RISKS Forum mailing list archives

Risks Digest 22.77


From: RISKS List Owner <risko () csl sri com>
Date: Wed, 18 Jun 2003 10:41:46 PDT

RISKS-LIST: Risks-Forum Digest  Wednesday 18 June 2003  Volume 22 : Issue 77

   FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
   ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at http://www.risks.org as
  http://catless.ncl.ac.uk/Risks/22.77.html
The current issue can be found at
  http://www.csl.sri.com/users/risko/risks.txt

  Contents:
Cyberterrorists in the U.S. Senate (Curt Sampson)
Digital mobile phones can phreak pacemakers (George Michaelson)
United Airlines to offer e-mail on domestic flights (NewsScan)
$24-million spreadsheet "boo-boo" (Jonathan Levine)
Crash loses names of Canadian firearms registrants (Derek K. Miller)
Scotland Yard outage chaos (Dave Austin)
eBay fraud (John Reinke)
Tiny tracking chips surface in retail use (Monty Solomon)
Smart cellphone would spend your money (Steve Holzworth)
Virginia grievance system online - with a slight problem (Jeremy Epstein)
Sign someone up to be an organ donor! (Giles Todd)
Continental Airlines check-in computer foul-up (Steve Bellovin)
Downloading data can turn your computer into a server (greep)
Re: U of Calgary to teach virus writing (Crispin Cowan)
Computer bugs and believing reliable sources (Mark Brader)
Re: Slade's Review of Mission Critical Security Planner (Eric Greenberg)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Wed, 18 Jun 2003 14:56:12 +0900 (JST)
From: Curt Sampson <cjs () cynic net>
Subject: Cyberterrorists in the U.S. Senate

  The chairman of the Senate Judiciary Committee [Sen. Orrin Hatch, R-Utah]
  said Tuesday he favors developing new technology to remotely destroy the
  computers of people who illegally download music from the Internet.
  http://www.salon.com/tech/wire/2003/06/17/hatch_download/

I don't know that there's much more to be said.

Curt Sampson  <cjs () cynic net>   +81 90 7737 2974   http://www.netbsd.org

  [There's lots more to be said.  For example, some software vendors would
  like to do that to their competitors, not just to their customers.  PGN]

------------------------------

Date: Thu, 12 Jun 2003 10:02:57 +1000
From: George Michaelson <ggm () apnic net>
Subject: Digital mobile phones can phreak pacemakers
 
http://www.newsfactor.com/perl/story/21695.html

The new generation of digital mobile phones can interfere with many types of
heart pacemakers, claims a new study in the Institute of Physics journal
Physics in Medicine and Biology. Pacemakers can confuse mobile-phone signals
with the heart's own electrical signals, causing a malfunction.

George Michaelson, APNIC, PO Box 2131 Milton QLD 4064, Australia
  +61 7 3367 0490  http://www.apnic.net  ggm () apnic net

------------------------------

Date: Wed, 18 Jun 2003 08:35:11 -0700
From: "NewsScan" <newsscan () newsscan com>
Subject: United Airlines to offer e-mail on domestic flights

By the end of the year, United Airlines will become the first domestic
airline to offer e-mail on all of its domestic flights.  Industry analyst
Jonathan Gaw of IDC says the service will be a good attraction for business
users, who both need their e-mail and who can expense it."  For $15.98 a
flight, a passenger will be able to send and receive e-mail and attachments,
by connecting a laptop computer to a jack on the Verizon Airfone handset
available throughout the plane.  [*Baltimore Sun*, 18 Jun 2003; NewsScan
Daily, 18 June 2003]
  http://www.sunspot.net/technology/bal-bz.email18jun18,0,7414783.story
  ?coll=bal-technology-headlines

  [And I presume first-class passengers will be offered a plate of Spam as
  an appetizer, with Monterey Jack.  (And why is Jack always female in this
  context?)  What about people SENDING spam from the plane?  What about spam
  filters for incoming e-mail?  Nothing like sitting on a 6-hour flight and
  watching your spam pile up.  PGN]

------------------------------

Date: Wed, 4 Jun 2003 17:08:10 -0600
From: Victor the Cleaner <jonathan () canuck com>
Subject: $24-million spreadsheet "boo-boo"

From *The Calgary Sun*, 4 Jun 2003:

  TransAlta Corp said yesterday a "clerical error" was a costly one for the
  power producer -- $24 million US to be exact.  The Calgary-based company
  said a spreadsheet goof by an employee last April caused the company to
  pay higher than intended rates to ship power in New York.  CEO Steve
  Snyder told a conference call yesterday a "cut-and-paste" foul-up in an
  Excel spreadsheet on a bid to New York's power grid operator led TransAlta
  to secure 15 times the capacity of power lines at 10 times the price.  The
  costly human error couldn't be reversed by the grid operator and while
  TransAlta has since tried to recoup the mammoth losses, it was left with a
  $24-million US lesson.  [...]

