[3320] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: October 98 SciAm: Computer Security

daemon@ATHENA.MIT.EDU (Arnold G. Reinhold)
Fri Sep 18 17:47:28 1998

In-Reply-To: 
 <Pine.GSO.3.96.980918114225.6834I-100000@techreports.jpl.nasa.gov>
Date: Fri, 18 Sep 1998 17:04:31 +0100
To: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov>,
        Cryptography List <cryptography@c2.net>
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Cc: editors@sciam.com

At 11:47 AM -0700 9/18/98, Jay D. Dyson wrote:
>
...
>
>	It is disconcerting to see the name of Carolyn Meinel listed aside
>names like Phil Zimmermann and Ron Rivest.  Ms. Meinel is not, in my view,
>even a close approximation of a security "expert."  And it would appear
>that I am not alone in this belief.  The following is attached for your
>review.
>
>- -----BEGIN FORWARDED MESSAGE-----
>Date: Fri, 18 Sep 1998 03:10:20 -0600 (MDT)
>From: Fyodor <fyodor@dhp.com>
>To: InfoSec News <isn@sekurity.org>
>Subject: Carolyn hacks Scientific American, October issue
>
>Scientific American Compromised
>http://www.dhp.com/~fyodor/meinelfraud.txt
>
>Cedar Crest, NM /InsecureWire/ -- September 16, 1998 -- In a hack which is
>arguably more devastating than the recent NYTimes fiasco, Scientific
>American's "Special Report on Security" has been compromised by notorious
>Internet con artist Carolyn P. Meinel.
>

I thought hers was one of the better articles in the issue. Most of the
others were dry as dust and contained nothing new, much as I respect their
authors. Ms. Meinel gave a very good feel for hard it is to secure a large
network. She explains how a single unauthorized modem can defeat the best
security. I liked her image of a hacker's war dialer searching for such a
modem late at night while a security guard notices that every phone in the
building was ringing in succession and doesn't report it. This article can
help senior managers understand why "buy a firewall" is not the final
answer to network security.

So what if some of the specific techniques she mentions are questionable? I
did not expect a hacking manual.
As for the erroneous comma in "telnet refrigerus.com 31,659," it may not be
her fault. Often I have had computer command strings "corrected" by editors
without checking with me first.  And if she got in Sci Am with false
credentials, that only adds a nice irony. How one knows whom to trust is
the very heart of security.

Arnold Reinhold




home help back first fref pref prev next nref lref last post