I asked the lawyers here that same question and havent gotten a response yet
if it is required. If it isnt now, I imagine it will be very soon.

----- Original Message -----
From: "Ed Crowley" <[EMAIL PROTECTED]>
To: "Exchange Discussions" <[EMAIL PROTECTED]>
Sent: Wednesday, January 15, 2003 11:50 PM
Subject: RE: The SEC is killing me.


> What are you doing about instant messaging?  Don't you have to keep all
> IM transactions as well?
>
> Ed Crowley MCSE+I MVP
> Technical Consultant
> hp Services
> "There are seldom good technological solutions to behavioral problems."
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]] On Behalf Of Dupler, Craig
> Sent: Wednesday, January 15, 2003 6:34 PM
> To: Exchange Discussions
> Subject: RE: The SEC is killing me.
>
>
> This will not help you with your SEC problem.  It's just a musing and is
> merely to suggest that no audit technique is fool proof.  I think that
> any system that you can design, a clever person can get around.
>
> Let me suggest a scenario from back in the days when I was working on
> virus delivery techniques and counter measures.  The key to this
> particular "almost impossible to detect" nefarious message delivery
> technique would be to send a message to an external mailbox that had a
> client running against it with in-box rules enabled.  The client could
> parse the message and execute a script or even an external program that
> would generate another message, which could be sent to any smtp address
> (or in the case of a virus, do nefarious things on  its own local
> network).  So let's say I send a one word message to my home mailbox
> that says "hi."  That could trigger a script that sends a message to
> tell someone to sell.  Another script triggered by "dinner tonight"
> could trigger a script that generates the buy message. You get the idea.
> The offending message itself can be as simple or complex but apparently
> harmless cipher that you could imagine.  It could even be embedded in a
> pattern that looks like I'm sending a daily (or better yet, apparently
> random and occasional) note commenting on tonight's menu, with an "if
> message text contains" filter at the other end.  A hindered word note
> that contained the phrase "rare steak" could be the trigger.  The "to"
> address is not that of the ultimate recipient, and the instruction in a
> form that you could detect is beyond the reach of your archives and
> searches. There reality is, that you simply cannot filter for this sort
> of thing in your archives.  You can find someone that is being stupid or
> careless, but not someone that is cunning and deliberate.
>
> The extent to which variations on this technique can be used is
> frightening. Consider what a batch file on a DOS machine could do, in
> terms of generating an Assembly language program by having VB Script
> simply write stings from an Excel or Word document to a text file.  The
> VB Script does not even have to travel with the Office document, but can
> simply be running on the machine on the receiving end.  Such a trigger
> can be hidden behind layer upon layer of isolating techniques.  The
> initial trigger instruction does not have to be sent via SMTP.  A FAX to
> something like a SatisFAXtion modem or a call to an IVR system listening
> for a specific DMTF sequence that would not be recorded by your phone
> system can do it.  A web site can do it.  Web mail to your home smtp
> address can do it.  A cellular call . . .  You get the idea. Every link
> will leave some tracks, but those tracks can be incomplete and look very
> harmless.
>
> Back in the 80's before Microsoft Office became the dominant office
> suite, there was a product called "Smartware" by a small company in
> Lenexa, Kansas that was later purchased by Informix and destroyed.
> Smartware had the equivalent of VBA in all of its modules, and it had a
> communications module. The second version of the package even had PEEK
> and POKE instructions. Imagine what you could do with that today in and
> administrative security context on a Win2K machine in an Internet world.
>
>
> Nedry (a transposition of "nerdy") is still out there.
>
>
> -----Original Message-----
> From: Chris Scharff [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, January 15, 2003 4:45 PM
> To: Exchange Discussions
> Subject: Re: The SEC is killing me.
>
>
> There are a number of archival solutions out there. Some of them are
> listed at www.mail-resources.com in addition to the ones Gary mentioned.
> Contact me offline, I might have some other ideas.
>
> On 1/15/03 17:05, "Clemens, Rick" <[EMAIL PROTECTED]> wrote:
>
>
>
> Mixed Exchange 5.5 SP4 / Exchange 2000 SP3
> 100% Active Directory
> 100% Windows 2000 Advanced Server SP4
>
> Our Legal and Security department wants us to provide the ability to
> access
> every e-mail the company sends or receives for a period of 90 days to
> satisfy certain SEC requirements.
>
> The original plan was to Journal everything into a mailbox using an
> Exchange
>
> 5.5 server.  It worked in so far as all the mail went to the
> mailbox...but...After it got over 1000000 messages outlook didn't do a
> very
> good job searching it.
>
> So we moved the Journal to Exchange 2000 and are Indexing it.  With
> 500000
> messages so far Outlook searches it pretty fast.  So far so good.
>
> I guess my questions is....what is everyone else out there doing to
> satisfy
> SEC requirements for Electronic Documents Retention?  Is there a better
> way?
>
> Or Better Software?
>
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
>
>
>
>
>
>
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
>
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
>
>
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
>


_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to