[118296] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: NCSC

daemon@ATHENA.MIT.EDU (Tim May)
Fri Sep 24 20:17:12 1999

Message-Id: <v03130301b41039d15526@[207.111.241.5]>
In-Reply-To: <v04220603b41029402890@[141.142.22.21]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Thu, 23 Sep 1999 13:13:04 -0700
To: Matt Elliott <melliott@ncsa.uiuc.edu>, cypherpunks@Algebra.COM
From: Tim May <tcmay@got.net>
Reply-To: Tim May <tcmay@got.net>

At 12:01 PM -0700 1999-09-23, Matt Elliott wrote:
>>Anyone unable to figure out that of the various "NCSC" hits returned the
>>relevant one is the National Computer Security Center is just damned dumb
>>to be on this list.
>>
>>Perhaps you are too.
>
>Perhaps, but I think I'll stick around for a while.  Never did see a
>National Computer Security Center in the list returned from my Sherlock
>request.

It popped up immediately for me. For example:

The NSA National Computer Security Center Trusted Products Evaluation
Program also has some resources along these lines, including:

       Rainbow Series Library
       Evaluated Products List

       NSA/NCSC Rainbow Series

       NCSC-TG-001 [Tan Book]
              A Guide to Understanding Audit in Trusted Systems [Version 2
6/01/88]
       NCSC-TG-002 [Bright Blue Book]
              Trusted Product Evaluation - A Guide for Vendors [Version 1
3/1/88]
       NCSC-TG-003 [Orange Book]
              A Guide to Understanding Discretionary Access Control in
Trusted Systems [Version 1, 9/30/87]
       NCSC-TG-004 [Aqua Book]
              Glossary of Computer Security Terms [Version 1, 10/21/88]
       NCSC-TG-005 [Red Book]
              Trusted Network Interpretation [Version 1 7/31/87]
       NCSC-TG-006 [Orange Book]
              A Guide to Understanding Configuration management in Trusted
Systems [Version 1, 3/28/88]

etc.

As I said, context is critical. What are you doing on the Cypherpunks list
if you can't either spot the contextual clues or use CP-related keywords to
winnow your search returns?

Not to mention that Bamford, Kahn, and articles by Levy and others have
covered the NSA and NCSC ad nauseum.


--Tim May


Y2K: It's not the odds, it's the stakes.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon"             | black markets, collapse of governments.



home help back first fref pref prev next nref lref last post