Computer underground Digest Thu Apr 21, 1994 Volume 6 : Issue 36 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Retiring Shadow Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Suspercollater: Shrdlu Nooseman CONTENTS, #6.36 (Apr 21, 1994) File 1--conference announcement File 2--DEF CON ][ Late Night Hack Announcement #3 Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Tue, 5 Apr 1994 18:29:06 -0700 (PDT) From: anonymous Subject: File 1--conference announcement The Tenth International Conference on Information Security - IFIP SEC'94 Organized by Technical Committee 11 of the International Federation for Information Processing, IFIP/TC 11 - in cooperation with the Special Interest Group on Information Security of the Dutch Computer Society - and hosted by the Caribbean Computer Society. I F I P S E C ' 9 4 M A Y 2 3 - 2 7 , 1 9 9 4 I T C P I S C A D E R A B A Y C U R A C A O D U T C H C A R I B B E A N I N T E R N A T I O N A L P R O G R A M * * * ** Five days, multiple parallel tracks, over sixty refereed unique presentations,ially invited speakers, dedicated tutorials workshops, working group sessions, lively panel discussions, and much, much more...... * * * Dynamic Views on Information Security in Progress ***ABOUT IFIP'S TECHNICAL COMMITTEE 11 The International Federation for Information Processing was established in 1960 under sponsorship of UNESCO. In 1984 the Technical Committee for Security and Protection in Information Processing Systems, Technical Committee 11, came into existence. Its aim is to increase the reliabil- ity and general confidence in information processing, as well as to act as a forum for security managers and others professionally active in the field of information processing security. Its scope encompasses the establishment of a frame of reference for security common to organiza- tions, professionals and the public; and the promotion of security and protection as essential parts of information processing systems. Eight working groups: Information Security Management, Small Systems Security, Database Security, Network Security, Systems Integrity and Control, Security Legislation, Information Security Education and IT Related Crime Investigations, all chaired by seasoned international experts, cover a major part of the actual TC 11 workload. +---------------------------------------------------------- ***ABOUT THE TENTH INTERNATIONAL INFORMATION SECURITY CONFERENCE This event is the Tenth in a series of conferences on information secu- rity. Something to celebrate. The organizers have compiled a truly exceptional, unique, and especially upgraded conference in a setting suitable for celebrating its Tenth birthday. Over 75 sessions will cover just about all aspects of information security, on a senior and advanced level. The formal language of SEC'94 is English. The proceedings are published by Elsevier North Holland in its acclaimed series. There are evidently some astounding surprises within SEC'94. As key note's SEC'94 will feature major players. Ten invited speakers, doubt- less seasoned seniors in their field, will contribute with their vision of the future. Ranging from the legislative aspects of data privacy, to the international impact of the Clipper chip, and the dimensions of new cryptographic standards and applications. Global policy making and breaking in respect of the international harmonization efforts of infor- mation technology security evaluation criteria, and other most enticing issues are advocated during the various invited lectures. Within the framework of this conference a series of special lectures are built in, dedicated to one most important aspect. SEC'94 includes a UNIX system security workshop and a cryptology tutorial. Special sessions are devoted to information security in developing nations, and information security in the banking and financial industry. Two major full day mini conferences "IT Security Evaluation Criteria" and "Open Systems Network Security" are included in the program as well. SEC'94 offers a panel discussion of the editors of Elseviers Journal Computers and Security, IFIP TC 11's formal journal. ***ABOUT YOU Each of the past ten years you have shown IFIP and TC 11 in particular, your commitment to information security by attending the IFIP SEC conferences. The visitors and delegates to IFIP SEC are a broad audi- ence, from everywhere: The Pacific Rim, Europe, Africa, the North and Latin America's and the Far East. The level of authority/positions is as usual: within practical, management, legal and technical level, the delegate to IFIP SEC is considered the top grade. Anyone - directly and indirectly - involved and/or interested in information security, wher- ever she/or he may live, is IFIP SEC's audience. You certainly may not miss SEC'94! ***SOMETHING EXTRA The organizers wanted to do something extra for this Tenth event. Besides compiling a unique conference program, its length was extended to FIVE days, extra