RISKS Forum mailing list archives

Risks Digest 28.34


From: RISKS List Owner <risko () csl sri com>
Date: Thu, 6 Nov 2014 15:45:15 PST

RISKS-LIST: Risks-Forum Digest  Thursday 6 November 2014  Volume 28 : Issue 34

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/28.34.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Digital Security and Source Protection for Journalists (Susan McGregor)
"All governments must protect the ability of journalists to write
  and speak freely" (digby)
Virginia Police Have Been Secretively Stockpiling Private Phone Records
  (G.W. Schultz)
Google ordered to pay a woman $2,250 for Street View image showing cleavage
  (Megan Geuss)
Virginia judge: Police can demand a suspect unlock a phone with a
  fingerprint (Megan Geuss)
Cop charged with stealing nude pics from women's phones (Cyrus Farivar)
"The icky part of tech support: Porn and other NSFW surprises" (Tam Harbert)
After massive Danish hack, Gottfrid Svartholm Warg sentenced to 3.5 years
  (Cyrus Farivar)
Which Messaging Technologies Are Truly Safe and Secure? (EFF)
Critics bash the EFF Secure Messaging Scorecard (Lauren Weinstein)
FBI wants black hats for digital black bag ops (Ed Pilkington)
$750k Fine for exporting crypto (Jeroen van der Ham)
An Unprecedented Look at Stuxnet -- the World's First Digital Weapon?
  (Matthew Kruk)
Skipping the Front Desk, and Checking In With a Click (Monty Solomon)
Fall of the Banner Ad: The Monster That Swallowed the Web (Monty Solomon)
Malicious Software Campaign Targets Apple Users in China (Monty Solomon)
Augmenting Your Password-Protected World (Monty Solomon)
NSA Director Makes Another Visit to Silicon Valley (Monty Solomon)
Re: "Have we gotten so pathetically lame that you need to be notified by an
  email that your laundry is done?" (Amos Shapir)
Absentee ballot of deceased Boston mayor not counted (Wexelblat)
Online voting rife with hazards (Amos Shapir)
Re: Risks of assuming votes are accurate (Rodney Van Meter, Rashid Motala)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Wed, 5 Nov 2014 9:26:21 PST
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: Digital Security and Source Protection for Journalists
  (Susan McGregor)

In the post-Snowden era, a report written by Susan McGregor
<susan.e.mcgregor () gmail com> (Columbia University's Tow Center for Digital
Journalism) is timely and highly relevant -- especially to digital
journalists and lawyers who might wish to defend them!  (I believe Susan
would welcome constructive comments, because this online report has not yet
been published in final form.  PGN)

  http://susanemcg.gitbooks.io/digital-security-for-journalists/

   [This topic is clearly a source-pot (or sore-spot, if you prefer).
   What's Source for the Goose may goose the ganderer.  PGN]

------------------------------

Date: Nov 2, 2014 7:37 PM
From: "Dewayne Hendricks" <dewayne () warpspeed com>
Subject: "All governments must protect the ability of journalists to write
and speak freely" (digby on the White House)

[Note:  This item comes from friend David Rosenthal. DH]
  [via Dave Farber, who commented: 'It's hard to be cynical enough ...']

digby's blog, 2 Nov 2014

http://digbysblog.blogspot.com/2014/11/all-governments-must-protect-ability-of.html

This is very special:

The White House, Office of the Press Secretary
For Immediate Release November 02, 2014
Statement by the President on the First-Annual International Day to End
Impunity for Crimes Against Journalists

History shows that a free press remains a critical foundation for
prosperous, open, and secure societies, allowing citizens to access
information and hold their governments accountable. Indeed, the Universal
Declaration of Human Rights reiterates the fundamental principle that every
person has the right ``to seek, receive, and impart information and ideas
through any media and regardless of frontiers.''  Each and every day, brave
journalists make extraordinary risks to bring us stories we otherwise would
not hear - exposing corruption, asking tough questions, or bearing witness
to the dignity of innocent men, women and children suffering the horrors of
war. In this service to humanity, hundreds of journalists have been killed
in the past decade alone, while countless more have been harassed,
threatened, imprisoned, and tortured. In the overwhelming majority of these
cases, the perpetrators of these crimes against journalists go unpunished.