The RISKS?  Jeez, where do you start?  This sort of thing is becoming so
depressingly common that it barely makes print.  Enormously complicated and
powerful tools that are capable of simultaneously magnifying minor errors
and burying from sight the megabuck consequences?  The apparent "we're
terribly sorry, but our computers aren't programmed to issue refunds"
response of the "New York power grid operator"?

Jonathan Levine, Middle Digital Inc. http://www.realweasel.com
  [Also noted by Morty Ovits.
     http://reddeeradvocate.com/editorials/radB948F.htm
   and George N. White III.  PGN]

------------------------------

Date: Wed, 04 Jun 2003 15:29:19 -0700
From: "Derek K. Miller" <dkmiller () pobox com>
Subject: Crash loses names of Canadian firearms registrants

A database crash now threatens to turn people trying to comply with an
unpopular law into lawbreakers instead.

The Canadian government has been attempting to implement a nationwide
firearms registry for several years now.  What was originally supposed to
cost at most a few million dollars to document every previously undocumented
rifle or shotgun in the country has now ballooned into a $1 billion-plus
megaproject that appears not to work.

http://www.cbc.ca/news/features/firearms_act.html

Even those, like me, who are firmly for Canada's strong gun-control laws
find the way this project has been put together to be laughable (and that's
a charitable assessment). In many rural parts of Canada, a long gun is a
necessity, at least to hunt for food or as protection against potentially
dangerous wildlife (everything from polar bears to moose and wolverines,
depending on where you are) for people living or working in the bush, from
native communities to petroleum exploration teams.

The latest registry mishap to come to light is that the database software,
overloaded before the registration deadline was extended several months from
its original 1 January 2003 date, crashed, and apparently took some
registrants' names with it. No one seems to know how many, and I haven't
been able to track down any details of the kinds of software or platforms
that were in use.

http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/1054726691584_31/

To add to the federal government's trouble, a number of provinces have now
said they will refuse to prosecute people who flout the act by not
registering their guns -- and there are many such scofflaws.

From the CTV article above:
The federal Firearms Act and the Criminal Code state that anyone possessing a
firearm as defined in Section 2 of the Code must hold a valid firearms
registration certificate. The new legislation requires that owners of
long-guns such as rifles and shotguns, register their weapons by July 1 or
face legal action.

Critics of the gun registry have argued that the legislation is nothing more
than a costly waste of time.

The auditor general has projected it could end up costing more than $1
billion by 2005 rather than the net $2 million over 10 years projected
when it was established in 1995. And many say people who would use their
firearms for violent offences aren't likely to register their guns anyway.

Aside from the direct risks of setting up a database without the bandwidth
or computational headroom for large increases of traffic before a deadline,
lacking proper file journaling, and insufficiently backed up, there is the
additional risk that the predictable failure of such a system will cast
further bad light on a project already suffering from a reputation for
inefficiency and poor planning.

Derek K. Miller - dkmiller () pobox com
  [Also noted by Dan Haggarty.  PGN]

------------------------------

Date: Fri, 6 Jun 2003 11:01:37 +0100
From: "Dave Austin" <dave.austin () insight co uk>
Subject: Scotland Yard outage chaos 

I thought that this was of interest, an old risk but surprising to find such
a high profile building vulnerable:

Yard crisis as power fails , 4 Jun 2003 

Scotland Yard was plunged into crisis today by a massive power and
communications failure.  All phones in the building were cut off as all
lines to the Yard were down, while the central system for handling 999 calls
also failed and had to be switched to local police stations.  Computers
which log emergency and other calls to police in London - known as the CAD
system - failed, along with a second system to Hendon which was supposed to
provide an emergency back-up.  Emergency generators restored power to the
building, but officers had to resort to using mobile phones.  A group of
senior officers was called together to handle the crisis. One police source
said the meeting had examined the possibility that the power failure was a
terrorist or a criminal act, though this had been ruled out.  The failure
showed the vulnerability of the Yard's communications network at a time when
London is on alert for a possible terrorist outrage.  The phones and
electricity crashed at about 9.30am and were still out of action two hours
later. A Yard spokesman said the crisis was caused by a single workman
cutting through an electricity cable in the Victoria area, and that the
company's chief executive had personally apologised to senior officers.  As
engineers from the Yard and outside companies were working flat-out to solve
the problem, the police spokesman emphasised that officers were still
responding to 999 calls which had been routed through the main London police
stations.  "We have contingency plans in place which are working well,"
added the spokesman. "We are still able to provide emergency cover for
London.  "This is a serious matter and we are seeking to bring the building
back on-line as quickly as possible."  One employee at the building said:
"We're in the hands of the engineers." Asked if it was causing huge
problems, he said: "You could say that."  Visitors to the Yard's reception
who had fixed appointments were told they couldn't be seen today because of
"internal communication problems".  Staff at reception were unable to make
internal phone calls and unless visitors had the mobile phone numbers of
staff they were due to meet, they were told they would not be able to see
them.  Other buildings in the area were also affected by the blackout.
London Ambulance said its 999 service was still operational but calls were
being handled on paper for about an hour and a half while the power was
disrupted. Scotland Yard has contingency plans to relocate its emergency
systems and senior officers in the event of a massive crisis such as a
terrorist attack.  However, this did not happen this morning.  Another
police source said: "This could come from the plot of a film.  "One wonders
whether there is a massive criminal heist going on somewhere in London.
"The fact that someone can bring the building to a halt by cutting a single
cable is a little alarming.  "I am sure there will be a few internal
inquiries about this."

Police chiefs told to explain blackout 

5 June 2003 

Police chiefs have been ordered to provide a full report into the power
failure which led to computers and telephones at Scotland Yard crashing for
more than seven hours.  Toby Harris, chair of the Metropolitan Police
Authority, said there were "grave concerns" after an engineer blacked out
the HQ yesterday by accidentally cutting a single cable in the street.  He
added it called into question the Met's ability to cope in a crisis.

Source: (London) Evening Standard - also covered in The Times et al.

Dave Austin <dave.austin () insight co uk>  www.insight.co.uk

------------------------------

Date: Fri, 13 Jun 2003 09:14:12 -0400
From: "John Reinke" <reinke () att net>
Subject: eBay fraud

Police in South Salt Lake, Utah, are working with eBay to determine just how
many people were victimized by what authorities say was one of the biggest
frauds in the auction site's history.  Police arrested 31-year-old Russell
Dana Smith last weekend after hundreds of auction winners complained that
they sent $1,000 or more to a company named Liquidation Universe for laptop
computers they never received.  Police say the firm appears to have raked in
$1 million from about 1,000 victims in just a few weeks.  [...] [Source: Bob
Sullivan, MSNBC, Man arrested in huge eBay fraud; Buyers criticize auction
site's seller verification service]
  http://www.msnbc.com/news/925433.asp?0dm=C12LT

[FJR: Guarantees are only as good as the guarantor. There ain't no free
lunch. When will people take security seriously?]
  [This one is a long and ugly story.  PGN]

------------------------------

Date: Tue, 10 Jun 2003 01:34:38 -0400
From: Monty Solomon <monty () roscom com>
Subject: Tiny tracking chips surface in retail use

Tom Pounds waved his overflowing grocery basket at the wall and offered a
glimpse of our shopping future.  The coffee cans, razor blades, and other
items in his basket each carried a stowaway -- a tiny chip, the size of a
fleck of black pepper, coupled with an antenna.  Each emitted a short burst
of identifying data that streamed via radio waves to a sensor on the wall.
[...] Within fractions of a second, a computer translated those received
signals onto a monitor as images of each product in the basket.  [...]  In
15 or 20 years, futurists predict, the pervasive RFID tags will link to
massive computer networks, enabling speedy checkout from the grocery store,
medicine cabinets that tell you when to take pills, and milk cartons that
inform your fridge when to add another gallon to the grocery list.  [...]
[Source: Chris Gaither, Radio Frequency Identification Tiny tracking chips
surface in retail use Retail uses for ID chips surfacing, *The Boston
Globe*, 9 Jun 2003]
  http://www.boston.com/dailyglobe2/160/business/
  Tiny_tracking_chips_surface_in_retail_use+.shtml

------------------------------

Date: Tue, 17 Jun 2003 11:32:52 -0400
From: Steve Holzworth <sch () unx sas com>
Subject: Smart cellphone would spend your money