tracks are added, the delegate admission is reduced, special student admission rate are available, Worldwide rebated air- travel and discounted hotel accommodation can be obtained, and those not yet being a member of the World's largest and most influencial computer society are being offered a free of charge membership for 1994! And that's not all! Yet, some surprises are saved for the event itself. IFIP TC 11's SEC'94 welcomes you to Curacao, BONBINI ! A W A R D S Technical Committee 11 of IFIP presents during its 10th event two pres- tigeous awards. The Kristian Beckman Award and the Best Paper Award. The Kristian Beckman Award has been established by IFIP TC 11 to com- memorate the first chairman of the committee, Kristian Beckman from Sweden, who was also responsible for promoting its founding in 1983/84. This award is granted annually to a successful nominee and is presented at the annual IFIP Security Conference. The objective of the award is to publicly recognize an individual - not a group or organization - who has significantly contributed to the development of information security, especially achievements with an international perspective. To celebrate the tenth annual conference the organizers have decided also to present a Best Paper Award. The award will be presented to the individual with the most significant paper at SEC'94. The audience itself will be selecting this presentation/individual. ------------------------------------------------------------------ P R O G R A M ***INVITED PRESENTATIONS*** Computer based cryptanalysis: man versus machine approach by Dr. N. Balasubramanian, former director of the Joint Cipher Bureau/ Crypto- graphic Services of the Department of Defense of the Government of India. Establishing a CERT: Computer Emergency Response Team by Kenneth A. van Wyk, manager Assist team, Defense Information Security Agency of the Department of Defense, United States Privacy aspects of data travelling along the new 'highway' by Wayne Mad- sen, scientist Computer Science Corp., United States Issues in designing and implementing a practical enterprise security architecture by Ross Paul, manager information security, the Worldbank, United States (key note's and other invited speakers to be announced by special bulletin) IFIP TC 11 position paper in discussion: Security Evaluation Criteria by H. Schoone, Netherlands Special TC 11 Working group sessions: 11.8 Computer Security Education, chair: Em. Prof. Dr. Harold Highland 11.1 IT Security Management, chair: Prof. S.H. von Solms (S. Africa) 11.5 System Integrity and Control, chair: William List (UK) Special Appearance: Information Warfare: waging and winning conflict in cyberspace by Winn Schwartau (US) Panel discussion: Panel discussion of the editors of Elseviers Journal Computers and Security chaired by John Meyer, Elsevier (UK), editor Extended UNIX tutorial: Unix meets Novell Netware by Kevin H. Brady, Unix Systems Lab. (US) Extended virus tutorial: Technologically enabled crime:shifting para- digms for the year 2000 by Sara Gordon (US) Viruses: What can we really do ? by Prof. Henry Wolfe (New Zealand) Future trends in virus writing by Vesselin V. Bontchev (Bulgaria/Germany) Viral Tidings by A. Padgett Peterson (US) Integrity checking for anti viral purposes by Yisrael Radai (Israel) Special appearance: *title to be announced* Prof. Eugene Spafford (US) ***REFEREED PRESENTATIONS*** Operations Security: the real solution to the problem - A. Don Temple (US) Security in virtual reality: virtual security - Amund Hunstad (Sweden) Prohibiting the exchange attack calls for hardware signature - Prof. Reinhard Posch/Wolfgang Mayerwieser (Austria) Towards secure open systems - Dr. Paul Overbeek (Netherlands) A security officer's workbench - Prof. Dennis Longley/Lam For Kwok (Aus- tralia/ Hong Kong) An introduction to Citadel: a secure crypto co-processor for worksta- tions - Dr. Elaine Palmer (US) On the calculation and its proof data for PI 10-9th - Shengli Cheng et al (P.R. of China) Securenet: a network oriented intelligent intrusion prevention and detection system - Ass. Prof. Dimitris Gritzalis et al (Greece) A methodology for the design of security plans - Drs. Fred de Koning (Netherlands) An open architecture for security functions in workstations - Stefan Santesson (Sweden) Security systems based on exponentiation primitives, TESS - Prof. Thomas Beth (Germany) The structure and functioning of the COST privacy enhanced mail system - Prof. Sead Muftic, Nada Kapidzic, Alan Davidson (Sweden) The need for a new approach to information security - Dr. Jean Hitchings (UK) A Practical database encryption system - Prof. C. Chang/Prof. D. Buehrer (Taiwan, ROC) Security analysis and strategy of computer networks - Jie Feng et al P.R.o. China) Information Security: legal threats and opportunities - Dr. Ian Lloyd (Scotland) Secure communication in LAN's using a hybrid encryption scheme - Prof. Mahmoud El-Hadidi, Dr. Nadia Hegazi, Heba