All governments must protect the ability of journalists to write and speak
freely. On this first-ever International Day to End Impunity for Crimes
against Journalists, the United States commends the priceless contributions
by journalists to the freedom and security of us all, shining light into
the darkness and giving voice to the voiceless. We honor the sacrifices so
many journalists have made in their quest for the truth, and demand
accountability for those who have committed crimes against journalists.

Well, some of the time anyway.

In a speech today in Washington, AP President and CEO Gary Pruitt [said]:

The actions of the DOJ against AP are already having an impact beyond the
specifics of this case. Some longtime trusted sources have become nervous
and anxious about talking with us -- even on stories unrelated to national
security. In some cases, government employees we once checked in with
regularly will no longer speak to us by phone. Others are reluctant to meet
in person.

In one instance, our journalists could not get a law enforcement official
to confirm a detail that had been reported elsewhere.

Imagine: officials were so fearful of talking to AP they wouldn't even
confirm a fact that had already been reported by numerous other media.

And I can tell you that this chilling effect on news gathering is not just
limited to AP. Journalists from other news organizations have personally
told me that it has intimidated both official and nonofficial sources from
speaking to them as well.

Now, the government may love this. But beware a government that loves too
much secrecy. [...]

------------------------------

Date: Tue, 4 Nov 2014 23:04:47 -0500
From: Monty Solomon <monty () roscom com>
Subject: Virginia Police Have Been Secretively Stockpiling Private Phone
 Records (G.W. Schultz)

G.W. Schulz, Center for Investigative Reporting, 20 Oct 2014

While revelations from Edward Snowden about the National Security Agency's
massive database of phone records have sparked a national debate about its
constitutionality, another secretive database has gone largely unnoticed and
without scrutiny.

The database, which affects unknown numbers of people, contains phone
records that at least five police agencies in southeast Virginia have been
collecting since 2012 and sharing with one another with little oversight.
Some of the data appears to have been obtained by police from telecoms using
only a subpoena, rather than a court order or probable-cause warrant. Other
information in the database comes from mobile phones seized from suspects
during an arrest. ...

http://www.wired.com/2014/10/virginia-police-secretively-stockpiling-private-phone-records/

------------------------------

Date: Tue, 4 Nov 2014 21:50:23 -0500
From: Monty Solomon <monty () roscom com>
Subject: Google ordered to pay a woman $2,250 for Street View image
  showing cleavage (Megan Geuss)

Megan Geuss, Ars Technica, 30 Oct 2014
Although her face was blurred out, image had "part of her breast exposed."

Earlier this month, a Quebecois court in Montreal decided that Google owed a
woman $2,250 for picturing her with "part of her breast exposed" in a Street
View image. The woman was sitting in front of her house, and although her
face was blurred out, she was still identifiable by her coworkers,
especially as her car was parked in the driveway without the license plate
blurred out. ...

http://arstechnica.com/tech-policy/2014/10/google-ordered-to-pay-a-woman-2250-for-street-view-image-showing-cleavage/

------------------------------

Date: Tue, 4 Nov 2014 21:53:10 -0500
From: Monty Solomon <monty () roscom com>
Subject: Virginia judge: Police can demand a suspect unlock a phone with a
 fingerprint (Megan Geuss)

Virginia judge: Police can demand a suspect unlock a phone with a fingerprint
But passcodes need not be divulged as per the Fifth Amendment, court says.

Megan Geuss, Ars Technica, 31 Oct 2014

A Virginia Circuit Court judge ruled on Thursday that a person does not need
to provide a passcode to unlock their phone for the police.  The court also
ruled that demanding a suspect to provide a fingerprint to unlock a phone
would be constitutional. ...

http://arstechnica.com/tech-policy/2014/10/virginia-judge-police-can-demand-a-suspect-unlock-a-phone-with-a-fingerprint/

------------------------------

Date: Tue, 4 Nov 2014 21:57:40 -0500
From: Monty Solomon <monty () roscom com>
Subject: Cop charged with stealing nude pics from women's phones
  (Cyrus Farivar)

Cyrus Farivar, Ars Technica, 31 Oct 2014
California Highway Patrol officer suspect: image trading was a years-old game.

