Dec 162017
Computer Underground Digest Vol.4 #38.
File CUD438.ZIP from The Programmer’s Corner in
Category Various Text files
Computer Underground Digest Vol.4 #38.
File Name File Size Zip Size Zip Type
CUD438.TXT 41310 15853 deflated

Download File CUD438.ZIP Here

Contents of the CUD438.TXT file

Computer underground Digest Sun Aug 23, 1992 Volume 4 : Issue 38

Editors: Jim Thomas and Gordon Meyer ([email protected])
Copy Editor: Etaion Shrdlu, III
Archivist: Brendan Kehoe
Shadow-Archivist: Dan Carosone

CONTENTS, #4.38 (Aug 23, 1992)
File 1--Retraction & apology to Ripco
File 2--THE GARBAGE DUMP BBS Purges Adult Gifs
File 3--Canada busts Pirate
File 4--Lotus NYT As against Borland
File 5--Secret Service -- the TV show
File 6--"The Hacker Files" Comic Book
File 9--CPSR Letter on Crypto Policy

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from [email protected] The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
Issues of CuD can also be found in the Usenet
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
libraries; from America Online in the PC Telecom forum under
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
anonymous ftp from ( and
European distributor: ComNet in Luxembourg BBS (++352) 466893.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

Date: Fri, 21 Aug 1992 11:41:44 -0600
From: [email protected]([email protected])
Subject: File 1--Retraction & apology to Ripco

((MODERATORS' NOTE: CuD #4.37 reported an inadvertent, but
unfortunate, phrasing of a reference to Ripco BBS, in an article in
Privacy Times. We contacted the editor, Evan Hendricks, who shared our
concern. He indicated that, if CuD's version of events were correct,
he would rectify the mistake. His response is below may be one reason
why Privacy Times is judged by many as as a first-rate and reputable
resource. His response should also be an example of integrity for
other journalists.))

The following retraction was printed in the Aug. 21, 1992 issue of
Privacy Times



In the previous issue, Privacy Times reported incorrectly that a
manual for breaking into TRW's credit bureau database was published on
the Ripco bulletin board. In fact, Ripco officials refused to publish
it. Our mistake was made worse by the fact that Ripco had been the
previous victim of unwarranted government persecution after
controversial matters were published on the board, sources said.

Privacy Times apologizes for this mistake. We regret any misconceptions
that this may have caused.


Date: Thu, 20 Aug 92 15:46:13 MDT
From: [email protected](Dean Kerl)
Subject: File 2--THE GARBAGE DUMP BBS Purges Adult Gifs



DataSafe, owners and operators of The Garbage Dump Bulletin Board
Service (BBS) in Albuquerque, NM and Denver, CO announce the immediate
removal of all adult graphic files from its online service. This
action was taken to free up system and personnel resources which will
be used to enhance and expand current services such as DOS, Windows
and OS/2 shareware downloadable files. Shareware files will be
promoted as a primary product along with interactive chat, message
areas and online multiplayer games.

Simon Clement, VP of Marketing said, "These graphic files have never
been an integral part of our business and this action will allow us to
market to a much wider audience. We feel that this new market strategy
will position us to serve more customers with better and more valuable
services. We would like to encourage our customers to continue using
our expanding services. Any customer who is dissatisfied with our
market emphasis will be given a full refund, on request, for any time
remaining on their account."

The Garbage Dump BBS will continue to offer and promote uncensored
Chat, E-mail, and Message Areas. This uncensored format allows for
open discussion of a wide range of controversial topics including
politics, consumer issues, freedom of speech, alternative lifestyles
and current events.

The Garbage Dump BBS can be reached via modem in Albuquerque, NM at
(505)-294-5675 and in Denver, CO at (303)-457-1111. If you have any
questions about our new policy or would like further information about
our services, please contact Dean Kerl at (505)-294-4980 Voice.


