Re: Good work by FBI and SEC on Emulex fraud case

2000-09-07 Thread Tom Vogt

Tim May wrote:
 At 11:44 AM -0700 9/6/00, Bill Stewart wrote:
 How often do people check signatures?
 If they check them, and they pass, how often do they check keys?

doesn't matter. it's POSSIBLE, that's what is important. the first time
you lose a million bucks at the exchange because you didn't check the
sig and someone else did, you'll start doing it.


 Sounds fair to me. Sounds like evolution in action.

definitely. I already suggested that my company sign PRs.




Re: Good work by FBI and SEC on Emulex fraud case

2000-09-06 Thread Bill Stewart

At 1:12 PM -0700 8/31/00, Eric Murray wrote:
A small note: IW digitally-signing the releases would not
have made a difference in this case--  the guy used his knowledge
of IW's procedures to social-engineer IW into accepting the
fake release without doing their usual checking procedures.

At 01:22 PM 8/31/00 -0700, Tim May wrote:
The system I envision would mean each chunk of text ("press release") 
would carry a digital sig, which could be checked multiple times. 
Hard for social engineering to get past the fact that Emulex, say, 
had not digitally signed their own alleged press release.

How often do people check signatures?  
If they check them, and they pass, how often do they check keys?


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Subject: Microsoft Press Release On Digital Signatures
Date:September 6, 2001

Microsoft announced today that all future press releases will
be signed with PGP digital signatures so that readers can verify
that they're reading genuine Microsoft press releases,
not forgeries from hackers trying to manipulate the stock price.
Microsoft's corporate PGP key 0xB9C8B513 is on the Network Associates 
keyservers, and you can verify the signatures there.

Microsoft's public relations department also announced that
plans for World Domination 2.0 are ahead of schedule,
and declined to comment on Bill Gates's muttered reference to the
antitrust prosecutors as a major-league %^%*@.


-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com

iQA/AwUBObaOltwjGL65yLUTEQIfNACgrmbcIwqX+u3wWmDRAShF+ydjpiYAoLwS
WZoHfvvlHEd2/0rCVSrXL60G
=g+G7
-END PGP SIGNATURE-





Re: Good work by FBI and SEC on Emulex fraud case

2000-09-06 Thread Tim May

At 11:44 AM -0700 9/6/00, Bill Stewart wrote:
  At 1:12 PM -0700 8/31/00, Eric Murray wrote:
A small note: IW digitally-signing the releases would not
have made a difference in this case--  the guy used his knowledge
of IW's procedures to social-engineer IW into accepting the
fake release without doing their usual checking procedures.

At 01:22 PM 8/31/00 -0700, Tim May wrote:
The system I envision would mean each chunk of text ("press release")
would carry a digital sig, which could be checked multiple times.
Hard for social engineering to get past the fact that Emulex, say,
had not digitally signed their own alleged press release.

How often do people check signatures?
If they check them, and they pass, how often do they check keys?



Don't know. But not the problem of those issuing press releases. That 
_some_ people check signatures, whether electronic or inked, and 
_other_ people _don't_ doesn't lessen the significance of signing.

Those who bother to check a putative press release and find the 
attached signature doesn't match what they have seen from Web sites 
(and related "widely witnessed events," including hashes published in 
the company's financial documents, etc.) will have competitive 
advantages over those who don't bother to check and just hit the 
panic button.

Sounds fair to me. Sounds like evolution in action.


--Tim May

-- 
-:-:-:-:-:-:-:
Timothy C. May  | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon" | black markets, collapse of governments.




Re: Good work by FBI and SEC on Emulex fraud case

2000-09-01 Thread Sampo A Syreeni

On Thu, 31 Aug 2000, Eric Murray wrote:

A small note: IW digitally-signing the releases would not
have made a difference in this case--  the guy used his knowledge
of IW's procedures to social-engineer IW into accepting the
fake release without doing their usual checking procedures.

So essentially what you are saying is that this was not computer crime. We
do not need a Big Brotherish society to thwart computer crime, especially if
it's not computer crime in the first place.

When/if we do ever have the common use of digitally-signed PR, documents
etc, I wonder how much people will be fooled into thinking that the
contents must be correct, because after all, they're signed?

Well at least in that case, assuming those holding the authentication keys
know what they're doing and guard their bits, the source of the information
is attributable to someone, which enormously facilitates plain old police
work.

Sampo Syreeni [EMAIL PROTECTED], aka decoy, student/math/Helsinki university




Re: Good work by FBI and SEC on Emulex fraud case

2000-09-01 Thread petro

Mr. May said:

(News services still have some role, of course.)

Of course, one of there roles could be "verification" of the 
press release, i.e. Emulex signs it, and rather than having to have 
985,234,003 keys on my key ring to verify every press release I read, 
the News Service can sign the whole thing saying "we witness that 
this press release was signed with the proper key"..
-- 
A quote from Petro's Archives:   ***
Today good taste is often erroneously rejected as old-fashioned
because ordinary man, seeking approval of his so-called personality,
prefers to follow the dictates of his own peculiar style rather than
submit to any objective criterion of taste.--Jan Tschichold




Good work by FBI and SEC on Emulex fraud case

2000-08-31 Thread Tim May


I just watched the live press conference by the FBI, District 
Attorney's Office, and SEC folks. The full story should be on Yahoo 
and other news sites. The gist is that an arrest was made this 
morning.

A former Internet Wire employee, who left in early August, was the 
arrestee. Internet Wire was of course the service which passed on the 
false press release.

The e-mail was traced back to a public access computer at El Camino 
Community College, in the LA area. The arrestee was enrolled during 
the summer at this college, was known to use these computers, and in 
fact was seen last Thursday night using the public computers, at the 
time when the e-mail was sent from one of these computers (in a media 
lab of some sort).

The cops apparently correlated former and current Internet Wire (and 
probably other companies, like Emulex, Bloomberg, PR Newswire, etc.) 
with employees and students at El Camino.

The FBI/SEC obtained his stock trading records, determined that he 
had shorted Emulex at around $70, had then lost a lot of money as 
Emulex went up above $100, and then had bought stock in Emulex as the 
stock fell to $45 after the hoax. (There may have been various put 
and call trades...consult the detailed stories.)

In short, this was classic FBI and law enforcement legwork: 
correlations, subpoenas, and, as appropriate and with warrants, 
searches and arrests.

Kudos.

I mention this here on Cypherpunks because this is an example of how 
law enforcement should work.

By contrast, imagine the enforcement protocol in a Big Brotherish 
world of intercepts, escrow, bans on encryption, etc.

There _was_ some rhetoric at the press conference about "hiding 
behind the Internet." Of course, this message was not "strongly 
untraceable." It was almost trivially traceable. And traced to a 
former employee (probably disgruntled, but I am only speculating) of 
Internet Wire who had specific knowledge of how press releases were 
handled, how the authentication could be spoofed, etc.

Now, what if the perp had used "Cypherpunks technologies"? Aside from 
the likely subpoenas of Anonymizer, Inc., and varous remailers, the 
cops could have sought search warrants of the employees who departed, 
obtained records of their stock trades, etc.

Someday, truly strong methods will be more widespread. Along with 
trading accounts unlinkable to meatspace names.

Will this thwart such efforts to catch fraudsters? To some extent, yes.

However, such a world will produce other changes which work in the 
other direction. Digitally-signed press releases, for example, are 
easy to do. (And I expect them to start happening Real Soon Now. 
Possibly with the strong urging of the SEC and others.)

So, kudos to the FBI and SEC for their detective work. And let it be 
a lesson that we don't need a Big Brother world to stop computer 
crime.

--Tim May
-- 
-:-:-:-:-:-:-:
Timothy C. May  | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon" | black markets, collapse of governments.




Re: Good work by FBI and SEC on Emulex fraud case

2000-08-31 Thread Eric Murray

On Thu, Aug 31, 2000 at 12:50:58PM -0700, Tim May wrote:
 
 
 I just watched the live press conference by the FBI, District 
 Attorney's Office, and SEC folks. The full story should be on Yahoo 
 and other news sites. The gist is that an arrest was made this 
 morning.
 
 A former Internet Wire employee, who left in early August, was the 
 arrestee. Internet Wire was of course the service which passed on the 
 false press release.
 

[...]

 
 However, such a world will produce other changes which work in the 
 other direction. Digitally-signed press releases, for example, are 
 easy to do. (And I expect them to start happening Real Soon Now. 
 Possibly with the strong urging of the SEC and others.)

A small note: IW digitally-signing the releases would not
have made a difference in this case--  the guy used his knowledge
of IW's procedures to social-engineer IW into accepting the
fake release without doing their usual checking procedures.
The story last saturday in the Merc about this said something
to the effect that he'd fooled the "day staff" into beleiving
that the "night staff" had already approved the release, and thus
the "day staff" didn't need to do any fact checking.

If they did digitally sign the releases, this one would have been
so signed.  Of course that doesn't make it any less untrue.  The
signature just protects it from detectable modification _after_
it's been sent.

When/if we do ever have the common use of digitally-signed PR, documents
etc, I wonder how much people will be fooled into thinking that the
contents must be correct, because after all, they're signed?


-- 
  Eric Murray http://www.lne.com/ericm  ericm at lne.com  PGP keyid:E03F65E5
 Consulting Security Architect