[fa.human-nets] HUMAN-NETS Digest V7 #10

Human-Nets-Request%rutgers@brl-bmd.UUCP (Human-Nets-Request@rutgers) (01/12/84)

HUMAN-NETS Digest       Thursday, 12 Jan 1984      Volume 7 : Issue 10

Today's Topics:
           Computers and People - New Generation Computing,
                 Computers on TV - Whiz Kids (3 msgs)
----------------------------------------------------------------------

Date: 10 Jan 1984 1313-PST
From: Ted Shapin <BEC.SHAPIN%USC-ECL@SRI-NIC>
Subject: New Generation Computing

Postal-address: Beckman Instruments, Inc.
Postal-address: 2500 Harbor X-11, Fullerton, CA 92634
Phone: (714)961-3393

I think Ron Newman's quotes on Japan's and the U.S. views on
new generation computing are very much to the point.

Since I haven't seen much discussion in Human-Nets on the subject,
here are some references:

"The Fifth Generation: Artificial Intelligence and Japan's Computer
Challenge to the World", by Edward A. Feigenbaum and Pamela McCorduck,
Addison-Wesley, 1983.

Aside from being written as though it was dictated but never edited,
and as Stewart Brand says having the flavor of "the Japanese are
coming", this book describes the purpose of computer-based expert
systems and the Japanese plan of a huge national effort to develop
them.

Somehow I can't imagine a U.S. government agency telling IBM, Amdahl,
Apple and Apollo that they must send a few of their brightest young
technical people to work on a joint project for three years, which is
essentially what is happening in Japan.

- - -

"The Mind of the Japanese Strategist" by K. Ohmae, McGraw-Hill, 1982.

This book describes how long-range planning can be done and how it was
successful in helping Japan in steel, in auto production and other
areas where Japanese industry is a leader.

- - -

The nearest thing the U.S. has done similar to the 5th generation
project is to set up the Microelectronics and Computer Technology
Corp. with Admiral Bobby Inman (retired) as head.  This is a
consortium of 14 computer and semiconductor companies that was formed
to compete head-on with advanced Japanese research.  It is privately
funded.  If you read the interview with Inman in the May 23, 1983
issue of Computerworld you will see the same emphasis on military
applications even though this is a commercial venture.

   Q. "What role, direct or otherwise, will the U.S. government play
   in MCC and if there is a role, what should be the government's
   return on investment?"

   Inman: "First, when you look at the era of great economic growth
   in the U.S. in the late '40s and '50s I believe you will find the
   impetus was in a very large measure [U.S. Defense Department]
   funding of basic research and grants to graduate education,
   without strings attached, that played a very major role not only
   in finding things that were useful in defense, but in stimulating
   tremendous commercial growth.

      Much of that was cut back in the '60s.  It wasn't cost-
   effective as one looked for ways to pay for the cost of VIetnam.
   Nobody else moved to fill the gap.

      Defense today remains the only single part of the government
   that has both the size and the scope to impact across a very
   broad range of research in the country.  So, I have watched with
   interest Defense's effort to refocus on the whole area of
   computers and software."

To answer Pournelle's question, of course DARPA is properly
interested in military applications. Unfortunately, all of the
main funding agencies in the U.S. for advanced computer research
have this as their driving interest.

- - -

Infoworld, Jan. 23, 1984, pg. 99 has an interview with Feigenbaum.

   Q. Have you seen any signs of change in the federal government's
  commitment to high-tech research and development in the areas you
  identify in the book as critical?

  Feigenbaum: There has been one very dramatic development: the
  announcement of DARPA's Strategic Computing initiative.  The
  Defense Department has, through this project, directly taken on the
  challenge of the Japanese Fifth Generation project.

- - -

The Jan. 1984 issue of IEEE Computer has a letter by Ben G.
Matley "And now, a US National computer policy?", pgs. 87-88.

  "In 1972, the Japan Computer Usage Development Institue
  published 'The Plan for an Informatin Society -- A National
  Goal Toward the Year 2000', in which it targeted nine areas for
  computer-based societal developments that would call for a $65
  billion national investment by 1985. Four tasks in the JCUDI
  plan are of particular interest:

   - Build an experimental 'Computopolis' city of the future,
     complete with computer-controlled transportation systems and
     home telematics services for work, education, and
     entertainment.

