Computer underground Digest Sun Feb 22, 1998 Volume 10 : Issue 13 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #10.13 (Sun, Feb 22, 1998) File 1--Bruce Sterling's Closing Sppech / CFP '98 File 2--cDc Global Domination Update #24 File 3--"Intranet Security: Stories from the Trenches", Linda McCarthy File 4--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sat, 21 Feb 1998 18:27:04 -0800 (PST) From: Jim Thomas <jthomas@well.com> Subject: File 1--Bruce Sterling's Closing Sppech / CFP '98 CFP Closing Speech, Austin, Feb 20, 1998 Literary Freeware -- Not for Commercial Use Hi, my name's Bruce Sterling, I'm a local writer and a CFP veteran. I'm grateful for this chance to once again bring you the fabulous benefits of my freelance pontifications. When I first got involved in the computer civil liberties scene, it was 1990. We'd just had a Secret Service raid here in Austin that had shut down a science fiction publisher. This was a strange and rude intrusion in my daily life, this was an advent calculated to waken me from my dogmatic slumbers. The more I learned about this computer crime raid, the more peculiar and significant it seemed. I ended up writing an entire book about it. I was hoping the book would encourage some informed debate, and maybe the deeper political issues behind the computer revolution could somehow all be put straight. Now, eight years later, almost to the day, we have these four hundred interested and relevant parties all meeting here in Austin to get together face to face and thrash some of these things out. And you can even earn legal credit for it. This gives me a warm sense of closure, a very fulfilled feeling. There's plenty of thrash at CFP. There's always a lot of thrash. Very interesting thrash. Not a lot of permanent legal results, though. If you glance back over the past eight years and examine the whole enterprise to date, what you see is very remarkable. In the world of computers, privacy, and freedom, crises go in and out of vogue, but they are very rarely settled in any permanent legislative way. The only real permanence is the thrash itself. I'd go so far as to call this a new status quo. Permanent technological revolution. Permanent thrash. I was very intrigued by the remarkable presentation of our first keynote speaker, Mr. Kahin. It was a very congenial and gentle speech: "modest" was a word he used a lot. I don't think I've ever, ever heard an Administration science and technology expert describe the aims of American government as "modest." This was a remarkable confession this gentleman was making. In so many words, he said that policy development is cyberspace is just plain too hard to do. There are too many competing values to achieve a workable political balance. The Administration is simply too overwhelmed by all this random electronic thrashing, all this buzzing and bleeping. So they'll simply modestly step back and let the mighty forces of technology and private enterprise thrash the situation out on their own. And maybe twenty years from now, when things calm down and get safer for elected American politicians, we may see some actual laws passed. Well, of course this statement is very good news for the techno-libertarian post-industrial contingent. Really, there ought to be corks popping in the offices of WIRED magazine over this keynote speech. The Bay Area WIRED folks are very into all this: emergence, and market power, and bottom-up entrepreneurism, and the sublime beauty of nonlinear network economics that are profoundly Out of Control. And let's face it, after that stinking Decency Act debacle, a hands-off policy smells terrific. I think you can make some good arguments that there are aspects of reality that governments should be very modest about. Our keynote speaker pointed out that the real nodes in the World Wide Web are words. Hotlinked key words. So this isn't merely chips and wires that we are talking about. This is language. When government tries to regulate and police the structure of language, this is generally considered to be double-plus ungood. There's a long tradition of restraint and modesty here. The First Amendment may be a local ordinance, but it's clearly served us rather well, and the First Amendment says, "make no law." Be modest. Make no law. But point of view is worth eighty IQ points. From another point of view, to say that American government should be modest in a flagship technology is a very weird thing to say. I have never before heard a federal official confess that some aspect of industrial development is simply beyond the mental grasp of government. That it just plain moves too fast to figure out, so we might as well throw up our hands and step back out of its way. This is a radical admission to make. It's very out of the ordinary. Rocket scientists are said to be pretty smart people, but that didn't lead the federal government to declare that NASA is impossible to manage politically, so that rockets should be best left to Westinghouse and General Dynamics. I don't think there are many Congressmen who fully grasp quantum chromodynamics, either. But you would never see the Administration say that quarks are too complex for government, and that relativity and subatomic physics should be left to the greater wisdom of the private sector. But that's the Internet policy. No