|
|
||
|
|
||
|
Cellphone fraud, which already costs the British cellphone industry 200
|
||
|
million a year, is increasing because of a new device that makes it
|
||
|
easier than ever for criminals to "clone" phones, writes Aisling
|
||
|
Irwin.
|
||
|
|
||
|
The new "super-scanner" can soak up all the identification numbers of
|
||
|
vulnerable analogue phones within half a mile. Each phone contains two
|
||
|
numbers: its phone number and a secret verification code. When a call is
|
||
|
made, the phone transmits the two numbers to the nearest of a network of
|
||
|
base stations, which checks that the phone is legitimate before allowing
|
||
|
the call to go ahead.
|
||
|
|
||
|
Normally, thieves pick up the numbers as they are transmitted at the
|
||
|
beginning of each call. Until now, such thefts have been possible only
|
||
|
when victims are making calls - and stealing numbers has taken much
|
||
|
longer.
|
||
|
|
||
|
But the new technique, which is far more powerful, only requires mobile
|
||
|
phones to be switched on to obtain their identification numbers.
|
||
|
|
||
|
By sending out a signal identical to that of a real base station, the
|
||
|
super-scanner gets the cellphones to yield their numbers. These are
|
||
|
received by the scanner, passed to a computer and can then be programmed
|
||
|
into stolen phones.
|
||
|
|
||
|
According to the Federation of Communication Services, which represents
|
||
|
leading cellphone companies, the new technology has evolved over the
|
||
|
past few months. "Its impact is really being felt heavily," said a
|
||
|
spokesman. The FCS has launched a campaign to make the advertising,
|
||
|
sale, ownership or use of cloning equipment illegal.
|
||
|
|
||
|
Although the FCS says the technique cannot be used to clone digital
|
||
|
phones, New Scientist reported last week that criminals may be close to
|
||
|
cloning these as well. If so, the problem will be magnified because
|
||
|
these can be used abroad.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Computer Hacking Whiz Pleads Guilty To Electronic Break-And-Enter
|
||
|
|
||
|
|
||
|
ST. LOUIS (Nov 15, 1996 11:12 a.m. EST) -- A computer whiz deemed so
|
||
|
cunning he could control almost any computer system has accepted a plea
|
||
|
bargain for hacking his way into the secret files of two major
|
||
|
communications companies.
|
||
|
|
||
|
Christopher Schanot, 20, was linked to the Internet Liberation Front, a
|
||
|
group of hackers who have claimed responsibility for some high-profile
|
||
|
computer pranks and who decry the commercialization of cyberspace.
|
||
|
|
||
|
In exchange for a reduced sentence, Schanot pleaded guilty Thursday to
|
||
|
two counts of computer fraud and one count of illegal wiretapping. He
|
||
|
faces up to 15 years in prison and $750,000 in fines at his sentencing
|
||
|
on Jan. 31.
|
||
|
|
||
|
Prosecutors said Schanot broke into national computer networks and had
|
||
|
passwords to military computers, the credit reporting service TRW and
|
||
|
the phone company Sprint. They gave no indication he tried to profit
|
||
|
from his intrusion.
|
||
|
|
||
|
His hacking caused security breaches that companies said cost tens of
|
||
|
thousands of dollars to repair.
|
||
|
|
||
|
The break-ins took place between October 1994 and April 1995, when
|
||
|
Schanot was an honor student at a Catholic boys' school in suburban St.
|
||
|
Louis. He vanished after graduating in May 1995.
|
||
|
|
||
|
Authorities caught up with Schanot last March and arrested him at the
|
||
|
suburban Philadelphia apartment he shared with a 37-year-old woman,
|
||
|
Netta Gilboa, the publisher of Gray Areas. The magazine professes to
|
||
|
explore subject matter that is "illegal, immoral and/or controversial."
|
||
|
|
||
|
In April, Schanot was placed under 24-hour house arrest and ordered to
|
||
|
not even talk about computers.
|
||
|
|
||
|
Originally accused in a five-count indictment, he pleaded guilty to
|
||
|
charges surrounding break-ins at Southwestern Bell and Bellcore, a
|
||
|
communications research company owned by seven regional telephone
|
||
|
companies.
|
||
|
|
||
|
Mike Schanot said his son made the plea bargain only after prosecutors
|
||
|
threatened him with a wider range of charges.
|
||
|
|
||
|
[dis: You can find a wide variety of other article on Schanot. Check
|
||
|
your favorite search engine to find them.]
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Hackers release two upcoming U2 songs on Internet
|
||
|
source: The Associated Press
|
||
|
|
||
|
|
||
|
LONDON - Hackers have distributed two unreleased U2 songs on the Internet,
|
||
|
possibly after tapping into computers at the Irish rock group's recording
|
||
|
studio, the Sunday Times said.
|
||
|
|
||
|
The songs, Discotheque and Wake Up Dead Man, have appeared on Internet sites in
|
||
|
at least four countries, the newspaper said. The songs are to appear on an album
|
||
|
scheduled for release in the spring.
|
||
|
|
||
|
Since their illicit appearance on the Internet, the songs have also been copied
|
||
|
onto compact discs, the Times said. The bootleg CDs are going for $10 at street
|
||
|
markets in Ireland and Britain.
|
||
|
|
||
|
"It is an infringement of our copyright," Marc Marot, managing director of
|
||
|
Island Records, told the Times.
|
||
|
|
||
|
Island Records did not immediately return calls for comment Sunday. The Sunday
|
||
|
Times said the record company is trying to shut down the Internet sites.
|
||
|
|
||
|
Conventional, low-tech theft of the songs has been ruled out, the newspaper
|
||
|
said.
|
||
|
|
||
|
Band managers are investigating the possibility that hackers tapped into
|
||
|
computers at U2's Dublin studio, it said. They may have gained access through
|
||
|
cables that have been feeding images of the band's recording sessions to an
|
||
|
Internet site maintained by Island Records.
|
||
|
|
||
|
Since 1981, U2 has sold 70 million records and grossed more than $1.5 billion.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Computer Crime Prompts New Parole Restrictions
|
||
|
|
||
|
WASHINGTON (Dec 17, 1996 07:42 a.m. EST) -- The U.S. Parole Commission
|
||
|
has approved restrictions on the use of computers by certain high-risk
|
||
|
parolees.
|
||
|
|
||
|
The Justice Department announced Monday that the panel voted this month
|
||
|
to authorize such restrictions as requiring certain parolees to get
|
||
|
prior written approval from the commission before using an Internet
|
||
|
service provider, computerized bulletin board system or any public or
|
||
|
private computer network.
|
||
|
|
||
|
Other restrictions would: prohibit particular parolees from possessing
|
||
|
or using data encryption programs, require some parolees to agree to
|
||
|
unannounced inspection of computers by probation officers, require some
|
||
|
parolees to compile daily logs of computer use or to pay for equipment
|
||
|
to monitor their computer use.
|
||
|
|
||
|
"Unrestricted access to the Internet and other computer online services
|
||
|
can provide sophisticated offenders with new opportunities for crime and
|
||
|
criminal associations," said Edward F. Reilly Jr., commission chairman.
|
||
|
"We cannot ignore the possibility that such offenders may be tempted to
|
||
|
use computer services to repeat their crimes."
|
||
|
|
||
|
The commission noted a surge in "how-to" information on child
|
||
|
molestation, hate crime and the illegal use of explosives available on
|
||
|
the Internet and on computer online services.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: (none) [Evil Hacker SYN-Flood's WebCom]
|
||
|
|
||
|
SAN FRANCISCO - The FBI says it is investigating charges that sabotage
|
||
|
caused a 40-hour outage last weekend on Web Communications, (WebCom) a
|
||
|
Silicon Valley service hosting 3,000 World Wide Web sites.
|
||
|
|
||
|
WebCom said it believes a hacker using a college computer network in
|
||
|
British, Columbia, Canada, flooded its server in San Jose with
|
||
|
requests for connections from phony addresses. It said the attack
|
||
|
ended Sunday after MCI Net, a unit of MCI Communications, blocked
|
||
|
telephone traffic between WebCom and CA-Net of Canada at the request
|
||
|
of WebCom and its local service provider.
|
||
|
|
||
|
WebCom Executive Vice President Thomas Leavitt said the sites the
|
||
|
company hosts were unreachable much of Saturday Dec. 14 and Sunday
|
||
|
Dec. 15, causing customers, some of who operate retail sites, to
|
||
|
suffer "extensive" damages,
|
||
|
|
||
|
"One customer said he lost about $20,000 in revenue due to a special
|
||
|
event that was not able to occur. Others said they lost business on
|
||
|
one of the busiest shopping weekends of the year," Leavitt said.
|
||
|
|
||
|
WebCom said the incident was due to a common type of Internet sabotage
|
||
|
known as "denial of service" or "SYN flood," in which a computer
|
||
|
hacker jams a server with requests for connections from addresses that
|
||
|
do not exist. These types of attacks are easy to carry out and hard to
|
||
|
trace, Leavitt said.
|
||
|
|
||
|
"You can fake where the messages are coming from," Leavitt said, and
|
||
|
almost any with access to the Internet and some technical
|
||
|
sophistication can do it.
|
||
|
|
||
|
Others in the industry have experienced similar attacks, WebCom said.
|
||
|
Public Access Networks of New York City experienced a SYN flood attack
|
||
|
in September.
|
||
|
|
||
|
WebCom, headquartered in Santa Cruz, said its own investigation helped
|
||
|
by three Internet service providers traced the origin of the flooding
|
||
|
message to a computer on a college network in British Columbia linked
|
||
|
to BC-Net, a local Internet service provider there.
|
||
|
|
||
|
Leavitt said that a network administrator at Malaspina
|
||
|
University-College in Nanaimo, British Columbia, has identified the
|
||
|
computer used for the sabotage and that it was broken into by someone
|
||
|
without authorized access to that computer or to the college network.
|
||
|
The individual has not been identified.
|
||
|
|
||
|
FBI spokesman George Grotz said that the FBI is working with the
|
||
|
information tracing the requests for connection to British Columbia
|
||
|
but noted the actual perpetrator may nothing to do with the college or
|
||
|
BC-Net. "BC-Net may just be another link in the case," he said.
|
||
|
|
||
|
The FBI has jurisdiction over such cases under Title 18 section 1030,
|
||
|
which deals with falsely perpetrating denial of service on a computer
|
||
|
network.
|
||
|
|
||
|
Leavitt said if the industry, or specifically Internet service
|
||
|
providers, adopt certain "source filtering" coding they can prevent
|
||
|
people from using one network to send messages that appear to come
|
||
|
from somewhere else.
|
||
|
|
||
|
The U.S. Department of Energy's Computer Incident Advisory Capability
|
||
|
has an advisory warning about SYN Floods.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: German Police Seek 12 After Raids On Computer Gang
|
||
|
|
||
|
MUNICH, Germany (Nov 28, 1996 3:36 p.m. EST) - European police are
|
||
|
seeking 12 members of an international computer chip counterfeiting gang
|
||
|
that was smashed this week in Germany and nine other countries, Bavarian
|
||
|
law officials said Thursday.
|
||
|
|
||
|
The raids, part of an operation code-named "Goldfish," resulted in the
|
||
|
arrest of 12 others suspected of selling counterfeit Pentium chips and
|
||
|
pirated software programs as well as fraud, money-laundering and tax
|
||
|
evasion, Bavarian prosecutor Hubert Vollmann told a news conference.
|
||
|
|
||
|
Police did not release the names of the suspects.
|
||
|
|
||
|
The highly-organized ring specialized in smuggling old Intel Corp
|
||
|
Pentium chips into Europe and selling them as new, Vollmann said. It
|
||
|
also sold illegal copies of Microsoft Corp programs and counterfeit
|
||
|
Hercules graphics adapters, he said.
|
||
|
|
||
|
Vollmann said the ring caused damages of several millions of dollars in
|
||
|
lost sales.
|
||
|
|
||
|
Tuesday and Wednesday, more than 2,000 law enforcement officals
|
||
|
confiscated "truckloads" of files, computer disks and equipment in
|
||
|
Germany, France, Italy and Belgium, he said.
|
||
|
|
||
|
The raids centered on offices and apartments near Munich in southern
|
||
|
Germany, and in the state of North Rhine-Westphalia, Vollmann said.
|
||
|
|
||
|
Three Germans and five Asians were arrested in Germany. Four other
|
||
|
arrests were made in France.
|
||
|
|
||
|
The raids were the culmination of a three-year probe that began when a
|
||
|
Laotian businessman reported he was robbed of almost $20,000 in 1993. He
|
||
|
came under suspicion after two of his attackers told police they had
|
||
|
robbed him of 500,000 marks.
|
||
|
|
||
|
A series of unusually large bank transactions by the man's companies led
|
||
|
to an investigation into tax evasion and money laundering, police said.
|
||
|
|
||
|
In addition to the 12 individuals under arrest and the 12 still at
|
||
|
large, 16 others were arrested in the raids on charges unrelated to chip
|
||
|
counterfeiting, Vollmann said.
|
||
|
|
||
|
The chip counterfeiting ring operated a multi-tiered organization that
|
||
|
bought used 133-megahertz Pentium chips in Asia and retouched them in
|
||
|
Hong Kong to look like new 166- megahertz processors, Vollmann said.
|
||
|
|
||
|
The group shipped the chips to Europe by courier to avoid customs and
|
||
|
taxes, and sold them to personal computer companies, he said.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: The tale of the Russian Hacker
|
||
|
|
||
|
Everyone wants to know how Vladimir Levin did it, writes Hugo Cornwall.
|
||
|
In mid-1994, as a 26-year-old computer scientist in St Petersburg, he is
|
||
|
supposed to have led a gang that hacked into Citibank in New Jersey, and
|
||
|
organised more than 40 wire transfers from customer accounts. Russia's
|
||
|
Mafia is said to have been involved.
|
||
|
|
||
|
Levin is still denying his involvement and, for the past 21 months, he
|
||
|
has been in prison in south London, fighting extradition. On Sunday, he
|
||
|
speaks for the first time to Channel 4's Equinox programme.
|
||
|
|
||
|
Could Levin really be living proof of the "professional hacker" so often
|
||
|
celebrated in movies, books and lurid conference presentations? Is he
|
||
|
a product of a KGB school of super hackers now turned loose on the
|
||
|
world as part of Russian criminal enterprise? If that turned out to be
|
||
|
true, it would delight the information warriors, the cyber-SWAT teams
|
||
|
set up by the US armed forces whose most recent claims on federal
|
||
|
budgets have been on the basis of threats to the global information
|
||
|
infrastructure. Equally pleased will be the platoons of consultants,
|
||
|
the sales forces of computer companies and the organisers of high-
|
||
|
price exclusive conferences.
