West Chicago Another Generation of Particle Physics

West Chicago Another Generation of Particle Physics

Volume 20 Friday, October 10, 1997 Number 20 Deconstructing the Main Ring, Magnet by Magnet by Sharon Butler, Office of Public Affairs The running joke among the technicians working in the Main Ring tunnel is: “Beam by Monday, right?” Right. It’s a phrase that has roused many from a good night’s sleep over the last 25 years, when one of the balky dipoles failed, requiring replacement. But not anymore. Beam was shut off on September 15, and now, down in the location designated FZero, pipes, wires and cables dangle like amputated limbs in the space where 12-ton magnets and radiofrequency cavities once stood. Greg “Red Dog” Lawrence, who supervises the mechanical support crews dismantling the accelerator, begged to be allowed to cut out the first magnet. “I took this great big blade thing with a hammer,” he said, f “and chopped right through the bellows.” INSIDE With that first magnet free, the dismem- berment of the Main Ring began. In 1972 the 2 Computer most powerful accelerator of its time, the Main Security Ring is now yielding to the Main Injector and 4 West Chicago another generation of particle physics. Profile To save money, many of the Main Ring’s conventional, copper-coiled magnets will be 7 On the Road ripped out, reworked and recycled into the new accelerator. This refurbishment will cost about $3,000 per magnet, well below the pricetag of Using a Sawzall, a new magnet: $30,000 for a quadrupole, Chris Exline cuts a $80,000 for a dipole. magnet loose from One-sixth of the ring, the area designated the Main Ring. the F sector, however, will remain almost exactly as it is, soon to begin delivering Photo by Reidar Hahn continued on page 8 Computer “ When you connected your Security network to the Revisited Internet, you connected it to Under a new plan, Fermilab counters the latest threats from cyberspace. every hacker in by Sharon Butler, Office of Public Affairs the world.” In The Cuckoo’s Egg, Clifford Stoll, a ~ Milkyway Networks, system manager at the Lawrence Berkeley a computer Laboratory in the 1980s, documents how he tracked down an elusive electronic spy ring security firm called the Chaos Computer Club, which was breaking into systems at U.S. military bases and defense contractors and selling sensitive information to Soviet intelligence agents. As Stoll mentions in passing, before one of the central villains in his story started cruising around the network to uncover military secrets, he was attempting to hack his way into Fermilab. “When you connected your network to the Internet, you connected it to every hacker in the world,” says a brochure from Milkyway Any more about its safeguards for priority Networks, which markets computer security systems, however, the working group will not systems. “Professional and amateur hackers publicly disclose—not what those systems alike want to intercept, alter and steal your might be, nor what the tight security measures data. For profit or just for a joke.” might entail. Identifying the systems would be That in mind, a working group at Fermilab an open invitation to hackers, who, as Bruce recently developed a new, technically based Sterling writes in The Hacker Crackdown: Law computer security plan to protect data and and Disorder on the Electronic Frontier, would systems critical to the Laboratory’s operations. relish the challenge of breaking open what Computer security at Fermilab is nothing others have locked tight. “Hackers,” writes novel, of course, but the new plan both Sterling, “are absolutely soaked through with formalizes and reinvigorates longstanding antibureaucratic sentiment.” practices. Its key elements are special measures “It becomes a game,” says Gaines. “The to safeguard priority systems, a kind of rapid last thing you want to do is to challenge a deployment force to handle suspicious incidents hacker by declaring ‘This system is secure.’” and a set of “strong” rules. Tom Nash, Rapid response associate director for technology and However, the working group is eager information, formed the working group, to discuss the creation of the new Fermilab which included Irwin Gaines, computer Computer Incident Response Team (FCIRT), protection program manager; Mark Kaletka, which will investigate any “suspicious in charge of networking; Al Thomas, in charge incidents.” A suspicious incident might be of distributed computing; and Joel Butler, an unusual number of false log-ins or the head of the Computing Division. discovery that files you once had access to Critical systems are now closed—anything, according to the Photos by Jenny Mullins Under the new security plan, Thomas and security plan, that “might cause the loss of data, members of a sub-working group will be compromise security, or lead to an investigation Mark Kaletka collaborating with division and section heads by legal, law enforcement, bureaucratic or and their representatives to establish what political authorities.” Thomas