DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: F T

⟦bffc96fa4⟧ TextFile

    Length: 5280 (0x14a0)
    Types: TextFile
    Names: »FBI.info«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦this⟧ »./misc/FBI.info« 

TextFile

From mojo!mimsy!haven!aplcen!uunet!tut.cis.ohio-state.edu!ucbvax!UPENN.EDU!topper%a1.relay Thu Mar 29 18:58:23 EST 1990
Article: 1213 of misc.security:
Path: mojo!mimsy!haven!aplcen!uunet!tut.cis.ohio-state.edu!ucbvax!UPENN.EDU!topper%a1.relay
>From: topper%a1.relay@UPENN.EDU ("Frank Topper")
Newsgroups: misc.security
Subject: Meeting with the FBI
Message-ID: <9003270541.AA01498@ucbarpa.Berkeley.EDU>
Date: 7 Mar 90 21:31:01 GMT
Sender: daemon@ucbvax.BERKELEY.EDU
Organization: The Internet
Lines: 97
Approved: security@rutgers.edu

Dear Security & Dasig Subscribers,

	Activated by a suggestion from William Sessions, Director of the
FBI, my associate Linda May and I scheduled a meeting with the local
Philadelphia office to discuss computer, information and network security.
We wanted to draw from their experience, learn their perspective, and
establish a direct conection with the poeple who can help us in the event
of an important security breach -- and to know what they can and can not do
regarding the subsequent investigation.

	We met with two agents last month.

	Our agenda included discussing security breaches (principal kinds
reported, principal deficiencies that enable such breaches, proportion
involving perpetrators external/internal to the organization, proportion of
organizations which had a security plan, program and officer, and the most
important factor(s) for achieving appropriate levels of security),
classifications of activities (legal, illegal and questionable), recaps of
proposed legislation, and suggested actions & publications.

	Regarding breaches:
	They said that banks are the most susceptible to loss, and that
most private companies absord losses without prosecuting due to the time,
expense, and the wish to not appear stupid.  They said that companies that
did prosecute breaches had fewer recurring problems.

	Universities tend to get more young hacker-types, while
corporations get embezzlers.  Most complaints are financial institutes that
get 'hit over the wire' (wire fraud), bulletin boards containing pirated
software & credit card access numbers, and, most recently, they are
beginning to get calls about virus problems.

	Although they were not allowed to give details, the FBI is
currently involved in two major virus investigations.

	They see a major problem being when a hacker receives 'celebrity
status'.  This encourages trying to beat the system since fame and not
disrepute is the potential payoff.

	Statistically, lower-level employees are easier to catch because
they leave a trail of their actions.  Higher-level (V.P.) employees know
the systems and leave less of a trail.

	Activity types:
	The FBI gets involved when a Federal crime is committed. Usually
this means either: 1)Crime involving more than one state, 2) crimes
involving gov't computers or gov't networks, or 3) the more broad 86'
Computer Fraud and Abuse Act.  Interestingly enough, one of the agents we
spoke with participated in the investigation which has lead to the
conviction of Robert Morris, Jr.

	A questionable activity, but not illegal, is when a hacker (or
employee) reads files they are not supposed to have seen.  Not so related
to universities is the new wrinkle provided by cellular phones.  In this
case the transmission travels through the airwaves to a hardwire
transmission point.  It is not illegal to listen in to the part broadcasted
(although, a recent note on the SECURITY list mentioned that it was illegal
to disclose an overheard conversation).

	Anytime we have a question about an activity we are encourages to
contact the agents & get the latest perspective.  Legislation-wise, neither
agent has received updates on the two 89' proposed acts: Computer
Protection & Computer Virus Eradication.  They said there is always a lag
time between when a law is passed and when they get instructions as to what
it means and how it can be used.  They can prosecute computer crimes now
involving threatsor harassment....and they said if they REALLY WANT to get
someone they'll research any and all laws to try to find something to stick
on the alleged criminal.

	They suggest knowing what data is sensitive and take extra
precautions.  Whatever security programs are running need to be monitored
and checked for patterns of unusual activity, i.e., send reports to the
user/custodians of each protected system.

	Lastly, to get around the undesirable impression of security being
iron-handed, they stressed the ned for an education program touching every
employee with a solid emphasis on WHY the security efforts (and the
employyees' efforts) are needed...and what can happen if the efforts are
not made.

	Based on an "OK" form the local agent-in-charge, both agents were
willing to come to this university and speak to our planned-for Security
Steering Committee, and without making specific recommendations, stress the
importance of having a full-time security officer-type and comprehensive
education/awareness program.

	Regards.

	Frank Topper
	Information Analyst
	University of Pennsylvania
	(215) 898-2171
	topper@a1.relay.upenn.edu

"I have observed that persons of good sense seldom fall into disputes,
except lawyers, university men, and men of all sorts that have been bred at
Edinborough."  Ben Franklin