  "A consortium of the world's top consumer electronics firms, mobile
  networks and broadcasters are funding the development of cellphones that
  will spend money on your behalf. The consortium, called Mobile VCE,
  includes Nokia, Sony, Vodafone and the BBC.  It might sound like a
  bankruptcy waiting to happen, but software engineer Nick Jennings is
  supremely confident the phones will not mess up anybody's life.  [...]
  The cellphone agents only offer help if triggered by a diary event or if a
  definite pattern of behaviour, such as going to the movies every Friday,
  has been established."  [Source: New Scientist]
    http://www.newscientist.com/news/news.jsp?id=ns99993818

[SCH - how many "supremely confident" software engineers have watched
as their rocket booster exploded, their online store got hacked, etc.?]

What mechanisms will be in place to dispute or refuse purchases that your
cellphone agent makes on your behalf?  Be *sure* that you always want to go
to the movies every Friday...

I own a DirecTivo video recorder, which has a similar agent-like process
that automatically records "suggested" programs for you, based on analyzing
your previous viewing habits.  I'm still often amused by some of the
"suggestions" it makes, which have no obvious relevance whatsoever to my
typical viewing habits.

I suppose that if your life runs on a rigid schedule, this might be useful.
My life certainly doesn't...

Steve Holzworth Senior Systems Developer SAS Institute - Open Systems R&D
VMS/MAC/UNIX, Cary, N.C.  sch () unx sas com

------------------------------

Date: Fri, 6 Jun 2003 11:10:44 -0400 
From: Jeremy Epstein <jeremy.epstein () webmethods com>
Subject: Virginia grievance system online - with a slight problem

Virginia put its workplace grievance system online as a way of improving
responsiveness (the old system typically took a year to process), according
to *The Washington Post* Expected savings are $100,000/year, possibly more.
As a Virginia taxpayer, that's good.... every little bit helps.
  [http://www.washingtonpost.com/wp-dyn/articles/A10481-2003Jun3.html]

"The system is secure from prying eyes, yet those who need to know a case
history can view an entire file by using the employee's Social Security
number."  So... yet another new system that uses the employee's SSN as the
key.  That's bad.  [And we won't even get into how they know that "the
system is secure from prying eyes".]

------------------------------

Date: Fri, 13 Jun 2003 22:22:23 +0200
From: Giles Todd <g () todd nu>
Subject: Sign someone up to be an organ donor!

Add anyone you like to the UK's NHS Organ Donor Register at:
  https://www.uktransplant.org.uk/odronline/servlet/mydetailsservlet

Apart from trivial address validity checks, the sole attempt to ensure that
the person being signed up is really who he or she says he or she is is an
e-mail message sent to the e-mail address supplied.

  Date: Fri, 13 Jun 2003 21:11:12 +0100 (BST)
  From: odr () uktransplant nhs uk
  Subject: I want to be a donor

  Thank you for joining the NHS Organ Donor Register.  Your new record will 
  now be downloaded directly to the register.

  If you wish to amend the personal information held on the register at any 
  time you can do so through this website, or by contacting:
    The Organ Donor Line (0845 60 60 400) between 7am and 11pm seven days a 
    week for a form, or by writing to:
      The NHS Organ Donor Register, UK Transplant, PO Box 14, FREEPOST
      Patchway, BRISTOL BS34 8ZZ  UK

------------------------------

Date: Sat, 14 Jun 2003 13:35:54 -0400
From: Steve Bellovin <smb () research att com>
Subject: Continental Airlines check-in computer foul-up

This morning, I tried to check in for a Continental flight from Newark to
Seattle.  But all of the self-service check-in kiosks and all of the
domestic check-in computers were down.  It seems that they'd done a software
upgrade at 0200, and when things got busy the system died.  One of the
customer service managers was muttering that they should have installed the
upgrade on a Sunday morning instead.

They told people to go upstairs to the International check-in area, which
hadn't been "upgraded".  But they didn't allocate enough desks -- or enough
people from the non-functional domestic check-in -- to handle the crowd.
Nor, despite assurances from Customer Service, did they hold any flights.
The system wouldn't let me check in 10 minutes prior to flight time, of
course, which is reasonable under normal circumstances but not when their
own software has fouled things up.  They also didn't have any priority
procedure for folks on earlier flights.

But it turns out that they did hold the flight, or so it seems -- checking
the Continental Web site when I got home, I found that my flight took off 25
minutes late.

