[2417] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, December 12, 2011

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Dec 12 15:22:02 2011

From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Mon, 12 Dec 2011 20:21:00 +0000
Message-ID: <CB0BCC5A.20FD0%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0047896366=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============0047896366==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CB0BCC5A20FD0myeatonexchangemitedu_"

--_000_CB0BCC5A20FD0myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. EVENT: Laptop Tagging at IS&T on 12/14

2. The Panic Around Carrier IQ Software

3. Data Privacy Awareness in January



--------------------------------------------------------

1. EVENT: Laptop Tagging at IS&T on 12/14

--------------------------------------------------------


Did you know that at least 23 laptops were stolen from campus this past Nov=
ember?


This Wednesday from 11:30 am to 1:00 pm, the IS&T Help Desk at E17 (40 Ames=
 St)<http://whereis.mit.edu/?go=3De17> is hosting laptop tagging and regist=
ration provided by the MIT Police Crime Prevention Unit.


STOP tags<http://www.stoptheft.com/site/index.php> are a theft deterrent de=
vice<http://ist.mit.edu/security/loss/deterrents> and can help to return st=
olen laptops or other mobile devices to their owner. A tag is affixed to th=
e cover of your laptop (iPads, smart phones and hard drives can also be tag=
ged) and your contact information as well as identifying information about =
the laptop is entered into a database.


The service requires a $10 fee, paid in cash, or by using an MIT cost objec=
t code. Bring your laptop or item to be tagged.


Next upcoming opportunities<http://kb.mit.edu/confluence/x/e4CSAw> are post=
ed in the Hermes knowledge base.


Also, if you have not yet switched your wireless network access from MIT to=
 MIT SECURE, a Help Desk consultant will be on hand at the event to help yo=
u. The MIT open wireless network will be retired in 2012, and IS&T recommen=
ds that you make the switch as soon as possible.



---------------------------------------------------

2. The Panic Around Carrier IQ Software

---------------------------------------------------


As an InfoWorld article states<http://www.infoworld.com/t/cringely/carrier-=
iq-isnt-spying-you-swears-carrier-iq-180732>: "It's been an interesting few=
 days for Carrier IQ, the formerly obscure mobile software company now at t=
he center of a Category 5 media hurricane<http://www.infoworld.com/t/cringe=
ly/carrier-iq-spying-your-cellphone-180425>."


If you have not been following this in the news, the most serious charge ag=
ainst Carrier IQ, a venture capital-funded startup in Mountain View, Calif.=
, that makes diagnostic software for carriers, has been that it records key=
strokes and transmits them to carriers. There's zero evidence that Carrier =
IQ captured, recorded, or transmitted any keystrokes.


Carrier IQ has released a statement posted here<http://www.businesswire.com=
/news/home/20111201006857/en/Carrier-IQ-Updates-Statement-Operators-Carrier=
-IQ>. To sum up, Carrier IQ marketing manager says that the software is use=
d for: "=85 gathering information off the handset to understand the mobile-=
user experience, where phone calls are dropped, where signal quality is poo=
r, why applications crash and battery life."



------------------------------------------------

3. Data Privacy Awareness in January

------------------------------------------------


Data Privacy Day<http://dataprivacyday2011.org/> on January 28, 2012 is aim=
ed at raising awareness around the importance of protecting personal identi=
ties. EDUCAUSE is expanding the day into a whole month<http://www.educause.=
edu/blog/fyfthgeer/JanuaryisDataPrivacyMonthFreeW/242849> of activities and=
 resources around this topic.


Here at MIT we handle, share, store and dispose of personal information on =
a regular basis.  Are we doing what we can to protect this information from=
 exposure?


If you would like to find out more, come to one of the two IAP sessions ent=
itled "Data Protection @ MIT"<http://student.mit.edu/searchiap/iap-a709.htm=
l> this January on the 12th and 26th from 1:00 - 2:30 pm in the E17 Learnin=
g Center. It is hosted by Monique Yeaton and Tim McGovern of the IT Securit=
y Systems and Services team in IS&T.