Prosecutors in Contra Costa County, directly across the bay from San
Francisco, have filed criminal felony charges against a former California
Highway Patrol (CHP) officer, Sean Harrington, who is accused of seizing and
distributing racy photos copied from arrestees' phones. ...

http://arstechnica.com/tech-policy/2014/10/cop-charged-with-stealing-nude-pics-from-womens-phones/

------------------------------

Date: Wed, 05 Nov 2014 12:54:27 -0800
From: Gene Wirchenko <genew () telus net>
Subject: "The icky part of tech support: Porn and other NSFW surprises"
  (Tam Harbert)

Tam Harbert, Computerworld, 30 Oct 2014
The help desk can be caught in the middle in more
ways than one when users put risque' material on their personal devices
http://www.infoworld.com/article/2841557/security/the-icky-part-of-tech-support-porn-and-other-nsfw-surprises.html

opening text:

As the recent scandal over leaked celebrity photographs reminded us all,
people use their electronic devices for very personal pursuits in the era of
smartphone ubiquity. Depending on the age and inclination of its owner, a
modern-day digital device might contain not just nude selfies like those
that were shared online, but images from dating sites like Tinder and
Grindr, creepshots, or other salacious or even illegal material downloaded
from the backwaters of "the dark Web" via anonymizers like Tor.

As blogger Kashmir Hill summed up as the selfie scandal was unfolding,
"Phones have become sex toys."

------------------------------

Date: Tue, 4 Nov 2014 21:59:08 -0500
From: Monty Solomon <monty () roscom com>
Subject: After massive Danish hack, Gottfrid Svartholm Warg sentenced to
 3.5 years (Cyrus Farivar)

Cyrus Farivar, Ars Technica, Oct 31 2014
His accomplice was sentenced to 6 months and was released for time served.

After being convicted of "hacking and gross damage," Gottfrid Svartholm
Warg, better known by his nom de hacker "anakata," was sentenced (Google
Translate) to 3.5 years in prison by a Danish court on Friday.

One day earlier, the Pirate Bay co-founder was found guilty of illegally
accessing the country's driver's license database (Google Translate), social
security database, and the shared IT system across the Schengen zone,
Europe's common passport regions. Using this access, he obtained the e-mail
accounts and passwords of 10,000 police officers and tax officials. All of
that data was managed by CSC, a large American IT contractor. ...

http://arstechnica.com/tech-policy/2014/10/after-massive-danish-hack-gottfrid-svartholm-warg-sentenced-to-3-5-years/

------------------------------

Date: November 4, 2014 at 10:00:45 AM EST
From: EFF Press <press () eff org>
Subject: Which Messaging Technologies Are Truly Safe and Secure?

Electronic Frontier Foundation Media Release

Peter Eckersley,  Technology Projects Director,  Electronic Frontier Foundation
  pde () eff org,  +1 415 436-9333 x131
Rebecca Jeschke, Media Relations Director, Electronic Frontier Foundation,
  press () eff org, +1 415 436-9333 x177

Which Messaging Technologies Are Truly Safe and Secure?

EFF's 'Secure Messaging Scorecard' Rates Digital Communication Tools

San Francisco - In the face of widespread Internet data collection and
surveillance, we need a secure and practical means of talking to each other
from our phones and computers.  Many companies offer "secure messaging"
products - but how can users know if these systems actually secure?  The
Electronic Frontier Foundation (EFF) released its Secure Messaging Scorecard
today, evaluating dozens of messaging technologies on a range of security
best practices.

"The revelations from Edward Snowden confirm that governments are spying on
our digital lives, devouring all communications that aren't protected by
encryption," said EFF Technology Projects Director Peter Eckersley.  "Many
new tools claim to protect you, but don't include critical features like
end-to-end encryption or secure deletion.  This scorecard gives you the
facts you need to choose the right technology to send your message."

