Tillbaka till svenska Fidonet
English   Information   Debug  
OS2PROG   0/36
OS2REXX   0/113
OS2USER-L   207
OS2   0/4786
OSDEBATE   0/18996
PASCAL   0/490
PERL   0/457
PHP   0/45
POINTS   0/405
POLITICS   22588/29554
POL_INC   0/14731
PSION   103
R20_ADMIN   1123
R20_AMATORRADIO   0/2
R20_BEST_OF_FIDONET   13
R20_CHAT   0/893
R20_DEPP   0/3
R20_DEV   399
R20_ECHO2   1379
R20_ECHOPRES   0/35
R20_ESTAT   0/719
R20_FIDONETPROG...
...RAM.MYPOINT
  0/2
R20_FIDONETPROGRAM   0/22
R20_FIDONET   0/248
R20_FILEFIND   0/24
R20_FILEFOUND   0/22
R20_HIFI   0/3
R20_INFO2   3250
R20_INTERNET   0/12940
R20_INTRESSE   0/60
R20_INTR_KOM   0/99
R20_KANDIDAT.CHAT   42
R20_KANDIDAT   28
R20_KOM_DEV   112
R20_KONTROLL   0/13300
R20_KORSET   0/18
R20_LOKALTRAFIK   0/24
R20_MODERATOR   0/1852
R20_NC   76
R20_NET200   245
R20_NETWORK.OTH...
...ERNETS
  0/13
R20_OPERATIVSYS...
...TEM.LINUX
  0/44
R20_PROGRAMVAROR   0/1
R20_REC2NEC   534
R20_SFOSM   0/341
R20_SF   0/108
R20_SPRAK.ENGLISH   0/1
R20_SQUISH   107
R20_TEST   2
R20_WORST_OF_FIDONET   12
RAR   0/9
RA_MULTI   106
RA_UTIL   0/162
REGCON.EUR   0/2056
REGCON   0/13
SCIENCE   0/1206
SF   0/239
SHAREWARE_SUPPORT   0/5146
SHAREWRE   0/14
SIMPSONS   0/169
STATS_OLD1   0/2539.065
STATS_OLD2   0/2530
STATS_OLD3   0/2395.095
STATS_OLD4   0/1692.25
SURVIVOR   0/495
SYSOPS_CORNER   0/3
SYSOP   0/84
TAGLINES   0/112
TEAMOS2   0/4530
TECH   0/2617
TEST.444   0/105
TRAPDOOR   0/19
TREK   0/755
TUB   0/290
UFO   0/40
UNIX   0/1316
USA_EURLINK   0/102
USR_MODEMS   0/1
VATICAN   0/2740
VIETNAM_VETS   0/14
VIRUS   0/378
VIRUS_INFO   0/201
VISUAL_BASIC   0/473
WHITEHOUSE   0/5187
WIN2000   0/101
WIN32   0/30
WIN95   0/4289
WIN95_OLD1   0/70272
WINDOWS   0/1517
WWB_SYSOP   0/419
WWB_TECH   0/810
ZCC-PUBLIC   0/1
ZEC   4

 
4DOS   0/134
ABORTION   0/7
ALASKA_CHAT   0/506
ALLFIX_FILE   0/1313
ALLFIX_FILE_OLD1   0/7997
ALT_DOS   0/152
AMATEUR_RADIO   0/1039
AMIGASALE   0/14
AMIGA   0/331
AMIGA_INT   0/1
AMIGA_PROG   0/20
AMIGA_SYSOP   0/26
ANIME   0/15
ARGUS   0/924
ASCII_ART   0/340
ASIAN_LINK   0/651
ASTRONOMY   0/417
AUDIO   0/92
AUTOMOBILE_RACING   0/105
BABYLON5   0/17862
BAG   135
BATPOWER   0/361
BBBS.ENGLISH   0/382
BBSLAW   0/109
BBS_ADS   0/5290
BBS_INTERNET   0/507
BIBLE   0/3563
BINKD   0/1119
BINKLEY   0/215
BLUEWAVE   0/2173
CABLE_MODEMS   0/25
CBM   0/46
CDRECORD   0/66
CDROM   0/20
CLASSIC_COMPUTER   0/378
COMICS   0/15
CONSPRCY   0/899
COOKING   33431
COOKING_OLD1   0/24719
COOKING_OLD2   0/40862
COOKING_OLD3   0/37489
COOKING_OLD4   0/35496
COOKING_OLD5   9370
C_ECHO   0/189
C_PLUSPLUS   0/31
DIRTY_DOZEN   0/201
DOORGAMES   0/2065
DOS_INTERNET   0/196
duplikat   6002
ECHOLIST   0/18295
EC_SUPPORT   0/318
ELECTRONICS   0/359
ELEKTRONIK.GER   1534
ENET.LINGUISTIC   0/13
ENET.POLITICS   0/4
ENET.SOFT   0/11701
ENET.SYSOP   33946
ENET.TALKS   0/32
ENGLISH_TUTOR   0/2000
EVOLUTION   0/1335
FDECHO   0/217
FDN_ANNOUNCE   0/7068
FIDONEWS   24159
FIDONEWS_OLD1   0/49742
FIDONEWS_OLD2   0/35949
FIDONEWS_OLD3   0/30874
FIDONEWS_OLD4   0/37224
FIDO_SYSOP   12852
FIDO_UTIL   0/180
FILEFIND   0/209
FILEGATE   0/212
FILM   0/18
FNEWS_PUBLISH   4436
FN_SYSOP   41708
FN_SYSOP_OLD1   71952
FTP_FIDO   0/2
FTSC_PUBLIC   0/13615
FUNNY   0/4886
GENEALOGY.EUR   0/71
GET_INFO   105
GOLDED   0/408
HAM   0/16075
HOLYSMOKE   0/6791
HOT_SITES   0/1
HTMLEDIT   0/71
HUB203   466
HUB_100   264
HUB_400   39
HUMOR   0/29
IC   0/2851
INTERNET   0/424
INTERUSER   0/3
IP_CONNECT   719
JAMNNTPD   0/233
JAMTLAND   0/47
KATTY_KORNER   0/41
LAN   0/16
LINUX-USER   0/19
LINUXHELP   0/1155
LINUX   0/22112
LINUX_BBS   0/957
mail   18.68
mail_fore_ok   249
MENSA   0/341
MODERATOR   0/102
MONTE   0/992
MOSCOW_OKLAHOMA   0/1245
MUFFIN   0/783
MUSIC   0/321
N203_STAT   930
N203_SYSCHAT   313
NET203   321
NET204   69
NET_DEV   0/10
NORD.ADMIN   0/101
NORD.CHAT   0/2572
NORD.FIDONET   189
NORD.HARDWARE   0/28
NORD.KULTUR   0/114
NORD.PROG   0/32
NORD.SOFTWARE   0/88
NORD.TEKNIK   0/58
NORD   0/453
OCCULT_CHAT   0/93
OS2BBS   0/787
OS2DOSBBS   0/580
OS2HW   0/42
OS2INET   0/37
OS2LAN   0/134
Möte POLITICS, 29554 texter
 lista första sista föregående nästa
Text 23873, 1159 rader
Skriven 2006-10-15 15:51:16 av Sean Dennis (1:18/200.0)
Ärende: Cybersecurity and other computer security risks
=======================================================
Hello, All.