actual government. Some form of emergent self-regulating governance. To me, that was the core message of CFP 98. They really are just plain giving up. That was the mellow, birdlike sound of the twilight of sovereignty. The era of big government is over; the era of puzzled, shrunken, benignly indifferent government is at hand. It's the giant sucking sound of abdicated responsibility. So what fills the power vacuum? I would argue that it is already being filled by a different and more modern political arrangement: not bureaucracy, but ad-hocracy. I believe that the best known ad-hocracy, the classic version, and certainly the one that gets the most admiring press, is the internet engineering task force. These guys get plenty of ink for their wonderful, cooperative, networking, non-governmental, emergent, non-hierarchical way of organizing their enterprise. They're a role model, a paradigm even. And that management model seems to work pretty well on the Internet. What do ad-hocracies look like in other contexts? Say, a business context. I would argue that Silicon Valley is a giant ad-hocracy. You see a particularly virulent aspect of this, in weird, market-bubble, casino-economy, Silicon Valley IPOs. Esther Dyson wrote a quite good article about this in the New York Times recently, in which she pointed out that many Silicon Valley companies are basically digital paper-tigers. They don't actually develop and sell products. Not even software, not even ones and zeros. They simply pitch high-concepts, sell stock in the vaporware, cash out for the venture capitalists behind the curtain, and then they are acquired by larger firms. If you look for an actual industrial enterprise, something with deliverables and a cash flow, there's simply no there there. Hollywood film production companies are long-established ad-hocracies. Show business has always been good at this. The entertainment industry. The military-entertainment complex. You're pitchforking a bunch of freelancers together, exposing some film, using the movie as the billboard to sell the ancillary rights, and after the thing gets slotted to video, everybody just vanishes. But in the political realm, I would argue that America's most famous and powerful ad-hocracy is that nebulous entity that our First Lady refers to as "the massive right-wing conspiracy." And here we find our flagship industry giving an odd little lurch. That's the grating sound of a postindustrial iceberg hitting us below the waterline. It's not pleasant to have the established order seriously menaced and frightened by their sense of a covert conspiracy. I don't believe in conspiracy in the grand Joseph McCarthy paranoiac tradition, but I do believe in a real and powerful right-wing ad-hocracy of Clinton's political enemies. I think it's self-evident, it doesn't challenge my credulity. I think these right-wing activist people are basically very much like CFP. They're all on each other's Rolodexes, they're all on each other's mailing lists, they all know each others' funding agencies, think tanks and industrial backers. And when anything, no matter how far-fetched or bizarre, comes up that might conceivably harm the President, that information is disseminated around the country and around the world at lightning speed. It's data-mined, and catalogued, and embroidered, and re-cycled, and re-circulated endlessly, and spun and spun and spun. The "massive right-wing conspiracy" is what our friends at the infowar contingent at RAND corporation like to call a "segmented, polycephalous influence network." It's a loosely linked, leaderless enterprise which is constructed rather like an art movement, or a literary movement. It doesn't have elections, laws, bylaws, a code of ethics, a code of morals, or any kind of brakes. It can't be defeated militarily any more than Russians could defeat Afghan guerrillas or Americans defeat the Viet Cong. And this isn't merely a theoretical exercise. The thing is as real as dirt. It has real power. You don't have to stretch too far to perceive this as a menace to democracy. It's certainly a real and visible menace to the established order, because it can throw sand in the works at any of a hundred different points, and there's no headquarters where the established order can hit back. When the established order hits back, it hits back with another, rival ad-hocracy. You may have seen James Carville -- a very interesting and significant postmodern figure -- appearing on television to publicly declare war on the Ken Starr investigation. I noticed some pundits scoffing at this declaration -- "Carville thinks he's in the bunker! Carville thinks he's an army! The Cajun's off his rocker!" This scoffing has a very hollow sound to me. It reminds me of Stalin asking how many divisions the Pope has. The Pope doesn't use divisions, Comrade Stalin. But the Pope knows the ground in Poland, and he can put a stake through your undead heart with no problem. James Carville has never been elected to any office. As far as I can see, James Carville has no legitimate or constitutional role in our society whatsoever. All James Carville possesses is a deep knowledge of the media, a gift for spin, a big Rolodex, and a lot of people who owe him favors. Oh, and a law degree, too, somewhere at the bottom of the list. But when the Clinton Administration goes to the mattresses, this guy is the *first* guy they call. You're not going to see James Carville declaring large areas of American reality off limits because they are beyond his mental grasp. You're not going to see James Carville declaring that he ought to be modest, and let the info-pundits and the venture capitalists decide what to do with digital media. The guy will do with digital media what he does with *all* media, bend it to his own uses. This is what ad-hocratic political power looks like in a heavily mediated and thoroughly networked society. I don't know what you call that form of power, but it sure doesn't look like anything I recognize from a high-school civics text. And it's not unique to the United States. Prime Minister Blair has proved that it works great in Britain. If you want to see how it develops in another social context -- a deeply non-American context -- take a good look at postmodern Russia. Yeltsin's campaign manager is a man named Anatoly Chubais, the Carville of Russia. This man is basically running the entire Russian government off of his laptop. I happen to have a very warm and kindly feeling about literary movements. I'd hate for the government to think that my cyberpunk literary ad-hocracy was some kind of organized menace against civil order, and that we should all be grilled in Congress by an unAmerican activities committee. It might be kind of an honor -- for a Texan writer it would be quite an honorable thing to walk down the trail of tears with John Henry Faulk and J. Frank Dobie -- but I don't think this would be a political plus for the American Republic. But I think it can be demonstrated that ad-hocracy can be a living menace to civil order. Let's take the Lewinsky wiretapping business. For eight years I've been to CFP, and for eight years I've heard the law and order contingent tell us that wiretapping is the only sure weapon against mafias, dope runners, terrorists and child pornographers. I don't remember Presidential sex partners being on that list, but it's getting pretty clear to rest of us that they are way, way up there as targets of opportunity. Here we've got a wiretapping development that may bring down an Administration, annul two elections, and plunge our country into years of debilitating public shame and trauma. You know, if terrorists or dope dealers did us a grievous harm like that, we'd pursue those evil sons of bitches to the ends of the earth. But instead it's our Justice Department, in league with a networked rabble of oppo research freaks with a sick need to monitor and surveill people's sex lives. Hey, thanks a lot, Mr. Law-and-Order Body-Wire. I'm sure my two innocent daughters will sleep a lot safer in their beds after you've ritually sacrificed the nation's chief executive in a neurotic orgy of national sex panic. After this gratifying experience, I'm anxious to see your wiretapping powers expanded radically, so that more American women, and their mothers, can be turned into felons for lying about their sex lives. You guys need more plug-in jacks and headphones, it's important for our nation's safety and stability. So after you clean that prurient filth off your tape heads, tell me just one more time why you're so eager to have Digital Telephony. It's very much a pattern. National moral sex panics have definite political advantages. Ad-hocracies specialize in this sort of agitation. The Christian right specializes in provoking reflexive loathing for homosexuality. For years we've seen law enforcement trumpet the terrifying menace of child pornography on computer networks. If a rightist adhocracy can checkmate the king through a mini-Profumo scandal, it's going to be open season on politician's sex lives for as far as the eye can see. What is all this about, what's the commonality here? It's a profoundly undemocratic process of shutting down informed debate by cynically exploiting sexual hot-button issues. We're supposed to be so panicked and stampeded by the specter of kidporn that we somehow miss the fact that the FBI is installing a Walkman jack in our phones. You see, it's just plain too complicated and technical for us to make up our minds about! So let's just panic! At least we can provoke some vigorous action that way. There's a flipside to the government's public abdication of competence to regulate and judge. It's the unspeakable, invisible, national-security underworld. Wired Power without the inconvenience of democracy. The taps, the tapes, the dossiers, ECHELON, the secret war against crypto -- none of this is remotely democratic. This is a frozen Cold War underworld accountable to none. If we can't regulate ourselves in an open, above-board fashion, spooks traditionally expand to fill the power vacuum. I would argue that in a true information society, private spookdom is bound to flourish. We all take on a mild flavor of spy. The walls between spy, journalist, pundit, spin-doctor, guru, opinion leader, and political operative become ever more vaporous. Don't believe me? Look around yourself. The day may come when powerful ad-hocracies abandon the pretence of legality, and simply crush public figures to death with the raw pressure of surveillance. In much the same way that Princess Di and her scandalous boy-toy were bloodily crushed to death by the sheer pressure of