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D



Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CB0BCC5A20FD0myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <B898D0B50BF47D479F6D6C2EDDCA370F@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<div>
<div><br>
</div>
<div><span class=3D"Apple-style-span" style=3D"font-family: Helvetica; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
 font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
 text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
 normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
 white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
 2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; ">
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. EVENT: =
Laptop Tagging at IS&amp;T on 12/14</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. The Pan=
ic Around Carrier IQ Software</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Data Pr=
ivacy Awareness in January</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. EVENT: =
Laptop Tagging at IS&amp;T on 12/14</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Did you kn=
ow that at least 23 laptops were stolen from campus this past November?&nbs=
p;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">This Wedne=
sday from 11:30 am to 1:00 pm, the IS&amp;T Help Desk at
<a href=3D"http://whereis.mit.edu/?go=3De17"><span style=3D"text-decoration=
: underline ; color: #1e37ee">E17 (40 Ames St)</span></a> is hosting laptop=
 tagging and registration provided by the MIT Police Crime Prevention Unit.=
&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><span styl=
e=3D"text-decoration: underline ; color: #1e37ee"><a href=3D"http://www.sto=
ptheft.com/site/index.php">STOP tags</a></span> are a
<a href=3D"http://ist.mit.edu/security/loss/deterrents"><span style=3D"text=
-decoration: underline ; color: #1e37ee">theft deterrent device</span></a> =
and can help to return stolen laptops or other mobile devices to their owne=
r. A tag is affixed to the cover of
 your laptop (iPads, smart phones and hard drives can also be tagged) and y=
our contact information as well as identifying information about the laptop=
 is entered into a database.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The servic=
e requires a $10 fee, paid in cash, or by using an MIT cost object code. Br=
ing your laptop or item to be tagged.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><span styl=
e=3D"text-decoration: underline ; color: #1e37ee"><a href=3D"http://kb.mit.=
edu/confluence/x/e4CSAw">Next upcoming opportunities</a></span> are posted =
in the Hermes knowledge base.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Also, if y=
ou have not yet switched your wireless network access from MIT to MIT SECUR=
E, a Help Desk consultant will be on hand at the event to help you. The MIT=
 open wireless network will be retired
 in 2012, and IS&amp;T recommends that you make the switch as soon as possi=
ble.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. The Pan=
ic Around Carrier IQ Software</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">As <a href=
=3D"http://www.infoworld.com/t/cringely/carrier-iq-isnt-spying-you-swears-c=
arrier-iq-180732">
an InfoWorld article states</a>: &quot;It's been an interesting few days fo=
r Carrier IQ, the formerly obscure mobile software company now
<a href=3D"http://www.infoworld.com/t/cringely/carrier-iq-spying-your-cellp=
hone-180425">
at the center of a Category 5 media hurricane</a>.&quot;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you hav=
e not been following this in the news, the most serious charge against Carr=
ier IQ, a venture capital-funded startup in Mountain View, Calif., that mak=
es diagnostic software for carriers,
 has been that it records keystrokes and transmits them to carriers. There'=
s zero evidence that Carrier IQ captured, recorded, or transmitted any keys=
trokes.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Carrier IQ=
 has released a statement posted
<a href=3D"http://www.businesswire.com/news/home/20111201006857/en/Carrier-=
IQ-Updates-Statement-Operators-Carrier-IQ">
here</a>. To sum up, Carrier IQ marketing manager says that the software is=
 used for: &quot;=85 gathering information off the handset to understand th=
e mobile-user experience, where phone calls are dropped, where signal quali=
ty is poor, why applications crash and
 battery life.&quot;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Data Pr=
ivacy Awareness in January</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"http://dataprivacyday2011.org/">Data Privacy Day</a> on January 28, 2012 i=
s aimed at raising awareness around the importance of protecting personal i=
dentities.
<a href=3D"http://www.educause.edu/blog/fyfthgeer/JanuaryisDataPrivacyMonth=
FreeW/242849">
EDUCAUSE is expanding the day into a whole month</a> of activities and reso=
urces around this topic.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Here at MI=
T we handle, share, store and dispose of personal information on a regular =
basis.&nbsp; Are we doing what we can to protect this information from expo=
sure?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you wou=
ld like to find out more, come to one of the two
<a href=3D"http://student.mit.edu/searchiap/iap-a709.html">IAP sessions ent=
itled &quot;Data Protection @ MIT&quot;</a> this January on the 12th and 26=
th from 1:00 - 2:30 pm in the E17 Learning Center. It is hosted by Monique =
Yeaton and Tim McGovern of the IT Security Systems
 and Services team in IS&amp;T.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; ">Monique
 Yeaton</span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
 Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
 Information Services &amp; Technology (IS&amp;T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
 253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</span></div>
</div>
</div>
</body>
</html>

--_000_CB0BCC5A20FD0myeatonexchangemitedu_--

--===============0047896366==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0047896366==--

home help back first fref pref prev next nref lref last post