The Risks Digest

The RISKS Digest

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Volume 10 Issue 65

Monday 6 December 1990

Contents

o A fondness for turkeys
Pete Mellor
o Heads-up "Holograms" of Runways to assist in landings?
Richard Wood
o Airline safety
John Sullivan
o As the spacecraft turn
Steve Bellovin
o NeXT microphone problem?
E. Loren Buhle
Jr.
o Risks of global networking
Hank Nussbacher
o Technological Risk, by H.W. Lewis
Jake Livni
o Hackers Accessed NASA's Phones
anonymous
o Hacker view of the "Legion of Doom" sentencing in Atlanta
Emmanuel Goldstein
o Info on RISKS (comp.risks)

A fondness for turkeys [No Thanksgiving for bad systems?]

Pete Mellor <pm@cs.city.ac.uk>
Sun, 2 Dec 90 09:14:27 PST
Sitting up late one night last week, I caught the re-broadcast in the UK of the
US news program "60 minutes".

One of the items was about ADATS, a tank-based anti-helicopter missile system,
meant to be effective in conditions of poor visibility (e.g., Iraqi sandstorms),
and reckoned to be essential against such things as the HIND killer-chopper
(of which Iraq is rumoured to have 40 or so). It is, or rather was, being
developed by Oerliken of Switzerland. However, they have pulled out, and (I
think) the completion of the system is now directly managed by the DoD.
This follows cancellations by several potential customers: Germany, Holland,
Saudi Arabia, etc. Only the US and Canada still seem to be interested.

It is strongly supported by some military people, e.g., General Granrod (? -
Sorry, there were no subtitles, so I wasn't able to get the correct name of
everyone interviewed, and I have no idea what any of the acronyms stand for.),
who said it had exceeded its requirements in field trials. Convincing film was
shown of it shooting a parked helicopter off the top of a tower, and then
firing a missile in a corkscrew spiral ending in the nearest bit of shrubbery.

A strong feeling of deja vue then descended, as it turned out that this system
is (you've guessed it!) highly computerised.

There seem to have been a few unfortunate hitches in its development:-

Originally estimated at $7 billion, its cost has now reached $12 billion and
is rising fast. Protests from parts of Congress on behalf of the US taxpayer
are the main reason for its current notoriety.

It is late. Certainly too late for the gulf. After having been under
development for years, it is still at least 5 years from delivery.

Its requirements seem, err..., less than adequately related to the real world.
It uses laser to track its target. This is not a bright idea for an all-weather
system. "You don't see through clouds with a laser.", one commentator said.
"You don't even see into them very far!" The missile tracks the laser beam.
Once off the beam, there is no way it can get back on (a possible explanation
for the impressive exercise in hedge-trimming). The chopper pilot knows (in
something as sophisticated as the HIND) that he is being scanned, and has 30
seconds to do something about it, like dodge behind the nearest hill, which is
a fairly effective protection against a line-of-sight system like ADATS. There
is also the minor problem that the computer system can't tell friend from foe.

Reliability is a problem. Although the producers of the programme didn't seem
to have a very clear idea of the difference between reliability,
maintainability, and availability, a number of people made statements to the
effect that the availability of the system is 40%. The system is thought to be
so complex that its reliability may never reach an acceptable level.
"Pilots are cautious people." remarked one interviewee. "If they find they're
under attack from something like ADATS, they'll simply go away and come back
when the system isn't working."

Why does this situation arise so often in modern weapons system development?

- There is a school of thought which believes that complex electronic systems
  are, or can be made, the answer to everything in modern warfare.

- Military careers are made on the backs of projects like ADATS. For those
  involved, there is no advantage in cancellation, even if it doesn't work.
  To get the troops something they can use is at most the third priority.
  (Senator Chuck Bernard).

Why is the US military persisting with ADATS?

As the senator said: "In this country, we seem to like turkeys!"

Peter Mellor, Centre for Software Reliability, City University, Northampton Sq.,
London EC1V 0HB +44(0)71-253-4399 Ext. 4162/3/1 p.mellor@uk.ac.city (JANET)


Heads-up "Holograms" of Runways to assist in landings?