In possibly-unrelated computer confusion, one of the arrival status monitors
at EWR was displaying the Internet Explorer "this page is not available"
screen, while one of the departure monitors was showing a typical Windows
desktop.  Hmm -- looking at the pictures I took, I see that it has Winzip
installed....

Steve Bellovin, http://www.research.att.com/~smb

------------------------------

Date: Fri, 6 Jun 2003 12:49:02 -0700
From: greep <greep () mindspring com>
Subject: Downloading data can turn your computer into a server

The Register reports
(<http://www.theregister.co.uk/content/6/31080.html>) that Joltid is
using "content distribution technology that utilises users' own PCs to
disseminate content for publishers."  According to the article, when
someone loads content (such as software) using the Joltid system, the
computer loading the data then becomes a server for that same data.

There seem to be a number of potential risks to users of such a system:

They could held liable for "publishing" information over which they have no
control.  This liability could include copyright and patent infringement.
If the content is found to contain viruses or material which is illegal, the
liability could be even more severe.

Bugs in the Joltid software could expose their personal files to the outside
world, even if their computers run no other server software.

Their own network throughput, or other computer resources, might be affected
by having their computers act as servers.

They may be subject to additional ISP charges for excessive outbound
traffic.

People who retrieve data from another customer's computer (not from the
original publisher) need to consider the possibility that the data has been
altered.  The article does say: "All files are digitally signed to prevent
tampering, the company claims", but no details are provided.

------------------------------

Date: Sat, 14 Jun 2003 14:53:10 -0700
From: Crispin Cowan <crispin () immunix com>
Subject: Re: U of Calgary to teach virus writing (Weaver, RISKS-22.76)

How is it that worms specifically, or malicious code in general, is a 
legitimate area of research, but not a legitimate study topic for 
students in a class? How are we to obtain more defensive experts such as 
Weaver if we do not train young people in the area.

Techniques to write viruses and worms are evidently already very well known
in the black hat community, as evidenced by the proliferation of such
worms. It is only in the defensive community where ignorance is relatively
common, as evidenced by the naive defenses that are proposed over and over
again. In light of that, how is the suppression of malicious coding
techniques in the education system any different from the suppression of how
to sharpen a pointed stick with which to murder one's neighbor?

I'm sorry, but the cat is clearly out of the bag, and there is little
benefit in attempting to suppress knowledge of how to write a worm.  IMHO,
all the hand-wringing over this course is badly misplaced.

Crispin Cowan, Ph.D.           http://immunix.com/~crispin/
Chief Scientist, Immunix       http://immunix.com
            http://www.immunix.com/shop/

------------------------------

Date: Fri, 13 Jun 2003 17:13:52 -0400 (EDT)
From: msb () vex net (Mark Brader)
Subject: Computer bugs and believing reliable sources

Back in comp.risks 22.73, Monty Solomon quoted
<http://finance.lycos.com/home/news/story.asp?story=34131541>:

| Computer bugs have been around since malfunctions in a 1945
| [Harvard] Mark II were blamed (facetiously) on a moth trapped
| in a relay.

In fact, the malfunction in question *was* caused by the moth trapped in a
relay -- the facetious part was the association of this event with the
existing slang term for a problem, i.e. "bug".  As
<http://americanhistory.si.edu/csr/comphist/objects/bug.htm> shows, the moth
was preserved along with the annotation, "First actual case of bug being
found".  (Note the word "actual".)

Now that's not Risks-worthy, but I think the other error in the quoted
sentence is: the Lycos writer gave the date of the incident as 1945.  As the
web page I just cited shows, the logbook with the moth now belongs to the
Smithsonian Institution's National Museum of American History, and *they*
say that the correct date is 1947.  Since the illustrated page does not show
the year, I e-mailed info () si edu to query the point.  They replied to say
that 1947 is correct and that "The year does not appear on the page, but it
does appear elsewhere in the logbook."

Now try a google search for the phrase "first computer bug" and each of the
years 1945 and 1947.  Go ahead, I'll wait...  But here are the counts I get
when I do it.

        "first computer bug" 1945               388
        "first computer bug" 1947               140

Of course, some of these will be false hits -- the year being mentioned in
another context on the same web page -- but it's easy to see from the google
synopses that many of the 388 hits do give the wrong date.  Among these are:

    http://www.history.navy.mil/photos/images/h96000/h96566kc.htm
    http://www.computer.org/history/development/1945.htm

and a *large* number of university sites.  Obviously sources that you would
expect things to be right, aren't they?  I even found one page (but I lost
it again, so no cite) that seems to show Grace Murray Hopper, who was part
of the group working on the computer, herself saying that the incident was
in 1945.