Date: 20 Aug 92 21:41:18 EDT
From: Gordon Meyer <[email protected]>
Subject: File 3--Canada busts Pirate

Centre d'ordinateurs Microbec, a chain of four computer stores, has
been handed the largest software-copyright fine in the province's
history. The company was fined C$63,000 for selling computers loaded
with illegal copies of the MS-DOS operating system.

The fine is not the worst of it for Microbec. When the Royal Canadian
Mounted Police raided the company last October, they seized about 140
computers carrying the illegal software as evidence. Since the
company was convicted, the seized hardware will not be returned, said
Allan Reynolds, manager of the Canadian Alliance Against Software
Theft (CAAST), a Toronto-based group of major software vendors set up
to fight software piracy. Reynolds said the value of the seized
computers is "more than double the fine amount in terms of revenue
value." (Reprinted from ST Report 8.33 with permission)


Date: Thu, 20 Aug 92 11:49:51 PDT
From: [email protected]
Subject: File 4--Lotus NYT As against Borland

In case you missed it, there was a full page ad by Lotus in the August
20 issue of the New York Times (Business section, p. 3) about their
lawsuit against Borland. With a banner headline saying "There's
nothing innovative about copying, parts of it read:

On Friday, July 31, 1992, a U.S. District Court ruled that
Borland's Quattro(r) and Quattro Pro(r) spreadsheets infringe the
copyrights of Lotus(r) 1-2-3.

In its ruling, the court concluded tht "...the Quattro programs
derive from illicit copying," holding that "Lotus has sued" and
"Borland is liable."

Lotus goes for the jugular in the ad. In a large-print subhead, it
announces: "_Lotus innovated. Borland copied," and another says: "Who
should you trust?" The ad concludes:

But perhaps most importantly, Borland lost what matters most to
customers: credibility. For instance, Borland told the Court they
needed to copy our menus to achieve macro compatibility with
1-2-3. Now they tell their customers that the 1-2-3 menus aren't
critical to compatibility.

So ask yourself: To what extent can you trust a company that
values what is expedient over what is legal? And to what extent
can you rely on the product it wants you to buy?

Here's our advice: Choose the product, and the company, you can
trust. Choose Lotus. After all, we're the best in the business at
building innovative spreadsheets. Always hae been, always will

Case closed.


Date: 17 Aug 1992 12:24:24 -0400 (EDT)
From: Stephen Tihor 212 998 3052
Subject: File 5--Secret Service -- the TV show

Last night NBC broadcast an episode of "Secret Service" in NY at least
that featured a straightforwards nut who wants to kill the President
plot and then a rather confusing account of their high technology
defense of a fuzzy city power system against sabotage by a fired

I hope someone taped it and caught the exact wording of the disclaimer
at the end because it was hard to follow the logic and determine what
was the original incident and what was Hollywoodisms.

The piece was prefaced with a brief discussion some of the risks of
power outages.

The expert quickly diagnosed the problem as a VIRUS. Persistent
references to virus in the context of a electric power control system
seemed odd. Since they appeared to be running pre-existing VIRUS
checking software on the system one might suspect the "main frame" was
an IBM PC or Apple Macintosh running standard software rather than a
real time control system or perhaps something larger and safer.
Interesting references were made to viruses lurking WITHIN modems.
Then they identified the source of the attacking codes as the local
font storage in what appeared to be a old DECwriter dot matrix

With some external clues the agents attempt to confront the criminal
in house, which is wired with many falling metal screen, sounds
effects, and gas but which lacks reinforced walls. The culprit is
classic middle aged computer geek who appears uncaring about possible
loss of life although the agents do not mention to him the risk of a
life sentence of death penalty of others die as a result of his
sabotage. He refuses to help them disarm the problem.

The expert has announced that this is a logic bomb and eventually
realizes that since the bug code is not in the copy of the system on
disk as long as they shutdown without writing memory to disk they can
reboot bug free. So a brief deliberate blackout is used to save the

I am obvious very curious about the TRUE FACTs of this can if the show
plans to show such other SS triumphs in the war on electronic crime as
almost destroying Steve Jackson Games.


Date: Fri, 21 Aug 92 09:18:22 MDT
From: [email protected](queen's gambit)
Subject: File 6--"The Hacker Files" Comic Book

_The Hacker Files_, if you've missed them, is the name of a new DC
comic book. At $1.95 each, I plunked down my six bucks and took the
first three of the 24 page monthly back to my digs and zap through
them between hacks. Reading took a lot less time than I thought. I
should have watched a double showing of Ishtar instead.

The premise of the story, which is continued in serial form from one
issue to the next, is that a virus has invaded Arpanet and threatens
the Pentagon's computer system and could trigger a nuclear set-to. No
matter that the collapse of Russia stretches the credibility of the
Dr. Strangelove plot. The hacker-not-cracker hero is Jack Marshall, a
scruffy looking peacenik who dresses in a t-shirt with a prominent
peace sign, jeans, and an army shirt-as-jacket. He's been dismissed
from his last company, Digitronix, under mysterious circumstances and
was black-balled from the industry. Digitronix, coincidentally,
installed the Pentagon's computers, and Jack Marshall, coincidentally,
wrote the operating system for it before his dismissal. Not
coincidentally, there's friction between Marshall and the Digitronix
crowd when he pops on the scene. Not coincidentally, this friction
may or may not have something to do with the plot in coming issues.
Marshall, handle of "Hacker," calls a few of his younger hacker
friends (Sue Denim and Dr. Zen) to help track down the virus planter.
Was it some curious kids? Was it Digitronix? Was it some nasty foreign
government? Do we really care?

I'm not sure who _The Hacker Files- is aimed at. It presents a rather
sympathetic view of hackers, so it's probably aimed at a younger,
techno-sophisticated audience. The unfolding of the plot is too slow
and twisted to hold the attention of the MTV generation, and pre-teens
would probably find the story line incomprehensible. The dialogue in
the book is R-rated, with "bullshits" and "goddamns" liberally
sprinkled in. The graphics include unnecessary snapshot scenes of
houses and neighborhoods that probably are intended for a touch of
realism, but do nothing but take up space. At 12 cents a page, the
space could be better used. The ads every few pages are distracting.
Simulated computer screens showing what the characters see on the
screen abound, but they don't add anything except maybe some vicarious
thrill for kids. The story line needs a stronger set of ideas
describing hackers and their activities and some coherent purpose in
using a hacker as hero or villain. The characters, except for the
youngest hackers, aren't either exciting or sympathetic, and like
Gertrude Stein said about Oakland, after three issues there just ain't
no there there.

As I see it, the "to be continued" format is just a device to entice
readers to get the next issue, but it's is as lame and drawn out as
the first three, the promised "conclusion" in the fourth issue will be
the last.


Date: 20 Aug 1992 09:46:11 U
From: "Anne"
Subject: File 7--ZEN AND THE ART OF THE INTERNET (Review 1)

((MODERATORS' NOTE: The following two posts review ZEN AND THE ART OF
THE INTERNET: A BEGINNER'S GUIDE, by Brendan P. Kehoe. Englewood
Cliffs (N.J.): Prentice-Hall. 122 pp. $22 (paper).))

Brendan Kehoe's _Zen and the Art of the Internet: A Beginner's Guide_
is an eminently usable handbook of information and tips for navigating
the Internet. Despite its title, beginners aren't the only ones who
can benefit from it. The novice will enjoy it as a guided tour of the
net; more experienced netters will find it a valuable resource as an
all-in-one-place source for tips and tricks.

Although some of his examples do betray an excessive fondness for
Unix, Kehoe stays for the most part platform-neutral, so anyone can
benefit from this book. All the basics are covered: email, FTP,
Usenet and Telnet; plus some of everybody's favorite fun things, such
as Finger, Ping, Talk and WHOIS.

One of the more interesting sections is Chapter 4, which is given over
entirely to explaining Usenet. Besides describing what Usenet is ("a
set of machines that exchange articles"), it also tells what Usenet is
not ("an organization," "the Internet," "fair"). Here the author
really seems to swing into his own; he's obviously very comfortable in
the world of newsgroups and this is some of his best writing. Although
the entire book is readable and easy to comprehend, it's fun in the
Usenet chapter. Perhaps echoing the anarchy of Usenet itself, Kehoe's
prose takes on a slightly more freewheeling bent, and his advice,
never heavy-handed, becomes more lively.

_Zen_ is also crammed with factoids that are great to know, but
sometimes hard to remember, such as directions for telnetting into the
Naval Observatory Automated Data Service and listings of email
gateways to. For the beginner, these are great guideposts for learning
what's what; the veteran will appreciate having a ready reference to
favorite services.

Like most people, I had to learn net behavior the hard way, but maybe
future generations will be spared this trauma by reading the section
on netiquette. Although having a more aware crop of newbies entering
the net may not be as amusing to the old timers, it has the potential
for freeing up substantial chunks of bandwidth that were previously
occupied by flames sent to the clueless ones.

One feature of the book that could still stand some improvement is the
appearance of the printed text itself. According to Kehoe, it was
output on a 300 dpi laser. In the mid-1980's that was a great "taking
control of our own property" kind of statement, but now it's easy to
get much higher-quality text out of felt that a book of this quality
deserved more attractive typefaces and higher-res output, such as what
could have easily been obtained from a Linotronic imagesetter.

However, this is a minor qualm and no reason for missing _Zen and the
Art of the Internet_. It's a book to keep handy by the computer,
whether you are a hardened veteran or a Although clearly
slanted towards the novice, there's lots here for everyone. I wish I'd
had it by my side when I first got on the net; it would have saved
asking a million clueless FAQs.

Anne Harwell
[email protected]


Date: Wed, 20 Aug 92 18:01:31 CDT
From: Jim Thomas Subject: File 8--ZEN AND THE ART OF THE INTERNET (Review 2)

_Zen and the Art of the Internet: A Beginner's Guide_ (ZAI) is a
deceptively subtle title. As Anne Harwell observes in her review in
the previous post, Kehoe has taken the most common problems and needs
of new internet riders and organized them in nine chapters, five
appendixes, a helpful glossary and a (all to brief) bibliography. Ms.
Harwell is an experienced cyber-surfer, administrator, and postmaster,
and not readily pleased. That she finds the book helpful is a
compelling endorsement.

Kehoe's title is more than a cute wordplay on the similarly titled
"Zen and the Art of Motorcycle Maintenance." It evokes an imagery and
analogue between the art of Zen, a belief that we fulfill ourselves
and understand the universe through self-mastery and mediation, and
the passion and mastery required to function in the Internet. The
Internet (or "net") is a system of interlinked computer systems
connected into a packet switching (data block transfer) network. It
enables users in different locations to communicate with each other by
connecting to a host computer, such as a university mainframe or
public access system, by addressing their "mail" with a unique address
to a recipient on the other end. Uses of the Internet include sending
and receiving electronic mail, ftp file transfers, telnet services
allowing access to remote systems, and inter-relay chat (IRC). The
increase in computer access at universities and the proliferation
especially of Unix-based public access systems such as The Well or
Mindvox have dramatically increased public access to The Net.
Internet's popularity and accessability make Kehoe's volume both
timely and important both for new users and even for experienced

ZAI offers not only the basics for roaming around Internet, but
provides a helpful reference source of tips and addresses for others.
Beginning with network basics, Kehoe describes the concept of
networking and summarizes how connections are made. A condensed
chapter on electronic mail addresses explains how they are
logically constructed, how to read domain and account names, and
tricks for correcting bounced mail. He emphasizes to readers that
Usenet *is not* the same as internet (the former is a process for
exchanging posts for a mass audience, the latter is the computer
networking systems that carry the posts). His explanation of Usenet
hierarchies, gateways, and "netiquette" should be invaluable to

ZAI's overview of ftp and telnet are especially helpful. One of the
most common "frequent asked questions" (FAQs) received by CuD is, "how
can I ftp back issues?" Kehoe explains, step-by-step, how one uses ftp
and telnet. He also provides the addresses of a number of useful sites
for accessing help files, security documents, and other information of
use both to novices and professionals. His summary of "things you'll
hear about" is a list of people, common terms, or sites that, if read
and remembered, will allow a novice to appear to be a seasoned user
almost immediately.

Readers should not be deceived by Kehoe's easy-going and often
humorous style. Beneath the captivating prose is a serious purpose:
Kehoe successfully brings to life a primer in netology, and he
collapses considerable information into a short space. When finished
with the book, one will be able to distinguish between Z files and Gif
files, roam around archie with confidence, and log on to anonymous

In the third edition, it would be helpful if some topics were
expanded. Additional addresses could be included of those sites that
have established longevity, Electronic digests such as Telecom Digest
and Cu-Digest might be mentioned, and a chapter on Bitnet, a
widely-used system among academics, might be included. It would also
be helpful to include a separate chapter on IRC, a growing interactive
communication procedure. If the publisher doesn't balk at the
expansion, a longer glossary and an expanded bibliography would also
be helpful (or at least explicit pointers to them).

These suggestions aside, ZAI, although a bit pricey at $22, is still a
good value, and the average reader will take away far more than from
books twice the size (or cost). It would make a nifty classroom aid
and should be required reading for anybody before being turned loose
on the nets. In fact, it should be required reading for us all.


Date: Mon, 17 Aug 1992 14:48:18 EDT
From: David Sobel
Subject: File 9--CPSR Letter on Crypto Policy

CPSR Letter on Crypto Policy

The following is the text of a letter Computer Professionals for
Social Responsibility (CPSR) recently sent to Rep. Jack Brooks,
chairman of the House Judiciary Committee. The letter raises several
issues concerning computer security and cryptography policy. For
additional information on CPSR's activities in this area, contact
[email protected] For information concerning CPSR generally
(including membership information), contact [email protected]


August 11, 1992

Representative Jack Brooks
House Judiciary Committee
2138 Rayburn House Office Bldg.
Washington, DC 20515-6216

Dear Mr. Chairman:

Earlier this year, you held hearings before the Subcommittee on
Economic and Commercial Law on the threat of foreign economic
espionage to U.S. corporations. Among the issues raised during the
hearings were the future of computer security authority and the
efforts of government agencies to restrict the use of new
technologies, such as cryptography.

As a national organization of computer professionals interested
in the policies surrounding civil liberties and privacy, including
computer security and cryptography, CPSR supports your efforts to
encourage public dialogue of these matters. Particularly as the
United States becomes more dependent on advanced network technologies,
such as cellular communications, the long-term impact of proposed
restrictions on privacy-enhancing techniques should be carefully
explored in a public forum.

When we had the opportunity to testify before the Subcommittee on
Legislation and National Security in May 1989 on the enforcement of
the Computer Security Act of 1987, we raised a number of these issues.
We write to you now to provide new information about the role of the
National Security Agency in the development of the Digital Signature
Standard and the recent National Security Directive on computer
security authority. The information that we have gathered suggests
that further hearings are necessary to assess the activities of the
National Security Agency since passage of the Computer Security Act of

The National Security Agency
and the Digital Signature Standard

Through the Freedom of Information Act, CPSR has recently learned
that the NSA was the driving force behind the selection and
development of the Digital Signature Standard (DSS). We believe that
the NSA's actions contravene the Computer Security Act of 1987. We
have also determined that the National Institute of Standards and
Technology (NIST) attempted to shield the NSA's role in the
development of the DSS from public scrutiny.

The Digital Signature Standard will be used for the
authentication of computer messages that travel across the public
computer network. Its development was closely watched in the computer
science community. Questions about the factors leading to the
selection of the standard were raised by a Federal Register notice, 56
Fed. Reg. 42, (Aug 30, 1991), in which NIST indicated that it had
considered the impact of the proposed standard on "national security
and law enforcement," though there was no apparent reason why these
factors might be considered in the development of a technical standard
for communications security.

In August 1991, CPSR filed a FOIA request with the National
Institute of Standards and Technology seeking all documentation
relating to the development of the DSS. NIST denied our request in
its entirety. The agency did not indicate that they had responsive
documents from the National Security Agency in their files, as they
were required to do under their own regulations. 15 C.F.R. Sec.
4.6(a)(4) (1992). In October 1991, we filed a similar request for
documents concerning the development of the DSS with the Department of
Defense. The Department replied that they were forwarding the request
to the NSA, from whom we never received even an acknowledgement of our

In April 1992, CPSR filed suit against NIST to force disclosure
of the documents. CPSR v. NIST, et al., Civil Action No. 92-0972-RCL
(D.D.C.). As

a result of that lawsuit, NIST released 140 out of a total of 142
pages. Among those documents is a memo from Roy Saltman to Lynn
McNulty which suggests that there were better algorithms available
than the one NIST eventually recommended for adoption. If that is so,
why did NIST recommend a standard that its own expert believed was

Further, NIST was required under Section 2 of the Computer
Security Act to develop standards and guidelines to "assure the
cost-effective security and privacy of sensitive information in
federal systems." However, the algorithm selected by NIST as the DSS
was purposely designed to minimize privacy protection: its use is
limited to message authentication. Other algorithms that were
considered by NIST included both the ability to authenticate messages
and the capability to incorporate privacy-enhancing features. Was
NSA's interest in communication surveillance one of the factors that
lead to the NIST decision to select an algorithm that was useful for
authentication, but not for communications privacy?

Most significantly, NIST also disclosed that 1,138 pages on the
DSS that were created by the NSA were in their files and were being
sent back to the NSA for processing. Note that only 142 pages of
material were identified as originating with NIST. In addition, it
appears that the patent for the DSS is filed in the name of an NSA

The events surrounding the development of the Digital Signature
Standard warrant further Congressional investigation. When Congress
passed the Computer Security Act, it sought to return authority for
technical standard-setting to the civilian sector. It explicitly
rejected the proposition that NSA should have authority for developing
technical guidelines:

Since work on technical standards represents virtually
all of the research effort being done today, NSA would
take over virtually the entire computer standards job
from the [National Institute of Standards and
Technology]. By putting the NSA in charge of developing
technical security guidelines (software, hardware,
communications), [NIST] would be left with the
responsibility for only administrative and physical
security measures -- which have generally been done
years ago. [NIST], in effect, would on the surface be
given the responsibility for the computer standards
program with little to say about the most important part
of the program -- the technical guidelines developed by

Government Operation Committee Report at 25-26, reprinted in 1988 U.S.
Code Cong. and Admin. News at 3177-78. See also Science Committee
Report at 27, reprinted in 1988 U.S.C.A.N. 3142.

Despite the clear mandate of the Computer Security Act, NSA does,
indeed, appear to have assumed the lead role in the development of the
DSS. In a letter to MacWeek magazine last fall, NSA's Chief of
Information Policy acknowledged that the Agency "evaluated and
provided candidate algorithms including the one ultimately selected by
NIST." Letter from Michael S. Conn to Mitch Ratcliffe, Oct. 31, 1991.
By its own admission, NSA not only urged the adoption of the DSS -- it
actually "provided" the standard to NIST.

The development of the DSS is the first real test of the
effectiveness of the Computer Security Act. If, as appears to be the
case, NSA was able to develop the standard without regard to
recommendations of NIST, then the intent of the Act has clearly been

Congress' intent that the standard-setting process be open to
public scrutiny has also been frustrated. Given the role of NSA in
developing the DSS, and NIST's refusal to open the process to
meaningful public scrutiny, the public's ability to monitor the
effectiveness of the Computer Security Act has been called into

On a related point, we should note that the National Security
Agency also exercised its influence in the development of an important
standard for the digital cellular standards committee. NSA's
influence was clear in two areas. First, the NSA ensured that the
privacy features of the proposed standard would be kept secret. This
effectively prevents public review of the standard and is contrary to
principles of scientific research.

The NSA was also responsible for promoting the development of a
standard that is less robust than other standards that might have been
selected. This is particularly problematic as our country becomes
increasingly dependent on cellular telephone services for routine
business and personal communication.

Considering the recent experience with the DSS and the digital

standard, we can anticipate that future NSA involvement in the
technical standards field will produce two results: (1) diminished
privacy protection for users of new communications technologies, and
(2) restrictions on public access to information about the selection
of technical standards. The first result will have severe
consequences for the security of our advanced communications
infrastructure. The second result will restrict our ability to
recognize this problem.

However, these problems were anticipated when Congress first
considered the possible impact of President Reagan's National Security
Decision Directive on computer security authority, and chose to
develop legislation to promote privacy and security and to reverse
efforts to limit public accountability.

National Security Directive 42

Congressional enactment of the Computer Security Act was a
response to President Reagan's issuance of National Security Decision
Directive ("NSDD") 145 in September 1984. It was intended to reverse
an executive policy that enlarged classification authority and
permitted the intelligence community broad say over the development of
technical security standards for unclassified government and
non-government computer systems and networks. As noted in the
committee report, the original NSDD 145 gave the intelligence
community new authority to set technical standards in the private

[u]nder this directive, the Department of Defense (DOD)
was given broad new powers to issue policies and
standards for the safeguarding of not only classified
information, but also other information in the civilian
agencies and private sector which DOD believed should be
protected. The National Security Agency (NSA), whose
primary mission is one of monitoring foreign
communications, was given the responsibility of
managing this program on a day-to-day basis.

H. Rep. No. 153 (Part 2), 100th Cong., 1st Sess. 6 (1987). The
legislation was specifically intended to override the Presidential
directive and to "greatly restrict these types of activities by the
military intelligence agencies ... while at the same time providing a
statutory mandate for a strong security program headed up by [NIST], a
civilian agency." Id. at 7.

President Bush issued National Security Directive ("NSD") 42 on
July 5, 1990. On July 10, 1990, Assistant Secretary of Defense Duane
P. Andrews testified before the House Subcommittee on Transportation,
Aviation, and Materials on the contents of the revised NSD. The
Assistant Secretary stated that the "the new policy is fully compliant
with the Computer Security Act of 1987 (and the Warner Amendment) and
clearly delineates the responsibilities within the Federal Government
for national security systems."

On August 27, 1990, CPSR wrote to the Directorate for Freedom of
Information of the Department of Defense and requested a copy of the
revised NSD, which had been described by an administration official at
the July hearing but had not actually been disclosed to the public.
CPSR subsequently sent a request to the National Security Council
seeking the same document. When both agencies failed to reply in a
timely fashion, CPSR filed suit seeking disclosure of the Directive.
CPSR v. NSC, et al., Civil Action No. 91-0013-TPJ (D.D.C.).

The Directive, which purports to rescind NSDD 145, was recently
disclosed as a result of this litigation CPSR initiated against the
National Security Council.

The text of the Directive raises several questions concerning the
Administration's compliance with the Computer Security Act:

1. The new NSD 42 grants NSA broad authority over "national security
systems." This phrase is not defined in the Computer Security Act and
raises questions given the expansive interpretation of "national security"
historically employed by the military and intelligence agencies and the
broad scope that such a term might have when applied to computer
systems within the federal government.

If national security now includes international economic activity, as
several witnesses at your hearings suggested, does NSD 42 now grant NSA
computer security authority in the economic realm? Such a result would
clearly contravene congressional intent and eviscerate the distinction
between civilian and "national security" computer systems.

More critically, the term "national security systems" is used
throughout the document to provide the Director of the National
Security Agency with broad new authority to set technical standards.
Section 7 of NSD 42 states that the Director of the NSA, as "National
Manager for National Security Telecommunications and Information
Systems Security," shall

* * *

c. Conduct, *approve*, or endorse research and
development of techniques and equipment to secure
national security systems.

d. Review and *approve* all standards, techniques,
systems, and equipment, related to the security of
national security systems.

* * *

h. Operate a central technical center to evaluate and
*certify* the security of national security
telecommunications and information systems.

(Emphasis added)

Given the recent concern about the role of the National Security
Agency in the development of the Digital Signature Standard, it is our
belief that any standard-setting authority created by NSD 42 should
require the most careful public review.

2. NSD 42 appears to grant the NSA new authority for information
security. This is a new area for the agency; NSA's role has
historically been limited to communications security. Section 4 of
the directive provides as follows:

The National Security Council/Policy Coordinating
Committee (PCC) for National Security Telecommuni-
cations, chaired by the Department of Defense, under the
authority of National Security Directives 1 and 10,
assumed the responsibility for the National Security
Telecommunications NSDD 97 Steering Group. By
authority of this directive, the PCC for National Security
Telecommunications is renamed the PCC for National
Security Telecommunications and Information Systems,
and shall expand its authority to include the
responsibilities to protect the government's national
security telecommunications and information systems.

(Emphasis added).

Thus, by its own terms, NSD 42 "expands" DOD's authority to
include "information systems." What is the significance of this new
authority? Will it result in military control of systems previously
deemed to be civilian?

3. NSD 42 appears to consolidate NSTISSC (The National Security
Telecommunications and Information Systems Security Committee)
authority for both computer security policy and computer security
budget determinations.

According to section 7 of the revised directive, the National
Manager for NSTISSC shall:

j. Review and assess annually the national security
telecommunications systems security programs and
budgets of Executive department and agencies of the U.S.
Government, and recommend alternatives, where
appropriate, for the Executive Agent.

NSTISSC has never been given budget review authority for federal
agencies. This is a power, in the executive branch, that properly
resides in the Office of Management and Budget. There is an
additional concern that Congress's ability to monitor the activities
of federal agencies may be significantly curtailed if this NSTISSC, an
entity created by presidential directive, is permitted to review
agency budgets in the name of national security.

4. NSD 42 appears to weaken the oversight mechanism established
by the Computer Security Act. Under the Act, a Computer Systems
Security and Privacy Advisory Board was established to identify
emerging issues, to inform the Secretary of Commerce, and to report
findings to the Congressional Oversight Committees. Sec. 3, 15 U.S.C.
Sec. 278g-4(b).

However, according to NSD 42, NSTISSC is established "to consider
technical matters and develop operating policies, procedures,
guidelines, instructions, and standards as necessary to implement
provisions of this Directive." What is the impact of NSTISSC
authority under NSD 42 on the review authority of the Computer Systems
Security and Privacy Advisory Board created by the Computer Security


Five years after passage of the Computer Security Act, questions
remain about the extent of military involvement in civilian and
private sector computer security. The acknowledged role of the
National Security Agency in the development of the proposed Digital
Signature Standard appears to violate the congressional intent that
NIST, and not NSA, be responsible for developing security standards
for civilian agencies. The DSS experience suggests that one of the
costs of permitting technical standard setting by the Department of
Defense is a reduction in communications privacy for the public. The
recently released NSD 42 appears to expands DOD's security authority
in direct contravention of the intent of the Computer Security Act,
again raising questions as to the role of the military in the nation's
communications network.

There are also questions that should be pursued regarding the
National Security Agency's compliance with the Freedom of Information
Act. Given the NSA's increasing presence in the civilian computing
world, it is simply unacceptable that it should continue to hide its
activities behind a veil of secrecy. As an agency of the federal
government, the NSA remains accountable to the public for its

We commend you for opening a public discussion of these important
issues and look forward to additional hearings that might address the
questions we have raised.


Marc Rotenberg,
CPSR Washington Office


End of Computer Underground Digest #4.38

 December 16, 2017  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>