Since we like to chew on all things political, I'm posting a monthly digest I
get called Cypto-Gram by one of the foremost computer security experts in the
field, Bruce Schneier.  This is a LONG (over 1200 lines) post, so I apologize
in advance for this if it breaks readers.

However, it contains lots of good information that I'm sure all of you will
find a position on and even some rather frightening things occuring in the name
of security.  It's an excellent read.

If this bothers anyone with its length, I won't post it in here again.  I just
wanted to try it to see if anyone else found this interesting.

===Cut===
                  CRYPTO-GRAM

                October 15, 2006

               by Bruce Schneier
                Founder and CTO
       Counterpane Internet Security, Inc.
            schneier@counterpane.com
             http://www.schneier.com
            http://www.counterpane.com


A free monthly newsletter providing summaries, analyses, insights, and 
commentaries on security: computer and otherwise.

For back issues, or to subscribe, visit 
<http://www.schneier.com/crypto-gram.html>.

You can read this issue on the web at 
<http://www.schneier.com/crypto-gram-0610.html>.  These same essays 
appear in the "Schneier on Security" blog: 
<http://www.schneier.com/blog>.  An RSS feed is available.


** *** ***** ******* *********** *************

In this issue:
      Screening People with Clearances
      Did Hezbollah Crack Israeli Secure Radio?
      Renew Your Passport Now!
      Faulty Data and the Arar Case
      Crypto-Gram Reprints
      Expensive Cameras in Checked Luggage
      Facebook and Data Control
      Indexes to NSA Publications Declassified and Online
      News
      Pupillometer
      On-Card Displays
      Screaming Cell Phones
      Counterpane News
      FairUse4WM News
      Voting Software and Secrecy
      Torture Bill as C Code
      The Doghouse: SecureRF
      Bureau of Industry and Security Hacked
      University Networks and Data Security
      Comments from Readers


** *** ***** ******* *********** *************

      Screening People with Clearances



Why should we waste time at airport security, screening people with U.S. 
government security clearances? This perfectly reasonable question was 
asked recently by Robert Poole, director of transportation studies at 
The Reason Foundation, as he and I were interviewed by WOSU Radio in Ohio.

Poole argued that people with government security clearances, people who 
are entrusted with U.S. national security secrets, are trusted enough to 
be allowed through airport security with only a cursory screening. 
They've already gone through background checks, he said, and it would be 
more efficient to concentrate screening resources on everyone else.

To someone not steeped in security, it makes perfect sense. But it's a 
terrible idea, and understanding why teaches us some important security 
lessons.

The first lesson is that security is a system. Identifying someone's 
security clearance is a complicated process. People with clearances 
don't have special ID cards, and they can't just walk into any secured 
facility. A clearance is held by a particular organization -- usually 
the organization the person works for -- and is transferred by a 
classified message to other organizations when that person travels on 
official business.

Airport security checkpoints are not set up to receive these clearance 
messages, so some other system would have to be developed.

Of course, it makes no sense for the cleared person to have his office 
send a message to every airport he's visiting, at the time of travel. 
Far easier is to have a centralized database of people who are cleared. 
But now you have to build this database. And secure it. And ensure that 
it's kept up to date.

Or maybe we can create a new type of ID card: one that identifies people 
with security clearances. But that also requires a backend database and 
a card that can't be forged. And clearances can be revoked at any time, 
so there needs to be some way of invalidating cards automatically and 
remotely.

Whatever you do, you need to implement a new set of security procedures 
at airport security checkpoints to deal with these people. The 
procedures need to be good enough that people can't spoof it. Screeners 
need to be trained. The system needs to be tested.

What starts out as a simple idea -- don't waste time searching people 
with government security clearances -- rapidly becomes a complicated 
security system with all sorts of new vulnerabilities.

The second lesson is that security is a trade-off. We don't have 
infinite dollars to spend on security. We need to choose where to spend 
our money, and we're best off if we spend it in ways that give us the 
most security for our dollar.

Given that very few Americans have security clearances, and that 
speeding them through security wouldn't make much of a difference to 
anyone else standing in line, wouldn't it be smarter to spend the money 
elsewhere? Even if you're just making trade-offs about airport security 
checkpoints, I would rather take the hundreds of millions of dollars 
this kind of system could cost and spend it on more security screeners 
and better training for existing security screeners. We could both speed 
up the lines and make them more effective.

The third lesson is that security decisions are often based on 
subjective agenda. My guess is that Poole has a security clearance -- he 
was a member of the Bush-Cheney transition team in 2000 -- and is 
annoyed that he is being subjected to the same screening procedures as 
the other (clearly less trusted) people he is forced to stand in line 
with. From his perspective, not screening people like him is obvious. 
But objectively it's not.

This issue is no different than searching airplane pilots, something 
that regularly elicits howls of laughter among amateur security 
watchers. What they don't realize is that the issue is not whether we 
should trust pilots, airplane maintenance technicians or people with 
clearances. The issue is whether we should trust people who are dressed 
as pilots, wear airplane-maintenance-tech IDs or claim to have clearances.

We have two choices: Either build an infrastructure to verify their 
claims, or assume that they're false. And with apologies to pilots, 
maintenance techs and people with clearances, it's cheaper, easier and 
more secure to search you all.

This essay originally appeared on Wired.com.
http://www.wired.com/news/columns/1,71906-0.html


** *** ***** ******* *********** *************

      Did Hezbollah Crack Israeli Secure Radio?



According to Newsday:

"Hezbollah guerrillas were able to hack into Israeli radio 
communications during last month's battles in south Lebanon, an 
intelligence breakthrough that helped them thwart Israeli tank assaults, 
according to Hezbollah and Lebanese officials.