   - Build a comprehensive 'think tank' center providing
     databases with computer simulation and modeling facilities
     to be shared among both government and private researchers.

   - Organize a labor redevelopment center for the retraining and
     reeducation of older workers.

   - Implement a 'Computer Peace Corps' for transferring computer
     technology to underdeveloped countries, with the expectation
     of peace through improved economic development.

  Such ambitious plans for a totally new computer-based society
  obviously require equally ambitious plans for the development
  of a domestic computer industry.  Little wonder, then, that the
  first $250 million of the $65 billion investment went to
  establishing a domestic Japanese chip industry.  Of the nine
  areas targeted for computer-based developments under the
  JUCDI's plan, significant progress had been made in eight areas
  by 1980."

The letter goes on to mention the response of the French government
and then Matley says:

"Clearly the 'computer problems' in our society now are not apt
to yield to solutions from entrepreneurships in Silicon Valley
nor venture capital along the HiTech Hiway North of Boston. As
aviation passed from Kitty Hawk to the government's NASA, so
computing has passed from Shockley Semiconductor to sovereign
nations."

A statement I agree with!

------------------------------

Date: 10 Jan 1984 0109-PST
Subject: Re: HUMAN-NETS Digest   V7 #6
From: Ian H. Merritt <SWG.MERRITT@USC-ISIB>



I was somewhat less impressed with the Whiz Kids episode on which REM
was commenting.  I don't often watch TV at all; much less that
particular program, but I happened to be switching channels and
stumbled upon it, and out of curiousity, I watched perhaps the last
3/4 of it.

As for shutting down the entire communications network in the US, I
won't say it couldn't happen; just that it is \\HIGHLY UNLIKELY//, and
I am indeed aware of what happened here in LA.  Furthermore, the story
portrayed a disjoint sequence of events presumably leading up to the
climax of the naive 'Ritchie' (was it?) breaking into what? A payroll
system somewhere in or near the NSA? (I suspect that his account and
password from the first break-in wouldn't have worked in anything
else; his 'magic' is certainly nothing special. Presumably, the NSA
would better protect its secure information than it would its payroll
systems).

In the first place, it is not clear what purpose was served by
shutting down communications networks in the story, despite the
unlikelihood of any single entity being able to simultaneously shut
down the combined resources of every one of the probably more than 100
communications carriers in the United States.

Let's assume for a moment that the kid could indeed get into some
top-secret NSA system.  It would seem to me that it would take the
'bad guys' a considerable amount of time to figure out what was where
within this system, or even how to use it.  Time, in which the NSA
would undoubtedly discover the unauthorized access and plug the hole.

Incidentally, if someone managed to knock off the whole country's
communications systems, just how long do you think it would take
before personnel at the many administration centers around the country
NOTICED?

I think we indeed need to be prepared and aware of potential problems,
but running off and getting SCARED every time some Hollywood TV
producers decide to portray a catastrophe accomplishes nothing.

Some historical (hysterical?) notes on the LA 'demonstration'.  In
fact, the entire 'operation' involved a single, albeit important
switching system: the Los Angeles 4E tandem, which provides
connections to and from the long-distance network.  Actually, less
substantial shutdowns occurred many times on local switches and TSPS
systems over the years.  This (I speak of the more significant event,
which has, in fact, occurred several times for different reasons, and
with varying consequences, but I think REM was referring to a specific
time), as with most such manipulations was in fact not so much an act
of any technical wizardry, as one of great command of the Bureaucracy.
Somebody telephoned the central office, pretending to be Western
Electric personnel (the names of whom were most likely researched
before-hand), and instructed the craftperson at the console to install
a software patch that was itself a fairly serious bug, not, I might
add, of the phone-freak's own invention. Then, as soon as the
situation that invoked the module into which this patch had been
installed was invoked, all hell broke loose.