|
||
|
|
||
|
Equinox tells a different story. The programme's researchers found a
|
||
|
Russian "recreational" hacker group called Megazoid. The Citibank fraud
|
||
|
because a group of hackers worldwide compiled files on the VAX/VMS
|
||
|
operating system, and some Russian hackers found a Citibank computer
|
||
|
with which they could play and use as a free jumping-off point to
|
||
|
other computers. One of them says that, for $100, he sold details to
|
||
|
Levin and his friends who ran a computer import/export business. In
|
||
|
reality Levin appears to have been an average-ability programmer
|
||
|
with entrepreneurial ambitions.
|
||
|
|
||
|
The Citibank fraud was possible only because of a number of coincidences -
|
||
|
poor security management, a group of Russian hackers getting lucky
|
||
|
and their information falling into the hands entreprenurs with the
|
||
|
right connections. This is the pattern of much computer crime.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Expert Warns Of Lax Security On Web
|
||
|
|
||
|
SAN FRANCISCO - An outspoken computer security expert, citing his
|
||
|
just-completed study, says up to two-thirds of certain Web sites,
|
||
|
including reputable institutions like banks and the media, are
|
||
|
vulnerable to hacker attacks.
|
||
|
|
||
|
Dan Farmer -- who stirred controversy in 1995 as co-author of software
|
||
|
dubbed SATAN that enables people with basic skills to infiltrate
|
||
|
computer systems -- surveyed more than 2,200 Web sites.
|
||
|
|
||
|
The survey released last week covered a relatively small portion of
|
||
|
the sprawling Web but focused on sites where security is more of a
|
||
|
concern.
|
||
|
|
||
|
Farmer probed 660 bank sites around the globe, 312 North American
|
||
|
online newspaper sites, 274 credit union sites, 47 U.S. federal
|
||
|
government sites and 451 Internet sex clubs.
|
||
|
|
||
|
In a summary, Farmer said that, out of his sample of about 1,700 Web
|
||
|
sites he selected, "over 60 percent could be broken into or
|
||
|
destroyed." As a control, he probed a random sample of 469 sites.
|
||
|
|
||
|
Farmer said he used relatively crude, non-intrusive methods and did
|
||
|
not actually break into the sites. He also said he would not publish
|
||
|
the names of the sites he surveyed.
|
||
|
|
||
|
"I barely electronically breathed on these (computer) hosts," he said
|
||
|
in his report, adding that, considering more intrusive tests, some 70
|
||
|
percent to 80 percent of sites may have security flaws.
|
||
|
|
||
|
Other computer security experts found Farmer's results credible and
|
||
|
authoritative, David Kennedy, director of research, education and
|
||
|
consulting at the National Computer Security Association, said in a
|
||
|
telephone interview.
|
||
|
|
||
|
Experts and computer industry executives said the study shed more
|
||
|
light on a problem well known within the industry but insufficiently
|
||
|
understood by the public at large.
|
||
|
|
||
|
The threat of hacker attacks was highlighted earlier this year when
|
||
|
intruders broke into the Justice Department and Central Intelligence
|
||
|
Agency Web sites and altered them, prompting the CIA to close its site
|
||
|
temporarily.
|
||
|
|
||
|
Farmer stressed that Web sites are being used primarily for marketing
|
||
|
and advertising purposes and that, although some bank sites may allow
|
||
|
visitors to look up balances, the sites do not provide access to
|
||
|
internal financial systems.
|
||
|
|
||
|
Deborah Triant, president of CheckPoint Software Technologies' U.S.
|
||
|
operating unit in Redwood City, Calif., said banks routinely keep Web
|
||
|
sites on separate computer systems.
|
||
|
|
||
|
"Our experience is the banks are so paranoid that they won't even
|
||
|
allow the access that they should be able to allow and would be quite
|
||
|
safe if you had a modern firewall" protecting their networks from
|
||
|
intruders, said Triant, whose company is the market leader in firewall
|
||
|
technology.
|
||
|
|
||
|
"So, if their Web site is vulnerable, that doesn't mean that anything
|
||
|
else at the bank is vulnerable, or that their customers' accounts or
|
||
|
the transactions their customers are doing are vulnerable," she said.
|
||
|
|
||
|
Nevertheless, with the advent of electronic commerce over the Internet
|
||
|
expected to gain momentum in 1997, lax security remains a critical
|
||
|
issue, experts said.
|
||
|
|
||
|
Farmer separated security flaws into two categories -- a red category
|
||
|
where he said a site was "essentially wide open to any potential
|
||
|
attacker" and a yellow category deemed less serious but with potential
|
||
|
for disastrous consequences.
|
||
|
|
||
|
Of the 660 bank sites, 68 percent were deemed vulnerable and nearly 36
|
||
|
percent were in the red category.
|
||
|
|
||
|
Some 51 percent of credit unions were vulnerable, 62 percent of the
|
||
|
federal sites, nearly 70 percent of newspapers and 66 percent of sex
|
||
|
clubs. Sites in the red category ranged from 20 percent for credit
|
||
|
unions to 38 percent for federal sites and 39 percent for online
|
||
|
newspapers.
|
||
|
|
||
|
Of the random sample of 469 Web sites used as the control, a far
|
||
|
smaller percentage -- 33 percent -- were found to be vulnerable, and
|
||
|
17 percent of the group was in the red category.
|
||
|
|
||
|
Farmer said part of the problem is that Web sites are trying to do too
|
||
|
much at once, increasing their complexity and making security far more
|
||
|
difficult to achieve.
|
||
|
|
||
|
But, even with security concerns, credit card transactions over the
|
||
|
Net are much safer than those carried out in shopping malls, said the
|
||
|
security association's Kennedy.
|
||
|
|
||
|
Farmer also said he plans to incorporate some newer testing tools into
|
||
|
a new version of SATAN, which stands for Security Administrator Tool
|
||
|
for Analyzing Networks, early next year.
|
||
|
|
||
|
The program enables people who manage corporate networks to locate
|
||
|
weaknesses and fix them. But it has been controversial because it can
|
||
|
also easily be used by malevolent intruders trying to cause damage.
|
||
|
|
||
|
Triant said there have been no reported security breaches at any of
|
||
|
the more than 15,000 institutions with CheckPoint network security
|
||
|
installed and said such precautions should provide adequate
|
||
|
protection.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: (none) [Man pleads guilty to writing AOL hacking soft]
|
||
|
source: Reuters World ReportJanuary 8, 1997 14:55:00
|
||
|
|
||
|
|
||
|
WASHINGTON, Jan 8 (Reuter) - A Yale University student pleaded guilty
|
||
|
Wednesday to committing computer fraud for developing a programme that
|
||
|
allowed him to use America Online Inc. without paying, the Justice Department
|
||
|
said.
|
||
|
Prosecutors said Nicholas Ryan, 20 of Victor, New York, entered the
|
||
|
guilty plea at a federal court hearing in Alexandria, Virginia. He faces
|
||
|
up to five years in prison and a $250,000 fine at sentencing, scheduled at
|
||
|
the end of March.
|
||
|
Prosecutors said Ryan in June 1995 developed the programme, called
|
||
|
"AOL4FREE," and frequently used it through December 1995, avoiding having
|
||
|
to pay the firm's rate of $2.95 per hour.
|
||
|
Ryan, who identified himself as "Happy Hardcore," also made the
|
||
|
programme available to other America Online users, and it circulated within
|
||
|
AOL chat rooms, prosecutors said.
|
||
|
As the company made changes to stop the use of the programme, Ryan
|
||
|
modified it and made the updated version available to other online service
|
||
|
users, the prosecutors said.
|
||
|
They said the heaviest use of the programme took place from September
|
||
|
through December 1995. America Online estimated that on a single day
|
||
|
individuals using the programme logged onto the system about 2,000 times,
|
||
|
the prosecutors said.
|
||
|
The case was brought by the U.S. Attorney's office and the Justice
|
||
|
Department's computer crime section.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Hackers Hack Crack, Steal Quake
|
||
|
author: Annaliza Savage
|
||
|
|
||
|
8:00 pm PST - Hackers broke into the Web server and file server of Crack dot
|
||
|
Com, a Texas gaming company, on Wednesday, stealing the source code for
|
||
|
id's Quake 1.01, as well as Crack's newest project, Golgatha, and older games
|
||
|
Abuse and Mac Abuse.
|
||
|
|
||
|
Although the hackers left a trail that may make them easy to track, the
|
||
|
theft did its damage. "Quake's raw engine market value dropped several
|
||
|
hundred thousand dollars," said Dave Taylor, who formed Crack dot Com
|
||
|
after leaving id Software, where he worked on Doom and Quake. But Barrett
|
||
|
Alexander of id denies that the financial loss will be so great, saying
|
||
|
that the code for Quake's unique engine is recognizable, making it hard
|
||
|
for anyone to be able to use without id's knowledge.
|
||
|
|
||
|
Crack dot Com is also worried that its unreleased techniques, developed for
|
||
|
Golgotha, could make their way into the hands of other game competitors, who
|
||
|
could copy bits of code into their own software.
|
||
|
|
||
|
The hackers, who were able to get through the Crack's firewall, left intact a
|
||
|
bash-history file that recorded all their movements. They even logged onto
|
||
|
IRC's #quake to brag about their exploits, and made Quake's source available
|
||
|
on Crack dot Com's homepage (it is no longer there).
|
||
|
|
||
|
The hackers, who identified themselves as being from the group FEH,
|
||
|
probably broke through Crack's firewall through their Web site. The former
|
||
|
editor of the now defunct hacker magazine FEH denies any knowledge of the
|
||
|
event, and has already posted a disclaimer.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Hackers Sabotage Blair's Internet Image
|
||
|
author: Robert Uhlig, Technology Correspondent
|
||
|
source: The Telegraph
|
||
|
date: 10th December 1996
|
||
|
|
||
|
|
||
|
The Labour Party has called for a police inquiry after computer hackers
|
||
|
made repeated attacks on its Internet site, replacing a picture of Tony
|
||
|
Blair with his Spitting Image puppet and headlining the site with "New
|
||
|
Labour - Same Politicians. Same Lies".
|
||
|
|
||
|
A group of British hackers, calling itself the Digital Anarchists,
|
||
|
infiltrated the Labour publicity site for the second time yesterday and
|
||
|
said it would continue to attack the Labour Web site this week. "We're
|
||
|
going to keep doing it again and again until further notice. And we're
|
||
|
going to hit some other sites as well," a spokesman for the group said
|
||
|
last night.
|
||
|
|
||
|
The hackers later infiltrated the Labour site a third time, while
|
||
|
computer experts were attempting to rectify the second attack. The Web
|
||
|
site has now been closed until future notice to prevent more further
|
||
|
embarrassing alterations of its content.
|
||
|
|
||
|
It is believed that the hackers will attack other political parties
|
||
|
including the Conservatives, Liberal Democrats, Scottish National Party
|
||
|
and Plaid Cymru. Internet sites belonging to other public organisations,
|
||
|
blue-chip companies and newspapers may also be affected.
|
||
|
|
||
|
The first attack, which promised free drugs and beer to young voters,
|
||
|
was made on Saturday while the British hacker community was staging a
|
||
|
Christmas party in Manchester.
|
||
|
|
||
|
The Labour leader's response to the Budget was replaced with a live sex
|
||
|
show of women wearing the "demon eyes" masks seen in the Tory
|
||
|
advertising campaign. The hackers also changed the title "The road to
|
||
|
the Manifesto" to "The road to nowhere" and altered links to other parts
|
||
|
of the site so they read "The Labour Party sex shop".
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Police looking into hacking of Government web site
|
||
|
author: Adeline Goh
|
||
|
source: The Straits Times
|
||
|
date: Dec 10 1996
|
||
|
|
||
|
|
||
|
POLICE are investigating how the Singapore government's Web site on the
|
||
|
Internet was modified without authorisation.
|
||
|
|
||
|
In the incident on Sunday, someone replaced the site's contents with a
|
||
|
list of more than 100 user identities (IDs) of people from various
|
||
|
government bodies.
|
||
|
|
||
|
Yesterday, the Commercial Crime Division (CCD) of the Criminal
|
||
|
Investigation Department told The Straits Times that three officers from
|
||
|
its computer crime team had started work on the case.
|
||
|
|
||
|
It added that the first step would be to trace the identity of the hacker
|
||
|
by checking the log files of the computer in which the Web site is housed.
|
||
|
|
||
|
These log files keep track of people who access it.
|
||
|
|
||
|
The web site -- at http://www.gov.sg -- is the on-line version of the
|
||
|
Singapore Government directory and has links to the Web sites of various
|
||
|
bodies such as the ministries.
|
||
|
|
||
|
The original contents of the site were restored by the National Computer
|
||
|
Board (NCB) on Sunday afternoon. When contacted yesterday, NCB, which
|
||
|
maintains the computer that houses the Web site, said that the hackers did
|
||
|
not gain access to any government networks which contain sensitive data.
|
||
|
|
||
|
It added that the computer where the Web site was stored did not contain
|
||
|
sensitive information.
|
||
|
|
||
|
It declined to give further details about the incident, saying that it had
|
||
|
referred the matter to the CCD.
|
||
|
|
||
|
Several computer experts contacted yesterday said that electronic networks
|
||
|
could be broken into with special computer programs.
|
||
|
|
||
|
They are placed into a network by hackers and they capture a user's log-in
|
||
|
password, which can then be retrieved.
|
||
|
|
||
|
Those contacted added that passwords which are proper English words were
|
||
|
easy for hackers to crack.
|
||
|
|
||
|
This is because there are also programs which try to log on by trying
|
||
|
words found in English dictionaries.
|
||
|
|
||
|
One of the experts, Mr A. I. Chow, 32, a partner in a computer firm, said
|
||
|
perpetrators could even impersonate computer system administrators and ask
|
||
|
a particular user on the network to change his password to one supplied by
|
||
|
them. "When the user changes his password, the hacker can then access the
|
||
|
network easily with the user's account."
|
||
|
|
||
|
Those contacted said data on Internet computers could be made more secure
|
||
|
if system administrators allowed Web pages to be updated only during
|
||
|
certain times or from computers within an organisation.
|
||
|
|
||
|
Security could also be improved, they said, if passwords were generated
|
||
|
randomly and refreshed constantly.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Computer Programmer Accused Of Breaking Into California
|
||
|
State Contract Data
|
||
|
|
||
|
SACRAMENTO, Calif. (Jan 17, 1997 00:36 a.m. EST) -- The Bay Area
|
||
|
computer programmer who was arrested for hacking into the state
|
||
|
Department of Information Technology computer system tapped into
|
||
|
confidential information dealing with nearly a half million dollars
|
||
|
worth of government contracts, court records show.
|
||
|
|
||
|
David Ernesto Salas of Alameda, who faces four years in prison,
|
||
|
allegedly told others he had obtained confidential communication between
|
||
|
a contractor and department officials and he was going to use it in a
|
||
|
lawsuit against the department, said documents on file in Sacramento
|
||
|
Superior Court.
|
||
|
|
||
|
Salas, 34, who is free on $50,000 bail, was arraigned Tuesday in
|
||
|
Sacramento on three felony counts of computer hacking, including one
|
||
|
count which alleges he attempted to destroy the department's computer
|
||
|
system after his hacking was discovered.