tabloid harassment. Or it may be that ad-hocracies will display some real benefits for real-world public order. We might see ad-hocracies for sewage lines, or ad-hocracies for railroads and highways and electrical power. People have been talking electronic democracy for quite a while now. It looks good on paper, or maybe it would be more accurate to say that it looks good glowing on a screen. But where's the demo? I've yet to see even the smallest American town, or the smallest unit of actual functional government, becoming fully electronic. Virtual communities -- they don't seem to be living up to their hype. They seem to work just about as well as other traditional American intentional communities. Pilgrim pioneers, hippie communes, Amish barn-raisings... these things are hard work. Most Americans prefer TVs to quilting bees. Most Americans want to kick back in the suburbs and have entertainment piped in. And virtual communities have never worked out their bad apple problem, their free rider problem. Spam has damaged USENET in ways that malicious hackers could only dream about. Network ad-hocracies are very good at forming a hostile overlay over the deeper infrastructure. They don't seem to be much good at all at forming structures themselves. Because ladies and gentlemen, real political structures have *structure!* They have laws, regulations, rights, grants of citizenship, constitutions, true faith and allegiance. It's hard to fake all those things with a Rolodex, an email list, and a starry-eyed sense of techno-optimistic benevolence. You know, the computer revolution really loves itself. It's all about publicity really, it's about moving data fast and cheap, so maybe it's only natural that it gets entranced by its own hype. But you know, this isn't the last technological revolution that you and I are going to witness. When I turn my eyes to the future, I really have to wonder what kind of precedent we're setting here. What kind of precedent are we bequeathing to the organizers and attendees of "Biotech Freedom and Privacy?" Because you can smell that one on the wind. You got the medical priesthood under seige by eager entrepreneurs, tremendous market demand, bathtub genetic sequencers, cheaper and cheaper equipment, cloned sheep on the front page, activists like Kevorkian and Richard Seed all ready to jump out of their basements and carry out a propaganda of the deed.... And we already know what outlaw pharmaceuticals look like. These cats aren't like computer outlaws, guys who are nine-tenths teenage ideologue. These dope people have revenue streams bigger than countries and they play for keeps. I would also point out that this very week the FBI did us the favor of busting a couple of biowar militia freaks. There's often some kind of loudly trumpeted FBI action during Computers Freedom and Privacy. Usually it's a computer bust. This time it's anthrax. You can take that little chunk of data and make of it what you may. But maybe the next techno-revolution won't play out like this one. It may be that there is something unique and special about the world of computation. We can't seem to build permanent structures; so maybe we're not a permanent problem. Come the year 2000, we may well find that some large percentage of the planet's installed computers simply cease to work. Computation may be America's flagship industry, but when you see how people live in computation, they're not like the settled aristocrats on the first class deck of the Titanic. They're a lot like the post-iceberg Titanic. They have a raft called the IBM mainframe, and then another raft called Apple II, and then a raft called Macintosh, and then they make a frantic leap sideways to Windows 95, dropping heaven only knows how much precious data in the transfer. And those who somehow fall overboard, end up stiff and pale and bobbing in the chill dark waters of technical obsolescence. Maybe that's what we have to offer to the future here at CFP. Pundits destined to sink without a trace, our solemn pontie all take on a mild flavor of spy. The walls between spy, journalist, pundit, spin-doctor, guru, opinion leader, and political operative become ever more vaporous. Don't believe me? Look around yourself. The day may come when powerful ad-hocracies abandon the pretence of legality, and simply crush public figures to death with the raw pressure of surveillance. In much the same way that Princess Di and her scandalous boy-toy were bloodily crushed to death by the sheer pressure of tabloid harassment. Or it may be that ad-hocracies will display some real benefits for real-world public order. We might see ad-hocracies for sewage lines, or ad-hocracies for railroads and highways and electrical power. People have been talking electronic democracy for quite a while now. It looks good on paper, or maybe it would be more accurate to say that it looks good glowing on a screen. But where's the demo? I've yet to see even the smallest American town, or the smallest unit of actual functional government, becoming fully electronic. Virtual communities -- they don't seem to be living up to their hype. They seem to work just about as well as other traditional American intentional communities. Pilgrim pioneers, hippie communes, Amish barn-raisings... these things are hard work. Most Americans prefer TVs to quilting bees. Most Americans want to kick back in the suburbs and have entertainment piped in. And virtual communities have never worked out their bad apple problem, their free rider problem. Spam has damaged USENET in ways that malicious hackers could only dream about. Network ad-hocracies are very good at forming a hostile overlay over the deeper infrastructure. They don't seem to be much good at all at forming structures themselves. Because ladies and gentlemen, real political structures have *structure!