The scorecard includes more than three dozen tools, including chat clients,
text messaging apps, email applications, and technologies for voice and
video calls.  EFF examined them on seven factors, like whether the message
is encrypted both in-transit and at the provider level, and if the code is
audited and open to independent review.  Six of these tools scored all seven
stars, including ChatSecure, CryptoCat, Signal/Redphone, Silent Phone,
Silent Text, and TextSecure.  Apple's iMessage and FaceTime products stood
out as the best of the mass-market options, although neither currently
provides complete protection against sophisticated, targeted forms of
surveillance.  Many options--including Google, Facebook, and Apple's email
products, Yahoo's web and mobile chat, Secret, and WhatsApp--lack the
end-to-end encryption that is necessary to protect against disclosure by the
service provider.  Several major messaging platforms, like QQ, Mxit, and the
desktop version of Yahoo Messenger, have no encryption at all.

"We're focused on improving the tools that everyday users need to
communicate with friends, family members, and colleagues," said EFF Staff
Attorney Nate Cardozo.  "We hope the Secure Messaging Scorecard will start a
race-to-the-top, spurring innovation in stronger and more usable
cryptography."

The Secure Messaging Scorecard is part of EFF's new Campaign for Secure and
Usable Cryptography, and was produced in collaboration with Julia Angwin at
ProPublica and Joseph Bonneau at the Princeton Center for Information
Technology Policy.

For the full Secure Messaging Scorecard:
https://www.eff.org/secure-messaging-scorecard

For this release:
https://www.eff.org/press/releases/which-messaging-technologies-are-truly-safe-and-secure

  [Of course, the correct answer to the titled question,
    Which Messaging Technologies Are Truly Safe and Secure?
  is generally NONE of them -- under any realistic threat model that
  includes penetration of typically nonsecure operating systems and
  insider misuse.  RISKS readers should know that by now.  PGN]

------------------------------

Date: Wed, 5 Nov 2014 17:17:19 -0800
From: Lauren Weinstein <lauren () vortex com>
Subject: Critics bash the EFF Secure Messaging Scorecard

Daily Dot via NNSquad
http://www.dailydot.com/politics/eff-secure-messaging-scorecard-critics/

  "The EFF scorecard gives Skype two check marks for being encrypted in
  transit and encrypted so the provider can't read it.  That was a hard sell
  for many privacy advocates, who immediately pointed to reports from the
  Edward Snowden, leaks saying the National Security Agency (NSA) had
  tripled the amount of Skype video calls being collected through Prism."

------------------------------

Date: Thu, 06 Nov 2014 12:27:04 -0800
From: Henry Baker <hbaker1 () pipeline com>
Subject: FBI wants black hats for digital black bag ops (Ed Pilkington)

FYI -- The NSA TAO is old (black) hat; the FBI wants to implant malware into
your computer, too.  The FBI is so afraid of "going dark", that it wants to
"go black" (hat).

http://www.theguardian.com/us-news/2014/oct/29/fbi-powers-hacking-computers-surveillance

FBI demands new powers to hack into computers and carry out surveillance

Ed Pilkington, *The Guardian*, 29 Oct 2014
Agency requests rule change but civil liberties groups say ``extremely
invasive'' technique amounts to unconstitutional power grab.

The FBI is attempting to persuade an obscure regulatory body in Washington
to change its rules of engagement in order to seize significant new powers
to hack into and carry out surveillance of computers throughout the US and
around the world.

Civil liberties groups warn that the proposed rule change amounts to a power
grab by the agency that would ride roughshod over strict limits to searches
and seizures laid out under the fourth amendment of the US constitution, as
well as violate first amendment privacy rights.  They have protested that
the FBI is seeking to transform its cyber capabilities with minimal public
debate and with no congressional oversight.