Aslan (Egypt) Secure Network Management - Bruno Studer (Switzerland) Ramex: a prototype expert system for computer security risk analysis and management - Prof. Peter Jarratt, Muninder Kailay (UK) The need for decentralization and privacy in mobile communications net- works - D.I. Frank Stoll (Germany) Is lack of quality software a password to information security problems ? - Dr. Peter Fillery, Nicholas Chantler (Western Australia) Smart: Structured, multi-dimensional approach to risk taking for opera- tional information systems - Ing. Paul van Dam, et al. (Netherlands) IT Audit: the scope, relevance and the impact in developing countries - Dr. K. Subramanian (India) Program structure for secure information flow - Dr. Jingsha He (US) Security, authentication and policy management in open distributed sys- tems - Ralf Hauser, Stefano Zatti (Switzerland/Italy) A cost model for managing information security hazards - Love Ekenberg, Subhash Oberoi, Istvan Orci (Sweden) Corporate computer crime management: a research perspective - Dr. James Backhouse (UK) A high level security policy for health care establishments - Prof. Sokratis Katsikas, Ass. Prof. Dimitris Gritzalis, et al (Greece) Moss: a model for open system security - Prof. S.H. von Solms, Dr. P van Zyl, Dr. M. Olivier (South Africa) The risk-based information system design paradigm - Dr. Sharon Fletcher (US) Evaluation of policies, state of the art and future research direc- tions in database security - Dr. Guenther Pernul, Dr. A.M. Tjoa (Aus- tria) Exploring minimal ban logic proofs of authentication protocols - Anish Maturia, et al (Australia) Security concepts for corporate networks - Prof. Rolf Oppliger, Prof. Dieter Hogrefe (Switzerland) The security process - Jeanette Ohlsson (Sweden) On the security of lucas function - Dr. C.S. Laih (Taiwan RoC) Security considerations of content and context based access controls - Donald Marks, Leonard Binns, Peter Sell, John Campbell (US) Anonymous and verifiable databases: towards a practical solution - Prof. Jennifer Seberry, Dr. Yuliang Zheng, Thomas Hardjono (Australia) A decentralized approach for authorization - Prof. Waltraud Gerhardt, Burkhard Lau (Netherlands) Applying security criteria to a distributed database example - Dr. Marshall Abrams, Michael Joyce (US) A comparison of international information security standards based on documentary micro-analysis - Prof. William Caelli, Em. Prof. John Car- roll (Australia/Canada) Security in EDI between bank and its client - Pauli Vahtera, Heli Salmi (Finland) Secure information exchange in organizations - D.I. Ralph Holbein (Switzerland) A framework for information system security management - Helen James, Patrick Forde (Australia) The security of computer system management - Xia Ling et al (P.R.o.China) Development of security policies - Jon Olnes (Norway) Factors affecting the decision to report occurances of computer abuse - John Palmer (Western Australia) Secure managable remote access for network and mobile users in an open on-line transaction processing environment - Dr. James Clark (Singapore) * * * Session lay-out: Monday May 23: plenary only Tuesday May 24 - Thursday May 26: four parallel tracks Friday May 25: plenary only * * * Registration: Sunday afternoon May 22 at the conference venue Monday morning May 23 at the conference venue * * * Terms and conditions: The conference registration/admission fee amounts US $ 1,295 for regular registrations per individual. However, if you are a member of a national computer society you may be eligible for a discount. Late charges and cancellations: Registration received after May 1, 1994are charged with an extra late charge of 10 %. Substitutions may be made at any time, though please advise us of a change of name. If you find it necessary to cancel the place, please telephone the conference office immediately and ask for a cancellation number. Confirm in writing quoting the cancella- tion number. Provided written notice is received by May 1, 1994, afull refund will be given less a 15 % administration charge. It is regretted that cancellations received after May 1, 1994 are liable for the full registration fee. Payment: the registration fees are immediately due upon registration, and all cheques should be made payable to the High Tech Port Curacao Foundation, accompanying the signed registration form. Alternatively registrations by fax and electronic mail are accepted, provided the payment for the full amount in US dollars is released by wiretransfer in favor of the High Tech Port Curacao Foundation within one week after the registration. Fax and/or email registrations must be completed before May 1, 1994. If payment is not received within stated period the registration is automatically cancelled and voided. Forms not signed or correctly filled in are not valid registrations. Conference registration fees should be paid in US dollars only, to prevent exces- sive exchange charges. It is possible to