It was the NBS's turn to host the National Computer Security Conference where the Federal government was ostensibly supposed to interface with academia and the business world. At this exclusive symposium, only two years before, the Department of Defense introduced a set of guidelines which detailed security specifications to be used by the Federal agencies and recommended for the private sector.

A very dry group of techno-wizards and techno-managers and tech- no-bureaucrats assemble for several days, twice a year, to dis- cuss the latest developments in biometric identifications tech- niques, neural based cryptographic analysis, exponential factor- ing in public key management, the subtleties of discretionary access control and formalization of verification models.

The National Computer Security Center is a Department of Defense working group substantially managed by the super secret National Security Agency. The NCSC's charter in life is to establish standards and procedures for securing the US Government's comput- ers from compromise.

1985's high point was an award banquet with slightly ribald speeches. Otherwise the conference was essentially a maze of highly complex presentations, meaningless to anyone not well versed in computers, security and government-speak. An attend- ee's competence could be well gauged by his use of acronyms. "If the IRS had DAC across its X.25 gateways, it could integrate X9.17 management, DES, MAC and X9.9 could be used throughout. Save the government a bunch!" "Yeah, but the DoD had an RFI for an RFQ that became a RFP, specced by NSA and based upon TD-80-81. It was isolated, environmentally speaking." Boring, thought Miles Foster. Incredibly boring, but it was his job to sit, listen and learn.

Miles Foster was a security and communications analyst with the National Security Agency at Fort Meade, Maryland. It was part of the regimen to attend such functions to stay on top of the latest developments from elsewhere in the government and from university and private research programs.

Out of the 30 or so panels that Miles Foster had to attend, pro forma, only one held any real interest for him. It was a mathe- matical presentation entitled, "Propagation Tendencies in Self Replicating Software". It was the one subject title from the conference guide about which he knew nothing. He tried to figure out what the talk was going to be about, but the answer escaped him until he heard what Dr. Les Brown had to say.

Miles Foster wrote an encapsulated report of Dr. Brown's presen- tation with the 23 other synopses he was required to generate for the NSA. Proof of Attendance.

SUBJECT: Dr. Les Brown - Professor of Computer Science, Sheffield Univer- sity. Dr. Brown presented an updated version of his PhD thesis.

CONTENTS: Dr. Brown spoke about unique characteristics of certain software that can be written to be self-replicating. He examined the properties of software code in terms of set theory and adequately demonstrated that software can be written with the sole purpose of disguising its true intents, and then replicate or clone itself throughout a computer system without the knowledge of the computer's operators.

He further described classes of software that, if designed for specific purposes, would have undetectable characteristics. In the self replicating class, some would have crystalline behav- iors, others mutating behaviors, and others random behaviors. The set theory presentations closely paralleled biological trans- mission characteristics and similar problems with disease detec- tion and immunization.