* They have laws, regulations, rights, grants of citizenship, constitutions, true faith and allegiance. It's hard to fake all those things with a Rolodex, an email list, and a starry-eyed sense of techno-optimistic benevolence. You know, the computer revolution really loves itself. It's all about publicity really, it's about moving data fast and cheap, so maybe it's only natural that it gets entranced by its own hype. But you know, this isn't the last technological revolution that you and I are going to witness. When I turn my eyes to the future, I really have to wonder what kind of precedent we're setting here. What kind of precedent are we bequeathing to the organizers and attendees of "Biotech Freedom and Privacy?" Because you can smell that one on the wind. You got the medical priesthood under seige by eager entrepreneurs, tremendous market demand, bathtub genetic sequencers, cheaper and cheaper equipment, cloned sheep on the front page, activists like Kevorkian and Richard Seed all ready to jump out of their basements and carry out a propaganda of the deed.... And we already know what outlaw pharmaceuticals look like. These cats aren't like computer outlaws, guys who are nine-tenths teenage ideologue. These dope people have revenue streams bigger than countries and they play for keeps. I would also point out that this very week the FBI did us the favor of busting a couple of biowar militia freaks. There's often some kind of loudly trumpeted FBI action during Computers Freedom and Privacy. Usually it's a computer bust. This time it's anthrax. You can take that little chunk of data and make of it what you may. But maybe the next techno-revolution won't play out like this one. It may be that there is something unique and special about the world of computation. We can't seem to build permanent structures; so maybe we're not a permanent problem. Come the year 2000, we may well find that some large percentage of the planet's installed computers simply cease to work. Computation may be America's flagship industry, but when you see how people live in computation, they're not like the settled aristocrats on the first class deck of the Titanic. They're a lot like the post-iceberg Titanic. They have a raft called the IBM mainframe, and then another raft called Apple II, and then a raft called Macintosh, and then they make a frantic leap sideways to Windows 95, dropping heaven only knows how much precious data in the transfer. And those who somehow fall overboard, end up stiff and pale and bobbing in the chill dark waters of technical obsolescence. Maybe that's what we have to offer to the future here at CFP. Pundits destined to sink without a trace, our solemn pontifications reduced to the weightless state of so much long-forgotten newsgroup chatter. No monument, just the churn. Floppies change shape and won't fit the new machines, CD-ROMs flake apart and delaminate. And government was wisest just to step back and let us be. We're glad they didn't have to warp the Constitution to fit our peculiar needs, because when it was all summed up in retrospect, we were gone like the 17-year cicada. But you know -- I can live with that. I prefer evanescence to catastrophe. When I think about all the scaremongering, and alarm stories, and gloomy predictions about computer crime that I've had to absorb over the past eight years, I feel very proud of the American republic. I think we've done an incredible job of assimilating this technology. When I went to CFP One, that event was a total freak scene. There were convicted criminals and their arresting officers buying each other drinks in the bar. In newpaper stories of 1990 you had to define the word "modem." But here we are eight years later and websurfing is a genuinely popular enterprise, it's like Monday Night Football or country line-dancing. I can live with hype, as long as we have a chance to keep making new mistakes. Sure, we've got ad-hocracies scurrying around in the woodwork destabilizing the American democratic process, but let's get real. This is America we're talking about. It's seen hard times and hard, hard tests. Slavery, civil war. Machine politics, the Tweed Ring, Tammany Hall, Chicago in the 20s. Jim Crow. Watergate. Texas state politics. Louisiana politics, for heaven's sake. The railroads, the steel mills, the robber barons. The military industrial complex. We survived all that. We look good now. We have resilience. We toughed it out. We have hope as a culture, we're not afraid to reinvent ourselves. We make ludicrous spectacles of ourselves that cause civilized people to wonder if we've lost our minds, but there's nothing new about that. It's what Americans always do. Let's look at the general situation here, the big picture. Stock market at an all time high. Balanced federal budget, practically kind of. We even have patches of deflation. Deflation! I'm a middle-aged man and I never in my life saw deflation, I thought it was a mythical beast. And there's jobs, even! They may be burn-out jobs in the high-end sector, with burger-flipping service jobs at the low end, but hey, at least there's work around. The computer industry is a very strange flagship industry to have, but Dell is headquartered in Austin, and Dell just set a bunch of new sales records. It's an industry! The Texas oil industry smells really bad. The Texas cattle industry has screwflies, brucellosis and droughts. I'm down with this Texas chip and computer thing. It's working out down here. In fact, I really suspect that this historical moment may be a little Golden Age for our community. Compared to what else has been going on, and compared to what else may be coming, this seems like a little Belle Epoque. We're no longer so eccentric that we seem freakish, and yet we have not yet settled down quite so much that we've become wallpaper. The electronic frontier is no longer a howling wilderness, and it hasn't yet matured into a decaying rust-belt slum. We've really got it good! When it's all said and done, my primary concern in the year 1998 is that we ought to be enjoying this more. I think the computer community just plain works too hard. We're all wrapped up in the eighty-hour weeks, and the piles of mounting email, and the constantly bleeping cellphones. We need to learn to kick back. We need to live less like galley slaves and more like human beings. We may never have it this good again. That's why I've made it my personal goal at this CFP to try and buy everybody a beer. The con's over now, our beloved CFP ad-hocracy is shutting down for another twelve months. There's one important thing about ad-hocracies, a charming quality they have. If you just get them outside of the video surveillance, and away from their podiums and microphones, and add a little social lubricant in the form of a couple of beers, they spontaneously disintegrate into parties. And I don't mean grim, committed, political parties. I mean good old-fashioned yahoo-style parties. When you come right down to it, virtual communities are a pretty thin and cerebral parody of actual communities. But I can slap a patch on that problem right now. You're in my home town. This is Austin. Slackerville. Berkeley on the Colorado. Come on out of the public spotlight, let's mosey on over to my house and let our hair down. It's not a black-tie do, it's very laid back and Texan. You're gonna have to twist off your own beer caps and nibble your own chips and sandwiches, but at least you can wear whatever the hell you want. Expectations are low, and the entry barriers are nonexistent. Nancy and I will be glad to have you. Let's get actually communal, let's have a little life-affirming celebration. Let's tie one on. So I dunno about you, but I'm outta here. Last guy out of the building has to log off and shut down! ------------------------------ Date: Fri, 20 Feb 1998 22:33:13 -0800 (PST) From: editor@CULTDEADCOW.COM Subject: File 2--cDc Global Domination Update #24 FOR IMMEDIATE RELEASE GLOBAL DOMINATION UPDATE _______________ http://www.cultdeadcow.com/cDc_files/ ____________________ _ _ ((___)) [ x x ] cDc Communications \ / Global Domination Update #24 (' ') February 15th, 1998 (U) Est. 1984 - * - Busy, busy, busy. The file-packs took a back-seat for a bit during the holiday season and the mad dash to an undisclosed location in the French Quarter for HoHoCon '97! Unfortunately, this time it was invite-only. Thanks to everyone who attended for making it the best HoHoCon yet! Here's a coupla files. Practice your phonics. ________________________________/text files\________________________________ 346:"The Man With The Creosote Grin" by Oxblood Ruffin. 347:"SPANK MY MONKEY" by Lady Carolin. 348:"When Cults Collide" by The Nightstalker. 349:"High School Reunion: The Nardcore Adventures of Reid Fleming" by Reid Fleming. 350:"Where Have My Heroes Gone?" by KSM. File submissions: editor@cultdeadcow.com - * - Thanks to the following items of influence this time around: WAREZ: dFx's STICKFIGHTER XXIX PRINT: _Apocalypse WOW_ by James Finn Garner MUSIC: Weasel MX RERUNS: Hogan's Heroes and The Six Million Dollar Man BEVERAGES: Coca Cola straight-up. _______________________________/ - x X x - \________________________________ Fools better recognize: CULT OF THE DEAD COW is a gift to the women of this world and the trademark of cDc communications. Established in 1984, the cDc is the largest and oldest krewe in telecom, inventor of the e-zine and stool loosener to sysadmins everywhere. Each and every issue is produced on an Apple II for genuine effect. Yo, bee-atch! Find the flavor at these fine locations: World Wide Web: http://www.cultdeadcow.com http://www.L0pht.com/cdc.html FTP/Gopher: ftp://ftp.cultdeadcow.com/cDc Usenet: alt.fan.cult-dead-cow BBS: 806/794-4362 Entry:KILL Any questions, jackass? Grandmaster Ratte' cDc/Phat Daddy & Pontiff Email: gratte@cultdeadcow.com Postal: POB 53011, Lubbock, TX, 79453, USA "cDc. Hyperbole is our business." _____________________________________________________________________________ Copyright(c)1998 Oxblood Ruffin, Straight Buttah & cDc communications ------------------------------ Date: Mon, 16 Feb 1998 08:39:27 -0800 From: "Rob Slade" <rslade@sprint.ca> Subject: File 3--"Intranet Security: Stories from the Trenches", Linda McCarthy BKINTRSC.RVW 971122 "Intranet Security: Stories from the Trenches", Linda McCarthy, 1998, 0-13-894759-7, U$29.95/C$41.95 %A Linda McCarthy %C One Lake St., Upper Saddle River, NJ 07458 %D 1998 %G 0-13-894759-7 %I Prentice Hall %O U$29.95/C$41.95 800-576-3800 201-236-7139 fax: +1-201-236-7131 %O betsy_carey@prenhall.com %P 260 p. %T "Intranet Security: Stories from the Trenches" Data security is more than somewhat akin to the weather. Many people talk a good line about how important it is to their company, but few invest the time, money, vigour, and rigour to make it really effective. There are some very good, practical, computer security books on the market. Leaving aside the really bad ones, though, there are also a great number of works that take a rather pompous academic approach to the concepts only, leaving the actual details of real dangers and protection as an exercise to the reader. McCarthy takes a different tack. Each chapter in this book is an authentic case study, with the names changed to protect the unfortunate. While this means that the text can't be easily used as a reference, with quick indexing of specific tasks, the content is firmly based in the real world, and informed with the author's insights into how people actually do react in an emergency. Techies may be unhappy with the lack of technical details in the inquiries. Too bad. Security is much more of a management issue than a technical one, and the stories show that clearly. The result is, therefore, much closer to "Digital Woes" (cf. BKDGTLWO.RVW) or "Computer-Related Risks" (cf. BKCMRLRS.RVW) than, say, "Practical UNIX and Internet Security" (cf. BKPRUISC.RVW). The book is also very readable. The chapters follow a format that includes a fictional worst case scenario, then presents the incident itself, gives a summary of the problems that led to the predicament, and finally suggestions for avoiding the trouble. The text is almost light, and loaded with personal entries both as observations of company situations and lively trivia. (I, too, have a sister much younger than I am.) Each investigation is chosen with a view to emphasizing a particular security problem or issue. Chapter one shows that without an incident response procedure, and exception report communications, even detection of attacks can fail to protect the enterprise. The danger of shrink-wrapped, out-of-the-box solutions is demonstrated in chapter two. As I noted at the beginning, data security gets a lot of lip service, particularly from management. Chapter three reveals the wrong way for executives to promote security--and also tells you how to do it right. Security requires a cooperative effort, as chapter four points out, and failure to specify areas of responsibility can result in loopholes and vulnerabilities. Chapter five looks at another area that gets more speeches than spending--training. Risk assessment, and the risk of not assessing risks, is the theme of chapter six. Where chapter four looks at the negligence in determining roles with respect to security, chapter seven finds that drawing the lines too finely can also result in gaps in coverage and protection. Over the years I have railed against antivirus procedures that are not effective because they are too draconian for people to actually use if they want to get work done. Chapter eight discloses the problem with unrealistic policies in any field of security. As chapters four and seven point out the potential difficulties where individual partners each leave security to the other, so chapter nine demonstrates the same problem between companies doing business together. Chapter ten points out the importance of encryption--the backbone of all data security--in every area of corporate activity. Finally, the techies can be happy with chapter eleven. It gives a detailed log of a system penetration. I will forgive McCarthy her use of the term "hacker" (she does mention the hacker/cracker controversy) for someone bent on security breaking, since she so forcefully derides the image of the invader as an "evil genius." An appendix provides contact information for tools, products, incident response teams, and security organizations. I was rather disappointed to find that Internet references for a number of the tools do not specify full location information, that relatively few security organizations are listed, that the antiviral systems mentioned are not of the top rank, and, most important of all, none of the international emergency response teams are from Canada. This book belongs on every security and management bookshelf. For the non-specialist manager, it provides enough background to prompt the right questions and concerns. For the head down data security specialist ... when was it you needed to make that pitch to the executive committee? copyright Robert M. Slade, 1997 BKINTRSC.RVW 971122 ====================== rslade@vcn.bc.ca rslade@sprint.ca slade@freenet.victoria.bc.ca BCVAXLUG Admin Chair http://peavine.com/bcvaxlug/ DECUS Canada Communications, Desktop, Education and Security groups ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 4--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #10.13 ************************************