pay by credit card, however a surcharge of 25 % is levied due to local monetary restrictions and poli- cies. Immediately after registration you will receive a confirmation by fax or email. Included in the conference fee is the admittance to all sessions of all tracks of the conference, the lunches during tuesday, wednesday, thursday and friday, coffee and tea during the intermissions, a welcome cocktail at your hotel, one admission ticket per delegate to the formal conference banquet, and a copy of the handout of the confer- ence proceedings. Registrations made after May 1, 1994 are on space available basis only. If you apply for a discount the registration form and payment must be received before May 1, 1994. All other services ordered are separately billed, payable upon receipt of the respective order confirmation. * * * Curacao is a tourist destination in high demand, we advise you to make your flight and hotel accommodation reservations well in advance !!! * * * FAX THE FORM BELOW TO: IFIP SEC'94 SECRETARIAT +599 9652828 OR AIRMAIL TO: IFIP SEC'94 SECRETARIAT POSTOFFICE BOX 4 0 6 6 WILLEMSTAD - CURACAO NETHERLANDS ANTILLES CARIBBEAN OR EMAIL TO: < TC11@IAIK.TU-GRAZ.AC.AT > ------------------------------cut-here-------------------------------- IFIP TC 11 SEC'94 CONFERENCE REGISTRATION (one form per individual, copy for multiple registrations) Please register the following individual for IFIP SEC'94: Surname: First name: Title: Organization: Job title: Mail address: Post/zip code: Country: Telephone: Telefax: Email: ** If you are a member of a national computer society, use this priority registration by fax or email, and wiretransfer the applicable amount, you are entitled to a rebated admission rate. Instead of US $ 1,295, you pay only US $ 1,165. If you send this by fax to the Conference secretariat, a signature is necessary, here:: I understand and agree to abide by the conditions as set out in the conference brochure, also printed elsewhere in this document. Date: If you send this form by email, a signature is not necessary. In that case the date of receipt of the wiretransfer of the applicable amount is the date of registration. CONFERENCE PAYMENT I will remit by wiretransfer US $ _________ in favor of the High Tech Port Curacao Foundation, bank account number 11.592652.5570.004 with CITco Bank NV, Curacao, Netherlands Antilles, immediately. Wiretransfer reference: IFIP SEC'94 ABA nr. of the CITco Bank (this is not the account number, but the banks' correspondents number): 021004823. US corresponding bank: Republic National Bank, New York. Upon receipt of the applicable amount by the High Tech Port Curacao Foundation I will receive within 24 hours by fax a confirmation and an invoice marked "fees paid". ADDITIONAL I apply for the 1994 free of charge membership of the ACM (valid only if you are not a member, yet) Mark yes > > < I have a special request: (insert your request here) * * * HOTEL INFORMATION The Curacao Caribbean Hotel (tel: +599-9625000 fax: 599-9625846) as well as the Sonesta Hotel (tel: +599-9368800 fax: +599-9627502, in the US call tollfree 1.800.477.4556) are beach front hotels at walking distance of the conference center. Special roomrates start at US $ 112 per single room/night, including tax, services, full breakfast. Roomrates based on double, triple and quad are available. Various other hotels on request. AIR TRANSPORT There are daily non-stop flights from Miami operated by American Air- lines, daily non-stop wide body flights from Amsterdam (Netherlands) operated by KLM, daily non-stop flights from Marquetia Aeropuerto Inter- nacional de Caracas (Venezuela), Santa Fe de Bogota (Colombia), and various Caribbean islands, all operated by regional carriers. Special promotional fares are by KLM, TAP Air Portugal, and American Airlines. Contact your tarvel agency for more information. * * * Curacao is tropical. Year-round an average temp. of 90 F/35 C. A con- stant tradewind makes it very pleasant. You do not need a jacket or coat! Make your flight and hotel reservation as soon as possible !!! * * * Come enjoy Dutch Caribbean hospitality soon ! SEC'94 also encompasses a great after hours social program, typical Caribbean style. ORGANIZING CHAIR: Dr. F. Bertil Fortrie (chairman SEC'94) Leon Strous (vice chairman SEC'94) Corinne Bor LLM (general secretary SEC'94) ------------------------------ Date: 26 Mar 94 15:00:26 -0500 From: Conal.Garrity@F8004.N282.Z1.FIDONET.ORG(Conal Garrity) Subject: File 2--DEF CON ][ Late Night Hack Announcement #3 Updated Last : 3.11.1994 (I appologise for spelling errors.. the WP died) Late Night Hack Announcement #3 What's this? This is an updated announcement and invitation to DEF CON II, a convention for the "underground" elements of the computer culture. We try to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists, Artists, Etc.. WHO: You know who you are, you shady characters. WHAT: A convention for you to meet, party, and listen to some