Dear Readers,

The IEEE Technical Committee on Security and Privacy have long sponsored their major events, the Symposium on Security and Privacy and the Computer Security Foundations Workshop. Last year they agreed to be a technical sponsor of the Conference on Email and Anti-Spam, and they have recently added SecureComm as well. Watch our main webpage,, for announcements on these events.

Last issue we announced a new look for the Cipher on-line edition, and this issue we announce the redesign of the IEEE TC S&P page just mentioned. The Trojan Horse artwork by Howard David Johnson reiterates the TC theme in modern graphics and determines our new color scheme.

This issue of Cipher has Jeremy Epstein's notes on the ACSAC conference last month in Tucson, and I commend it to you as both interesting and illustrative of the value of personal perspectives on conference events. Be Like Jeremy and contribute to Cipher.

Cipher depends solely on volunteers, and their efforts are appreciated by readers around the globe. My thanks go to those who have contributed time and effort, and we can use more help as we strive to be more comprehensive and timely. Yong Guan of Iowa State University has been helping to redesign our "Calls-For-Papers" page, he deserves particular thanks for his time and energy.

Although it is not feature news in this Cipher issue, the recent disclosure of a compromise in a cell phone company's database of personal messages and pictures is a reminder of the ongoing challenges in computer security practice, and should serve as a spur to invention of more effective protection methods.

Gene Spafford is looking to help researchers find funding opportunities, and his new email lists for announcements related to funding is in the "Announcements" section of this newsletter.

As you travel to conferences and other security events this winter, think about contributing your comments to Cipher, or contributing a book or software review.

Whither goest the network goest thy data.

     Hilarie Orman