|
||
|
|
||
|
Although some data was lost in the crash and the department's computer
|
||
|
system was down for two days in September, nearly everything has been
|
||
|
re-created by a backup computer system. Damage was estimated about
|
||
|
$10,000, officials said.
|
||
|
|
||
|
The incident, however, has been an embarrassment to department officials
|
||
|
and is viewed with concern because Information Technology oversees $2.2
|
||
|
billion in computer projects throughout state government.
|
||
|
|
||
|
The department was established last year after a series of audits and
|
||
|
investigations showed that millions in public funds were wasted on
|
||
|
bungled state computer projects.
|
||
|
|
||
|
Kenneth Keller, Salas's San Francisco attorney, has said his client, who
|
||
|
was a subcontractor hired to develop and install the department's
|
||
|
computer system, will eventually be vindicated.
|
||
|
|
||
|
Keller, who couldn't be reached for comment Thursday, said last week
|
||
|
that Salas had permission to be using the computer.
|
||
|
|
||
|
But according to court documents, Salas lost his authority to access the
|
||
|
computer when he lost his contract after a dispute with another
|
||
|
contractor in August. Beginning shortly before 11 p.m. Sept. 25 and into
|
||
|
the following day, Salas gained access to the department's computer. To
|
||
|
this day, it is not known exactly what he did once he entered the
|
||
|
system.
|
||
|
|
||
|
The backup computer, unbeknownst to Salas, did capture a trail of
|
||
|
changed passwords that led to the highest administrative level, giving
|
||
|
Salas full access to the entire computer system, documents said.
|
||
|
|
||
|
"Electronic mail (E-mail) regarding state service contracts worth
|
||
|
approximately $400,000 between (a contractor) and DOIT resided on the
|
||
|
DOIT system," said a summary of the facts in the case prepared for
|
||
|
Salas's arrest.
|
||
|
|
||
|
Special Agent Fred Adler of the Sacramento Hi-Tech Crimes Task Force,
|
||
|
which arrested Salas, said Thursday the case is still under
|
||
|
investigation and another arrest is possible.
|
||
|
|
||
|
In his affidavit for the search warrant, Adler said on Sept. 9, Salas
|
||
|
told Information Technology deputy director and chief counsel Alexis
|
||
|
Schatten that he had contacted an attorney to initiate a lawsuit against
|
||
|
a competing contractor for slandering him and other subcontractors.
|
||
|
|
||
|
Adler said there were witnesses who had seen Salas "bringing up
|
||
|
privileged information on (his computer) screen" and that Salas had
|
||
|
"alluded" to others that he possessed confidential information about
|
||
|
Information Technology's business dealings, court records show.
|
||
|
|
||
|
Department officials told investigators that "numerous confidential
|
||
|
communications exist on the their system relative to procurement,
|
||
|
installation and maintenance of multi-million dollar, state computer
|
||
|
systems," the affidavit said.
|
||
|
|
||
|
"Knowledge of these communications could prove to be financially
|
||
|
advantageous to firms involved in these processes," the affidavit said.
|
||
|
|
||
|
Rich Halberg, department spokesman, declined to comment on the search
|
||
|
warrant out of fear it might jeopardize an ongoing prosecution and
|
||
|
investigation.
|
||
|
|
||
|
He did say, however, that the department computer system does not
|
||
|
contain actual contracts, but he did say that there may be E-mail
|
||
|
pertaining to such contracts.
|
||
|
|
||
|
"We are doing the right thing by going after this guy," Halberg said.
|
||
|
|
||
|
"It is all too common in large companies and government to not want to
|
||
|
go after the hacker because it is difficult to prove. Hopefully, this
|
||
|
guy won't be in a position to do this again to another government
|
||
|
agency," Halberg said.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: (none) [Australian Phone Worker Rigs Radio Contest]
|
||
|
source: COMTEX Newswire
|
||
|
date: 12/10/96 7:48 PM
|
||
|
|
||
|
SYDNEY, Dec. 11 (UPI S) -- An Australian telephone company worker who won
|
||
|
$50,000 Australian (U.S. $40,000) in a radio station's phone-in
|
||
|
competition has been charged with fraud after allegedly hacking into the
|
||
|
phone line. Brian Ronald Francis, who police say used his expertise to
|
||
|
ensure he was the 10th caller in the competition, has also been charged
|
||
|
with two more offenses relating to two other radio competitions he won
|
||
|
this year.
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
title: Hacker challenges `dark side' book
|
||
|
author: Simson Garfinkel
|
||
|
|
||
|
Special to the Mercury News
|
||
|
|
||
|
KEVIN Poulsen was one of the most talented "dark side hackers" ever to
|
||
|
phreak a phone call.
|
||
|
|
||
|
For more than two years, Poulsen lived the life of a fugitive as part
|
||
|
of the seedy Los Angeles underground. He made money by reprogramming
|
||
|
Pacific Bell's computers for pimps and escort services, re-activating
|
||
|
old telephone numbers and building a voice-mail network pairing
|
||
|
prostitutes with their johns.
|
||
|
|
||
|
And he cleaned up by messing with the phones used by Los Angeles radio
|
||
|
stations, rigging their call-in contests so that he would always win
|
||
|
the big bucks or the car.
|
||
|
|
||
|
But Poulsen got caught and he spent more than five years in jail.
|
||
|
|
||
|
Behind bars in 1993, Poulsen did what any phone phreak would do: He
|
||
|
picked up the pay phone and started making collect calls. But these
|
||
|
calls where different: they went to Jonathan Littman, a journalist in
|
||
|
Mill Valley who had just published a magazine article about Poulsen's
|
||
|
crimes and exploits and was about to write a book on the same topic.
|
||
|
|
||
|
Poulsen wanted to make sure that Littman got the story right. He felt
|
||
|
that Littman had made a lot of mistakes in the magazine article.
|
||
|
|
||
|
Today, Poulsen feels somewhat betrayed by the journalist to whom he
|
||
|
gave total access. After reading an advance copy of Littman's book,
|
||
|
Poulsen says Littman has twisted the truth in order to make a more
|
||
|
compelling story.
|
||
|
|
||
|
"Most of my complaints about Littman's book are small things," said
|
||
|
Poulsen, who is on parole and living in Sherman Oaks, a Los Angeles
|
||
|
suburb. "He has major events right but then he changes the meaning of
|
||
|
them by changing minor events and making up quotes."
|
||
|
|
||
|
Littman stands by his work.
|
||
|
|
||
|
The book, "The Watchman: The Twisted Life and Crimes of Serial Hacker
|
||
|
Kevin Poulsen," is due to be published next month by Little, Brown and
|
||
|
Co. It's an insider's look at the world of a criminal computer hacker,
|
||
|
one of the most detailed yet published.
|
||
|
|
||
|
"He was one of the first to hack the Internet and get busted for it,"
|
||
|
said Littman, referring to Poulsen's 1984 arrest for breaking into
|
||
|
university computers on the ARPAnet, predecessor to today's Internet.
|
||
|
|
||
|
"They decided not to prosecute him because he was 17" when he was
|
||
|
arrested, Littman said. Instead, Poulsen was hired by a Silicon Valley
|
||
|
defense contractor. "It was every hacker's dream -- to commit a crime
|
||
|
and instead of going to jail, to get a job with what was a top think
|
||
|
tank and defense contractor," Littman said.
|
||
|
|
||
|
Soon, however, Poulsen was back to his old tricks -- with a vengeance,
|
||
|
according to the book. He started physically breaking into Pacific
|
||
|
Bell offices, stealing manuals and writing down passwords. Much of
|
||
|
what he found went into a storage locker. But Poulsen couldn't handle
|
||
|
his finances, and got behind in his rent. When the locker company
|
||
|
broke open Poulsen's lock his stash was discovered and a trap was
|
||
|
laid. As the FBI closed in, Poulsen left town, a fugitive on the run.
|
||
|
|
||
|
Guilty plea
|
||
|
|
||
|
He was caught June 21, 1991, and spent nearly three years in pre-trial
|
||
|
detention. On June 14, 1994, in federal court in Southern California,
|
||
|
he pleaded guilty to seven counts of computer fraud, interception of
|
||
|
wire communications, mail fraud, money laundering and obstruction of
|
||
|
justice. He was then transferred to Northern California to face a
|
||
|
spying charge, based on his possession of material the government
|
||
|
called classified. He pleaded guilty to fraud, possession of
|
||
|
unauthorized access devices and fraudulent use of a Social Security
|
||
|
number, and was released June 4, last year.
|
||
|
|
||
|
The Watchman is Littman's second book on the computer hacker
|
||
|
underground. His first, "The Fugitive Game," followed the exploits of
|
||
|
hacker Kevin Mitnick, who was on the run and eventually caught by
|
||
|
computer security expert Tsutomu Shimomura and New York Times reporter
|
||
|
John Markoff. Shimomura and Markoff wrote their own book describing
|
||
|
the chase, and they both objected to Littman's version of the events.
|
||
|
|
||
|
For his part, Poulsen seems most angry about the implication of the
|
||
|
new book's title -- that he was somehow obsessed with eavesdropping
|
||
|
and largely acted alone.
|
||
|
|
||
|
Only two wiretaps
|
||
|
|
||
|
In the book, Littman has Poulsen listening to dozens of conversations
|
||
|
-- even wiretapping the telephones of people trying to sell used
|
||
|
equipment through newspaper classified ads, to see if they are being
|
||
|
honest with their prices.
|
||
|
|
||
|
Poulsen insists that he wiretapped the telephones of only two people:
|
||
|
another hacker who was also an FBI informant and his high-school
|
||
|
girlfriend.
|
||
|
|
||
|
"He also reports that I obsessively followed the details of every
|
||
|
escort date, including details of the tricks," Poulsen says, among
|
||
|
other complaints. "He made that up. Totally made that up."
|
||
|
|
||
|
Littman denies making up quotes, and insists that everything in the
|
||
|
book was told to him by one of the participants.
|
||
|
|
||
|
"I've written a book about a very complicated story about
|
||
|
controversial people who had very different versions of what
|
||
|
happened," Littman said. "I've done the best I can to view them
|
||
|
objectively. Somebody else might view them differently, and the
|
||
|
participants obviously have a subjective perspective. My views are in
|
||
|
the book."
|
||
|
|
||
|
But Poulsen says that Littman's fundamental premise is flawed. "John
|
||
|
had a problem in writing this book," Poulsen said. "He wanted to sell
|
||
|
it as the troubled loner-hacker-stalker guy. The problem is I had five
|
||
|
co-defendants and it is hard to portray someone as a troubled loner
|
||
|
when you have five other people making it happen."
|
||
|
|
||
|
Not a loner
|
||
|
|
||
|
Ron Austin, Poulsen's friend and co-conspirator, agrees. "Littman has
|
||
|
to write an interesting book, I guess," he said. "He downplays the
|
||
|
role of a lot of people, but I think that's because he is writing a
|
||
|
book about Kevin. My role is downplayed." Austin also said the role of
|
||
|
Justin Petersen, a hard-rocking hacker and co-conspirator is
|
||
|
underplayed.
|
||
|
|
||
|
Austin, also on parole, said he is concerned that the controversy
|
||
|
regarding Littman's portrayal of Poulsen might obscure some of the
|
||
|
more important issues raised by Littman's book: That the FBI engaged
|
||
|
in widespread wiretapping of foreign consulates in the San Francisco
|
||
|
area, the FBI's apparent hiring of an informant to commit illegal acts
|
||
|
on the agency's behalf, and that the FBI's apparent ability to decrypt
|
||
|
files on Poulsen's computer that had been encrypted with the
|
||
|
U.S. government's Data Encryption Standard, a popular data-scrambling
|
||
|
algorithm.
|
||
|
|
||
|
The FBI office in Los Angeles declined to comment on the Poulsen
|
||
|
case. A representative of the FBI's Washington office said, "We
|
||
|
normally do not comment on books that are coming out until we have had
|
||
|
an opportunity to review the book."
|
||
|
|
||
|
As a condition of his plea bargain, Poulsen is prohibited from
|
||
|
discussing FBI wiretaps.
|
||
|
|
||
|
Littman said he feels "lucky as a writer to have been able to spend
|
||
|
some time with Poulsen and these other characters in the story."
|
||
|
|
||
|
"One thing about Poulsen is he really had a very highly developed
|
||
|
ethical model that he believed in," Littman said. "He found it
|
||
|
challenged by his circumstances and the people he associated with. I
|
||
|
found it fascinating to see how he resolved this age-old computer
|
||
|
hacker ethic with a changing world."
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Cellular Code-breakers Blame Standards Process
|
||
|
577 Words
|
||
|
4312 Characters
|
||
|
04/03/97
|
||
|
TR Wireless News
|
||
|
Copyright (c) 1997 BRP Publications, Inc.
|
||
|
|
||
|
Computer scientists claim they have demonstrated how to break the
|
||
|
industry-standard code that encrypts cellular phone calls-a discovery
|
||
|
they termed "a setback to the U.S. cellular telephone industry." The
|
||
|
code-breakers included Bruce Schneier of Counterpane Systems, a
|
||
|
Minneapolis consulting firm, and graduate student David Wagner of the
|
||
|
University of California at Berkeley.
|
||
|
|
||
|
They criticized the wireless industry's technical standards-setting
|
||
|
process for establishing what they consider a weak standard, and they
|
||
|
attacked the government for "hamstringing emerging cellular security
|
||
|
technology." Release of their announcement and academic paper was timed
|
||
|
to coincide with congressional hearings on encryption policy.
|
||
|
|
||
|
The researchers' press release observes that the digital cellular
|
||
|
system uses encryption to "scramble voice communications." Their paper,
|
||
|
Cryptanalysis of the Cellular Message Encryption Algorithm (CMEA),
|
||
|
concerns cellular phone keypad entries, but not voice conversations. Mr.
|
||
|
Schneier told TRWN that the digital cellular voice encryption standard
|
||
|
is "so incredibly vulnerable" to decryption that it was "not worth
|
||
|
writing about." The voice standard's fundamental code was broken by the
|
||
|
"Union Army in the Civil War," he added.
|
||
|
|
||
|
The researchers didn't challenge either the subscriber
|
||
|
"authentication" or the "fingerprinting" antifraud procedures now common
|
||
|
in the cellular service. Authentication and fingerprinting technologies
|
||
|
"are not compromised by the cryptography announced today," according to
|
||
|
the Cellular Telecommunications Industry Association.
|
||
|
|
||
|
The technical paper describes a cryptographic "attack" on the CMEA.
|
||
|
Such an attack, in practice, would require analysis of data recovered
|
||
|
from recorded calls, received on radios capable of decoding digital
|
||
|
cellular transmissions. Such radios aren't easily available; the common
|
||
|
"scanner" can't receive them.
|
||
|
|
||
|
"We did not touch a cellular phone in our analysis, and there is no
|
||
|
commercial equipment available that could receive digital cellular
|
||
|
signals. We worked with a paper standard only," Mr. Schneier said. The
|
||
|
attack took "minutes or hours" on a Pentium-class personal computer, and
|
||
|
to comply with U.S. laws and who agreed not to "misuse" the
|
||
|
information. Federal agencies, including NSA, had certain
|
||
|
"sensitivities" as to the encryption power of CMEA and its lawful export
|
||
|
under then-current laws, he said. These concerns led to CMEA's being
|
||
|
somewhat less "robust" than the authentication algorithm.
|
||
|
|
||
|
Updating CMEA to address the concerns raised by the cryptographers'
|
||
|
announcement has become the "highest priority" for the TR45 committee at
|
||
|
its upcoming meetings, Mr. Marinho said. He added that the shift in
|
||
|
federal jurisdiction over encryption from the State Department to the
|
||
|
Commerce Department has enabled TIA to move forward in improving CMEA.
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
|
||
|
TRENDS IN BRIEF...
|
||
|
285 Words
|
||
|
2117 Characters
|
||
|
04/07/97
|
||
|
Report on Microsoft
|
||
|
Copyright 1997 Information Access Company. All rights reserved.
|
||
|
|
||
|
A trade publication reports that a "major" security flaw has been
|
||
|
uncovered in Microsoft's network operating system, Windows NT.
|
||
|
|
||
|
The flaw could enable a user dialing in from a remote location to
|
||
|
unscramble encrypted information -- including a corporate network's
|
||
|
entire registry of user passwords -- and display it as plain text. EE
|
||
|
Times Online (http://www.eet.com) said the discovery is especially
|
||
|
troublesome for Microsoft because it has tried to position NT as more
|
||
|
secure network server than alternatives such as Unix. Two professional
|
||
|
security technologists wrote the code for the "hack" that found the
|
||
|
flaw.
|
||
|
|
||
|
The code has been verified by several experts and is making the
|
||
|
rounds on the Internet via an mailing list frequented by skilled
|
||
|
hackers with an interest in NT-security issues. The potentially
|
||
|
password-cracking code is the third major security flaw found in NT in
|
||
|
as many months and follows recent revelations of security holes in
|
||
|
Microsoft's Internet Explorer Web browser. The software giant's
|
||
|
security technology has come under closer scrutiny by the hacking
|
||
|
community as NT and Internet Explorer have found broader market
|
||
|
acceptance... At least a dozen major companies have joined the race to
|
||
|
buy, invest or strike strategic alliances with small Java developers,
|
||
|
according to a trade publication report. Driven by the growing
|
||
|
popularity of Java and the need to get products to market more quickly
|
||
|
than they can be developed internally, these vendors frequently are
|
||
|
courting the same developers to shore up their Java offerings. One
|
||
|
developer, while declining to comment on any talks his company has had,
|
||
|
named Sun Microsystems Inc., Microsoft, Novell Inc., Netscape
|
||
|
Communications Corp. and IBM/Lotus as the top Java hunters, followed by
|
||
|
a second tier of tools vendors that include Symantec Corp.
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Social Security officials insist Web info is secure
|
||
|
|
||
|
April 8, 1997
|
||
|
Web posted at: 12:10 a.m. EST
|
||
|
|
||
|
WASHINGTON (CNN) -- Social security records now available through the
|
||
|
Internet pose few security threats to the individuals who request them
|
||
|
administration officials said Monday.
|
||
|
|
||
|
For the past month, Americans have had the option of having their Personal
|
||
|
Earnings and Benefit Estimate Statement (PEBES) sent to them electronically.
|
||
|
The information previously had to be mailed to them in a process that took as
|
||
|
long as six weeks -- and at a cost of millions of dollars in postage each year.
|
||
|
|
||
|
Phil Gambino, a spokesman for the Social Security Administration, said the top
|
||
|
priority of the new program is maintaining privacy, and several security
|
||
|
features have been built into the new system to do just that.
|
||
|
|
||
|
"The information going back and forth between the requester and Social Security
|
||
|
is encrypted, so if it gets intercepted in the middle, it can't be interpreted -- it
|
||
|
would look like jibberish," he said.
|
||
|
|
||
|
Auditors also are able to trace the origin of a request to the exact personal
|
||
|
computer used to make it, he said.
|
||
|
|
||
|
Still, critics concerned about privacy rights are worried.
|
||
|
|
||
|
"As soon as crooks start exploiting this service to get other people's
|
||
|
information, Social Security is going to have a real problem on its hands,"
|
||
|
Evan Hendricks, chairman of the U.S. Privacy Council in Washington, told USA
|
||
|
Today.
|
||
|
|
||
|
The newspaper identified various types of potential abuse: potential employers
|
||
|
could get the salary history of job applicants; co-workers could determine how
|
||
|
much fellow employees make; landlords could use the information to determine
|
||
|
whether someone can afford an apartment.
|
||
|
|
||
|
While Gambino insisted someone would have to "go through a great deal of
|
||
|
effort" to steal information, even the PEBES Web page offers a disclaimer: "We
|
||
|
cannot absolutely guarantee that the information you are sending will not be
|
||
|
intercepted by others and decrypted."
|
||
|
|
||
|
Indeed, one person in January decoded an encryption code similar to the one
|
||
|
used to secure the Social Security information.
|
||
|
|
||
|
Responding to a challenge from a computer security firm, a graduate student
|
||
|
cracked the code in 3 1/2 hours. He used 250 work stations to do test 100
|
||
|
billion code combinations per hour to crack a 40-bit electronic key. The
|
||
|
PEBES page is encrypted with at least a 40-bit key, although it could have
|
||
|
128 bits or more.
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Web authors linked to suicide sect
|
||
|
By Alan Boyle and Paul Chavez
|
||
|
MSNBC
|
||
|
|
||
|
Members of the religious community who died in Rancho Santa Fe
|
||
|
earned money by designing business sites on the World Wide Web and
|
||
|
may have tied their death pact to coincide with the return of the
|
||
|
Hale-Bopp comet.
|
||
|
|
||
|
Farewell tape shows cultists' calm resolve Cult built an 'earth ship' of
|
||
|
old tires Rendezvous with mortality Cults growing on the Net How to know if a
|
||
|
loved one is in a cult Talk about this story in our News BBS.
|
||
|
|
||
|
The group did business as Higher Source Contract Enterprises and
|
||
|
designed a variety of sites, including the San Diego Polo Clubs home
|
||
|
page on the World Wide Web.
|
||
|
|
||
|
Commander Al Fulmer of the San Diego County Sheriffs Office said
|
||
|
during a Thursday press conference that the group also called itself
|
||
|
Heavens Gate. A Web site using that name makes a connection
|
||
|
between the Hale-Bopp comet, which last visited Earth about 4,200
|
||
|
years ago, and a time of closure.
|
||
|
|
||
|
The Heavens Gate site was found under several addresses
|
||
|
Thursday, including one Internet address located in Romania. Most of
|
||
|
the sites were either pulled off the World Wide Web later Thursday or
|
||
|
were made inaccessible because of high volumes of Internet traffic.
|
||
|
Katie Greene, a spokesperson for Internet service provider
|
||
|
Concentric Network, located in Californias Silicon Valley south of San
|
||
|
Francisco, said they have been providing Internet service to the group
|
||
|
since March 1995.
|
||
|
|
||
|
A section of one Heavens Gate site outlined the groups beliefs and
|
||
|
said that 2,000 years ago a crew member of the kingdom of heaven took
|
||
|
over the body of Jesus. This Christ-like member prepared others for
|
||
|
departure into the kingdom of heaven.
|
||
|
|
||
|
The site said the groups mission was the same.
|
||
|
|
||
|
I am in the same position to todays society as was the One that
|
||
|
was in Jesus then, the sites author wrote. My being here now is
|
||
|
actually a continuation of that last task as was promised, to those who
|
||
|
were students 2,000 years ago. ... Our only purpose is to offer the
|
||
|
discipline and grafting required of this transition.
|
||
|
|
||
|
Another section of the site described two leaders, a male and
|
||
|
female, who in the early 1970s took over two bodies, which they called
|
||
|
vehicles.
|
||
|
|
||
|
The Heavens Gate group may be a high-tech reincarnation of a
|
||
|
1970s community that had been dubbed the UFO Cult.
|
||
|
|
||
|
Strong similarities exist between the 1970s group and information
|
||
|
found on World Wide Web sites connected to Heavens Gate. The two
|
||
|
leaders of the the so-called UFO cult have been previously identified in
|
||
|
news reports as Houston residents. News reports also said the female
|
||
|
leader is dead.
|
||
|
|
||
|
One page called Last Chance to Evacuate Earth Before Its
|
||
|
Recycled outlined the groups history and mission. The author of the
|
||
|
page identified himself as Do as in the musical tone.
|
||
|
|
||
|
The author said he was related to the Ti and Do that made news in
|
||
|
1975 as the UFO cult. The author also said that his female partner, Ti,
|
||
|
left earth in 1985.
|
||
|
|
||
|
Much of the information on the site outlined how representatives
|
||
|
from a Kingdom Level Above Human were on Earth to escort others to
|
||
|
the higher level.
|
||
|
|
||
|
The site also had a section detailing its position against suicide by
|
||
|
non-members. Larry Trachte, professor of religion at Wartburg College, said
|
||
|
that suicide often has a different meaning among religious groups and cults.
|
||
|
|
||
|
|
||
|
Death is seen more in an Eastern perspective, Trachte said. So
|
||
|
there isnt a sense that all this is tragic. Its more the spiritual, mental
|
||
|
orientation of these people that believe this way. They believe this life
|
||
|
is just one in an ongoing cycle or series or wheel of life. And ending this
|
||
|
life is like opening a window or door and moving into another existence.
|
||
|
|
||
|
Trachte said he took some solace in the news that no children were
|
||
|
involved with the group.
|
||
|
|
||
|
He also was not surprised with the connection to the Hale-Bopp comet.
|
||
|
|
||
|
Throughout history, the heavens and the signs of the stars and
|
||
|
peculiar events like comets have signified extraterrestrial powers,
|
||
|
Trachte said. Its not totally surprising that a comet would trigger such a
|
||
|
response.
|
||
|
|
||
|
He said the group was unique in that it apparently mixed modern
|
||
|
phenomena, such as UFOs, computers, the comet and the Internet, with
|
||
|
age-old beliefs of being swept into heaven.
|
||
|
|
||
|
Even in the Christian experience you have that recorded experience
|
||
|
of people from another country following a heavenly display or
|
||
|
revelation, which to them pointed to the birth of Christ, Trachte said.
|
||
|
|
||
|
The Heavens Gate group also designed pages publicizing
|
||
|
Pre-Madonna, an album of Madonnas early songs;
|
||
|
1-800-HARMONY, a music and video mail-order operation; British
|
||
|
Masters, a clearinghouse for auto parts; and Keep the Faith, a site
|
||
|
devoted to contemporary Christian music and news.
|
||
|
|
||
|
The group used advanced Web page design and technology,
|
||
|
including Java and Javascript, animated images and virtual reality
|
||
|
modeling language.
|
||
|
|
||
|
Beverly Hills businessman Nick Matzorkis, who runs the
|
||
|
Pre-Madonna site, told authorities that he now employs a former
|
||
|
member of the Higher Source group. Matzorkis said that members sent
|
||
|
the employee whom he identified only as Rio two videotapes this week
|
||
|
that described their intentions to commit suicide.
|
||
|
|
||
|
Members of Heavens Gate believed it was time to shed their
|
||
|
containers, perhaps to rendezvous with a UFO they believed was
|
||
|
traveling behind the Hale-Bopp comet, Matzorkis told NBCs Today
|
||
|
show.
|
||
|
|
||
|
The author identified as Do said on the Heavens Gate site, dated
|
||
|
Sept. 29, 1996, that time was short.
|
||
|
|
||
|
The end of this civilization is very close, the site said. The end of
|
||
|
a civilization is accompanied by a spading under, refurbishing the
|
||
|
planet in preparation for another civilization. And the only ones who
|
||
|
can survive that experience have to be those who are taken into the
|
||
|
keeping of the Evolutionary Level Above Human.
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
|
||
|
Hecklers hack at human bugs that crawl the Web
|
||
|
|
||
|
A couple of weeks ago the U.S. public was distracted by issues of
|
||
|
Internet pornography. The U.S. Supreme Court was considering the
|
||
|
Communications Decency Act, a law meant to control obscenity
|
||
|
supposedly bombarding youthful computer users.
|
||
|
|
||
|
Meanwhile Marshall Herff Applewhite and 38 members of the Heaven's
|
||
|
Gate cult were updating their Web site, laying in a supply of new
|
||
|
Nike sneakers, and preparing to kill themselves.
|
||
|
|
||
|
Politicians and clergy had a firm grip on the anti-porn franchise.
|
||
|
Who, on the other hand, was tackling murderous mass delusion?
|
||
|
|
||
|
The answer: a few skeptics and hecklers, and they did a good job
|
||
|
of it.
|
||
|
Their postings continue to collect in the forums of Usenet where
|
||
|
cult followers put their prophecies about the alien spaceship that
|
||
|
supposedly follows the comet Hale-Bopp.
|
||
|
|
||
|
"It seems odd that a higher life form would prefer us paltry
|
||
|
humans to wear black Nikes with a white "swoosh' as our ceremonial
|
||
|
sending off garb," sneers a contributor to sci.astro, a group of
|
||
|
otherwise sensible astronomers. "What is wrong with Reebok or
|
||
|
Adidas? Is there a conspiracy here?"
|
||
|
|
||
|
Criticism also focused on syndicated radio host Art Bell, who has
|
||
|
promoted the astronaut-messiah movement. He used to talk more about
|
||
|
evil government, until the Oklahoma City federal building bomb went
|
||
|
off. Lately his agenda has been heavier on spaceships.
|
||
|
|
||
|
"Art's role in their deaths was that of a liar and snake oil
|
||
|
salesman, trafficker in junk science, a promoter of charlatans and
|
||
|
their wares, and a parasitic peddler of pernicious poppycock," says a
|
||
|
contributor "decieving you're some sort of chosen spokesman
|
||
|
for some trumped-up alien scam so you can sell your booklet," says
|
||
|
another.
|
||
|
|
||
|
A preacher surrounding himself with goons in a sealed-off temple,
|
||
|
a con artist fleecing followers in a distant commune, even an
|
||
|
infomercial huckster on radio or television, is protected from
|
||
|
opponents who might distract his victims.
|
||
|
|
||
|
But how many of Jim Jones' followers might have been deterred from
|
||
|
going to Guyana with him, and tasting his deadly brew, had the
|
||
|
Internet been in wider use 20 years ago, complete with its noisy
|
||
|
skeptics countering his preachings?
|
||
|
|
||
|
Jones took more than 900 lives with him. Applewhite only got 38
|
||
|
to go along. That's progress.
|
||
|
|
||
|
"Think of it as evolution in action. Or maybe they were right and
|
||
|
are aboard the mothership now. Either way, it's 39 fewer idiots
|
||
|
cluttering up the planet," says another contributor. This does not
|
||
|
encourage copycats.
|
||
|
|
||
|
Skeptical argument is not limited to religious themes. In
|
||
|
Usenet's thousands of newsgroups, forums cover politics, social life,
|
||
|
dating and marriage, most of the arts and sciences, journalism and
|
||
|
international relations. To some degree, they are all the scenes of
|
||
|
noisy, sometimes sarcastic and even profane debate. Group members
|
||
|
even patrol for porn, often vigorously repelling sexual-oriented
|
||
|
postings with the same forensic muscle.
|
||
|
|
||
|
Anyone can join in soc.couples, alt.fan.rush-limbaugh,
|
||
|
alt.politics.clinton, alt.politics.british, alt.history.what-if,
|
||
|
rec.arts.movies, sci.military, alt.journalism and other cyberbrawls.
|
||
|
They argue feminism, political campaign funding, TV violence,
|
||
|
landmines, sex and Nazism. There is even a fun group that regularly
|
||
|
argues the perennial subject of world domination by hamburger
|
||
|
franchise (it's called alt.nuke.the.usa).
|
||
|
|
||
|
Heckling and skepticism? Indeed, as it should be.
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
The Netly News Network
|
||
|
April 3, 1997
|
||
|
|
||
|
IRS raids a cypherpunk
|
||
|
by Declan McCullagh (declan@well.com)
|
||
|
|
||
|
|
||
|
Jim Bell's first mistake was publishing an
|
||
|
essay describing how disgruntled citizens could
|
||
|
kill off Federal government agents by using
|
||
|
anonymous betting pools and digital cash. His
|
||
|
second mistake was informing the IRS that the
|
||
|
agency had no legal authority to tax him.
|
||
|
|
||
|
About twenty armed IRS agents and other
|
||
|
Federal police swarmed into Bell's home in
|
||
|
Washington state on Tuesday morning, hunting for
|
||
|
evidence that Bell's "Assassination Politics"
|
||
|
essay had come to fruition. They expropriated
|
||
|
Bell's three computer systems, two guns and even
|
||
|
a solitary mouse cable. The Feds were taking no
|
||
|
chances: Since Bell's voluminous Net postings
|
||
|
mentioned tax collectors, agents from the BATF,
|
||
|
FBI, DEA, and local police forces joined the
|
||
|
raid.
|
||
|
|
||
|
[...]
|
||
|
|
||
|
The raid stemmed from a six-month tussle
|
||
|
between Bell and the IRS, which began in November
|
||
|
1996 when the 38-year old computer engineer
|
||
|
demanded a hefty tax refund and threatened to
|
||
|
convene his own "common-law court" if it was
|
||
|
refused. That grabbed the Feds' attention. (So
|
||
|
did the actions of the "Multnomah County Common
|
||
|
Law Court," which apparently met in January to
|
||
|
convict IRS agents and Attorney General Janet
|
||
|
Reno of "theft by deception.") In February, IRS
|
||
|
agents seized Bell's 1986 Honda as payment for
|
||
|
back taxes -- and found inside it a printout of
|
||
|
his "Assassination Politics" essay. "
|
||
|
|
||
|
[...]
|
||
|
|
||
|
And it was, ultimately, a Federal magistrate
|
||
|
who signed the search warrant on 9:02 am on March
|
||
|
28 at the request of the IRS. Jeffrey Gordon, an
|
||
|
inspector in the IRS' Internal Security Division,
|
||
|
details in an 10-page affidavit how he traced
|
||
|
Bell's use of allegedly fraudulent Social
|
||
|
Security Numbers, how he learned that Bell had
|
||
|
been arrested in 1989 for "manufacturing a
|
||
|
controlled substance," how he found out that Bell
|
||
|
possessed the home addresses of a handful of IRS
|
||
|
agents. Gordon's conclusion: Bell planned "to
|
||
|
overthrow the government." The IRS investigator
|
||
|
says in his affidavit that Bell's "essay details
|
||
|
an illegal scheme by Bell which involves plans to
|
||
|
assassinate IRS and other government officals...
|
||
|
I believe that Bell has begun taking steps to
|
||
|
carry out his Assassination Politics plan."
|
||
|
|
||
|
[...]
|
||
|
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
Security/Hacker Conferences
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
The 1997 Summer Security Conference
|
||
|
|
||
|
"SUMMERCON IX.V"
|
||
|
|
||
|
May 31st, 1997
|
||
|
|
||
|
Atlanta, GA
|
||
|
|
||
|
This is the official announcement and open invitation to the nine
|
||
|
and 1/2 summer security conference, Summercon. A long time ago,
|
||
|
Summercon was an invite-only hacker gathering held annually in St.
|
||
|
Louis, Missouri. Starting in 1995, SummerCon became an open event to
|
||
|
any and all interested parties: Hackers, Phreaks, Pirates, Virus
|
||
|
Writers, System Administrators, Law Enforcement Officials,
|
||
|
Vigilantes, Neo-Hippies, Secret Agents, Teachers, Disgruntled
|
||
|
Employees, Telco Flunkies, Journalists, New Yorkers, Programmers,
|
||
|
Conspiracy Nuts, Musicians, Nudists, and Rug Sucking Wannabes.
|
||
|
This con is going to be different than previous SummerCons. First
|
||
|
off, there are two other major cons happening this summer, Defcon
|
||
|
and Beyond HOPE. If you want to see good technical speakers, meet a
|
||
|
ton of hackers, and have a good time for a couple days, I suggest
|
||
|
you go to one or both of those cons. DefCon information is at
|
||
|
http://www.defcon.org, Beyond HOPE info is at http://www.2600.com.
|
||
|
|
||
|
So why have SummerCon at all? Well, its a tradition, and most
|
||
|
of the people I talked to said we should have it anyways. But,
|
||
|
because of the other 2 cons, I am really aiming just to make this
|
||
|
a fun weekend with yer friends in a new city, not a technical
|
||
|
hacker gala. If you want to learn something, go to HOPE or
|
||
|
Defcon. If you want to meet hackers, go to HOPE or DefCon. If
|
||
|
you have to choose one con to go to this summer, this one should
|
||
|
NOT be it. If you are already going to DefCon and HOPE, and still
|
||
|
have one more weekend you want to waste this summer, this is the
|
||
|
perfect place for you.
|
||
|
If you are a criminal, if you are an anarchist, if you are
|
||
|
interested in pulling fire alarms or breaking things, don't come
|
||
|
to this con; we don't want you here and you wouldn't like us
|
||
|
anyhow.
|
||
|
Why 9.5? Well, SummerCon X should be this huge major security
|
||
|
conference, but with HOPE this year, we didn't think it was the
|
||
|
right year to do another one of those. So, we'll have SummerCon X
|
||
|
next year, this one is just going to be a little party.
|
||
|
|
||
|
|
||
|
LOCATION
|
||
|
|
||
|
It will be held in Atlanta, GA, but we haven't actually figured
|
||
|
out WHERE in Atlanta. That's because this is a pre-release of the
|
||
|
announcement, when this becomes official, we'll fill in the
|
||
|
details.
|
||
|
|
||
|
|
||
|
DIRECTIONS
|
||
|
|
||
|
Fly to Hartsfield International Airport, look for the hackers.
|
||
|
|
||
|
|
||
|
CONFERENCE INFO
|
||
|
|
||
|
It has always been our contention that cons are for socializing.
|
||
|
"Seekret Hacker InPh0" is never really discussed except in private
|
||
|
circles, so the only way anyone is going to get any is to meet new
|
||
|
people and take the initiative to start interesting conversations.
|
||
|
|
||
|
Because of this, the formal speaking portion of Summercon will be
|
||
|
held on one day, not two or three, leaving plenty of time for
|
||
|
people to explore the city, compare hacking techniques, or go
|
||
|
trashing and clubbing with their heretofore unseen online
|
||
|
companions. Futhermore, except for maybe getting Mudge up on
|
||
|
stage to blow us all away with some cool technical details, it is
|
||
|
probably a pretty good bet that the speeches will end up being
|
||
|
boring, long, and a complete waste of time. Don't come to
|
||
|
SummerCon to learn anything, because you won't.
|
||
|
|
||
|
If you are coming from out of town and want the full
|
||
|
hacker/tourist experience, we will be having a specially scheduled
|
||
|
2600 meeting Friday, May 30th, at 6pm at Lenox Mall food court.
|
||
|
If you don't know how to get there, just ask, everyone in Atlanta
|
||
|
knows.
|
||
|
|
||
|
The formal conference will be held on Saturday, May 31st, 1997,
|
||
|
from 10am to 5pm (with a break for lunch). There will be a
|
||
|
variety of speakers, panel discussions, demonstrations, and other
|
||
|
events that will hopefully keep everyone entertained; if not you
|
||
|
can always start drinking early.
|
||
|
|
||
|
No video or audio tapes will be allowed in the conference room.
|
||
|
No still photography will be permitted in the conference room
|
||
|
without prior permission of all those being photographed.
|
||
|
Violation of these policies will result in you being asked to
|
||
|
leave the conference.
|
||
|
|
||
|
There will be no selling of t-shirts, disks, firewalls, payphones,
|
||
|
etc. in or around the conference area without prior permission of
|
||
|
the organizers, and you WON'T get permission. We can't keep you
|
||
|
from selling t-shirts in your hotel room, but we can keep you away
|
||
|
from the actual conference area, and we can probably get you
|
||
|
kicked out of the hotel for soliciting, and if we can, we will.
|
||
|
T-Shirt sales is where we make up all the money we spend putting
|
||
|
on the conference, and so we will be the only ones selling them.
|
||
|
If you want to sell t-shirts, go have your own con.
|
||
|
|
||
|
If you are interested in demoing or selling something, please
|
||
|
contact us at the address listed at the bottom. If you offer us
|
||
|
money, we might let you do it.
|
||
|
|
||
|
|
||
|
SPEAKERS
|
||
|
|
||
|
The speakers list for Summercon X is still being finalized, but it
|
||
|
is sure to be much less interesting than previous years. In fact,
|
||
|
right now we have NO speakers, and probably we won't until the day
|
||
|
of the con. So again, don't come to summercon for the speakers.
|
||
|
|
||
|
If you are an expert in some aspect of computer, network, or telco
|
||
|
security and are interested in speaking at Summercon, please
|
||
|
contact us to discuss the possibility further at the address
|
||
|
listed at the end of this document.. We won't pay you, don't ask.
|
||
|
|
||
|
We are also going to be having short speeches by real hackers or
|
||
|
phreakers giving their own perspective on some issue or insight
|
||
|
into a new technology. This is an open invitation for you hackers
|
||
|
to be heard; just provide us with a brief outline of the topic you
|
||
|
will be covering and the amount of time you will take (suggested:
|
||
|
5 - 15 minutes) at the address listed below.
|
||
|
|
||
|
|
||
|
COSTS
|
||
|
|
||
|
Costs for SummerCon X are as follows, these are same rates as last
|
||
|
year, which I think is pretty good. There will be NO refunds, and
|
||
|
if you annoy any of the organizers, we reserve the right to throw
|
||
|
you out, and you won't get your money back.
|
||
|
|
||
|
Secret Service / FBI Rate: $500.00
|
||
|
Government / Institutional Rate: $ 80.00
|
||
|
Hacker / Individual Rate: $ 20.00
|
||
|
|
||
|
|
||
|
Members of the United States Secret Service or Federal Bureau of
|
||
|
Investigations, and anyone that has in the past or currently is
|
||
|
providing information or services to the Secret Service or FBI are
|
||
|
required to pay the 'Secret Service / FBI Rate'.
|
||
|
|
||
|
Employees of a local, state, or federal government, members and
|
||
|
associates of any L.E.O., must pay the 'Government / Institutional
|
||
|
Rate'.
|
||
|
|
||
|
Anyone that does not fit into one of the above categories is
|
||
|
eligible for the 'Individual / Hacker Rate'.
|
||
|
|
||
|
Due to historical lack of interest, there will not be
|
||
|
pre-registration for the conference. Registration will begin at
|
||
|
10am the day of the conference, and will continue for the duration
|
||
|
of the conference or until the meeting facilities have reached their
|
||
|
capacity. Since the latter is likely to occur, it is suggested you
|
||
|
don't oversleep.
|
||
|
|
||
|
No purchase orders, checks, money orders, foreign currency, stock
|
||
|
certificates, IOUs, or coins will be accepted for registration.
|
||
|
Secret Service agents, small unmarked bills only, please.
|
||
|
|
||
|
Bring money for t-shirts, they are cool, and this year we will make
|
||
|
enough for everyone (we hope).
|
||
|
|
||
|
HOTEL INFORMATION
|
||
|
|
||
|
Still working on this part.
|
||
|
|
||
|
The cost for a double occupancy room at the hotel is $XX. There is
|
||
|
no special conference rate, there is no need to mention you are with
|
||
|
a conference at all, the people in reservations probably won't know
|
||
|
what you are talking about anyhow.
|
||
|
|
||
|
If the hotel is damaged in any manner, you are going to pay for it,
|
||
|
and you will probably end up in jail. And even if you are lucky
|
||
|
enough to get away with it, the rest of the hackers staying at the
|
||
|
hotel will end up paying for it, and I'm sure that's going to make
|
||
|
you a well-liked and respected hacker, especially among some of the
|
||
|
bigger hackers who might feel tempted to inflict bodily harm on
|
||
|
someone who causes any damage to the hotel. Please act responsibly,
|
||
|
don't drink and drive, chew all your food before you swallow, don't
|
||
|
swallow your gum, and recycle.
|
||
|
|
||
|
Anyhow, if you pull a fire alarm, if you damage a room, if you spit
|
||
|
on the floor, and any of the organizers, or any of their friends
|
||
|
find out, we are going to call the police and have you arrested. In
|
||
|
fact, we are making a game out of it. If anyone does any damage to
|
||
|
the hotel, we will give whoever tells us what person or persons did
|
||
|
it $100 in cash if we are able to get that person taken to jail.
|
||
|
|
||
|
|
||
|
CONTACTING SUMMERCON ORGANIZERS
|
||
|
|
||
|
|
||
|
You can contact the Summercon organizers through e-mail. If you
|
||
|
haven't figured out e-mail yet, you probably shouldn't be coming to
|
||
|
Summercon.
|
||
|
|
||
|
As a final note, if you are planning on coming to Summercon, we
|
||
|
would appreciate you sending e-mail to us with the subject of "GOING
|
||
|
TO SCON" or something similar, just so that we have a rough idea of
|
||
|
how many people are going to show up.
|
||
|
|
||
|
|
||
|
E-mail: scon@2600.com
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
--== Hacking In Progress ==--
|
||
|
|
||
|
8th, 9th and 10th of August 1997
|
||
|
Near Almere, Netherlands
|
||
|
|
||
|
http://www.hip97.nl/
|
||
|
info@hip97.nl
|
||
|
|
||
|
|
||
|
|
||
|
Welcome to the HIP announcement list. We are not
|
||
|
alone! More than 1600 (!) of you subscribed to this
|
||
|
list.
|
||
|
|
||
|
As you probably already know what HIP is about, this
|
||
|
announcement will focus on how you can help us and how
|
||
|
you can stay informed about HIP. Please read the FAQ
|
||
|
for more common questions.
|
||
|
|
||
|
|
||
|
What is HIP?
|
||
|
------------
|
||
|
|
||
|
HIP is a place for hackers, artists, activists and
|
||
|
many, many others to network themselves, both in the
|
||
|
social and electronic sense of the word. HIP is a
|
||
|
do-it-yourself event. We, the organizers, will provide
|
||
|
the infrastructure, such as large tents, showers,
|
||
|
toilets and large amounts of reliable electrical power
|
||
|
and network connectivity. We'll also arrange for a
|
||
|
basic set of workshops and lectures, mainly dealing
|
||
|
with the social and political aspects of information
|
||
|
technology, security, Internet, access to technology,
|
||
|
new developments, cryptography and other 'hacker-
|
||
|
related' topics that come to mind. We are open to
|
||
|
suggestions for other fields of interest.
|
||
|
|
||
|
At this moment we are working on discussions and
|
||
|
workshops about smartcard security, Tempest attacks,
|
||
|
the SPAM threat, virtual communities, cryptography and
|
||
|
the law (Trusted Third Parties and Key Recovery), a
|
||
|
tele-presence experiment, activism on the Net, and
|
||
|
much more.
|
||
|
|
||
|
|
||
|
A do-it-yourself event?
|
||
|
-----------------------
|
||
|
|
||
|
We will absolutely need your help setting up
|
||
|
everything once we're there. HIPcamp will open on
|
||
|
August 5th, three days before HIP starts. If you
|
||
|
decide to join in that early expect some pretty
|
||
|
primitive circumstances. If you don't care about that,
|
||
|
or think that's the best part, you can help build
|
||
|
HIPnet and all other facilities.
|
||
|
|
||
|
We also urgently need you to think now about what it
|
||
|
is you would like to see and do at HIP. Just like
|
||
|
Hacking at the End of the Universe in 1993, we need
|
||
|
lots of people that have ideas for organizing their
|
||
|
own small part of HIP and the organizational talent to
|
||
|
do this without too much help from us.
|
||
|
|
||
|
One of the proven recipes for fun:
|
||
|
|
||
|
* GET a group of friends together in an early stage;
|
||
|
arrange how you're going to get there if you're far
|
||
|
away.
|
||
|
|
||
|
* THINK: Is there something you and your friends would
|
||
|
like to show others, discuss or do there?
|
||
|
|
||
|
* If so: TELL us about it, so we can coordinate, help
|
||
|
or announce things.
|
||
|
|
||
|
* Maybe BUY a nice big army surplus tent for almost
|
||
|
nothing.
|
||
|
|
||
|
* BRING lots of computers and other electronics.
|
||
|
|
||
|
* HOOK it all up once you get there.
|
||
|
|
||
|
* Check out what others have been doing and MEET nice
|
||
|
people, hang out, have fun!
|
||
|
|
||
|
Of course you can also come alone and have lots of
|
||
|
fun, and there will be a huge exhibition tent to set
|
||
|
up computers in. In another big tent there will be
|
||
|
near to a thousand chairs where you can listen to and
|
||
|
participate with panel discussions.
|
||
|
|
||
|
This event will be big, and as said, in this stage
|
||
|
we're looking for people to organize their own chaotic
|
||
|
little part of it. So don't mail us saying "put me on
|
||
|
the list, I want to be a volunteer" when you could say
|
||
|
"I'm xxx and I'd like to do yyy." Tell us what you
|
||
|
need us to do. We could put your workshop or whatever
|
||
|
it is you'd like to do in one of our announcements and
|
||
|
on the website, so people can communicate with you
|
||
|
beforehand. We could make sure there is enough room if
|
||
|
your project requires a lot of space. You name it.
|
||
|
|
||
|
You can use the newsgroup alt.hacking.in.progress to
|
||
|
find people to work with at HIP. Or you can use the
|
||
|
notice board at the website to search for someone to
|
||
|
travel with to HIP. Use it to ask for help or offer
|
||
|
some.
|
||
|
|
||
|
As the days get longer, there will be parts of the
|
||
|
overall organization that need coordination with
|
||
|
volunteers some time before the actual event (workshop
|
||
|
coordination, audiovisual stuff, registration-desk,
|
||
|
bar, network), but now is not yet the time.
|
||
|
|
||
|
This isn't going to be passive entertainment, we all
|
||
|
work together to make it work. Also: HIP is not the
|
||
|
event to buy a computer or get advice on buying one,
|
||
|
and there're not going to be any beginner courses on
|
||
|
using the Internet. If you're not into networking of
|
||
|
some sort, you'll think it's boring.
|
||
|
|
||
|
But if you're very technically inclined, part of some
|
||
|
remote community on the edge of the net, or if the
|
||
|
politics surrounding information technology are just
|
||
|
your thing, HIP is definitely made for you (and by
|
||
|
you, we hope).
|
||
|
|
||
|
HIPcamp will open on August 5th, three days before HIP
|
||
|
starts. If you decide to join in that early expect pretty
|
||
|
primitive circumstances. If you don't care about that,
|
||
|
or think that's the best part, you can help build HIPnet
|
||
|
and all other facilities.
|
||
|
|
||
|
|
||
|
How to stay in contact:
|
||
|
-----------------------
|
||
|
|
||
|
* Check out the website http://www.hip97.nl/
|
||
|
* Participate in alt.hacking.in.progress
|
||
|
* Read the FAQ on the website or the newsgroup
|
||
|
* Mail us at info@hip97.nl
|
||
|
|
||
|
Snailmail us at:
|
||
|
|
||
|
HIP
|
||
|
Postbus 1035
|
||
|
1000 BA Amsterdam
|
||
|
Netherlands
|
||
|
|
||
|
Tel. +31 20 5352081
|
||
|
Fax. +31 20 5352082
|
||
|
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
Defensive Information Warfare
|
||
|
And Systems Assurance
|
||
|
For Community, Company and Country
|
||
|
September 11-12, 1997
|
||
|
Sheraton Premier, Tysons Corner, VA
|
||
|
|
||
|
Call for Papers
|
||
|
|
||
|
|
||
|
Sponsors:
|
||
|
National Computer Security Association
|
||
|
http://www.ncsa.com
|
||
|
and
|
||
|
Winn Schwartau, Interpact, Inc.
|
||
|
http://www.infowar.com
|
||
|
http://www.info-sec.com
|
||
|
|
||
|
Interested parties from government, law enforcement, academia,
|
||
|
corporations and individuals from all nations are invited to submit
|
||
|
papers or concepts for papers/presentation to be given at
|
||
|
InfoWarCon 7 and published on http://www.infowar.com. The following
|
||
|
Solutions Oriented topics are of special interest to the conference,
|
||
|
but all papers will be considered:
|
||
|
|
||
|
Case studies and real world successes are strongly encouraged.
|
||
|
|
||
|
New technologies, systems, models and approaches to provide higher
|
||
|
levels of information and systems assurance in a world where
|
||
|
conflict has moved to Cyberspace. (Commercial, Law Enforcement and
|
||
|
Government).
|
||
|
|
||
|
Detect and Response Solutions
|
||
|
Denial of Service Methods and Protection
|
||
|
New Info-Sec Models for Local and Global Enterprises
|
||
|
Demonstrations of New Emerging Technologies
|
||
|
Encryption, Access Control, and Identification
|
||
|
|
||
|
The technical and social convergence of the military, law enforcement
|
||
|
and private sectors in the interest of National Security: defensive
|
||
|
mechanisms, policies and cooperative efforts.. (Commercial and
|
||
|
Government)
|
||
|
|
||
|
Electronic Civil Defense Policies
|
||
|
Alternative National Defense and Intelligence Mechanisms
|
||
|
National vs. International Policy Development
|
||
|
Educating Populations for Support
|
||
|
Dealing with the Non-nation State Actor
|
||
|
|
||
|
Cooperative legal, ethical and political means by which to interest,
|
||
|
create and sustain international cooperation for the discovery and
|
||
|
prosecution of computer crimes and cyber-terrorism. (Law enforcement
|
||
|
and Government)
|
||
|
|
||
|
Redefining the State
|
||
|
Case Studies of Prosecution; Successful and Not
|
||
|
Corporate Vigilantism and Self-Preservation
|
||
|
Electronic Bills of Rights for Nation States
|
||
|
United Nations of Cyberspace
|
||
|
Legal Conundra
|
||
|
|
||
|
Multi-media presentations, real-time scenarios or gaming, audience
|
||
|
participation and highly interactive topics are more likely to be
|
||
|
accepted. English is the conference language and all sessions will
|
||
|
be unclassified.
|
||
|
|
||
|
Submissions are to be in Word 6.0 or greater, Powerpoint, or other
|
||
|
popular formats, sent by email to: betty@infowar.com
|
||
|
|
||
|
Submission Deadline: May 16, 1997
|
||
|
Acceptance Date: June 9, 1997
|
||
|
|
||
|
For complete information on attendance:
|
||
|
Registration: Conferences@ncsa.com
|
||
|
Sponsorships: Sponsors@ncsa.com
|
||
|
|
||
|
Questions/Help: betty@infowar.com
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
Second International Workshop on Enterprise Security
|
||
|
|
||
|
June 18-20, 1997
|
||
|
Massachusetts Institute of Technology (MIT),
|
||
|
Cambridge, Massachusetts, USA
|
||
|
|
||
|
Co-sponsored by the IEEE Computer Society and the
|
||
|
Concurrent Engineering Research Center (CERC) at
|
||
|
West Virginia University
|
||
|
|
||
|
|
||
|
==============================================================================
|
||
|
Enterprises are increasingly dependent on their information systems to
|
||
|
support their business and workflow activities.
|
||
|
There is a need for universal electronic connectivity to support
|
||
|
interaction and cooperation between multiple organizations.
|
||
|
This makes enterprise security and confidentiality more important,
|
||
|
but more difficult to achieve, as the multiple organizations may
|
||
|
have differences in their security policies and may have to interact
|
||
|
via an insecure Internet. These inter-organizational enterprise systems
|
||
|
may be very large and so tools and techniques are needed
|
||
|
to support the specification, analysis and implementation of security.
|
||
|
|
||
|
This workshop will focus on the problems and challenges relating to
|
||
|
enterprise security in inter-organizational systems. We aim to bring
|
||
|
together principal players from both the internetwork and enterprise
|
||
|
security community and will provide plenty of time for discussion. Topics
|
||
|
to be addressed include:
|
||
|
|
||
|
- Internet/Intranet security
|
||
|
- Security infrastructure and protocols
|
||
|
- Java Security
|
||
|
- Specifying and Analyzing Enterprise Security Policy
|
||
|
- Role-Based Access Control
|
||
|
- Supporting enterprise security over the Internet
|
||
|
- Conflicts and harmonization of inter- and intra-organizational
|
||
|
Security
|
||
|
- Distributed Database Security
|
||
|
- Secure Transactions
|
||
|
- Security in Workflow Process
|
||
|
- Object-Oriented and CORBA Security
|
||
|
- Secure Applications and Environments
|
||
|
- Integrating Heterogeneous Security Environments
|
||
|
- Managing inter-organizational Enterprise Security
|
||
|
- Internet Security protocols
|
||
|
- Security Algorithms
|
||
|
|
||
|
This workshop will be part of the IEEE Sixth Workshops on Enabling
|
||
|
Technologies: Infrastructure for Collaborative Enterprises (WET-ICE
|
||
|
96) organized by the Concurrent Engineering Research Center (CERC)/
|
||
|
West Virginia University.
|
||
|
|
||
|
Important Dates:
|
||
|
================
|
||
|
Papers Due March 25, 1997
|
||
|
Panel Proposals March 18, 1997
|
||
|
Authors notified of acceptance April 21, 1997
|
||
|
Workshop June 18-20, 1997
|
||
|
Camera Ready June 28, 1997
|
||
|
|
||
|
INFORMATION FOR AUTHORS OF PAPERS TO BE INCLUDED IN THE PROCEEDINGS
|
||
|
===================================================================
|
||
|
Mail six copies of an original (not submitted or published elsewhere)
|
||
|
paper (double-spaced) of 3000-5000 words to one of the PC co-chairs.
|
||
|
Include the title of the paper, the name and affiliation of each author, a
|
||
|
150-word abstract and no more than 8 keywords. The name, position,
|
||
|
address, telephone number, and if possible, fax number and e-mail
|
||
|
address of the author responsible for correspondence of the paper must
|
||
|
be included.
|
||
|
|
||
|
|
||
|
An e-mail submission in postscript format will be accepted.
|
||
|
|
||
|
INFORMATION FOR PANEL ORGANIZERS
|
||
|
================================
|
||
|
Send six copies of panel proposals to one of the PC co-chairs.
|
||
|
Include the title, a 150-word scope statement, proposed session chair and
|
||
|
panelists and their affiliations, the organizer's affiliation,
|
||
|
address, telephone and fax number, and e-mail address.
|
||
|
|
||
|
INFORMATION FOR AUTHORS OF POSITION PAPERS
|
||
|
==========================================
|
||
|
Send six copies of position paper of 2-3 pages to one of the PC
|
||
|
co-chairs. Include the title of the paper, the name and affiliation of
|
||
|
each author, a 150-word abstract and no more than 8 keywords. The
|
||
|
name, position, address, telephone number, and if possible, fax number
|
||
|
and e-mail address of the author responsible for correspondence of the
|
||
|
paper must be included. An accepted position paper will get less
|
||
|
presentation time than full paper.
|
||
|
|
||
|
Workshop General Chair and Organizer
|
||
|
====================================
|
||
|
Yahya Al-Salqan, Ph.D.