speeches that you would normally never hear. WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th) WHERE: Las Vegas, Nevada @ The Sahara Hotel So you heard about DEF CON I, and want to hit part II? You heard about the parties, the info discussed, the bizarre atmosphere of Las Vegas and want to check it out in person? Load up your laptop muffy, we're heading to Vegas! Here is what Three out of Three people said about last years convention: "DEF CON I, last week in Las Vegas, was both the strangest and the best computer event I have attended in years." -- Robert X. Cringely, Info World "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas "Soon we were at the hotel going through the spoils: fax sheets, catalogs, bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds. The documents disappeared in seconds." -- Gillian Newson, New Media Magazine DESCRIPTION: Last year we held DEF CON I, which went over great, and this year we are planning on being bigger and better. We have expanded the number of speakers to included midnight tech talks and additional speaking on Sunday. We attempt to bring the underground into contact with "legitimate" speakers. Sure it's great to meet and party with fellow hackers, but besides that we try to provide information and speakers in a forum that can't be found at other conferences. While there is an initial concern that this is just another excuse for the evil hackers to party and wreak havok, it's just not the case. People come to DEF CON for information and for making contacts. We strive to distinguish this convention from others in that respect. WHAT'S NEW THIS YEAR: This year will be much larger and more organized (hopefully) than last year. We have a much larger meeting area, and have better name recognition. Because of this we will have more speakers on broader topics. Expect speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new things expected include: o An Internet connection with sixteen ports will be there, _BUT_ will only provide serial connections because terminals are too hard to ship. So bring a laptop with communications software if you want to connect to the network. Thanks to cyberlink communications for the connection. o There will be door prizes, and someone has already donated a Cell Phone and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict. o Dr. Ludwig will present his virus creation awards on Sunday. o A bigger and better "Spot The Fed" contest, which means more shirts to give away. o More room, we should have tables set up for information distribution. If you have anything you want distributed, feel free to leave it on the designated tables. Yes, this year there will be a true 24 hour convention space. o A 24 hour movie / video suite where we will be playing all type of stuff. VHS Format. Mail me with suggested titles to show, or bring your own. We'll use a wall projector when not in use by speakers. o Midnight Tech Talks on Friday and Saturday night to cover the more technical topics and leave the days free for more general discussions. WHO IS SPEAKING:============================================================= This list represents almost all of the speakers verified to date. Some people do not want to be announced until the event for various reasons, or are waiting for approval from employers. A speaking schedule will go out in the next announcement. Phillip Zimmerman, Notorious Cryptographer & author of PGP. Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and "Computer Viruses, Artificial Life and Evolution" Loyd Blankenship (The Mentor), Net Running in the 90's and RPG. Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer. The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle. Judi Clark, Computer Professionals for Social Responsibility. Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced. To be Announced, The Software Publishers Association, Topic to be Announced. Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics. Mark Lotter, Cellular Enthusiest, Hacking Cell Phones. Lorax, The Lighter Side of VMBs. Peter Shipley, Unix Stud, Q&A on Unix Security. George Smith, Crypt Newsletter, Virus Topic to be Announced. Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc. John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal. Red Five & Hellbender, Madmen With a Camcorder, Who Knows? Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned.. There should be a few round table discussions on Virus, Cellular, Unix and something else surrounding the industry. I'll name the rest of the the speakers as they confirm. I'm still working on a few (Two?) people and groups, so hopefully things will work out and I can pass the good news on in the next announcement, or over our List Server. ============================================================================ WHERE THIS THING IS: It's in Las Vegas, the town that never sleeps. Really. There are no clocks anywhere in an attempt to lull you into believing the day never ends. Talk about virtual reality, this place fits the bill with no clunky hardware. If you have a buzz you may never know the difference. It will be at the Sahara Hotel. Intel is as follows: The Sahara Hotel: 1.800.634.6078 Room Rates: Single/Double $55, Tripple $65, Suite $120 (Usually $200) + 8% tax Transportation: Shuttles from the airport for cheap. NOTE: Please make it clear you are registering for the DEF CON II convention to get the room rates. Our convention space price is based on how many people register. Register under a false name if it makes you feel better, 'cuz the more that register the better for my pocket book. No one under 21 can rent a room by themselves, so get your buddy who is 21 to rent for you and crash out. Try to contact people on the Interactive Mailing List (More on that below) and hook up with people. Don't let the hotel people get their hands on your baggage, or there is a mandatory $3 group baggage fee. Vegas has killer unions. OTHER STUFF: I'll whip up a list of stuff that's cool to check out in town there so if for some reason you leave the awesome conference you can take in some unreal sites in the city of true capitalism. If anyone lives in Las Vegas, I would appreciate it if you could send a list of some cool places to check out or where to go to see the best shows and I'll post it in the next announcement or in the program -o I am asking for people to submit to me any artwork, pictures, drawings, logos, etc. that they want me to try and include in this years program. I am tring to not violate any copywrite laws, but wat cool shit. Send me your art or whatever and I'll try and use it in the program, giving you credit for the work, of course. Please send it in .TIF format if it has more than eight bit color. The program will be eight bit black and white, -o in case you want to make adjustments on your side. *** NEW MAILING LIST SERVER *** We've finally gotten Major Dommo List Serv software working (Kinda) and it is now ready for testing. MTV spent alot of time hacking this thing to work with BSDi, and I would like to thank him. The purpose of the list is to allow people interested in DEF CON II to chat with one another. It would be very sueful for people over 21 who want to rent hotel space, but split costs with others. Just mention you have room for 'x' number of people, and I'm sure you'll get a response from somone wanting to split costs. Someone also suggested that people could organize a massive car caravan from Southern Ca. to the Con. My attitude is that the list is what you make of it. Here are the specifics: Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to technical problems, etc. I'll do another mass mailing to everyone letting them know that the list is up and how to access it. Sorry for the delay! MEDIA: Some of the places you can look for information from last year include: New Media Magazine, September 1993 InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely Gray Areas Magazine, Vol 2, #3 (Fall 1993) Unix World, ???, Phrack #44 COST: Cost is whatever you pay for a hotel room split however many ways, plus $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit color name tag (We're gonna make it niftier this year) and your foot in the door. There are fast food places all over, and there is alcohol all over the place but the trick is to get it during a happy hour for maximum cheapness. ============================================================================ I wanted to thank whoever sent in the anonymous fax to Wired that was printed in issue 1.5 Cool deal! ============================================================================= FOR MORE INFORMATION: For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com in /pub/defcon. There are digitized pictures, digitized speeches and text files with the latest up to date info available. For email users, you can email dtangent@defcon.org for more information. For non-net people call: ---- A L L I A N C E ---- SysOp Metalhead One Thousand One Hundred Megabytes Online 612.251.8596 USRobotics 16.8 Dual Standard Synchronet Multinode BBS Software International Informational Retrieval Guild (IIRG) Distro Site Electronic Frontier Foundation (EFF) MEMBER American Bulletin Board Association (ABBA) MEMBER ----------------------------------------------------------------------- o 200+ Message bases. No post call ratio. Nope, not ever. o FidoNet [1:282/8004] o CyberCrime international [69:4612/2] o International Networked message ECHO areas: UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch, TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King, Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE LIVING, POLITICS, POETRY, RACISM, and too many more to mention o Computer Underground Magazines, History, Updates & Text o DEF CON Mirrior Archive o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org) o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change) ----------------------------------------------------------------------- For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102, Seattle, WA, 98112 For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone. A DEF CON Mailing list is maintained, and the latest announcements are mailed automatically to you. If you wish to be added to the list just send email to dtangent@defcon.org. We also maintain a chat mailing list where people can talk to one another and plan rides, talk, whatever. If you request to be on this list your email address will be shown to everyone, just so you are aware. ============================================================================= (Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full documentation. Get CrAzY.) VIRUS CREATION AWARDS: Announcing The Second International Virus Writing Contest Sponsored by American Eagle Publications, Inc. P.O. Box 41401 Tucson, AZ 85717 USA and The Crypt Infosystems BBS +1 (818) 683-0854 *** The Goal *** The purpose of this contest is to write a fully functional computer virus that entertains people with political satire. Viruses will be judged on the basis of originality, creativity, functionality, and political incorrectness. *** Eligibility *** Anyone who can write a computer virus is eligible. *** Contest Dates *** The contest is underway from January 1, 1994 until June 30, 1994. Your submissions must be received by June 30 to qualify. The winner of the contest will be announced at the DEFCON conference in Las Vegas, July 22-24, 1994. If you can be present, an official award will be bestowed on you at that time. ************************************************************* Details ************************************************************* The philosopher Friedrik Nietzsche once said that if you want to kill something, you must laugh at it--and laugh at it deeply. So there should be little wonder that political satire is as old as politics itself. Is there something going on in the political arena that you abhor, that makes you sick, that is just plain wrong? Well, here's your chance to make a mockery of it. I've always had this idea that if someone wrote a sufficiently witty virus that really addressed the issues the way the people (not the press, not the politicians) saw them, it might just get passed around by people voluntarily. Let's find out. Write a virus that is itself a political satire. I don't mean a virus that simply displays a message. I mean a living entity whose every move--whose every action--is politically motivated. If you need more than one virus to make your point--perhaps two viruses working together, or something like that, that is fine. ----------------------------------------------------------- Let me give you a simple example: The Political Correctness Virus This virus is a spoof on the "political correctness" movement--which is just a form of self-imposed censorship--that is sweeping american intellectual circles, particularly colleges and universities. This virus is a memory resident boot sector virus which maintains a list of politically incorrect words on your computer system. It also hooks the keyboard interrupt and monitors every keystroke you make. If you type a politically incorrect word into the computer, the PCV springs into action. Politically incorrect words are ranked at three different offense levels. When the PCV encounters such a word, it determines what offense level that word is, and acts accordingly. The least offensive words merely register a beep. More offensive words cause a beep to sound for 10 seconds. The most offensive words cause a siren to sound for two minutes, locking the system for that duration. If you turn the computer off before the two minutes are up, the virus will stop the boot process for five minutes, with sirens, when you turn it back on. If you allow the siren to complete, then you can proceed. The virus has two different word lists, both stored in an encrypted and compressed format. The list is selected at random when the system is infected, after which it cannot be changed. The first list is the "proper" list of political correctness no-no's. For example, a word like "sodomite" is among the worst possible offenses. The second list is an inverted list of no-no's. This list trys to force you to use "sodomite" by flagging words like "gay" and "homosexual" as no-no's. If you allow the PCV to live in your system for three months without getting a single flag, you are given the supreme honor of viewing the word list assigned to you and adding a word to it. If you get more than 3000 flags in a lifetime, the virus will force you to enter a politically correct word before allowing you to start the computer, since you are obviously unwilling to submit to its censorship. The virus also uses powerful means to prevent disinfection, so that, once you get it, you can't get rid of it ------------------------------ End of Computer Underground Digest #6.36 ************************************