On other occasions, such simple methods as exercising an existing bug
in the standard software has been known to bring down an office, often
quite unintentionally.

In your efforts to not underestimate the power of a high-school kid,
you often seem to overestimate that power and danger.  We needn't be
alarmists about these things; as long as we learn from mistakes,
irrespective of who makes them.
                                                <>IHM<>

------------------------------

Date: 11 January 1984 01:24 EST
From: Andrew Scott Beals <BANDY @ MIT-ML>
Subject: Whiz kids - remote intrusion into nuclear-war

To: REM @ MIT-MC

    Date: 01/10/84 22:56:37
    From: REM at MIT-MC
    To:   BANDY
    Re:   Whiz kids - remote intrusion into nuclear-war

    Maybe some NSA person wanted to work at home and figured a
    20-character pseudo-random password would be enough?
    Nah, you're right, anything that crucial hooked to the phone
    network for home work would use encrypted packet protocol, not
    just a password.

Anything even pretending to be secure hooked into a public network
wouldn't use just >one< password .. I've talked to someone who had to
access a `top secret' computer to get something off for him to work
on... He had to go thru a long (>20 challenges/reply) sequence, and if
he got one of the wrong, or took too much time, it wouldn't boot you
off then ... it would boot you off when you were done with the
challenges ... then it'd just hang up the phone ... no "Invalid
response" or anything like that, just hang up the phone. (the file
that he got was a speech that he was supposed to work on ... I don't
think it was of a very highly secret nature)

Anyone who keeps crucial data on a system hooked to a public network
had better be more paranoid than our friends in the NSA, as there is
likely to be someone just a little bit more cleverer than the person
who made your system "secure" trying to crack your system.

        andy

ps. Down with ascii! Why don't we all use funny encrypting terminals?
(for `secure' applications)

------------------------------

Date: 11 January 1984 05:04 EST
From: Robert Elton Maas <REM @ MIT-MC>
Subject: Whiz Kids 1/7 (re: human-nets msg) / show mostly
Subject: realistic, but

To: urban @ RAND-UNIX

    From: trw-unix!trwspp!urban@Berkeley (Mike Urban)
    Date: Tuesday, 10 Jan 1984 08:34-PST
    Reply-To: Mike Urban <urban@rand-unix>

      1) "Wrench" is smart enough to come up with a 20-letter
    random password for the NSA system, but (faced with hangup
    when a zero-parity character is typed) isn't smart enough
    to try 256 different characters.  Sure.

Haven't you ever had a blind spot? You work on a computer-program bug
or a math problem or a puzzle (crossword, numerical, whatever) for
hours and can't figure out what's wrong or what the solution is; then
you ask somebody else and the answer turns out to be trivial and
you're embarrased you didn't think of it? Although the writers
probably goofed, they accidently invented the way things really are!

      2) THE BIGGEST LOGIC GAFFE: Richie is convinced that he's
    dealing with the real NSA because they take him into a big
    room (that the bad guys managed to COVERTLY stock with
    20-foot high situation monitors, etc.  Right.) AND SHOW HIM
    RALF, WHICH THE FBI HAD CONFISCATED.  When Richie looks at
    the room and breathes "Ralf!", it sure had ME convinced...
When he entered that room, he already knew (incorrectly) the fellow
was an NSA agent, because the fellow showed him his ID the day before
when they first met.

      3) The NSA knows about "Wrench"(es) but the FBI doesn't.
    Possible, but a little weird...?

This is based on the true premise that the National Security Agency
(NSA) is even more secretive than the FBI and CIA combined. Of course
they know things the FBI doesn't know, especially if it deals with
National Security.

      5) The NSA gurus know someone's penetrating their system
    (early scene in computer facility).  They don't change the
    password.  Makes sense if "wrench" is really an NSA
    audition, preposterous otherwise.

Yeah, you're right, I doubt the NSA would be so dumb. Almost anybody
in industry or government could be that dumb (anybody dumb not to
change the system-maintenance password after accepting delivery on a
brand new computer system; to whit a certain hospital and a certain
labratory near Livermore), but not the NSA!

------------------------------

End of HUMAN-NETS Digest
************************