|
||
|
Sun Microsystems
|
||
|
|
||
|
alsalqan@eng.sun.com
|
||
|
|
||
|
Program Committee
|
||
|
=================
|
||
|
|
||
|
Program Committee Co-Chairs
|
||
|
==========================
|
||
|
Barbara C. Davis
|
||
|
Director of Technology
|
||
|
The Applied Knowledge Group
|
||
|
231 Market Place, #315
|
||
|
San Ramon, CA 94583-2785
|
||
|
USA
|
||
|
|
||
|
Tel. (888) 442-2785
|
||
|
FAX (510) 275-9695
|
||
|
bcdavis@appliedknowledge.com
|
||
|
|
||
|
Douglas Moughan
|
||
|
National Security Agency, R23
|
||
|
9800 Savage Rd.
|
||
|
Ft. Meade, Maryland 20755-6000
|
||
|
USA
|
||
|
|
||
|
wdm@tycho.ncsc.mil
|
||
|
|
||
|
|
||
|
|
||
|
Workshop Program Committee (Partial List):
|
||
|
==========================================
|
||
|
Abdallah Abdallah, Birzeit University, Jerusalem
|
||
|
Takasi Arano, NTT Corp, Japan
|
||
|
Germano Caronni, ETH-Zurich, Switzerland
|
||
|
Taher ElGamal, Netscape Corp., USA
|
||
|
Stephen Farrell, Software and Systems Engineering, Ireland
|
||
|
Takeo Hamada, Fujitsu, Japan
|
||
|
Matthias Hirsch, BSI (Federal Department of Security in the Information
|
||
|
Technology-Germany
|
||
|
Cynthia L Musselman, Sandia Lab, USA
|
||
|
Lisa Pretty, Certicom Corp., Canada
|
||
|
Jeffrey Parrett, LLNL, USA
|
||
|
Sumitra Reddy, West Virginia University, USA
|
||
|
Nahid Shahmehri, Linkoping University, Sweden
|
||
|
Morris Sloman, Department of Computing: Imperial College, UK
|
||
|
Badie Taha, Al-Quds University, Jerusalem
|
||
|
Robert Thomys, BSI (Federal Department of Security in the Information
|
||
|
Technology-Germany
|
||
|
Tatu Ylonen, SSH Communication Security, Finlad
|
||
|
Nick Zhang, EIT, USA
|
||
|
|
||
|
|
||
|
|
||
|
Internet Hot-line
|
||
|
=================
|
||
|
|
||
|
Information on Enterprise Security Workshop may be obtained through
|
||
|
the WWW using the URL http://www.cerc.wvu.edu/SECWK/
|
||
|
|
||
|
For more information on WET-ICE'97, visit the URL:
|
||
|
http://www.cerc.wvu.edu/WETICE/WETICE97.html
|
||
|
|
||
|
One does not need to have a paper to attend the workshop.
|
||
|
|
||
|
[=-------------------------------------------------------------------------=]
|
||
|
|
||
|
|
||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||
|
|
||
|
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB
|
||
|
|
||
|
DEF CON V Convention Announcement #1.08 (04.09.97)
|
||
|
July 11-13th @ the Aladdin Hotel and Casino in Las Vegas
|
||
|
|
||
|
XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON V Convention Announcement
|
||
|
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON V Convention Announcement
|
||
|
XXXXXXxxxxxxXXXXXX X X DEF CON V Convention Announcement
|
||
|
XXXXXxxxxxxxxXXXXXXX X DEF CON V Convention Announcement
|
||
|
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON V Convention Announcement
|
||
|
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON V Convention Announcement
|
||
|
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON V Convention Announcement
|
||
|
XXXxxxxxxxxxxxxXXXXXXXX DEF CON V Convention Announcement
|
||
|
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON V Convention Announcement
|
||
|
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON V Convention Announcement
|
||
|
XXXXXXxxxxxxXXXXXXXXX X DEF CON V Convention Announcement
|
||
|
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON V Convention Announcement
|
||
|
XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON V Convention Announcement
|
||
|
|
||
|
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB
|
||
|
|
||
|
The only convention with free beer!
|
||
|
|
||
|
IN
|
||
|
SHORT:--------------------------------------------------------------------
|
||
|
|
||
|
WHAT: Speakers and partying in Vegas for all hackers
|
||
|
WHEN: July 11th - 13th
|
||
|
WHERE: Las Vegas, Nevada @ the Aladdin Hotel and Casino
|
||
|
COSTS: $30 in advance, $40 at the door
|
||
|
MORE INFO: http://www.defcon.org or email info@defcon.org
|
||
|
|
||
|
IN
|
||
|
LONG:---------------------------------------------------------------------
|
||
|
|
||
|
It's time to brave Las Vegas again for DEF CON! This is an initial
|
||
|
announcement and invitation to DEF CON V, a convention for the
|
||
|
"underground"
|
||
|
elements of the computer culture. We try to target the (Fill in your
|
||
|
favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers,
|
||
|
Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks,
|
||
|
Futurists, Artists, Criminally Insane, Hearing Impaired. It seems that
|
||
|
books about the culture are becoming more popular, so of course reporters
|
||
|
are also welcome. You won't be hurt. I promise. Just bring cash for
|
||
|
drinks.
|
||
|
|
||
|
So you heard about DEF CON IV, and want to hit part V? You heard about the
|
||
|
parties, the info discussed, the bizarre atmosphere of Las Vegas and want
|
||
|
to
|
||
|
check it out in person? You want to do weird shit _away_ from the hotel
|
||
|
where you can't get me in trouble? You have intimate knowledge of the
|
||
|
SWIFT
|
||
|
network, and want to transfer millions of dollars to the Def Con account?
|
||
|
Then you're just the person to attend!
|
||
|
|
||
|
What DEF CON is known for is the open discussion of all ideas, the free
|
||
|
environment to make new contacts and the lack of ego. More people have
|
||
|
made
|
||
|
great friends at DEF CON over the years than my brain can conceive of. DEF
|
||
|
CON is also known for letting the "Suits" (Government / Corporate) mix with
|
||
|
everyone and get an idea of what the scene is all about. The media makes
|
||
|
an
|
||
|
appearance every year and we try to educate them as to what is really going
|
||
|
on. Basically it has turned into the place to be if you are at all
|
||
|
interested in the computer underground.
|
||
|
|
||
|
[Note]----------------------------------------------------------------------
|
||
|
-
|
||
|
|
||
|
Now last year over 800 people showed up and threw my whole program for a
|
||
|
loop. I was thinking 500+ people, but when 800 showed up it got a little
|
||
|
crazy for the planning staff. This year I am planning for 1,000. This
|
||
|
way I will be able to accommodate everyone and have less logistical screw-
|
||
|
ups.
|
||
|
|
||
|
I would also like to apologize to everyone last year who had temporary
|
||
|
badges for half the convention, etc. I will do all that is possible for
|
||
|
maximum coolness, and minimum hassles. Anyway, enough of my shit, on with
|
||
|
the details.
|
||
|
|
||
|
[End
|
||
|
Note]-------------------------------------------------------------------
|
||
|
|
||
|
SPEAKERS:-------------------------------------------------------------------
|
||
|
-
|
||
|
|
||
|
Over the years DEF CON has had many notable speakers. This year there will
|
||
|
be more of an emphasis on technical talks. There will be a separate
|
||
|
smaller
|
||
|
room for break-out sessions of more specific topics. While the talks of
|
||
|
the
|
||
|
past have been great, it always seems some tech people drop out and general
|
||
|
talks fill in. I will load it tech heavy so when people do drop out there
|
||
|
will still be plenty of meat left for the propeller heads.
|
||
|
|
||
|
There will be some speaking on Friday evening before Hacker Jeopardy, all
|
||
|
day Saturday and Sunday. About 20 people will speak, plus smaller tech
|
||
|
sessions. If you are interested in speaking or demonstrating something
|
||
|
please contact me.
|
||
|
|
||
|
Current speakers include:
|
||
|
|
||
|
[> If you are interested in speaking please contact me at
|
||
|
dtangent@defcon.org
|
||
|
|
||
|
[> Nihil - Windows NT (in)security. The challenge response system, NT 5.0
|
||
|
Kerb security services, man in the middle attacks on domain controllers.
|
||
|
This will be a more technical discussion of NT related security.
|
||
|
|
||
|
[> Koresh - Hacking Novell Netware.
|
||
|
|
||
|
[> Yobie - Emerging infrastructures made possible by Java. He will describe
|
||
|
and talk about Java as the foundation for a global, object-oriented
|
||
|
distributed network. New concepts and computing paradigms will discussed
|
||
|
as well as applications for both applications development or straight-out
|
||
|
hacking.
|
||
|
|
||
|
[> Mudge - System Administrator for L0pht Heavy Industries. He will present
|
||
|
a technical talk on something cool.
|
||
|
|
||
|
[> Clovis - From the Hacker Jeopardy winning team. He will discuss issues
|
||
|
with security and networked object systems, looking at some of the
|
||
|
recent security issues found with activeX and detail some of the
|
||
|
potentials and problems with network objects. Topics will include
|
||
|
development of objects, distributed objects, standards, activex, corba,
|
||
|
and hacking objects.
|
||
|
|
||
|
[> Bruce Schneier - Author of Applied Cryptography and the Blowfish
|
||
|
algorithm - Why cryptography is harder than it looks.
|
||
|
|
||
|
[> FBI Computer Crime Squad - They will make another appearance this year
|
||
|
only if I can bribe them with the audio from last years convention. Can
|
||
|
I do it in time?
|
||
|
|
||
|
[> Richard Thieme - "The Dynamics of Social Engineering: a cognitive map for
|
||
|
getting what you need to know, working in networks, and engaging in
|
||
|
espionage quietly; the uses of paranoia, imagination, and grandiosity
|
||
|
to build the Big Picture.
|
||
|
|
||
|
[> G. Gillis - Packet Sniffing: He will define the idea, explain everything
|
||
|
from 802.2 frames down to the TCP datagram, and explain the mechanisms
|
||
|
(NIT, bpf) that different platforms provide to allow the hack.
|
||
|
|
||
|
[> Seven - What the feds think of us.
|
||
|
|
||
|
[> RK - Electronic countermeasures, counter espionage, risk management.
|
||
|
Should include a demonstration of electronic countermeasures equipment
|
||
|
as well as a talk on what works, what doesn't, and the industry.
|
||
|
|
||
|
[> Tom Farley the Publisher of the "Private Line" journal, and Ken
|
||
|
Kumasawa of TeleDesign Management - Toll Fraud in the 90s: Two
|
||
|
perspectives. An overview of phreaking from a hackers point of view and
|
||
|
an industry/security consultants point.
|
||
|
|
||
|
[> Michael Quattrocchi - The future of digital cash and a presentation about
|
||
|
the modernization and state of register-level debit cards; in effect
|
||
|
currently throughout Canada.
|
||
|
|
||
|
[> Ira Winkler - NCSA - Real life case studies of successful and
|
||
|
unsuccessful corporate espionage.
|
||
|
|
||
|
|
||
|
SCHEDULE:-------------------------------------------------------------------
|
||
|
-
|
||
|
|
||
|
FRIDAY: Network Setup, Sign in, Informal PGP Keysigning at the "PGP
|
||
|
table",
|
||
|
Lots of Partying. Capture the Flag Contest Starts at 16:00
|
||
|
|
||
|
On Friday there will be the demonstrations of the Radio Burst Cannon, a
|
||
|
"real" rail gun, and an omni-directional cell phone jammer. Times to be
|
||
|
announced.
|
||
|
|
||
|
10:00 - Doors open, sign in starts
|
||
|
10:00 - Movies start in main conference room
|
||
|
16:00 - Capture the Flag II starts
|
||
|
|
||
|
Breakout Tech Sessions:
|
||
|
|
||
|
19:00 - Tech Talks starts in break out room
|
||
|
|
||
|
24:00 (Midnight) Hacker Jeopardy Starts.
|
||
|
|
||
|
SATURDAY:
|
||
|
|
||
|
Speakers from 10:00 to 19:00 This is _NOT_ the order they will speak in.
|
||
|
|
||
|
10:00 - 10:50 Keynote (?)
|
||
|
11:00 - 11:50 Bruce Schneier
|
||
|
12:00 - 12:50 Yobie
|
||
|
13:00 - 13:50 Clovis
|
||
|
14:00 - 14:50 FBI Computer Crime Squad
|
||
|
15:00 - 15:50 Richard Theme
|
||
|
16:00 - 16:50 Seven
|
||
|
17:00 - 17:50 RK
|
||
|
18:00 - 18:50 Tom Farley
|
||
|
|
||
|
Breakout Tech Sessions:
|
||
|
|
||
|
Nihil
|
||
|
Koresh
|
||
|
Mudge
|
||
|
Weld Pond
|
||
|
G. Gillis
|
||
|
|
||
|
24:00 (Midnight) Final rounds of Hacker Jeopardy.
|
||
|
|
||
|
SUNDAY:
|
||
|
|
||
|
Speakers from 10:00 to 16:00 This is _NOT_ the order they will speak in.
|
||
|
|
||
|
10:00 - 10:50 Michael Q.
|
||
|
11:00 - 11:50 Ira Winkler
|
||
|
12:00 - 12:50
|
||
|
13:00 - 13:50
|
||
|
14:00 - 14:50
|
||
|
15:00 - 15:50
|
||
|
|
||
|
|
||
|
Breakout Tech Sessions:
|
||
|
|
||
|
|
||
|
|
||
|
16:00 Awards for Capture the Flag
|
||
|
End of it all, cleanup, etc. See you all next year!
|
||
|
|
||
|
EVENTS:---------------------------------------------------------------------
|
||
|
-
|
||
|
|
||
|
[> HACKER JEOPARDY:
|
||
|
|
||
|
Winn is back with Hacker Jeopardy!! The third year in the running!
|
||
|
Can the all-powerful Strat and his crypto-minion Erik, whose force
|
||
|
cannot be contained, be defeated?! Will the powers that be allow
|
||
|
Strat-Meister to dominate this beloved event for the third year in
|
||
|
a row?! Can Erik continue to pimp-slap the audience into submission
|
||
|
with a spoon in his mouth?!? Only Skill, Time, and booze will tell
|
||
|
the tail!
|
||
|
|
||
|
The Holy Cow will help supply the beer, you supply the answers.
|
||
|
The first round starts at 12 midnight o'clock on Friday and lasts
|
||
|
until it is done. The second and secret rounds will happen Saturday
|
||
|
at midnight.
|
||
|
|
||
|
6 teams will be picked at random and compete for the final round.
|
||
|
There can be only one! Strat's Team, the winners from last year
|
||
|
will defend if all the members can be found.
|
||
|
|
||
|
[> FREE BEER!
|
||
|
|
||
|
Holy Cow will provide free beer tickets! If you are over 21 prepare
|
||
|
to consume "hacker" beers. Actually it's whatever beer they have on
|
||
|
tap, but it's the best beer in Las Vegas. Follow Las Vegas Blvd. up
|
||
|
until you see the florescent cow with the big sunglasses. All taxi
|
||
|
drivers know of this Mecca. Over 1,000 free beers in all!
|
||
|
|
||
|
[> BLACK AND WHITE BALL:
|
||
|
|
||
|
We've talked it over, and the verdict is in. For the last two years
|
||
|
|
||
|
at DEF CON there has been a sort of unspoken Saturday night dress up
|
||
|
event. People have worn everything from party dresses and Tuxedoes
|
||
|
to AJ's ultra pimp Swank outfit with tiger print kilt. This year it
|
||
|
is official. Wear your cool shit Saturday night, be it gothic or
|
||
|
PVC
|
||
|
vinyl or Yakuza looking black MIBs. No prizes, just your chance to
|
||
|
be the uber-bustah pimp.
|
||
|
|
||
|
[> THE TCP/IP DRINKING GAME:
|
||
|
|
||
|
If you don't know the rules, you'll figure 'em out.