"Using technology most likely supplied by Iran, special Hezbollah teams 
monitored the constantly changing radio frequencies of Israeli troops on 
the ground. That gave guerrillas a picture of Israeli movements, 
casualty reports and supply routes. It also allowed Hezbollah anti-tank 
units to more effectively target advancing Israeli armor, according to 
the officials."

Read the article.  Basically, the problem is operational error:

"With frequency-hopping and encryption, most radio communications become 
very difficult to hack. But troops in the battlefield sometimes make 
mistakes in following secure radio procedures and can give an enemy a 
way to break into the frequency-hopping patterns. That might have 
happened during some battles between Israel and Hezbollah, according to 
the Lebanese official. Hezbollah teams likely also had sophisticated 
reconnaissance devices that could intercept radio signals even while 
they were frequency-hopping."

I agree with The Register:  "Claims that Hezbollah fighters were able to 
use this intelligence to get some intelligence on troop movement and 
supply routes are plausible, at least to the layman, but ought to be 
treated with an appropriate degree of caution as they are substantially 
corroborated by anonymous sources."

But I have even more skepticism.  If indeed Hezbollah was able to do 
this, the last thing they want is for it to appear in the press.  But if 
Hezbollah can't do this, then a few good disinformation stories are a 
good thing.

http://www.newsday.com/news/printedition/stories/ny-wocode184896831sep18,0,709
19 66,print.story 
or http://tinyurl.com/jncdk
http://www.theregister.co.uk/2006/09/20/hezbollah_cracks_israeli_radio/


** *** ***** ******* *********** *************

      Renew Your Passport Now!



If you have a passport, now is the time to renew it -- even if it's not 
set to expire anytime soon. If you don't have a passport and think you 
might need one, now is the time to get it. In many countries, including 
the United States, passports will soon be equipped with RFID chips. And 
you don't want one of these chips in your passport.

RFID stands for "radio-frequency identification." Passports with RFID 
chips store an electronic copy of the passport information: your name, a 
digitized picture, etc. And in the future, the chip might store 
fingerprints or digital visas from various countries.

By itself, this is no problem. But RFID chips don't have to be plugged 
in to a reader to operate. Like the chips used for automatic toll 
collection on roads or automatic fare collection on subways, these chips 
operate via proximity. The risk to you is the possibility of 
surreptitious access: Your passport information might be read without 
your knowledge or consent by a government trying to track your 
movements, a criminal trying to steal your identity or someone just 
curious about your citizenship.

At first the State Department belittled those risks, but in response to 
criticism from experts it has implemented some security features. 
Passports will come with a shielded cover, making it much harder to read 
the chip when the passport is closed. And there are now access-control 
and encryption mechanisms, making it much harder for an unauthorized 
reader to collect, understand and alter the data.

Although those measures help, they don't go far enough. The shielding 
does no good when the passport is open. Travel abroad and you'll notice 
how often you have to show your passport: at hotels, banks, Internet 
cafes. Anyone intent on harvesting passport data could set up a reader 
at one of those places. And although the State Department insists that 
the chip can be read only by a reader that is inches away, the chips 
have been read from many feet away.

The other security mechanisms are also vulnerable, and several security 
researchers have already discovered flaws. One found that he could 
identify individual chips via unique characteristics of the radio 
transmissions. Another successfully cloned a chip. The State Department 
called this a "meaningless stunt," pointing out that the researcher 
could not read or change the data. But the researcher spent only two 
weeks trying; the security of your passport has to be strong enough to 
last 10 years.

This is perhaps the greatest risk. The security mechanisms on your 
passport chip have to last the lifetime of your passport. It is as 
ridiculous to think that passport security will remain secure for that 
long as it would be to think that you won't see another security update 
for Microsoft Windows in that time. Improvements in antenna technology 
will certainly increase the distance at which they can be read and might 
even allow unauthorized readers to penetrate the shielding.

Whatever happens, if you have a passport with an RFID chip, you're 
stuck. Although popping your passport in the microwave will disable the 
chip, the shielding will cause all kinds of sparking. And although the 
United States has said that a nonworking chip will not invalidate a 
passport, it is unclear if one with a deliberately damaged chip will be 
honored.

The Colorado passport office is already issuing RFID passports, and the 
State Department expects all U.S. passport offices to be doing so by the 
end of the year. Many other countries are in the process of changing 
over. So get a passport before it's too late. With your new passport you 
can wait another 10 years for an RFID passport, when the technology will 
be more mature, when we will have a better understanding of the security 
risks and when there will be other technologies we can use to cut the 
risks. You don't want to be a guinea pig on this one.

This op-ed originally appeared in the Washington Post.
http://www.washingtonpost.com/wp-dyn/content/article/2006/09/15/AR200609150092
3. html

Rebuttal:
http://www.mercurynews.com/mld/mercurynews/news/opinion/15637460.htm

My previous writings on RFID passports:
http://www.schneier.com/blog/archives/2006/08/hackers_clone_r.html
http://www.schneier.com/blog/archives/2004/10/rfid_passports.html
http://www.schneier.com/blog/archives/2005/04/rfid_passport_s.html
http://www.schneier.com/essay-060.html 
http://www.schneier.com/blog/archives/2005/08/rfid_passport_s_1.html


** *** ***** ******* *********** *************

      Faulty Data and the Arar Case



Maher Arar is a Syrian-born Canadian citizen.  On September 26, 2002, he 
tried to fly from Switzerland to Toronto.  Changing planes in New York, 
he was detained by the U.S. authorities, and eventually shipped to Syria 
where he was tortured.  He's 100% innocent.

The Canadian government has completed its "Commission of Inquiry into 
the Actions of Canadian Officials in Relation to Maher Arar," the 
results of which are public.  From their press release:  "On Maher Arar, 
the Commissioner comes to one important conclusion: 'I am able to say 
categorically that there is no evidence to indicate that Mr. Arar has 
committed any offence or that his activities constitute a threat to the 
security of Canada.'"

Certainly something that everyone who supports the U.S.'s right to 
detain and torture people without having to demonstrate their guilt 
should think about.  But what's more interesting to readers of this blog 
is the role that inaccurate data played in the deportation and 
ultimately torture of an innocent man.

Privacy International summarizes the report.  These are among their 
bullet points:

"The RCMP provided the U.S. with an entire database of information 
relating to a terrorism investigation (three CDs of information), in a 
way that did not comply with RCMP policies that require screening for 
relevance, reliability, and personal information. In fact, this action 
was without precedent.

