TEAM-ADA Archives

Team Ada: Ada Programming Language Advocacy

TEAM-ADA@LISTSERV.ACM.ORG

Options: Use Forum View

Use Proportional Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Beard, Frank" <[log in to unmask]>
Reply To:
Beard, Frank
Date:
Tue, 18 Jul 2000 22:03:27 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (61 lines)
Jim,

Currently the two are not connected.  They are two separate
networks.  E-mail can't be sent directly to the ship from the
shore from non-encrypted E-mail systems.  The message
would have to be copied (currently done by hand with pen
and paper) from the unsecure E-mail system and
re-transmitted over the encrypted ship network.

Even if they were to connect over the "commercial" internet,
they would still have NES encryption (for example) between
the systems.  So the only way it could be received is from
another authorized node with NES encryption.

Now if someone were to write the E-mail to a disk and then
re-enter it onto the encrypted system, then it might be
possible.  The Navy would probably re-institute keel-hauling
for the naval operator responsible.

Some of the Navy systems were hit by the "I Love You"
virus, but they were not the ship networks.  They were
the land based internet E-mail systems.

Frank


> -----Original Message-----
> From: jim hopper [SMTP:[log in to unmask]]
> Sent: Tuesday, July 18, 2000 9:28 PM
> To:   [log in to unmask]
> Subject:      Re: Microsoft on the new Aircraft Carrier (CVN-77)
>
> At 9:09 PM -0400 7/18/00, Beard, Frank wrote:
> >Rush wrote:
> >
> >>  God help the Navy when it's enemies discover that they can attach
> >>  a VBA or Active-X agent to a datastream and infect the entire system
> >>  with some sort of virus.
> >
> >Rush,
> >
> >While I agree with the sentiment, it won't be quite that easy.  Unless
> >the Navy diverts from using either KG krypto or NES encryption, the
> >enemy will have to penetrate one of the two before they can attach
> >the virus.  While I'm not a huge Microsoft fan, they do have some
> >useful tools, virus prone as they may be.  Since both encryption
> >methods are "heavy duty" and rotate keys frequently, you can
> >basically use just about anything behind them.  Of course it
> >never hurts to have something less vulnerable.
>
>
> what about if someone sends email from navy shore faciltiy that is
> infected?  Our army customers mail system was shut down for about a
> week over the iloveyou virus!
>
> Jim
> --
> If you wish to strive for peace of soul then believe;
> if you wish to be a devotee of truth, then inquire.
>     -- Friedrich Nietzsche

ATOM RSS1 RSS2