|
||
|
|
||
|
[> CAPTURE THE FLAG:
|
||
|
The second year of capture the flag is back. With the lessons
|
||
|
learned
|
||
|
from last year the contest should be more interesting and intense.
|
||
|
Up to six machines will be connected running different operating
|
||
|
systems. The object is to control as many machines as possible at
|
||
|
certain time periods. You can form teams or go it lone star. There
|
||
|
will be valuable cash prizes and redeemable coupons for those who
|
||
|
come in first and second, plus various runner up stuffs.
|
||
|
|
||
|
Four protocols (TCP/IP, NetBeui, IPX, and x.25! Yes, you heard
|
||
|
right, x.25) and three segments with 2 boxes per segment. Pick your
|
||
|
segment, protect your boxes. At all times you must have a WWW
|
||
|
server (port 80), finger, and mail working. There will be several
|
||
|
stock operating systems on the network including linux, FreeBsd,
|
||
|
Windows NT, Novell, Some Apple System 7.x, and who knows what else.
|
||
|
|
||
|
More specifics as time goes on.
|
||
|
|
||
|
[> VIRTUAL WORLD:
|
||
|
|
||
|
We are working on the group discounts like the last two years.
|
||
|
|
||
|
[> QUAKE COMPETITION:
|
||
|
|
||
|
http://www.ctive.com/ntech/defcon.htm
|
||
|
|
||
|
This year knightPhlight contacted me and wanted to organize a single
|
||
|
elimination Quake competition to find out who that badest ass 'mo
|
||
|
'fo
|
||
|
is. Check out the web site to get the rules, sign up, or to
|
||
|
donate a computer the greater good of destruction.
|
||
|
|
||
|
It is IMHO that Quake by id Software rules 3D action gaming. But who
|
||
|
rules Quake? We'll find out this July 11th-13th at the DefCon
|
||
|
Conference in Las Vegas. This isn't going to be a networked game
|
||
|
intent on quickly eliminating as many players as possible in a
|
||
|
single
|
||
|
round. Rather, one-on-one games will be played to absolutely
|
||
|
determine who the best really is.
|
||
|
|
||
|
Of course, you already know your the best so why would you feel
|
||
|
obligated to prove it? Because we'll give the first place winner
|
||
|
$750. Now, being the wily person you are, I bet you would like to
|
||
|
know where I got the money for the prizes. It'll come from your
|
||
|
registration fee of $7.50. Any half wit can do the math and see the
|
||
|
10,000% return for the winner. But just for entering you'll be in a
|
||
|
drawing for really kewl stuff. If you don't think its kewl you can
|
||
|
just give us your email address and we'll be happy to send you a
|
||
|
couple hundred thousand messages explaining why the prizes are
|
||
|
great.
|
||
|
|
||
|
[> NET CONNECTION:
|
||
|
|
||
|
This year we are pre-building many of the network boxes so the net
|
||
|
can go up first thing Friday. It looks like we will have a T1 line
|
||
|
and we will break it out to 10 BaseT hubs. If you want in on the
|
||
|
network bring along the appropriate cables and adapters.
|
||
|
|
||
|
More Net Madness! The T1 bandwidth will allow us to do the
|
||
|
following cool stuff:
|
||
|
|
||
|
- Have several color quickcams and a CU-SeeMe reflector site set
|
||
|
up so people not at the con can check out what's going on. During
|
||
|
the convention check out the DEF CON web site to get the location
|
||
|
of the reflector site. You should get and install the software
|
||
|
needed to view CU-SeeMe streams in advance!
|
||
|
|
||
|
- Have a RealAudio server set up to stream the speakers talks to
|
||
|
those who can not attend.
|
||
|
|
||
|
- Potentially play a competitive multi user game(s) over the net.
|
||
|
|
||
|
NOTE! If you wish to participate interactively with the convention
|
||
|
please e-mail me and we can coordinate something. It would be
|
||
|
great to get people from all over the world involved.
|
||
|
|
||
|
[> 5th ANNUAL SPOT THE FED CONTEST:
|
||
|
|
||
|
The ever popular paranoia builder. Who IS that person next to you?
|
||
|
|
||
|
"Like a paranoid version of pin the tail on the donkey, the
|
||
|
favorite sport at this gathering of computer hackers and phone
|
||
|
phreaks seems to be hunting down real and imagined telephone
|
||
|
security and Federal and local law enforcement authorities who the
|
||
|
attendees are certain are tracking their every move.. .. Of course,
|
||
|
they may be right."
|
||
|
- John Markhoff, NYT
|
||
|
|
||
|
Basically the contest goes like this: If you see some shady MIB
|
||
|
(Men in Black) earphone penny loafer sunglass wearing Clint Eastwood
|
||
|
to live and die in LA type lurking about, point him out. Just get
|
||
|
my attention and claim out loud you think you have spotted a fed.
|
||
|
The people around at the time will then (I bet) start to discuss the
|
||
|
possibility of whether or not a real fed has been spotted. Once
|
||
|
enough people have decided that a fed has been spotted, and the
|
||
|
Identified Fed (I.F.) has had a say, and informal vote takes place,
|
||
|
and if enough people think it's a true fed, or fed wanna-be, or
|
||
|
other nefarious style character, you win a "I spotted the fed!"
|
||
|
shirt, and the I.F. gets an "I am the fed!" shirt.
|
||
|
|
||
|
NOTE TO THE FEDS: This is all in good fun, and if you survive
|
||
|
unmolested and undetected, but would still secretly like an "I am
|
||
|
the fed!" shirt to wear around the office or when booting in doors,
|
||
|
please contact me when no one is looking and I will take your
|
||
|
order(s). Just think of all the looks of awe you'll generate at
|
||
|
work wearing this shirt while you file away all the paperwork
|
||
|
you'll have to produce over this convention. I won't turn in any
|
||
|
feds who contact me, they have to be spotted by others.
|
||
|
|
||
|
[> RAIL GUN DEMONSTRATION: (Friday)
|
||
|
|
||
|
On Friday afternoon there will be a demonstration of a hand held
|
||
|
rail gun. This garage project should be able to fire a graphite
|
||
|
washer very, very fast.
|
||
|
|
||
|
[> OMNIDIRECTIONAL CELL PHONE JAMMER DEMONSTRAITON: (Friday)
|
||
|
|
||
|
Another interesting creation to be tested on Friday in the desert.
|
||
|
Come along and watch you cell phone antenna explode with power!
|
||
|
See control channels crumble before you.
|
||
|
|
||
|
[> RADIO BURST CANNON DEMONSTRATION: (Friday)
|
||
|
|
||
|
While not quite a HERF gun, this should come close. The RBC should
|
||
|
be able to produce up to or less than one MegaWatt for up to or less
|
||
|
than one second. What will this do? Who knows! Come and find out.
|
||
|
Obviously the above demonstrations will take place away from the
|
||
|
local hospitals and casinos out in the desert someplace, so be
|
||
|
prepared.
|
||
|
|
||
|
|
||
|
HOTELS:---------------------------------------------------------------------
|
||
|
-
|
||
|
|
||
|
[> Book your room NOW!!! We have a block of rooms, but it is first come,
|
||
|
[> first served. Rooms get released about one month before the convention.
|
||
|
[> Book by June 9th or risk it. The room rates are quite cool this year.
|
||
|
|
||
|
|
||
|
PRIMARY HOTEL: The Aladdin Hotel and Casino
|
||
|
3667 Las Vegas Blvd. South, Las Vegas, Nevada
|
||
|
Built in 1966 it is one of the oldest hotels in Las Vegas that
|
||
|
hasn't been blown up to make room for newer ones. It is quite nice
|
||
|
and has Tennis courts, two swimming pools, Chinese, Vietnamese and
|
||
|
Korean. A Seafood and steakhouse, Joe's Diner and a 24 hour coffee
|
||
|
shop too. It's located next to the MGM Theme park on the strip.
|
||
|
|
||
|
PHONE: 1-800-225-2632, reference the "DC Communications conference"
|
||
|
for reservations.
|
||
|
|
||
|
RATES: Single & Double rooms are $65 in the Garden section, $85 for
|
||
|
the Tower. Suites are $250 to $350. All costs are plus 8% room
|
||
|
tax.
|
||
|
Rollaway beds are available for an additional $15 a night.
|
||
|
|
||
|
|
||
|
STUFF IN
|
||
|
VEGAS:--------------------------------------------------------------
|
||
|
|
||
|
URLs
|
||
|
|
||
|
Listings of other hotels in Las Vegas, their numbers, WWW pages, etc.
|
||
|
http://www.intermind.net/im/hotel.html
|
||
|
http://vegasdaily.com/HotelCasinos/HotelAndCasinos/CasinoList.html
|
||
|
|
||
|
VENDORS / SPONSORS /
|
||
|
RESEARCH:-----------------------------------------------
|
||
|
|
||
|
If you are interested in selling something (shirts, books,
|
||
|
computers, whatever) and want to get a table contact me for costs.
|
||
|
|
||
|
If you have some pet research and you want to have the participants
|
||
|
fill out anonymous questioners please contact me for the best way
|
||
|
to do this.
|
||
|
|
||
|
If you want to sponsor any event or part of DEF CON V in return for
|
||
|
favorable mentions and media manipulation please contact me. For
|
||
|
example in the past Secure Computing has sponsored a firewall
|
||
|
hacking contest.
|
||
|
|
||
|
MORE
|
||
|
INFO:-------------------------------------------------------------------
|
||
|
|
||
|
[> DEF CON Voice Bridge (801) 855-3326
|
||
|
|
||
|
This is a multi-line voice bbs, VMB and voice conference system.
|
||
|
There are 5 or so conference areas, with up to eight people on each
|
||
|
one. Anyone can create a free VMB, and there are different voice
|
||
|
bbs sections for separate topics. This is a good neutral meeting
|
||
|
place to hook up with others.
|
||
|
|
||
|
The Voice bridge will be changing numbers soon, but the old number
|
||
|
will refer you to the new location. The new spot won't suffer from
|
||
|
"Phantom" bridges!
|
||
|
|
||
|
[> MAILING LIST
|
||
|
|
||
|
send emial to majordomo@merde.dis.org and in the body of the
|
||
|
message
|
||
|
include the following on a separate line each.
|
||
|
|
||
|
subscribe dc-stuff
|
||
|
|
||
|
dc-announce is used for convention updates and major announcements,
|
||
|
dc-stuff is related to general conversation, planning rides and
|
||
|
rooms, etc.
|
||
|
|
||
|
[> WWW Site http://www.defcon.org/
|
||
|
|
||
|
Convention updates and archives from previous conventions are
|
||
|
housed
|
||
|
here. Past speakers, topics, and stuff for sale. Also a growing
|
||
|
section of links to other places of interest and current events.
|
||
|
|
||
|
[> The Third Annual California Car Caravan to DEF CON!
|
||
|
http://exo.com/~enigma/caravan/
|
||
|
|
||
|
[> The DEF CON V Car ride sharing page: Use this site to arrange ride
|
||
|
sharing to the convention from all over North America. If you can
|
||
|
spare a seat for someone, or need to leech a ride go to the ride
|
||
|
sharing page set up by Squeaky.
|
||
|
http://www.geocities.com/ResearchTriangle/4955/defcon.html
|
||
|
|
||
|
Room Sharing Page:
|
||
|
|
||
|
[> EMAIL dtangent@defcon.org
|
||
|
|
||
|
Send all email questions / comments to dtangent@defcon.org. It has
|
||
|
been said that my email is monitored by various people. If you
|
||
|
want
|
||
|
to say something private, please do so with my pgp key (At the
|
||
|
bottom of this announcement) I usually respond to everything, if
|
||
|
not I'm swamped or had a system problem.
|
||
|
|
||
|
[> SNAIL MAIL
|
||
|
|
||
|
Send all written materials, pre-registrations, etc. to:
|
||
|
DEF CON, 2709 E. Madison, Seattle WA, 98112
|
||
|
If you are pre-registering for $30 please make payable to DEF CON
|
||
|
and include a name to which you want the registration to apply.
|
||
|
I don't respond to registrations unless you request.
|
||
|
|
||
|
DO YOU WANT TO
|
||
|
HELP?---------------------------------------------------------
|
||
|
|
||
|
Here is what you can do if you want to help out or participate in
|
||
|
some way:
|
||
|
|
||
|
Donate stuff for the continuous give-aways and the various
|
||
|
contests.
|
||
|
Got extra ancient stuff, or new cool stuff you don't use anymore?
|
||
|
Donate it to a good cause! One person was very happy over winning
|
||
|
an osborne "portable" computer.
|
||
|
|
||
|
ORGANIZE sharing a room or rides with other people in your area.
|
||
|
Join the mailing list and let people know you have floor space or
|
||
|
some extra seats in your car. Hey, what's the worst that can
|
||
|
happen besides a trashed hotel room or a car-jacking?
|
||
|
|
||
|
CREATE questions for hacker jeopardy (you know how the game is
|
||
|
played) and email them to winn@infowar.com. No one helped out last
|
||
|
year, so this year let's try. Everything from "Famous narks" to
|
||
|
"unix bugs" is fair game.
|
||
|
|
||
|
BRING a machine with a 10bt interface card, and get on the local
|
||
|
network, trade pgp signatures, etc.
|
||
|
|
||
|
FINAL CHECK LIST OF STUFF TO
|
||
|
BRING:------------------------------------------
|
||
|
|
||
|
MY PGP
|
||
|
KEY:------------------------------------------------------------------
|
||
|
|
||
|
- -----BEGIN PGP PUBLIC KEY BLOCK-----
|
||
|
Version: 2.6.1
|
||
|
|
||
|
mQCNAy6v5H8AAAEEAJ7xUzvdRFMtJW3CLRs2yXL0BC9dBiB6+hAPgBVqSWbHWVIT
|
||
|
/5A38LPA4zqeGnGpmZjGev6rPeFEGxDfoV68voLOonRPcea9d/ow0Aq2V5I0nUrl
|
||
|
LKU7gi3TgEXvhUmk04hjr8Wpr92cTEx4cIlvAeyGkoirb+cihstEqldGqClNAAUR
|
||
|
tCZUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
|
||
|
=ngNC
|
||
|
- -----END PGP PUBLIC KEY BLOCK-----
|
||
|
|
||
|
-----BEGIN PGP SIGNATURE-----
|
||
|
Version: 2.6.2
|
||
|
|
||
|
iQCVAwUBM07aS8tEqldGqClNAQFuSAQAjwGLBdDKA9TKTNAxewgeluvRXPFu+cLf
|
||
|
hQ74qJFtGybyik+Te4FPQI3Uw+wjir/4ES1imyjQ9n9oIOh+E0L3moYxbcQKN7iT
|
||
|
/VWAJXwPNJR8guxGcrRNYO85KXSB2qFrU9JwCwJ/8C5lEi/5FVjqRewpliw68+SW
|
||
|
9jHqxFccQUs=
|
||
|
=PPpy
|
||
|
-----END PGP SIGNATURE-----
|
||
|
|
||
|
EOF
|