calls “specialized protection FCIRT, headed by Mark Leininger, in the techniques” for critical systems. Computing Division, will investigate all reports. Through a triage system, the team will decide 2 FermiNews October 10, 1997 the seriousness of the matter. If necessary, the head of FCIRT may take over administrative control of the system involved and bring in technical experts for assistance. “This team is Fermilab’s second fire department,” says Leininger. The sooner incidents are reported, the more likely the response team will be able to prevent broad damage. “Even the best hacker takes time to penetrate from one place to another,” says Leininger. “It’s just like a fire. If you detect a little bit of smoke, you need to report it before the fire spreads and does some real damage,” Leininger adds. Photo by Reidar Hahn Strong rules personnel may implement certain services, Networking equipment To ensure that FCIRT works, the computer including, for example, newsgroups, external at the Feynman security plan has laid down two rules. network connections and addressing and Computing Center First: Users and employees must immediately naming. report any suspicious incidents, including Apart from these rules, the security plan apparent attempts at unauthorized access, to the leaves much to judgment and common sense. Customer Support Help Desk at the Feynman In a policy statement, Nash wrote: “We want Computing Center (630-840-2345) or to the there to be unhindered freedom to use system manager, if immediately available. System computers within a wide area, but this area is managers must report incidents that can’t be surrounded by extremely high walls. We cannot simply explained by the system’s routine always describe exactly where those boundaries operations. lie, because the technology is changing rapidly And second: System managers will be asked and because the walls may shift with shifts in to maintain a list of all systems for which they the public’s tolerance and areas of scrutiny. have access and must register with the computer Those who use Fermilab’s computers and protection program manager (via the Web form networks will have to use judgment and at http://miscomp.fnal.gov/sysadmindb). common sense when they operate near the That way, FCIRT will be able to reach system edges of acceptable use.” managers for help in case of a security breach. Assistance is available from Kaletka, Other than those two, there are just four whom the Computing Division has assigned Photo by Jenny Mullins more strong rules, all of them spelled out in a responsibility for education and guidance in Al Thomas recent memo sent to employees and users, and computer security matters. Kaletka is working included on Fermilab’s Web page. There are few to raise awareness among end users and system rules, says Nash, but “they will be strictly managers of the need for such routine security enforced.” measures as regularly changing passwords and Specifically, no one is permitted backing up files. End users, he says, are the first unauthorized entry to computer systems and line of defense against electronic intruders. accounts. Nor may anyone either use or even “Most unauthorized accesses can be possess security or “cracker” tools, unless prevented simply by selecting a proper password authorized. Security tools can systematically [not your spouse’s name, for example] and probe a system or network to ferret out security not revealing it to anyone,” says Kaletka. vulnerabilities. Cracker tools exploit these Both he and Nash emphasize that people vulnerabilities, so that an individual can gain are responsible for protecting their own data. unauthorized access to systems and files, destroy The directorate gets involved only if someone or steal data, or attempt other improper activities. creates a vulnerability or threat for others. “We have zero tolerance for hacking,” “If you lose your own data, we’re sorry,” says Nash. “We don’t want people playing in says Kaletka. “If you enable somebody to this area.” damage someone else’s data, then we get Fermilab is also insisting on basic standards concerned.” of ethical behavior, with computers as without. “We aren’t jack-booted thugs or the Photo by Reidar Hahn Individuals may not use their computers to network police,” adds Kaletka. In fact, he’d Mark Leininger engage in illegal or unethical behaviors, such as prefer that people think of him as just a fraud, forgery, plagiarism, harassment or libel. guidance counselor for computer security. ■ Finally, under the new security plan, central services are restricted. Only authorized FermiNews October 10, 1997 3 A Junction of Cultures: West Chicago Sense of community and a multicultural atmosphere are among town’s attributes, according to residents. by Donald Sena, Office of Public Affairs As DuPage County’s population continues European, Indian and Slavic cultures along with to explode—some cities in the county’s western the large Hispanic population.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us