<rwood@vajra.pa.dec.com>
Thu, 29 Nov 90 17:39:03 PST
Summarized from: {Business Week Nov 19, 1990}

    Seattle's fog is legendary, but from now on it will not delay as
    many flights as it has in the past. Seattle-Tacoma International
    Airport is the first to win approval for takeoffs guided by new
    technology that lets a pilot see in thick fog. Developed by
    Flight Dynamics Inc., Portland OR, the system is similar to the
    heads-up display in jet fighters. A transparent screen flips down
    inside the windshield, and holographic images of the runway's
    center line and horizon are projected onto it. Thanks to special
    optical tricks, the images appear to be in front of the plane,
    where the real runway is. Alaska Airlines has been using the
    system for landings for the past year, but until now, the Federal
    Aviation Administration would not allow its use for takeoffs if
    visibility dropped below 600 feet.

Richard Wood     Corporate Worksystems Team      Digital Equipment Corp.


Airline safety

<sullivan@poincare.geom.umn.edu>
Tue, 4 Dec 90 11:36:13 CST
This week's Economist has an article about airline safety, reminding us
(as the Northwest crash yesterday did) that two-thirds of all accidents
happen in the 5% of a flight around take-off and landing.

    Although three-quarters of accidents are blamed on
    pilots' errors, pilots can be "set up" for an accident by many
    things, such as confusing instructions from air-traffic
    controllers or by picking the wrong switch in a badly designed cockpit.

The article focuses on four recommendations from Boeing for increased safety.
None of them relates specifically to computer risks, though they all seem
related to the safety and privacy concerns we have often discussed in RISKS.

1.  Pilots should calculate before takeoff a "decision speed" at which
takeoff can continue even with engine loss (rather than aborting and
possibly going off the end of the runway).  Such accidents are rare,
but in 2/3 of the cases, the pilot is found later to have made the
wrong decision.

2.  Install new Ground Proximity Warning Systems (GPWS):

    Early GPWS systems can be unreliable and are prone to giving false
    alarms. ... this means they eventually get ignored--or disconnected.
    Pilots can easily turn them off in the cockpit.

3.  Install more ILS (Instrument Landing Systems) at airports.
This would encourage fewer "nonstabilised" approaches at high speed.

4.  Make more use of flight-data recorder (black box) info, which could be
"highly valuable for training".  This "final suggestion is controversial"
although already used by some airlines in Europe.  The Economist closes:

    [T]here is opposition from some pilots and their unions.
    They reckon that the recorders--which also make a tape of
    flight-deck conversations--could become a "spy" in the cockpit.
    Passengers might think that a good idea.


John Sullivan


As the spacecraft turn

<smb@ulysses.att.com>
Wed, 05 Dec 90 11:09:41 EST
This doesn't appear to be a very good week for computers in space...  I'll let
others tell the myriad stories about what's going on with the space shuttle's
telescopes, but a lot of the problems appear to be computer-related.  For
example, one attempt to fix some star tracker problems involved patching some
software, because the tracker was more sensitive than thought.  Unfortunately,
the patch was loaded into the wrong computer.

On another (orbital) plane, Magellan lost several mapping orbits worth of data
because of a data entry error.  It seems that the commands downloaded
(uploaded?) didn't have the required blank delimiters; consequently, the
orbiter correctly rejected the entire sequence.
                                                --Steve Bellovin


NeXT microphone problem?

"E. Loren Buhle, Jr. [215-662-3084]" <UHLE@xrt.upenn.edu>
Tue, 27 Nov 90 12:56 EDT
THIS MESSAGE DEALS WITH A POSSIBLE "RISK" PERTAINING TO CONTROL OF THE INTEGRAL
MICROPHONE IN THE LATEST NeXT MACHINE.

FIRST, SOME DESCRIPTION:

The newest NeXT machine has a microphone in the lower left portion of the CRT
console (embedded in the plastic frame of the CRT). This integral microphone is
an important input device for the voice annotation software running on the
NeXT. It comes with all new NeXT machines. The software interface on the NeXT
presents the user with keys corresponding to a tape recorder (e.g. record,
stop, rewind, play, etc.). The user hits the record button, speaks for any
length of time, hits stop, rewind, play and hears the conversation that was
recorded to a disk file (and played back) . . . . very nice touch!

The operating system on the NeXT machine is Mach UNIX, a multiuser environment.
NOTHING APPEARS TO PREVENT REMOTE OPERATION OF THE MICROPHONE. There is NO
INDICATION ON THE FRONT OF THE NeXT MACHINE THAT THE MICROPHONE IS LIVE OR
DEAD! (Remember Ronald Reagan's problems with "supposedly dead" microphones?)

Here is a scenario: A remote user turns on the microphone on the NeXT,
recording the voice to a file (locally or remotely). Any sound in the proximity
of the NeXT CRT is recorded. This file containing the conversation is then
played back on a remote NeXT. Voila, a built-in office bug! While it can be
argued that control of the microphone is by the console, anyone with superuser
privs can undoubtable find a workaround.

On the old (1988 vintage) NeXT box, the microphone was plugged into a jack on
the back. Unplugging the microphone removed this problem. Cumbersome, but very
effective. The new microphone is built into the CRT case. It is not trivial to
detach/attach at will.

So what can be done? One possibility would be to have a physical LED turn on
whenever the microphone was active. This LED would be physically wired to the
microphone and NOT be under program control. This possibility assumes the
people carrying on the conversation are looking at the NeXT console. . . .

Thoughts?

Dr. E. Loren Buhle, Jr.  INTERNET: BUHLE@XRT.UPENN.EDU
University of Pennsylvania School of Medicine         Phone: 215-662-3084
Rm 440A, 3401 Walnut St., Philadelphia, PA 19104-6228   FAX: 215-349-5978


Risks of global networking

Hank Nussbacher <ANK@BARILVM.BITNET>
Wed, 28 Nov 90 09:45:05 O
Over the past few months I have noticed upon occasion files that appear in our
system that arrive from a fellow Bitnet system named NCCIBM1.  The files always
remain in the RSCS print queue since they are destined for the system printer.
I always purged them, since there was never any indication that they were
intended for any user on our system - BARILVM (Bar-Ilan University in Israel).

This past week I decided to track down the people at NCCIBM1 and find out why
we are getting their job outputs.  NCCIBM1 (USA Environmental Protection Agency
in North Carolina) determined that their JES system has BARILVM listed as node
#178.  They also have a remote printer listed as #178.  Rather than typing R178
for her output JCL, the user made a mistake and typed N178 - which sent the
output to Israel rather to some printer in North Carolina.

Is this a risk of computer networking?  I bet over the past year there has been
a very irate user in North Carolina trying to find her job outputs.  All she
had to do was hop on a plane and fly a few thousand miles to find her MVS
output. :-)

Hank Nussbacher, Computer Center, Bar Ilan University


Book Review - Technological Risk by H. W. Lewis

Jake Livni <jake@bony1.bony.com>
Wed, 28 Nov 90 21:39:35 EST
In the Sunday New York Times book review section (Nov. 25, 1990), there was a
review of:

  Technological Risk
  by H. W. Lewis
  353 pp. New York
  W. W. Norton & Company.  $22.95

According to the reviewer, it seems to be an interesting and surprising view of
risks in technology.  The author, "a physicist at UCSB", shows that many
technological risks are overshadowed by similar natural risks and that concern
over technological disasters may be overdone.

I haven't seen this book, so I'm just notifying you about the article / review.


``Hackers Accessed NASA's Phones''

<[anonymous]>
Thu, 6 Dec 1990
Today's AP wire, datelined HOUSTON, and reported in the Houston Chronicle,
noted that computer intruders have stolen some $12 million in free telephone
service through Johnson Space Center...  That figure was calculated from costs
of similar break-ins described by law enforcement agents specializing in
computer crime.  A long-distance credit card number was used, as well as NASA's
phone lines.  The credit card fraud was discovered by AT&T when use of the
number exceeded typical patterns.  An earlier report, on 17 Nov 90, noted that
phone service worth millions had been similarly obtained from the Houston
offices of the Drug Enforcement Administration.  Both cases involved intrusions
to the Federal Telephone System, which apparently has little or no
accountability.