"The RCMP provided the U.S. with inaccurate information about Arar that 
portrayed him in an infairly negative fashion and overstated his 
importance to a RCMP investigation. They included some 'erroneous notes.'

"While he was detained in the U.S., the RCMP provided information 
regarding him to the U.S. Federal Bureau of Investigation (FBI), 'some 
of which portrayed him in an inaccurate and unfair way.' The RCMP 
provided inaccurate information to the U.S. authorities that tended to 
link Arar to other terrorist suspects; and told the U.S. authorities 
that Arar had previously refused to be interviewed, which was also 
incorrect; and the RCMP also said that soon after refusing the interview 
he suddenly left Canada for Tunisia. 'The statement about the refusal to 
be interviewed had the potential to arouse suspicion, especially among 
law enforcement officers, that Mr. Arar had something to hide.' The 
RCMP's information to the U.S. authorities also placed Arar in the 
vicinity of Washington DC on September 11, 2001 when he was instead in 
California."

Judicial oversight is a security mechanism.  It prevents the police from 
incarcerating the wrong person.  The point of habeas corpus is that the 
police need to present their evidence in front of a neutral third party, 
and not indefinitely detain or torture people just because they believe 
they're guilty.  We are all less secure if we water down these security 
measures.

Background:
http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-543297 
or http://tinyurl.com/yl4s9y

Government report:
http://www.ararcommission.ca/eng/index.htm
http://www.ararcommission.ca/eng/ReleaseFinal_Sept18.pdf

Privacy International:
http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-543296 
or http://tinyurl.com/yfd6zb

Judicial oversight:
http://www.schneier.com/essay-045.html


** *** ***** ******* *********** *************

      Crypto-Gram Reprints



Crypto-Gram is currently in its ninth year of publication.  Back issues 
cover a variety of security-related topics, and can all be found on 
<http://www.schneier.com/crypto-gram-back.html>.  These are a selection 
of articles that appeared in this calendar month in other years.

Phishing:
http://www.schneier.com/crypto-gram-0510.html#1

Secure Flight Working Group Report:
http://www.schneier.com/crypto-gram-0510.html#10

Judge Roberts, Privacy, and the Future:
http://www.schneier.com/crypto-gram-0510.html#16

Keeping Network Outages Secret:
http://www.schneier.com/crypto-gram-0410.html#2

RFID Passports:
http://www.schneier.com/crypto-gram-0410.html#3

The Legacy of DES:
http://www.schneier.com/crypto-gram-0410.html#8

Wholesale Surveillance:
http://www.schneier.com/crypto-gram-0410.html#10
http://www.schneier.com/crypto-gram-0410.html#11

Academic Freedom and Security:
http://www.schneier.com/crypto-gram-0410.html#13

The Future of Surveillance:
http://www.schneier.com/crypto-gram-0310.html#1

National Strategy to Secure Cyberspace:
http://www.schneier.com./crypto-gram-0210.html#1

Cyberterrorism:
http://www.schneier.com/crypto-gram-0110.html#1

Dangers of Port 80
http://www.schneier.com/crypto-gram-0110.html#9

Semantic Attacks:
http://www.schneier.com/crypto-gram-0010.html#1

NSA on Security:
http://www.schneier.com/crypto-gram-0010.html#7

So, You Want to be a Cryptographer:
http://www.schneier.com/crypto-gram-9910.html#SoYouWanttobeaCryptographer 
or http://tinyurl.com/8tk8t

Key Length and Security:
http://www.schneier.com/crypto-gram-9910.html#KeyLengthandSecurity

Steganography: Truths and Fictions:
http://www.schneier.com/crypto-gram-9810.html#steganography

Memo to the Amateur Cipher Designer:
http://www.schneier.com/crypto-gram-9810.html#cipherdesign


** *** ***** ******* *********** *************

      Expensive Cameras in Checked Luggage



This is a blog post about the problems of being forced to check 
expensive camera equipment on airplanes:

"Well, having lived in Kashmir for 12+ years I am well accustomed to 
this type of security. We haven't been able to have hand carries since 
1990. We also cannot have batteries in any of our equipment checked or 
otherwise. At least we have been able to carry our laptops on and 
recently been able to actually use them (with the batteries). But, if 
things keep moving in this direction, and I'm sure it will, we need to 
start thinking now about checking our cameras and computers and how to 
do it safely. This is a very unpleasant idea. Two years ago I ordered a 
Canon 20D and had it "hand carried" over to meet me in England by a 
friend. My friend put it in their checked bag. The bag never showed up. 
She did not have insurance and all I got $100 from British Airways for 
the camera and $500 from American Express (buyers protection) that was 
it. So now it looks as if we are going to have to check our cameras and 
our computers involuntarily. OK here are a few thoughts."

Pretty basic stuff, and we all know about the risks of putting expensive 
stuff in your checked luggage.

The interesting part is one of the blog comments, about halfway down. 
Another photographer wonders if the TSA rules for firearms could be 
extended to camera equipment:

"Why not just have the TSA adopt the same check in rules for 
photographic and video equipment as they do for firearms?

"All firearms must be in checked baggage, no carry on.

"All firearms must be transported in a locked, hard sided case using a 
non-TSA approved lock. This is to prevent anyone from opening the case 
after its been screened.

"After bringing the equipment to the airline counter and declaring and 
showing the contents to the airline representative, you take it over to 
the TSA screening area where it is checked by a screener, relocked in 
front of you, your key or keys returned to you (if it's not a 
combination lock) and put directly on the conveyor belt for loading onto 
the plane.

"No markings, stickers or labels identifying what's inside are put on 
the outside of the case or, if packed inside something else, the bag.

"Might this solve the problem? I've never lost a firearm when flying."

Then someone has the brilliant suggestion of putting a firearm in your 
camera-equipment case:

"A 'weapons' is defined as a rifle, shotgun, pistol, airgun, and STARTER 
PISTOL. Yes, starter pistols -- those little guns that fire blanks at 
track and swim meets -- are considered weapons...and do NOT have to be 
registered in any state in the United States.

"I have a starter pistol for all my cases. All I have to do upon 
check-in is tell the airline ticket agent that I have a weapon to 
declare...I'm given a little card to sign, the card is put in the case, 
the case is given to a TSA official who takes my key and locks the case, 
and gives my key back to me.

"That's the procedure. The case is extra-tracked...TSA does not want to 
lose a weapons case. This reduces the chance of the case being lost to 
virtually zero.

"It's a great way to travel with camera gear...I've been doing this 
since Dec 2001 and have had no problems whatsoever."

I have to admit that I am impressed with this solution.

http://blogs.lexar.com/mattbrandon/2006/08/tighter_securit.html


** *** ***** ******* *********** *************

      Facebook and Data Control



Earlier this month, the popular social networking site Facebook learned 
a hard lesson in privacy.  It introduced a new feature called "News 
Feeds" that shows an aggregation of everything members do on the site: 
added and deleted friends, a change in relationship status, a new 
favorite song, a new interest, etc.  Instead of a member's friends 
having to go to his page to view any changes, these changes are all 
presented to them automatically.

The outrage was enormous.  One group, Students Against Facebook News 
Feeds, amassed over 700,000 members.  Members planned to protest at the 
company's headquarters.  Facebook's founder was completely stunned, and 
the company scrambled to add some privacy options.

Welcome to the complicated and confusing world of privacy in the 
information age.  Facebook didn't think there would be any problem; all 
it did was take available data and aggregate it in a novel way for what 
it perceived was its customers' benefit.  Facebook members instinctively 
understood that making this information easier to display was an 
enormous difference, and that privacy is more about control than about 
secrecy.

But on the other hand, Facebook members are just fooling themselves if 
they think they can control information they give to third parties.

Privacy used to be about secrecy.  Someone defending himself in court 
against the charge of revealing someone else's personal information 
could use as a defense the fact that it was not secret.  But clearly, 
privacy is more complicated than that.  Just because you tell your 
insurance company something doesn't mean you don't feel violated when 
that information is sold to a data broker.  Just because you tell your 
friend a secret doesn't mean you're happy when he tells others.  Same 
with your employer, your bank, or any company you do business with.

But as the Facebook example illustrates, privacy is much more complex. 
It's about who you choose to disclose information to, how, and for what 
purpose.  And the key word there is "choose."  People are willing to 
share all sorts of information, as long as they are in control.

When Facebook unilaterally changed the rules about how personal 
information was revealed, it reminded people that they weren't in 
control.  Its eight million members put their personal information on 
the site based on a set of rules about how that information would be 
used.  It's no wonder those members -- high school and college kids who 
traditionally don't care much about their own privacy -- felt violated 
when Facebook changed the rules.

Unfortunately, Facebook can change the rules whenever it wants.  Its 
Privacy Policy is 2,800 words long, and ends with a notice that it can 
change at any time.  How many members ever read that policy, let alone 
read it regularly and check for changes?  Not that a Privacy Policy is 
the same as a contract.  Legally, Facebook owns all data members upload 
to the site.  It can sell the data to advertisers, marketers, and data 
brokers.  (Note: there is no evidence that Facebook does any of this.) 
It can allow the police to search its databases upon request.  It can 
add new features that change who can access what personal data, and how.

But public perception is important.  The lesson here for Facebook and 
other companies -- for Google and MySpace and AOL and everyone else who 
hosts our e-mails and webpages and chat sessions -- is that people 
believe they own their data.  Even though the user agreement might 
technically give companies the right to sell the data, change the access 
rules to that data, or otherwise own that data, we -- the users -- 
believe otherwise.  And when we who are affected by those actions start 
expressing our views -- watch out.

What Facebook should have done was add the feature as an option, and 
allow members to opt in if they wanted to.  Then, members who wanted to 
share their information via News Feeds could do so, and everyone else 
wouldn't have felt that they had no say in the matter.  This is 
definitely a gray area, and it's hard to know beforehand which changes 
need to be implemented slowly and which won't matter.  Facebook, and 
others, need to talk to its members openly about new features. 
Remember: members want control.

The lesson for Facebook members might be even more jarring: if they 
think they have control over their data, they're only deluding 
themselves.  They can rebel against Facebook for changing the rules, but 
the rules have changed, regardless of what the company does.

Whenever you put data on a computer, you lose some control over it. And 
when you put it on the internet, you lose a lot of control over it. 
News Feeds brought Facebook members face to face with the full 
implications of putting their personal information on Facebook. It had 
just been an accident of the user interface that it was difficult to 
aggregate the data from multiple friends into a single place.  And even 
if Facebook eliminates News Feeds entirely, a third party could easily 
write a program that does the same thing.  Facebook could try to block 
the program, but would lose that technical battle in the end.

We're all still wrestling with the privacy implications of the Internet, 
but the balance has tipped in favor of more openness.  Digital data is 
just too easy to move, copy, aggregate, and display.  Companies like 
Facebook need to respect the social rules of their sites, to think 
carefully about their default settings -- they have an enormous impact 
on the privacy mores of the online world -- and to give users as much 
control over their personal information as they can.

But we all need to remember that much of that control is illusory.

This essay originally appeared on Wired.com.
http://www.wired.com/news/columns/0,71815-0.html

http://www.danah.org/papers/FacebookAndPrivacy.html
http://www.motherjones.com/interview/2006/09/facebook.html
http://www.nytimes.com/2006/09/10/fashion/10FACE.html?ei=5090&en=ccb86e3d53ca6
71
f&ex=1315540800&adxnnl=1&partner=rssuserland&emc=rss&adxnnlx=1160759797-MRZvPT
2R gJLviJ0Z11NuRQ 
or http://tinyurl.com/ycwl6o
http://berkeley.facebook.com/group.php?gid=2208288769
http://blog.facebook.com/blog.php?post=2208197130
http://blog.facebook.com/blog.php?post=2208562130
http://mashable.com/2006/08/25/facebook-profile

Facebook privacy policy:
http://www.facebook.com/policy.php


** *** ***** ******* *********** *************

      Indexes to NSA Publications Declassified and Online



In May 2003, Michael Ravnitzky submitted a Freedom of Information Act 
(FOIA) request to the National Security Agency for a copy of the index 
to their historical reports at the Center for Cryptologic History and 
the index to certain journals:  the NSA Technical Journal and the 
Cryptographic Quarterly.  These journals had been mentioned in the 
literature but are not available to the public.  Because he thought NSA 
might be reluctant to release the bibliographic indexes, he also asked 
for the table of contents to each issue.

The request took more than three years for them to process and 
declassify -- sadly, not atypical -- and during the process they asked 
if he would accept the indexes in lieu of the tables of contents pages: 
specifically, the cumulative indices that included all the previous 
material in the earlier indices.  He agreed, and got them last month. 
The results are online.

This is just a sampling of some of the article titles from the NSA 
Technical Journal:  "The Arithmetic of a Generation Principle for an 
Electronic Key Generator" - "CATNIP: Computer Analysis - Target Networks 
Intercept Probability" - "Chatter Patterns: A Last Resort" - "COMINT 
Satellites - A Space Problem" - "Computers and Advanced Weapons Systems" 
- "Coupon Collecting and Cryptology" - "Cranks, Nuts, and Screwballs" - 
"A Cryptologic Fairy Tale" - "Don't Be Too Smart" - "Earliest 
Applications of the Computer at NSA" - "Emergency Destruction of 
Documents" - "Extraterrestrial Intelligence" - "The Fallacy of the 
One-Time-Pad Excuse" - "GEE WHIZZER" - "The Gweeks Had a Gwoup for It" - 
"How to Visualize a Matrix" - "Key to the Extraterrestrial Messages" - 
"A Mechanical Treatment of Fibonacci Sequences" - "Q.E.D.- 2 Hours, 41 
Minutes" - "SlGINT Implications of Military Oceanography" - "Some 
Problems and Techniques in Bookbreaking" - "Upgrading Selected US Codes 
and Ciphers with a Cover and Deception Capability" - "Weather: Its Role 
in Communications Intelligence" - "Worldwide Language Problems at NSA"

In the materials the NSA provided, they also included indices to two 
other publications: Cryptologic Spectrum and Cryptologic Almanac.

The indices to Cryptologic Quarterly and NSA Technical Journal have 
indices by title, author, and keyword. The index to Cryptologic Spectrum 
has indices by author, title, and issue.

Consider these bibliographic tools as stepping stones.  If you want an 
article, send a FOIA request for it.  Send a FOIA request for a dozen. 
There's a lot of stuff here that would help elucidate the early history 
of the agency and some interesting cryptographic topics.

Thanks, Mike, for doing this work.

http://www.thememoryhole.org/nsa/bibs.htm


** *** ***** ******* *********** *************

      News


More on the HP spying scandal:
http://www.schneier.com/blog/archives/2006/09/more_on_the_hp.html

Cybercrime is moving up in the criminal food chain: more organized crime 
syndicates are getting involved:
http://www.wired.com/news/wireservice/0,71793-0.html
I've been saying this sort of thing for years, and have long complained 
that cyberterrorism gets all the press, while cybercrime is the real 
threat.  I don't think this article is fear and hype; it's a real problem.

You can program an ATM to believe that $20 bills are $5 bills, and then 
withdraw four times the money you're entitled to.  It's surprisingly 
easy, actually.
http://www.schneier.com/blog/archives/2006/09/programming_atm.html

People applying for a U.S. visa have to answer this question:  "Have you 
ever been arrested of convicted for any offense or crime, even through 
subject of a pardon, amnesty or other similar legal action?  Have you 
ever unlawfully distributed or sold a controlled substance (drug), or 
been a prostitute or procurer for prostitutes?"
And this question:  "Did you seek to enter the United States to engage 
in export control violations, subversive or terrorist activities, or any 
other unlawful purpose? Are you a member or representative of a 
terrorist organization as currently designated by the U.S. Secretary of 
State?  Have you ever participated in persecutions directed by the Nazi 
government or Germany; or have you ever participated in genocide?"
http://www.schneier.com/blog/archives/2006/09/us_visa_applica.html

Germans are spying on British trash.  You just can't make this stuff up:
http://www.thisislondon.co.uk/news/article-23364736-details/Spy+in+your+wheeli
e+ bin/article.do 
or http://tinyurl.com/f9fx4

An anonymous note in the Harvard Law Review argues that there is a 
significant benefit from Internet attacks:
http://www.harvardlawreview.org/issues/119/june06/note/immunizing_the_internet
.p df 
or http://tinyurl.com/e7pkf

You can open a car door in only 3,129 button presses.  On the average, 
it should take half that. (Article is from 2004.)
http://everything2.com/index.pl?node_id=1520430

Torpark is a free anonymous web browser.  It's based on a portable 
version of Firefox, runs on a USB drive so it leaves no traces on the 
PC, and uses the TOR network for anonymous web browsing.
http://www.darkreading.com/document.asp?doc_id=104381
http://www.torrify.com/
http://www.boingboing.net/2006/09/19/torpark_is_out_offer.html

Funny future history: "19 Year Old Diebold Technician Wins U.S. Presidency."
http://www.avantnews.com/modules/news/article.php?storyid=281

Steganographic squid can hide messages in their skin:
http://www.sciencedaily.com/releases/2006/09/060920191616.htm

The Onion on TSA's liquid ban:
http://www.theonion.com/content/node/53536?utm_source=onion_rss_daily

Clever new voting protocol from Ron Rivest:
http://theory.csail.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf 
or http://tinyurl.com/hrjmq

Interesting story on the risks of dying without telling anyone your 
computer passwords.
http://news.com.com/Taking+passwords+to+the+grave/2100-1025_3-6118314.html 
or http://tinyurl.com/gfdzh

Scary airplane security false alarm.  This is what vigilantism looks like:
http://www.schneier.com/blog/archives/2006/10/this_is_what_vi.html

Hoax flaw in Firefox JavaScript:
http://www.schneier.com/blog/archives/2006/10/firefox_javascr.html

This is a really interesting post about someone finding SQL injection 
vulnerabilities with Google.  His result is that 11.3% of websites are 
vulnerable to this attack.
http://portal.spidynamics.com/blogs/msutton/archive/2006/09/26/How-Prevalent-A
re -SQL-Injection-Vulnerabilities_3F00_.aspx 
or http://tinyurl.com/lw98p

"PhishTank is a collaborative clearing house for data and information 
about phishing on the Internet. Also, PhishTank provides an open API for 
developers and researchers to integrate anti-phishing data into their 
applications at no charge."
http://www.phishtank.com

60 Minutes got a copy of the TSA no-fly list.  The errors and problems 
are enormous.
http://rawstory.com/showoutarticle.php?src=http%3A%2F%2Fwww.cbsnews.com%2Fstor
ie s%2F2006%2F10%2F05%2F60minutes%2Fmain2066624.shtml 
or http://tinyurl.com/ymc6ov

The DHS is funding the development of software that monitors opinions in 
newspapers world-wide.  One can easily imagine the chilling effect this 
would have on worldwide freedom of the press.
http://www.schneier.com/blog/archives/2006/10/opinion_monitor.html

You can use Google's new code search feature to find usernames and 
passwords, confidential code, buffer overflows, and all sorts of other 
things.
http://www.kottke.org/06/10/google-code-search
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articl
eI d=9003938&source=NLT_SEC&nlid=38 
or http://tinyurl.com/zg5ae
http://monkey.org/~jose/blog/viewpage.php?page=google_code_search_stats

Airport security confiscated a rock.
http://www.courant.com/news/opinion/op_ed/hc-thorson1005.artoct05,0,777555.col
um n?coll=hc-headlines-oped 
or http://tinyurl.com/zkz43
They already take away scissors.  Can paper be far behind?