The regulatory body to which the Department of Justice has applied to make
the rule change, the advisory committee on criminal rules, will meet for the
first time on November 5 to discuss the issue.  The panel will be addressed
by a slew of technology experts and privacy advocates concerned about the
possible ramifications were the proposals allowed to go into effect next
year.  [... PRUNED FOR RISKS.  PGN]

https://s3.amazonaws.com/s3.documentcloud.org/documents/1348429/fbi-committee-hearing.pdf

------------------------------

Date: Nov 4, 2014 1:00 PM
From: "Jeroen van der Ham" <jeroen () dckd nl>
Subject: $750k Fine for exporting crypto (Cryptography)

It appears that the Bureau of Industry and Security is showing its teeth
with a $750k fine against Wind River Systems for unlawfully exporting
encryption software to countries on the BIS list.

http://www.goodwinprocter.com/Publications/Newsletters/Client-Alert/2014/1015_Software-Companies-Now-on-Notice-That-Encryption-Exports-May-Be-Treated-More-Seriously.aspx

We believe this to be the first penalty BIS has ever issued for the
unlicensed export of encryption software that did not also involve
comprehensively sanctioned countries (e.g., Cuba, Iran, North Korea, Sudan
or Syria). This suggests a fundamental change in BIS's treatment of
violations of the encryption regulations.

See also the discussion here: https://news.ycombinator.com/item?id=3D8551825

------------------------------

Date: Wed, 5 Nov 2014 16:07:33 -0700
From: "Matthew Kruk" <mkrukg () gmail com>
Subject: An Unprecedented Look at Stuxnet -- the World's First Digital Weapon?

http://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/

------------------------------

Date: Thu, 6 Nov 2014 06:37:00 -0500
From: Monty Solomon <monty () roscom com>
Subject: Skipping the Front Desk, and Checking In With a Click

In a bid to help harried travelers save time at check-in, a number of major
brands are experimenting with letting guests use their phones to unlock
their rooms.

http://www.nytimes.com/2014/11/04/business/hotels-test-turning-guests-smartphonoes-into-room-keys-.html

------------------------------

Date: Wed, 5 Nov 2014 22:22:15 -0500
From: Monty Solomon <monty () roscom com>
Subject: Fall of the Banner Ad: The Monster That Swallowed the Web

In the 20 years since their introduction, banner ads have ruined the
appearance and usability of the web, perverted content and diminished
privacy.

http://www.nytimes.com/2014/11/06/technology/personaltech/banner-ads-the-monsters-that-swallowed-the-web.html

------------------------------

Date: Thu, 6 Nov 2014 01:01:01 -0500
From: Monty Solomon <monty () roscom com>
Subject: Malicious Software Campaign Targets Apple Users in China

It would not be easy for the average Mac user to be hit by this malware, but
it points to new ways in which hackers are targeting Apple products.

http://bits.blogs.nytimes.com/2014/11/05/malicious-software-campaign-targets-apple-users-in-china/

------------------------------

Date: Thu, 6 Nov 2014 01:01:50 -0500
From: Monty Solomon <monty () roscom com>
Subject: Augmenting Your Password-Protected World

While passwords aren't likely to disappear soon, new technology that uses
eyes and fingerprints as identifiers can protect data more easily.

http://www.nytimes.com/2014/11/06/technology/personaltech/augmenting-your-password-protected-world.html

------------------------------

Date: Thu, 6 Nov 2014 06:33:10 -0500
From: Monty Solomon <monty () roscom com>
Subject: NSA Director Makes Another Visit to Silicon Valley

Relations between tech companies and the intelligence community has been
strained recently, but Adm. Michael S. Rogers played down government
concerns.

http://bits.blogs.nytimes.com/2014/11/03/n-s-a-director-makes-another-visit-=
to-silicon-valley/

------------------------------

Date: Wed, 5 Nov 2014 11:24:59 +0200
From: Amos Shapir <amos083 () gmail com>
Subject: Re: "Have we gotten so pathetically lame that you need to be
 notified by an email that your laundry is done?"

Actually, it's not a matter of being lame.  I'm sure many people who work
long hours would love having a washing machine which can be tracked and
operated over the net, so that e.g. clothes can be put in before leaving for
work, and laundry timed to have them ready to dry by the time of arriving
back.

I know I would like a way to avoid waking out in the morning to find stale
clothes in the machine which were left there wet overnight (this had
happened quite a few times).  However, I don't think I'll be willing to pay
four times the price of a dumb machine for that.

