[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
- To: bill payne <[email protected]>
- Subject: Re: From: [email protected] (Marc Dacier)
- From: Anooshiravan Merat <[email protected]>
- Date: Sat, 01 Aug 1998 01:10:17 +0430
- CC: [email protected], [email protected], [email protected], masanori fushimi <[email protected]>, john gilmore <[email protected]>, [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected]
- References: <[email protected]>
- Sender: [email protected]
STOP SENDING ME EMAILS MR PAYNE
STOOOPPPP IITTTT!!!!!!
bill payne wrote:
> Friday 7/31/98 11:40 AM
>
> John Young
>
> I am looking at http://www.jya.com/raid98.htm
>
> Dacier asked me why NSA/Sandia was concerned about what
> each bit in an executable image did when I was in his office in
> Zurich in April 1997.
>
> Spiking, of course. A SECRET OTHER FUNCTION to a device.
>
> http://caq.com/cryptogate http://www.aci.net/kalliste/speccoll.htm
>
> NSA/Sandia doesn�t trust its own employees!
>
> On the other hand, NSA/Sandia employees don�t trust NSA/Sandia either.
>
> The REAL WORLD again.
>
> IBM Zurich was BIG into Java.
>
> Network World, July 20, 1998 page 6
>
> The incredible shrinking Java alliance
>
> By Chris Nerney and Andy Eddy
>
> A year ago there were four of them, members of a new alliance
> touting a potent new weapon designed to end Microsoft Corp.'s
> growing dominance in the computing industry.
> Now the Java Gang of Four is the Gang of Two and a Half.
> Java creator Sun Microsystems, Inc., of course, is still fully
> committed to the programming language, as is IBM. ...
>
> Not looking good for Java future.
>
> Java is similar to FORTH. FORTH executes super-slow on high-level
> in most machines. About 10% of the speed of a compiled-language
> program - such as Visual Basic.
>
> Specialized Forth and Java machine can be made to run fast.
> http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/
>
> But I am not confident Java or Forth machines are going anywhere.
> May be hard to get parts in the future.
>
> But I'm confident about the 80C32 supply!
> http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
>
> Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets
> settled soon so that we can move on to constructive projects.
>
> Later
> bill
>
> /\/\/\
>
> Marc
>
> Since I was working the OTHER SIDE of
>
> Recent Advances in Intrusion Detection
>
> for the FBI, I might be able to give a nice talk about what the US
> government is REALLY UP TO on defeating intrusion detection!
>
> I am not reading e-mail.
>
> best
> bill
>
> Hi Matthias!
>
> ------------------------------------------------------------------------
> Counterfeiting Wiegand Wire Access Credentials
>
> Bill Payne
>
> October 16,1996
>
> Abstract
>
> Wiegand wire access credentials are easy and
> inexpensive to counterfeit.
>
> Access Control & Security Systems Integration magazine, October
> 1996 [http://www/securitysolutions.com] published the article,
>
> Wiegand technology stands the test of time
>
> by PAUL J. BODELL, page 12
>
> Many card and reader manufacturers offer Wiegand (pronounced
> wee-gand) output. However, only three companies in the
> world make Wiegand readers. Sensor Engineering of Hamden
> Conn., holds the patent for Wiegand, and Sensor has licensed
> Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
> Germany, to manufacture Wiegand cards and readers. ... A
> Wiegand output reader is not the same thing as a Wiegand
> reader, and it is important to understand the differences.
>
> In brief, Wiegand reader use the Wiegand effect to
> translate card information around the patented Wiegand
> effect in which a segment of a specially treated wire
> generates an electronic pulse when subjected to a specific
> magnetic field. If the pulse is generated when the wire is
> near a pick-up coil, the pulse can be detected by a circuit.
> Lining up several rows of wires and passing them by a cold
> would generate a series of pulses. Lining up two rows of
> wires - calling on row "zero bits" and the other "one bits"
> - and passing them by two different coils would generate two
> series of pulses, or data bits. These data bits can then be
> interpreted as binary data and used to control other
> devices. If you seal the coils in a rugged housing with
> properly placed magnets, and LED and some simple circuitry,
> you have a Wiegand reader. Carefully laminate the special
> wires in vinyl, and artwork, and hot-stamp a number on the
> vinyl, and you have a Wiegand card.
>
> IN THE BEGINNING
>
> Wiegand was first to introduce to the access control
> market in the late 1970s. It was immediately successful
> because it filled the need for durable, secure card and
> reader technology.
> Embedded in the cards, Wiegand wires cannot be altered or
> duplicated. ...
>
> Bodell's Last statement is incorrect.
>
> Tasks for EASILY counterfeiting Wiegand wire cards are
>
> 1 Locate the wires inside the card to read the 0s and 1s.
>
> 2 Build an ACCEPTABLE copy of the card.
>
> Bodell's clear explanation of the working of a Wiegand card can
> be visualized
>
> zero row | | |
>
> one row | |
>
> binary 0 1 0 0 1
> representation
>
> Solutions to Task 1
>
> A X-ray the card
>
> B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
> Edmunds Scientific Company, catalog 16N1, page
> 205, C33,447 $11.75
>
> is placed over the top of the Wiegand card.
>
> COW MAGNET, Cow magnetics allow farmers to trap metal in the
> stomachs of their cows. Edmunds, page 204, C31,101 $10.75
> is placed under the card.
>
> Location of the wires is easily seen on the green film.
>
> Mark the position of the wires with a pen.
>
> Next chop the card vertically using a shear into about 80/1000s
> paper-match-sized strips.
>
> Don't worry about cutting a wire or two.
>
> Note that a 0 has the pen mark to the top. A 1 has the pen mark
> at the bottom.
>
> Take a business card and layout the "paper match"-like strips to
> counterfeit the card number desired.
>
> Don't worry about spacing. Wiegand output is self-clocking!
>
> Tape the "paper-match - like" strips to the business card.
>
> Only the FUNCTION of the card needs to be reproduced!
>
> History
>
> Breaking electronic locks was done as "work for others" at Sandia
>
> National Laboratories beginning in 1992 funded by the Federal
> Bureau of Investigation/Engineering Research Facility, Quantico,
> VA.
>
> The FBI opined that this work was SECRET/NATIONAL SECURITY
> INFORMATION.
>
> Details of the consequences of this work are covered in
>
> Fired Worker File Lawsuit Against Sandia
> Specialist Says He Balked When Lab Sought Electronic
> Picklock Software, Albuquer Journal, Sunday April 25, 1993
>
> State-sanctioned paranoia, EE Times, January 22, 1996
>
> One man's battle, EE Times, March 22, 1994
>
> Damn the torpedoes, EE Times, June 6, 1994
>
> Protecting properly classified info, EE Times, April 11,
> 1994
>
> DOE to scrutinize fairness in old whistle-blower cases,
> Albuquerque Tribune, Nov 7 1995
>
> DOE boss accelerates whistle-blower protection, Albuquerque
> Tribune, March 27, 1996
>
> DOE doesn't plan to compensate 'old' whistle-blowers with
> money, Albuquerque Tribune September 27, 199