Continued terrorist paranoia causes yet another ridiculous story, as a 
HAZMAT team is called in to deal with Jell-O by the side of the road.
http://news.bbc.co.uk/1/hi/world/europe/6035821.stm

In an effort to deal with the problem of imposters in fake uniforms, 
Iraqi policemen now have a new, harder-to-counterfeit uniform.  I'm sure 
it will help, but I don't see what kind of difference it will make to a 
normal citizen faced with someone in a police uniform breaking down his 
door at night.  Or when gunmen dressed in police uniforms execute the 
brother of Iraqi Vice President Tariq al-Hashimi.
http://english.aljazeera.net/NR/exeres/A1853C26-1620-4BE4-A819-4BF569B9394A.ht
m 
or http://tinyurl.com/ykr4nl
http://www.swissinfo.org/eng/international/ticker/detail/Gunmen_kill_brother_o
f_ Iraq_s_VP.html?siteSect=143&sid=7143598&cKey=1160413744000 
or http://tinyurl.com/s97qp

Fukuyama on secrecy:
http://www.nytimes.com/2006/10/08/books/review/Fukuyama.t.html?_r=1&8bu&emc=bu
&o ref=slogin 
or http://tinyurl.com/y52t5m

Nice essay on the idiocy of the "ticking time bomb" theory of torture:
http://balkin.blogspot.com/2006/10/torture-and-ticking-time-bomb.html
See also:
http://fafblog.blogspot.com/2005/03/would-you-could-you-in-box-theres-bomb.htm
l 
or http://tinyurl.com/ybsnzf

How's this for a dumb idea?  Tagging all passengers at airports.
http://news.bbc.co.uk/1/hi/technology/6044310.stm
http://www.theregister.co.uk/2006/10/12/airport_rfid/

The Rand Corporation published A Million Random Digits with 100,000 
Normal Deviates back in 1955, when generating random numbers was hard. 
I have a copy of the original book; it's one of my library's prize 
possessions. I had no idea that the book was reprinted in 2002; it's 
available on Amazon. But even if you don't buy it, go to the Amazon page 
and read the user reviews. They're hysterical.
http://www.amazon.com/Million-Random-Digits-Normal-Deviates/dp/0833030477/sr=8
-1 /qid=1160657548/ref=pd_bbs_1/102-7977781-1757709?ie=UTF8
http://www.schneier.com/blog/archives/2006/10/a_million_rando.html


** *** ***** ******* *********** *************

      Pupillometer



Does this EyeCheck device sound like anything other than snake oil: 
"The device looks like binoculars, and in seconds it scans an 
individuals pupils to detect a problem.

"'They'll be able to tell if they're on drugs, and what kind, whether 
marijuana, cocaine, or alcohol. Or even in the case of a tractor trailer 
driver, is he too tired to drive his rig?' said Ohio County Sheriff Tom 
Burgoyne.

"The device can also detect abnormalities from chemical and biological 
effects, as well as natural disasters."

The device is called a pupillometer, and -- according to the company 
website -- "uses patented technologies to deliver reliable pupil 
measurements in less than five minutes for the detection of drugs and 
fatigue."  And despite what the article implied, the device doesn't do 
this at a distance.

I'm not impressed with the research, but this is not my area of expertise.

http://www.officer.com/article/article.jsp?id=32602&siteSection=1
http://www.mcjeyecheck.com/index.htm
http://www.mcjeyecheck.com/research.htm


** *** ***** ******* *********** *************

      On-Card Displays



This is impressive: a display that works on a flexible credit card.

One of the major security problems with smart cards is that they don't 
have their own I/O.  That is, you have to trust whatever card 
reader/writer you stick the card in to faithfully send what you type 
into the card, and display whatever the card spits back out.  Way back 
in 1999, Adam Shostack and I wrote a paper about this general class of 
security problem.

Think WYSIWTCS: What You See Is What The Card Says.  That's what an 
on-card display does.

No, it doesn't protect against tampering with the card.  That's part of 
a completely different set of threats.

http://www.cr80news.com/library/2006/09/16/on-card-displays-become-reality-mak
in g-cards-more-secure/ 
or http://tinyurl.com/r7e6y
http://www.schneier.com/paper-smart-card-threats.html


** *** ***** ******* *********** *************

      Screaming Cell Phones



Wired has the story:

"Does it pay to scream if your cell phone is stolen? Synchronica, a 
mobile device management company, thinks so. If you use the company's 
Mobile Manager service and your handset is stolen, the company, once 
contacted, will remotely lockdown your phone, erase all its data and 
trigger it to emit a blood-curdling scream to scare the bejesus out of 
the thief."

The general category of this sort of security countermeasure is "benefit 
denial."  It's like those dye tags on expensive clothing; if you 
shoplift the clothing and try to remove the tag, dye spills all over the 
clothes and makes them unwearable.  The effectiveness of this kind of 
thing relies on the thief knowing that the security measure is there, or 
is reasonably likely to be there.  It's an effective shoplifting 
deterrent; my guess is that it will be less effective against cell phone 
thieves.

Remotely erasing data on stolen cell phones is a good idea regardless, 
though.  And since cell phones are far more often lost than stolen, how 
about the phone calmly announcing that it is lost and it would like to 
be returned to its owner?

http://blog.wired.com/gadgets/index.blog?entry_id=1558434


** *** ***** ******* *********** *************

      Counterpane News



The Associated Press ran a profile about me.
http://apnews.excite.com/article/20060925/D8KBIJ480.html

Last month I gave a lecture on "The Future of Privacy" at the University 
of Southern California.  The audio is online.
http://uscpublicdiplomacy.org/index.php/events/events_detail/1925/

Schneier is speaking at the InfoSecurity Conference in Chicago on 
October 20:
http://infosecurityconference.techtarget.com/

Schneier is speaking at RSA Europe in Nice, France on October 24:
http://2006.rsaconference.com/europe/

Schneier is speaking at Rendez-vous de la Securite de l'Information in 
Montreal on October 30:
http://rsec-info.com/

Schneier is speaking at the ACLU Delaware Membership Conference in 
Wilmington on November 10:
http://www.aclu-de.org/Paranoid%20Society%20Conference.htm

Schneier is speaking at the ACLU Rhode Island in Providence on November 16:
http://www.riaclu.org/events.html

Counterpane announced new data security solutions supporting IBM, SAP, 
Oracle and MSSQL platforms to help customers defend against unauthorized 
activity and improve compliance:
http://www.counterpane.com/pr-20061009.html
http://www.counterpane.com/pr-20061002.html
http://www.counterpane.com/pr-20060918.html

Current Counterpane job openings:
http://www.counterpane.com/jobs.html


** *** ***** ******* *********** *************

      FairUse4WM News



A couple of weeks I ago I wrote about the battle between Microsoft's DRM 
system and FairUse4WM, which breaks it.  The new news is that Microsoft 
has patched its security against FairUseWM 1.2 and filed a lawsuit 
against the program's anonymous authors, and those same anonymous 
authors have released FairUse4WM 1.3, which breaks the latest Microsoft 
patch.