Hacker view of the "Legion of Doom" sentencing in Atlanta

Emmanuel Goldstein <emmanuel@well.UUCP>
Fri, 30 Nov 90 01:00:21 pst
The following is from the forthcoming Autumn 1990 edition of 2600, The Hacker
Quarterly. We would appreciate it being distributed to as many interested
people as possible. We consider this to be a very major and very frightening
issue. If there are any questions or comments, we can be reached at
2600@well.sf.ca.us or (516) 751-2600.

Emmanuel Goldstein, Editor, 2600 Magazine

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Over the past year there has been a great deal of publicity concerning the
actions of computer hackers. Since we began publishing in 1984 we've pointed
out cases of hackers being unfairly prosecuted and victimized. We wish we could
say things were getting better but we cannot. Events of recent months have made
it painfully clear that the authorities, above all else, want to "send a
message". That message of course being that hacking is not good. And there
seems to be no limit as to how far they will go to send that message.

And so we come to the latest chapter in this saga: the sentencing of three
hackers in Atlanta, Georgia on November 16. The three, Robert Riggs (The
Prophet), Frank Darden, Jr. (The Leftist), and Adam Grant (The Urville) were
members of the Legion of Doom, one of the country's leading hacker "groups".
Members of LOD were spread all over the world but there was no real
organization, just a desire to learn and share information. Hardly a gang of
terrorists, as the authorities set out to prove.

The three Atlanta hackers had pleaded guilty to various charges of hacking,
particularly concerning SBDN (the Southern Bell Data Network, operated by
BellSouth). Supposedly Riggs had accessed SBDN and sent the now famous 911
document to Craig Neidorf for publication in PHRACK. Earlier this year,
BellSouth valued the document at nearly $80,000. However, during Neidorf's
trial, it was revealed that the document was really worth $13. That was enough
to convince the government to drop the case.

But Riggs, Darden, and Grant had already pleaded guilty to accessing
BellSouth's computer. Even though the facts in the Neidorf case showed the
world how absurd BellSouth's accusations were, the "Atlanta Three" were
sentenced as if every word had been true. Which explains why each of them
received substantial prison time, 21 months for Riggs, 14 months for the
others. We're told they could have gotten even more.

This kind of a sentence sends a message all right. The message is that the
legal system has no idea how to handle computer hacking. Here we have a
case where some curious people logged into a phone company's computer
system. No cases of damage to the system were ever attributed to them. They
shared information which we now know was practically worthless. And they
never profited in any way, except to gain knowledge. Yet they are being
treated as if they were guilty of rape or manslaughter. Why is this?

In addition to going to prison, the three must pay $233,000 in restitution.
Again, it's a complete mystery as to how this staggering figure was arrived at.
BellSouth claimed that approximate figure in "stolen logins/passwords" which we
have a great deal of trouble understanding. Nobody can tell us exactly what
that means. And there's more. BellSouth claims to have spent $1.5 million
tracking down these individuals. That's right, one and a half million dollars
for the phone company to trace three people! And then they had to go and spend
$3 million in additional security. Perhaps if they had sprung for security in
the first place, this would never have happened.  But, of course, then they
would have never gotten to send the message to all the hackers and potential
hackers out there.

We think it's time concerned people sent a message of their own. Three young
people are going to prison because a large company left its doors wide open and
doesn't want to take any responsibility. That in itself is a criminal act.

We've always believed that if people cause damage or create a nuisance, they
should pay the price. In fact, the LOD believed this too. So do most hackers.
And so does the legal system. By blowing things way out of proportion because
computers were involved, the government is telling us they really don't know
what's going on or how to handle it. And that is a scary situation.

If the media had been on top of this story and had been able to grasp its
meaning, things might have been very different indeed. And if BellSouth's gross
exaggerations had been taken into account at the sentencing, this injustice
couldn't have occurred. Consider this: if Riggs' sentence were as much of an
exaggeration as BellSouth's stated value of their $13 document, he would be
able to serve it in full in just over two hours. And the $233,000 in
restitution would be under $40. So how much damage are we really talking about?
Don't look to BellSouth for answers.

In early 1991, the three are to begin their sentences. Before that happens, we
need to reach as many people as possible with this message. We don't know if it
will make a difference in this particular case if the general public,
government officials, and the media hear this side of the story.  But we do
know it would be criminal not to try.

Please report problems with the web pages to the maintainer

Top