------------------------------

Date: Tue, 4 Nov 2014 15:29:26 -0500
From: Wexelblat <wex () cs uml edu>
Subject: Absentee ballot of deceased Boston mayor not counted

*The Boston Globe* on Mayor Menino (who died last week):
http://www.bostonglobe.com/metro/2014/10/31/menino-cast-absentee-ballot-upcoming-election/dF6CeR53bbXZUcErwoXegN/story.html

But under Massachusetts state law, the secretary of state's office said, the
ballot cannot be counted because of the mayor's death.

Wanna bet that every town clerk checks the obituaries for the names of every
absentee voter?  (351 cities and towns in Massachusetts.)

The big risk, of course is that some close election will be overturned after
a year or so because it is determined that several voters who were presumed
living on election day were ultimately discovered to have been dead.

The implications of determining that sitting legislators, even Senators,
were not actually elected ...

  [This is not the first time this particular issue has shown up in RISKS.
  PGN]

------------------------------

Date: Wed, 5 Nov 2014 11:32:44 +0200
From: Amos Shapir <amos083 () gmail com>
Subject: Re: Online voting rife with hazards

``your are [sic] voluntarily waving [sic] your right to a secret ballot'' --

IANAL, but it seems to me that this statement borders on the
unconstitutional.  Can anyone legally waive such a basic constitutional
right?  I'd really like to know, maybe a real lawyer can comment on this.
(Coming to think of it, perhaps the spelling mistakes are intentional!)

------------------------------

Date: Tue, 4 Nov 2014 15:48:55 -0500
From: Rodney Van Meter <rdv () sfc wide ad jp>
Subject: Re: Risks of assuming votes are accurate (Long, RISKS-28.33)

I'm sure John didn't intend for this to be a partisan matter.  In fact,
votes may be flipping the other way in North Carolina:

http://www.rawstory.com/rs/2014/11/north-carolina-voters-report-voting-mac=
hines-switching-their-votes-to-gop-candidate/

The article doesn't say, but this one also sounds like a touch screen
mis-registration problem, or outright hardware malfunction.

(By the time you are reading this, the election may well be over.  We can
only hope that any such problems haven't affected the outcome in critical
races.)

------------------------------

Date: Wed, 5 Nov 2014 12:05:22 +0000
From: Rashid Motala <rashidm () identisoft net>
Subject: Re: Risks of assuming votes are accurate (Long, RISKS-28.33)

In addition, there seemed to have been a false assumption that allowing
illegal immigrants to get drivers licenses would not have any deleterious
effects. In fact, obtaining a driver's license allowed those individuals
to also register to vote.

This is equivalent to saying "...there seemed to have been a false
assumption that allowing illegal immigrants to eat would not have any
deleterious effects (on voting)."

------------------------------

Date: Sun, 7 Oct 2012 20:20:16 -0900
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks)

 The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
 comp.risks, the feed for which is donated by panix.com as of June 2011.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.  The mailman Web interface can
 be used directly to subscribe and unsubscribe:
   http://lists.csl.sri.com/mailman/listinfo/risks
 Alternatively, to subscribe or unsubscribe via e-mail to mailman
 your FROM: address, send a message to
   risks-request () csl sri com
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit that process by sending directly to either
   risks-subscribe () csl sri com or risks-unsubscribe () csl sri com
 depending on which action is to be taken.

 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 *** Contributors are assumed to have read the full info file for guidelines.

=> .UK users may contact <Lindsay.Marshall () newcastle ac uk>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line.
 *** NOTE: Including the string `notsp' at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.
=> ARCHIVES: ftp://ftp.sri.com/risks for current volume
     or ftp://ftp.sri.com/VL/risks for previous VoLume
 http://www.risks.org takes you to Lindsay Marshall's searchable archive at
 newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
   Lindsay has also added to the Newcastle catless site a palmtop version
   of the most recent RISKS issue and a WAP version that works for many but
   not all telephones: http://catless.ncl.ac.uk/w/r
 <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    <http://www.csl.sri.com/illustrative.html> for browsing,
    <http://www.csl.sri.com/illustrative.pdf> or .ps for printing
  is no longer maintained up-to-date except for recent election problems.
 *** NOTE: If a cited URL fails, we do not try to update them.  Try
  browsing on the keywords in the subject line or cited article leads.
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 28.34
************************


Current thread: