💾 Archived View for spam.works › mirrors › textfiles › hacking › issm201.hac captured on 2023-06-14 at 16:53:01.

View Raw

More Information

-=-=-=-=-=-=-

The Information Systems Security Monitor  
  
     _______     /--------\      /--------\     \          /|  
        |        |               |              | \       / |  
        |        |               |              |   \   /   |  
        |         \_______        \_______      |     \     |  
        |                 \               \     |           |  
        |                 |                |    |           |  
        |                 |                |    |           |  
        |        \________/       \________/    |           |  
      -------                                    
Dedicated to the pursuit of security awareness............  
================================================================= 
Volume 2 Number 1                                   January 1992 
================================================================= 

////////////////////// In this Issue \\\\\\\\\\\\\\\\\\\\\\\\\\\ 
 
One Nerd's Approach to Computer Security  
  
What did Clyde say?  
  
Digital Signatures Still A Mystery to Many in Government  
  
Cyberspace  
  
Dear Clyde  
  
Computer Speak  
  
Virus Fighters  
  
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\////////////////////////////////// 
 
  
ONE NERD'S APPROACH TO COMPUTER SECURITY  
  
Hi, my name is Bill Strouse and I'm a NERD (Network Emergency   
Repair Dude). I've been a Sysop or systems operator now for better 
 
than a decade and I've learned a great deal about human nature and 
 
security in general.     
   
Back in 1980 it dawned on me that if I connected a modem to my   
computer I could access it from anywhere I happened to be. But I 
 
would have to have some sort of security or others would be   
accessing it, possibly in a destructive way. The solution I decided 
 
on was to setup a bulletin board system that used a combination of  
 
a unique name and password for each caller to control what that  
 
caller had access to. Once I got the system working I found it was 
 
a great way to keep in touch with friends that also had modems and 
 
an even better way to get answers on technical problems. Plus the 
 
latest PD (public domain) software regularly showed up on my hard 
 
disk. I publicized the number in electronic lists that were    
distributed worldwide and was soon getting calls from all over the 
 
continent and foreign countries like Sweden, England and Australia.  
 
I soon had one of the best collections of PD software in the   
country and the phone line was in constant use day and night.    
    
Along with all the great people I met there were always those few 
 
who had nothing better to do than try to destroy or disrupt what 
 
others had built. One of the first things I learned was not to   
allow just anyone the ability to leave public electronic mail.   
 
Kids would call and leave grossly obnoxious public messages with 
 
all sorts of foul language. We devised a system whereby a caller 
 
could only leave a message to the Sysop on the first call then we 
 
would call them back voice and verify who they were. Most   
importantly we had verified they were connected to a legitimate  
 
phone number which could be traced to a physical location and    
person. After verification their security level was raised so they 
 
had full access and an hour of system time a day. One of the next 
 
lessons I learned was not to allow anyone to upload a program they 
 
could then execute on the system. A friend, who continually worked 
 
at busting the security to see if he could find holes uploaded a 
 
game with a hidden copy of BASIC embedded in the program. When he 
 
ran the program online he could issue a control code and jump to 
 
the interpreter which allowed him to walk all over the security  
 
like it didn't exist! After that all files were uploaded to a   
private area no one but the Sysop had access to till they were   
thoroughly inspected.     
   
By 1985 I had so many people asking for help with computer related 
 
problems I went into business for myself as a VAR, or Value Added 
 
Reseller. Someone who not only sells you the goods but sticks   
around and makes them work for you. Not long after that networking 
 
looked like it might be the wave of the future. Since a network was 
 
a shared resource, similar in nature to a bulletin board system and 
 
even used a name and password for security I was right at home. And 
 
I learned even more about security.    
    
Number one. The weakest link in security is the employee using the 
 
computer! They put their password on a sticky note and paste it on 
 
their monitor so they don't forget; loan their account to fellow 
 
employees; use passwords such as "secret", "love", or their social 
 
security account number (every 14 year old wanna-be hacker has the 
 
list of most commonly used passwords). They go to lunch and leave 
 
their workstation logged into accounting records, bring in new   
 
(virus infected) programs they want to use at work and just    
generally gum up the (security) works. A good employee security  
 
education program is worth its weight in gold.    
    
And, security must be physical as well as electronic. I read a book 
 
about a group of young hackers (Inner Circle) that could not   
gain access to a mainframe because the security was well designed 
 
so they posted a kid in the lobby of the company with a   
questionnaire. He passed himself off as a high school student who 
 
had been given an information gathering assignment as a school   
project. Some of the questions asked were "What is your first and 
 
last name", "Do you use a computer at work", "Are you married",  
 
"What's your wife's name". Needless to say they were into the   
system within days.    
    
Mainframe managers are somewhat aware of this and protect their  
 
iron (computers) from anyone without proper authority but most of 
 
the LANs (Local Area Networks) I've worked with are in an area   
that's easily accessible by anyone. Remember, something as simple 
 
as a cup of coffee, or a boot disk with the proper utilities in  
 
the hands of a disgruntled stockboy can turn your data into random 
 
1s & 0s and truly ruin your day, if not your career.    
    
The system I run is called The Ring of Fire after the tectonic   
plate we live on the edge of here in California. Over time it has 
 
grown to four (4) phone lines and over 350 megabytes of   
downloadable software packages and graphics images. There are   
well over 1,000 regular callers and the system averages about 3,000 
 
calls a month but the electronic mail is where the real action is.  
 
  
The E-mail is shared with other similar computer systems all over 
 
the US and some foreign countries. Callers can leave a message in 
 
a conference and it will show up on other systems all over the   
 
country. Replies are automatically routed back to the originator 
 
and show up as return mail addressed to that person. Thus, callers 
 
can converse with a large number of diversely scattered individuals 
 
at minimal cost (usually a free local phone call). To further   
reduce online time we support SLMR off-line mail reader. With it 
 
you can download a compressed mail packet of pre-specified   
conferences then read and reply off-line with a full screen   
editor and upload a compressed set of replies.    
    
All of this runs on a Novell network that spans several computers 
 
and large hard disks, a read/write CD, Fax server AND all of our 
 
inhouse workstations. Hopefully, I'll see you online and we can  
 
continue this as an interactive discussion ;-).    
  
Author bio:  
          Bill Strouse has been a systems analyst for more    
          than twenty years now and has worked as a con-   
          sultant for IBM, Amdahl, Ford Aerospace and    
          Stanford University's SLAC (Stanford Linear    
          Accelerator).   
   
          Bill Strouse has been telecommuting since 1980    
          when he started his first electronic bulletin    
          board service, back in the CP/M days.  He has    
          been the system operator  ever since and current   
          ly has one of  Silicon Valley's most popular    
          boards, the Ring-of-Fire, at 408-453-3326 and    
          408-453-2460.  He was President of PRACSA (Public    
          Remote Access Computer Standards Association) for    
          many years before leaving three years ago to    
          found and become President of United Sysop's    
          Association, an organization of bulletin board    
          system operators and users.   
   
          Mr. Strouse is a president of Stoney River Net-   
          works, an authorized Novell Reseller.  His com-  
          pany has installed many remote communication sys-   
          tems for various clients.  He is also President    
          and Co-founder of the Silicon Valley Novell User    
          Group and serves on the Board of the Northern    
          California Netware User's Association.  Bill is    
          also the editor of NetWare News, the newsletter    
          of the California Netware Users Association.   
   
   
-------------------------End of Article---------------------  
  
WHAT DID CLYDE SAY?  
  
It's been brought to our attention that everyone that reads the  
ISSM isn't always well versed in computer terminology.  Well, in 
 
an effort to remedy that situation we will be providing an article 
 
called "Computer Speak", starting in this issue, that will be  
devoted to getting every reader to understand computer jargon.  
  We appreciate hearing from our readers about any items or topics 
 
that they would like to see appear in the ISSM. So let's keep  
hearing from you.  Just drop a note to Clyde or call.  
  
-------------------------End of Article---------------------  
  
DIGITAL SIGNATURES STILL ARE MYSTERY TO MANY IN GOVERNMENT  
     By Darryl K. Taft   
   
A fight has erupted over the government proposal of a new   
standard for digital signatures, and questions remain as to just 
 
what a digital signature and public-key encryption actually are. 
 
     The National Institute of Standards and Technology has   
proposed a standard for digital signatures that would securely   
verify a message sender's identity.   
     Miles Smid, manager of the security technology group in NIST's 
 
Computer Systems Laboratory, defined a "key" as a binary number  
 
used with an algorithm to encipher or decipher data.   
     Public-key encryption requires the use of a matched pair of 
 
such keys for each user, one that is publicly known and one that 
 
is private and known only to the user. More traditional data   
encryption methods, like the government's Data Encryption Standard 
 
(DES), require only one key to encipher and decipher data.   
     Under the old method, "if I were to scramble a message with 
 
my secret key, the only way you could descramble it would be to use 
 
my key," Smid said. DES requires exchanging secret encryption keys 
 
with each party, thus requiring prior relationships.   
     However, rather than using the same key to both encrypt and 
 
decrypt the data, public-key encryption uses a matched pair of   
encryption and decryption keys. Each key performs the inverse   
function of the other.   
     Thus, a user makes his public-key publicly available, perhaps 
 
via a directory or certifying authority, and keeps his private key 
 
secret. To send a private message, an originator scrambles his   
entire message using his intended recipient's public key. Once this 
 
is done, the message can only be decoded with the recipient's   
private key.   
     Inversely, a sender also can work over a file using his   
private key, and it can only be decoded using that sender's public 
 
key.   
     This provides the basis for the digital signature, because if 
 
you can unscramble a signature in a message with someone's public 
 
key, they had to use their private key to scramble it in the first 
 
place.   
     The proposed standard, known as the Digital Signature Standard 
 
(DSS) is based on a digital signature algorithm (DSA) derived from 
 
a concept known as ElGamal encryption. It is intended for use in 
 
electronic mail, electronic funds transfer, electronic data   
interchange, software distribution, data storage and other   
applications that require data integrity assurance and data origin 
 
authentication.   
     NIST, on Aug.30, proposed to adopt the DSS as a Federal   
Information Processing Standard (FIPS). The proposed standard   
specifies a digital signature algorithm based on a public key.   
     The government's DSS is not intended to encrypt the data in 
 
a message, but primarily to authenticate. The DSS is intended to 
 
verify the author and verify the integrity of the data in the   
message.   
     Public-key encryption algorithms are based upon what are known 
 
as "hard problems," Smid said. These hard problems are mathematical 
 
operations involving very large numbers. The government's proposed 
 
DSS uses one of a variety of public-key encryption algorithms, Smid 
 
said.   
     The NIST proposal's scheme differs markedly from that of a  
 
popular encryption system from RSA Data Security Inc. of Redwood 
 
City, Calif. The difference lies in the algorithms used to encrypt 
 
and decrypt data. Smid said the RSA algorithm is based on the   
difficulty of factoring very large numbers. This involves finding 
 
a number that is the product of two other numbers.   
     Breaking that system for a small number would be pretty   
simple, "but if I give you a large number, like 150 digits, that 
 
would be difficult. Factoring very large numbers is a difficult  
 
problem," he said.   
     The algorithm used in the NIST proposal is based upon the   
difficulty of finding discrete logarithms. Essentially, this method 
 
involves finding the remainder left over when you divide one number 
 
by another one. Again, when dealing with very large numbers this 
 
becomes a very difficult problem, Smid said.   
  
Trap Doors   
  
     RSA's president, D. James Bidzos, has attacked the NIST   
proposal as one that is not secure and that encourages trap doors. 
 
Smid said many cryptographers rate the discrete logarithm problem 
 
as more difficult or at least as difficult as the factoring method 
 
RSA uses.   
     Ironically, Tahar ElGamal, whose work is recognized in the  
 
NIST encryption scheme, is RSA's director of engineering.   
     "What NIST has proposed is a modification of the idea. Their 
 
algorithm is about half from my work and half from theirs. The key 
 
size is limited to 512 bits, which is questionable," ElGamal said. 
 
ElGamal added that while he believes the NIST proposal will work, 
 
he questions its security.   
     To use the DSS, a user need only use the system with his   
everyday mail software.   
     "What you'd see is the regular message under whatever mail  
 
system you have, but somewhere there would be a place for a digital 
 
value, from three to 500 bits of data. This would be the sender's 
 
signature. You'd have to have some software that would be able to 
 
pull off the signature and verify it," Smid said.   
     Using the DSS, messages appear "in the clear," Smid said   
because the DSS does not account for privacy. The DSS does not   
encrypt the entire message, it adds an encrypted "signature" onto 
 
the message.   
     The RSA system does allow for privacy -- with or without   
another encryption scheme. The RSA system lets the user "sign" a 
 
message with his private key and then add privacy by encrypting the 
 
message with the recipient's public key. In trying RSA Data   
Security's Mailsafe software for MS-DOS on the GCN local area   
network, we found it to work quickly and easily, whether a message 
 
was just "signed" or signed and "sealed."   
  
Signed and Sealed   
  
     Signing the message with the sender's private key put an   
encrypted digital signature at the end of an openly readable   
message. Any person receiving the message with RSA software could 
 
verify that it had not been changed and that it came from the   
sender who scrambled the signature.   
     Sealing it with the recipient's public key then scrambled the 
 
entire message so only the recipient could read it with his private 
 
key.   
     At the receiving end, we decrypted the message first with the 
 
recipient's private key, then verified the signature with the   
sender's public key.   
     Full encryption and decryption took less than five seconds  
 
each for a 10K file on AST Research Inc. Premium 386/25 computers. 
 
Varying hard-drive speeds had no measurable effect at this file  
 
size.   
     Though all this sounds very good, it appears to be practical 
 
only in close-knit computing communities. As yet, no third-party 
 
certification authorities have been established. To use these   
schemes, users must be able to verify that a public-key/private- 
 
key combination fits the right person. Without a certification   
authority this is difficult in a large network.   
     The U.S. Postal Service is vying to provide that service.   
Without certification of keys, someone could establish a key in  
 
someone else's name.   
     The 90-day comment period for the NIST proposal ends at the 
 
end of November, but NIST probably will not formally adopt the   
standard until February, Smid said. The DSS would be mandatory for 
 
federal users and for private companies protecting government data, 
 
he said.   
     Though questioning claims that the DSS is less secure than  
 
RSA's method, Smid acknowledged that the DSS lacks a necessary   
hashing function. A hashing function is a cryptographic algorithm 
 
used to create a message digest that is unique to each document, 
 
much like a fingerprint, said Bidzos. This function ensures the  
 
message has not changed since the sender "signed" it. However, Smid 
 
said NIST will deliver a hashing function soon.   
     Public-key encryption is not simply a black art that just   
happens. "To use public-key encryption, you need a system that   
knows how to use it," said Robert E. Frank, project leader for   
electronic commerce at the Lawrence Livermore National Laboratory 
 
in Livermore, Calif.   
     Frank heads a Defense Department funded project to move DOD 
 
to electronic commerce. One area his group has focused on is   
public-key encryption. The pilot system that Lawrence Livermore has 
 
developed gives users an option to use either the NIST proposal or 
 
the RSA method.   
     "Our main objective is to provide a trusted mail capability 
 
that makes it possible for vendors and government buyers to use the 
 
security features if they want to, and to use what they're most  
 
comfortable with," Frank said.   
  
Reprinted with permission by Government Computer News, October 28, 
 
1991, page 37.  Copyright 1989, Ziff-Davis Publishing Company  
  
-------------------------End of Article---------------------  
  
  
...........................................................  
A journey behind (way behind)  .        .          .    .  
.   .         .       .         .           ..         .  
 .      CYBERSPACE  .     .       ..     .         .      
     .     .           .      .       .       .       .  
hackers in their illusive world   .        ..   .      .  
...........................................................  
by Kim Clancy  
  
In the last issue of the ISSM, I explained that I would be  
documenting my journey behind hackers in cyberspace. Let me start 
 
by saying that cyberspace is fascinating; it is another world that 
 
quietly but actively exists. I mean ACTIVELY. I have no idea what 
 
the traffic is of electronic interactions but I can tell you that 
 
within minutes I can send a message to Japan and get a response. 
 
I can write this article in West Virginia and send it in electronic 
 
format to San Francisco. As a matter of fact, almost every guest 
 
article we have received has been sent to us through cyberspace. 
 
Within minutes of receiving the article, it is imported into the 
 
newsletter and finalized. This is a fascinating technology.   
  
The dark side of cyberspace  
  
  Alas, while the technology offers major advantages, it also  
offers some very frightening avenues as well. What is scary to me 
 
in regard to some of the avenues is the ability for individuals  
to get to so many different types of information, individuals that 
 
may initially be too naive to know what they are stumbling into. 
 
I am not stating that I think information should be shielded from 
 
individuals. I am saying that turning people, children for example, 
 
loose in cyberspace may have some unpleasant results. I once went 
 
to a presentation about hackers. The presenter told a story about 
 
a mother who took her child's computer modem out into the driveway 
 
and ran over it after her son had been arrested for hacking. The 
 
presenter said that you should never let your child use a modem  
unattended. While hackers spend time developing their skills and 
 
learning how to master cyberspace they also use cyberspace to share 
 
information about what they have learned. Information has been  
found on how to steal long distance phone calls from the phone  
company, how to make a pipe bomb and how to perform satanic rituals 
 
before sitting down to hack. I hesitate to write the above because 
 
I don't want people to avoid the technology. Everything I have  
found is in most libraries, but the accessibility of it through  
computers makes it much easier to obtain. In an earlier issue of 
 
the ISSM, we published a code of computer ethics being used by  
schools throughout the nation. If you have purchased a modem for 
 
your child for Christmas, you may wish to dig that issue out and 
 
go over that with him or her.  
  
On a brighter note  
  
  I thoroughly enjoy cyberspace. Cyberspace has fantastic  
legitimate resources and places to visit that are good for the  
entire family. For example, you can dial up CompuServe and get  
access to encyclopedias. This is a great way for a child to  
research a school project. The AIS Security Branch accesses  
numerous electronic bulletin boards(bbs) that keep us up to date 
 
on security issues and provides us with a network of security  
professionals. As a matter of fact, we actively participate in  
cyberspace by running our own bbs.   
  There is really no way of knowing where a person will end up once 
 
he/she starts exploring cyberspace. The technology is addictive and 
 
before you know it you are constantly searching for more computers 
 
to call and more people to learn from. Cyberspace is a great world, 
 
but if you are not careful, it can carry you away. Don't ignore the 
 
technology, if you don't know about it, you are already behind.  
Dive in, experience it, have a great time. You will be fascinated 
 
by what you discover.  
  
-------------------------End of Article---------------------  
  
          /^\  
      _ /_ \_\         /\      Clyde....dedicated to the pursuit 
 
    /  /\  \          /  \              of security ...  
  /__/   \__\        |    |  
     @  @            ______      
 __   </   __          |  
 \ \______/ /          |  
  \_______/            |  
  
  
DEAR CLYDE...responses to questions for those who are searching for 
 
             the truth............................................. 
 
  
Dear Clyde,   
     How do I select a good password?  
                      Signed, ABCDE  
  
Dear ABCDE,  
One method is to choose a 5 or 6 character word at random and then 
 
add 2 or more random characters to it.  This should give you  
something relatively easy to remember with the additional  
characters making it more difficult to compromise.  It is not a  
good practice to choose a word that can be associated with you.  
  
Send your comments or questions to Clyde c/o the AIS Security  
Branch in Parkersburg, WV, Room 1011, or leave them in Clyde's  
mailbox located on the Security bulletin boards located throughout 
 
the Parkersburg office.  You may also leave Clyde an email message 
 
on the AIS Security Branches bbs (304-420-6083)  
  
-------------------------End of Article---------------------  
  
//Computer Speak:  Computer terms and their meanings\\  
  
SYSOP n. The operator (and usually the owner) of a bulletin-board  
system.  
  
MODEM n. A device that connects a computer and a terminal via a  
telephone line. Short for modulator/demodulator.  
  
NETWORK n. A data communications system that allows a number of  
systems that allows a number of systems and devices to communicate 
 
with each other.  
  
TRAP DOOR alt. trapdoor n. A breach created intentionally in an EDP 
 
systems for the purpose of collecting, altering, or destroying  
data.  
  
HARDWARE n. Physical equipment used in data processing.  Such as 
 
PC, disk drives, mainframe, keyboard, etc.  
  
SOFTWARE n. Computer programs, procedures, rules, and possibly  
associated documentation.  
  
-------------------------End of Article---------------------  
^^^^^VIRUS FIGHTERS  
  
What is a computer virus?    
    
The term "computer virus" is derived from and analogous to a    
biological virus.  The word virus itself is Latin for poison.    
A computer virus is a computer program that will copy (infect) its 
 
code into the machine codes of other programs, and when those    
infected programs are run performing some apparently useful    
function, such as a login, it executes its hidden code performing 
 
an unwanted, usually malicious function.    
    
How does a computer virus work?    
    
A program infected with a virus and loaded and executing in the  
 
main memory of a computer can infect another executable (object) 
 
program in the computer's disk storage system by secretly    
requesting the computer's operating system to append a copy of the 
 
virus code to the object program, usually at the start.  The    
infection makes the object program slightly longer.    
When the newly infected program is itself loaded into memory and 
 
invoked, the virus in it takes control and performs hidden    
functions, such as infecting yet other object programs.  The virus 
 
may also perform destructive functions before transferring control 
 
to the original entry point.  The virus code contains a marker so 
 
that the virus won't attempt to infect a program already infected 
 
by its own kind: multiple infections would cause an object file to 
 
grow ever larger, leading to easy detection.    
The same principle works in personal computers, where floppy disks 
 
play the role of object programs in the description above.  In this 
 
case, the virus usually attacks the copy of the operating system 
 
contained on the floppy disk so that the virus is automatically  
 
invoked whenever the disk's operating system is started.  Since the 
 
operating system then resides in the PC's main memory, it can    
infect any diskettes inserted into the PC.    
    
What can be done to protect against viruses in a computer or    
workstation?    
    
An additional measure of protection can be obtained by care in the 
 
way one uses a computer.  Analogies with food and drug safety are 
 
helpful.  Just as one would not consider purchasing food or    
capsules in unsealed containers or from untrusted sources, one can 
 
refuse to use any unsealed software or software from untrusted   
 
sources.    
    
Can the operating procedures followed by those who use a computer 
 
system lower the risk?    
    
Yes!  The following are some procedures that would help lower the 
 
risk:    
    
. Never insert a diskette that has no manufacturer's seal into your 
 
  PC.    
. Never use a program borrowed from someone who does not practice 
 
  digital hygiene to your own standards.    
. Beware of software obtained from public bulletin boards.    
. Purchase programs that check other programs for known viruses. 
 
. Be wary of public domain software (including virus eradicators!). 
 
. Monitor the last-modified dates of programs and files.    
. Don't execute programs sent in electronic mail--even your friends 
 
  may have inadvertently forwarded a virus.    
. Don't let employees bring software from home, unless it is    
  approved and checked to be virus free by user management.  
    
What are some of the computer virus symptoms?    
    
When a strange behavior occurs, do not dismiss it as simply a bug.  
 
Instead, suspect a virus and respond accordingly - acting quickly 
 
may save your data.  The following are possible symptoms of a viral 
 
infection:    
    
. Strange screen graphics or displays.    
. Unexpected musical tones or sound effects.    
. Alteration of text or commands.    
. Unusual behavior on reboot.    
. Reduction in system performance.    
. Unexpected disk access patterns.    
. Changes in file length or alteration times.    
. Bugs in previously reliable software.    
. Bad sectors on floppy disks, or unusually large numbers of bad 
 
  sectors on hard disks.    
. Reduction in available memory.    
. Unexplained changes in the system clock.    
. Unknown, new files or directories/folders appearing on disk.   
 
. Problems in time-dependent tasks such as communications or     
 
  printing.    
. The system will not reset or reboot.    
  
What to do if you expect a virus.    
    
. Leave the machine on!  Any evidence of intrusion or      
  infection may be lost if the machine is powered down. Turn off  
 
  the machine only at the instruction of your management, your    
 
  security group, or your technical support group.    
. If your desk-top computer is connected to any kind of network, 
 
  break the network connection logically.    
  
NOTE: BPD EMPLOYEES MUST CONTACT THE COMMUNICATIONS BRANCH IN THE 
 
      DIVISION OF PROGRAMS AND COMMUNICATIONS (OAIS) SO THAT THEY 
 
      MAY BREAK THE PHYSICAL CONNECTION.   
   
. Let people know about your suspicions.  Alert your own      
  management.    
. Use your regular trouble reporting procedure to notify technical 
 
  support of your problem.    
    
Additional information on viruses can be obtained from publications 
 
available in the AIS Security Branch.  The information above was 
 
obtained from the publication "Computers Under Attack - Intruders, 
 
worms, and Viruses" by Peter J. Denning.    
  
-------------------------End of Article---------------------  
  
  
DON'T FORGET, THE AIS SECURITY BRANCH RUNS ITS OWN ELECTRONIC  
BULLETIN BOARD SYSTEM(BBS).  GIVE US A CALL AND LET US KNOW WHAT 
YOU THINK.  THE NUMBER IS 304-420-6083.  
  
The ISSM is a quarterly publication of the Department of Treasury, 
Bureau of the Public Debt, AIS Security Branch, 200 3rd Street,  
Parkersburg, WV  26101, (304) 420-6363.  The ISSM is also available 
in paper format.  Let us know if you would like a copy or if you 
would like to download a copy of the print file.  The print file 
can be copied to a HP II or III laser printer and you will receive 
a copy with all graphics and formatting.   
Editors:  Bob Settles, Ed Alesius, Kim Clancy, Joe Kordella


Downloaded From P-80 International Information Systems 304-744-2253