 From Engaget:  "We asked Viodentia about Redmond's accusation that he 
and/or his associates broke into its systems in order to obtain the IP 
necessary to crack PlaysForSure; Vio replied that he's 'utterly shocked' 
by the charge. 'I didn't use any Microsoft source code. However, I 
believe that this lawsuit is a fishing expedition to get identity 
information, which can then be used to either bring more targeted 
lawsuits, or to cause other trouble.' We're sure Microsoft would like 
its partners and the public to think that its DRM is generally 
infallible and could only be cracked by stealing its IP, so Viodentia's 
conclusion about its legal tactics seems pretty fair, obvious, and 
logical to us."

What's interesting about this continuing saga is how different it is 
from the normal find-vulnerability-then-patch sequence.  The authors of 
FairUse4WM aren't finding bugs and figuring out how to exploit them, 
forcing Microsoft to patch them.  This is a sequence of crack, fix, 
re-crack, re-fix, etc.

The reason we're seeing this -- and this is going to be the norm for DRM 
systems -- is that DRM is fundamentally an impossible problem.  Making 
it work at all involves tricks, and breaking DRM is akin to "fixing" the 
software so the tricks don't work.  Anyone looking for a demonstration 
that technical DRM is doomed should watch this story unfold.  (If 
Microsoft has any chance of winning at all, it's via the legal route.)

http://www.schneier.com/blog/archives/2006/09/microsoft_and_f.html
http://www.engadget.com/2006/09/25/microsoft-claims-successful-patch-against-f
ai ruse4wm-1-2/ 
or http://tinyurl.com/rndpv
http://arstechnica.com/news.ars/post/20060927-7849.html
http://www.engadget.com/2006/09/27/viodentia-responds-to-microsoft-releases-fa
ir use4wm-1-3/ 
or http://tinyurl.com/p3osv


** *** ***** ******* *********** *************

      Voting Software and Secrecy



Here's a quote from an elections official in Los Angeles:  "The software 
developed for InkaVote is proprietary software. All the software 
developed by vendors is proprietary. I think it's odd that some people 
don't want it to be proprietary. If you give people the open source 
code, they would have the directions on how to hack into it. We think 
the proprietary nature of the software is good for security."

It's funny, really.  What she meant, and should be saying, is something 
like:  "I think it's odd that everyone who has any expertise in computer 
security doesn't want the software to be proprietary.  Speaking as 
someone who knows nothing about computer security, I think that secrecy 
is an asset."  That's a more realistic quote.

As I've said many times, secrecy is not the same as security.  And in 
many cases, secrecy hurts security.

http://www.dailynews.com/news/ci_4407865?source=email

Secrecy and security:
http://www.schneier.com/crypto-gram-0205.html#1


** *** ***** ******* *********** *************

      Torture Bill as C Code



Kevin Poulsen boils down the new terrorist (and others) 
arrest/detainment/torture bill into a small piece of C code:

if (person = terrorist) {
      punish_severely();
} else {
      exit(-1);
}

There's one obvious error, but there are other problems with the code. 
Anyone care to comment?

http://blog.wired.com/27bstroke6/2006/09/bad_code.html
http://www.boingboing.net/2006/10/02/the_us_torture_bill_.html
http://www.schneier.com/blog/archives/2006/10/torture_bill_as.html

U.S. bill:
http://thomas.loc.gov/cgi-bin/query/z?c109:S.3930.ES:


** *** ***** ******* *********** *************

      The Doghouse: SecureRF



SecureRF:  "Claims to offer the first feasible security for RFIDs. 
Conventional public key cryptography (such as RSA) is far too 
computationally intensive for an RFID. SecureRF provides a similar 
technology at far lower footprint by harnessing a relatively obscure 
area of mathematics: infinite group theory, which comes (of all places) 
from knot theory, a branch of topology."

Their website claims to have "white papers" on the theory, but you have 
to give them your personal information to get it.  Of course, they 
reference no actual published cryptography papers.  "New mathematics" is 
my Snake-Oil Warning Sign #2 -- and I strongly suspect their 
documentation displays several other of the warning signs, too.  I'd 
stay away from this one.

http://www.oreillynet.com/etel/blog/2006/09/embedded_systems_conference_20.htm
l 
or http://tinyurl.com/yz9e2k
http://www.securerf.com/

Snake-oil warning signs:
http://www.schneier.com/crypto-gram-9902.html#snakeoil


** *** ***** ******* *********** *************

      Bureau of Industry and Security Hacked



The BIS is the part of the U.S. Department of Commerce responsible for 
export control.  If you have a dual-use technology that you need special 
approval in order to export outside the U.S., or to export it to 
specific countries, BIS is what you submit the paperwork to.

It's been hacked by "hackers working through Chinese servers," and has 
been shut down.  This may very well have been a targeted attack.

Manufacturers of hardware crypto devices -- mass-market software is 
exempted -- must submit detailed design information to BIS in order to 
get an export license.  There's a lot of detailed information on crypto 
products in the BIS computers.

Of course, I have no way of knowing if this information was breached or 
if that's what the hackers were after, but it is interesting.  On the 
other hand, any crypto product that relied on this information being 
secret doesn't deserve to be on the market anyway.

http://www.techweb.com/showArticle.jhtml;jsessionid=OM4E5LCHY4W0WQSNDLRCKHSCJU
NN 2JVN?articleID=193105174 
or http://tinyurl.com/epsq2


** *** ***** ******* *********** *************

      University Networks and Data Security



In general, the problems of securing a university network are no 
different than those of securing any other large corporate network. But 
when it comes to data security, universities have their own unique 
problems. It's easy to point fingers at students -- a large number of 
potentially adversarial transient insiders. Yet that's really n