And it's actually even worse than the above numbers suggest.  Of the 140
hits in the second (1947) search, many *are* false.  If you search for the
phrase together with *both* years, there are 103 hits, and many of these are
pages that date the incident to 1945 and then mention 1947 in another
context.

Everyone learns quickly enough that you can't believe everything you
read on the Web.  But in this case there are enough pages at enough
reliable-seeming sites that it's hard to believe that they're all
wrong -- and yet (unless my correspondent at the Smithsonian, where
the actual logbook is, was lying or mistaken) they are.

The difference between a 1945 and 1947 date for a minor piece of
etymological history is a trivial error to practically everyone.  But the
next time you believe what you read, it might not be trivial.

(Of course this sort of problem can happen with non-Internet research
too.  The Risks relevance is that Web searching makes it so much easier
to become very sure very fast...)

Mark Brader   |   "I'm a little worried about the bug-eater", she said.
Toronto       |   "We're embedded in bugs, have you noticed?"
msb () vex net   |                          -- Niven, "The Integral Trees"

------------------------------

Date: Mon, 16 Jun 2003 09:14:49 -0400
From: "Eric Greenberg" <eric () netframeworks com>
Subject: Re: Slade's Review of Mission Critical Security Planner

My book titled Mission Critical Security Planner (Wiley, 2003), which 
Slade has critiqued here, survived full scrutiny and review on 
slashdot.org, a tough group of folks

http://books.slashdot.org/article.pl?sid=03/02/13/1515257

and has been reviewed by many reviewers, all of which have offered 
nothing but praise. I encourage you to see the other reviews on 
Amazon.com and elsewhere on the Internet.

http://www.amazon.com/exec/obidos/ASIN/0471211656

You might also visit the Mission Critical Security Planner companion 
Web site, where you can download a free electronic copy of the 
Chapter 1 and the free worksheets used in the book, at 

http://www.CriticalSecurity.com

Judge my commitment to this book, supporting the readers, and security
planning in general, by that material and the Web site.

Eric Greenberg   http://www.CriticalSecurity.com
http://www.amazon.com/exec/obidos/ASIN/0471211656

------------------------------

Date: 30 May 2003 (LAST-MODIFIED)
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks)

 The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.  Alternatively, via majordomo,
 send e-mail requests to <risks-request () csl sri com> with one-line body
   subscribe [OR unsubscribe]
 which requires your ANSWERing confirmation to majordomo () CSL sri com .
 If Majordomo balks when you send your accept, please forward to risks.
 [If E-mail address differs from FROM:  subscribe "other-address <x@y>" ;
 this requires PGN's intervention -- but hinders spamming subscriptions, etc.]
 Lower-case only in address may get around a confirmation match glitch.
   INFO     [for unabridged version of RISKS information]
 There seems to be an occasional glitch in the confirmation process, in which
 case send mail to RISKS with a suitable SUBJECT and we'll do it manually.
   .UK users should contact <Lindsay.Marshall () newcastle ac uk>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative 
 address from which you NEVER send mail!
=> The INFO file (submissions, default disclaimers, archive sites,
 copyright policy, PRIVACY digests, etc.) is also obtainable from
 http://www.CSL.sri.com/risksinfo.html  ftp://www.CSL.sri.com/pub/risks.info
 The full info file will appear now and then in future issues.  *** All
 contributors are assumed to have read the full info file for guidelines. ***
=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line.
=> ARCHIVES: http://www.sri.com/risks
 http://www.risks.org redirects you to the Lindsay Marshall's Newcastle archive
 http://catless.ncl.ac.uk/Risks/VL.IS.html      [i.e., VoLume, ISsue]
   Lindsay has also added to the Newcastle catless site a palmtop version 
   of the most recent RISKS issue and a WAP version that works for many but 
   not all telephones: http://catless.ncl.ac.uk/w/r
 http://the.wiretapped.net/security/info/textfiles/risks-digest/ .
 http://www.planetmirror.com/pub/risks/ ftp://ftp.planetmirror.com/pub/risks/
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    http://www.csl.sri.com/illustrative.html for browsing,
    http://www.csl.sri.com/illustrative.pdf or .ps for printing

------------------------------

End of RISKS-FORUM Digest 22.77
************************


Current thread: