Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…
Buried in a lead article ("from News Services") about the space shuttle in this morning's (Minneapolis) Star Tribune is the sentence: The spacewalk was [...] delayed for 1 1/2 hours because Endeavour's on-board computer made a mistake in plotting the route needed to rendezvous with the satellite. I hope someone will have more information on this. -John Sullivan@Geom.UMN.Edu
_Rocky Mountain News_, 15 May 1992, page 211 Computer Chip Get Blame A woman who went on trial Wednesday in the shooting of three people at a Denver homeless shelter three years ago blamed the rampage on a computer chip she said her ex-husband planted in her brain. Juanita Whitaker, 42, pleaded innocent by reason of insanity in the Dec. 7, 1988, attack at the Brandon Center for homeless and battered women. One victim, a maid at the center, died in the attack. Bear Giles, email@example.com
William Safire's column in the New York Times for May 11, 1992 (Page A15, Column 1) contains a sharp attack upon the Bush Administration's efforts to prevent the use of technology designed to allow secure communications. The essay is called: "Foiling the Compu-Tappers". Here are some quotes: [...] You might think, with foreign economic spies intercepting our global data transmissions, faxes and phone calls, the Bush Justice Department and National Security Agency would be helping American businesses defend communications from prying eyes and ears of overseas competitors eager to steal our scientific advantage. The opposite is the case. In a policy blunder ranking with the adoption of the Smoot-Hawley tariff as depression loomed, the Bush Administration sent F.B.I. Director William Sessions to Congress to argue for a weakening of the devices U.S. citizens use to encode and keep confidential the information our competition would love to see. [...] This is a classic case of falling off the pace of change. In the name of law enforcement, we are making ourselves technologically vulnerable to international criminality. To preserve the huge investment in our old eavesdropping facilities, we are abandoning the field to modern organized crime. Does anyone seriously think that state terrorism cannot afford the best encryption and penetration software, or that drug cartels cannot buy the latest encryption devices for their money movements? [...] The trouble with both our Federal law enforcement and intelligence services is that they have become hooked on yesterday's technology. Electronic surveillance for cops and satellite photography for spooks have become central to their lives; their reaction to the inexorable improvement in encryption is to say to the world of science: slow down. It won't. In trying to sweep back the tide of change, King Canute-style, the F.B.I. is the front for the intelligence community, which hates to be forced to go back to the difficult days of running human spies. The N.S.A. (No Such Agency) is obsolescent because its expensive eavesdropping is an offensive weapon in the coming age of digital defense. [...] Mr. Bush is on the wrong side of this issue (and Ross Perot will take him apart on it in debate) because his mindset is toward old-fashioned spookery and against personal privacy. In the end, that's what this futile scramble to stop the scrambling will come down to: not to stop the march of progress, not to take tools from counterspies, but to preserve business and personal privacy. The coming Information Age threatens to be intrusive; the individual will be watched, examined, crowded. At the same time, to the happy tune of "I got algorithm," the computer-telephone complex brings us defenses against its own intrusion. Peter D. Junger, Case Western Reserve University Law School, Cleveland, OH Internet: JUNGER@SAMSARA.LAW.CWRU.Edu — Bitnet: JUNGER@CWRU
Has anyone else noticed that the New York Times (at least the west coast edition) seems to have lots of trouble with computer typesetting? Yesterday they had a notice on the front page that due to computer problems, some articles were not complete. The issue also had a lot of articles with headlines in the wrong fonts. It looked rather like someone had put the paper together by cut and paste. Today, the pull-out quotes in Science Times were scrambled so that the article on jury behavior had pull-out quotes from the article on crystals in the human brain. Made for an amusing, if accidental, editorial. Craig Partridge E-mail: firstname.lastname@example.org or email@example.com
About a year back, a co-worker asked me how to re-partition his hard drive. I told him that this was a silly idea, considering that he had lots of space and the partitions didn't get into anyone's way. He just wanted to do it because it was "better". Anyway, after explaining that he would have to save all of the old data some place (and suggesting that he not use millions of floppies, but instead FTP it up to our Unix system), he went away. About an hour later, he came back asking for PKzipFix. I asked him why, and he told me that PKunzip was complaining that he had a bad ZIP file. I went over to his desk, and after about 15 minutes of questioning, I realized what had happened. He had PKzip-ed each of his partitions and FTP-ed them up to the system. Unfortunately, he did not specify BINARY mode, and so it only transferred ASCII characters and converted CRLFs to LFs. Since he had reformatted his drive, all of that data was lost... The RISK was that FTP had no warning message of the following sort: WARNING: Non-ASCII characters found while in ASCII mode. I suppose that some further argument could be made that BINARY mode should be the default (instead of the data-modifying ASCII mode)...
`Busy signal' aided an `anklet' escapee (Newark "Star Ledger", 13 May 1992, By Robert Schwaneberg) A Paterson man charged with committing a murder while he should have been under house arrest was able to beat the electronic system monitoring his where-abouts because a computer got a busy signal - and never called back. That was the explanation members of the Senate Law and Public Safety Committee were given yesterday as to how Tony Palmer was able to remove the rivets from his electronic anklet and have the tampering go undetected for four months. In fact, the computer at the Corrections Department headquarters in Trenton detected the tampering on Dec. 16 and printed the information out, according to Steven Adams, supervisor of the electronic monitoring-home confinement program. But when the computer tried to relay the information to computer monitors sitting just a few feet away, it got "a busy signal," Adams said. "It did not call back," he added. As a result, senior parole officers manning the monitors 24 hours a day, seven days a week never knew what the computer knew - that Palmer had tampered with his anklet and that the computerized phone calls assuring that he was at home were worthless. Sen. Louis Kosco (R-Bergen), the committee chairman, was incredulous at first. "I don't accept the answers that I've gotten," Kosco said. "How could this have happened for four months - time after time after time?" Corrections Commissioner William Fauver and other staffers explained that once the computer detected the tampering, any additional tampering would not set off new warnings. Adams explained that the device remained in "tamper status" until it was reset. When Kosco realized the implications of that, he was even more appalled. "If someone could get away with it one time, then he had carte blanche," Kosco said. "If you can get away with it one time, you're free." "That's what happened in the Palmer case," conceded Loretta O'Sullivan, the Corrections Department's egislative liaison, "but it will not happen again." Adams said parole officers in Trenton now scrutinize the computer printouts for information about tampering, disconnected phone service or an inmate on home detention failing to answer when called. Anv such incident would trigger an immediate visit from a parole officer, he said. Other staffers said that when parole officers visit home jail inmates once a week, they no longer rely on a visual inspection of their anklets but insert them into a verifier, which would show if the anklets are in "tamper" mode. By the end of the month, Adams added, the state should begin receiving new anklets that attach with interlocking metal bands rather than rivets. Adams, displaying one of the new anklets, said, "The only way this can be removed is by cutting it off." Sen. Bradford Smith (R-Burlington) said a "major fault" of the current system is that even when an anklet is in tamper mode, the inmate can still use it to check in when the computer calls to see if he is home. Smith said that if the device has been tampered with, that should trigger an alarm each time a call is made to the inmate. "The technology has got to be up-graded in some fashion," Smith said. "This is just not acceptable." The anklets and monitoring equipment were manufactured by Digital Products of Florida, which did not have a representative at yesterday's committee meeting at Corrections Department headquarters. "I think we ought to look at some other systems and see what other companies are doing," Smith said. Despite their apparent distress at the technical limitations of the system, the lawmakers said the home confinement program must continue but should be improved and become more selective about the kinds of inmates it takes. State and county jails face severe crowding problems. It costs $12.80 a day to keep an inmate on home confinement vs. $67 a day to keep him in prison. "We all believe this is a very worthwhile program," Kosco said. "We want it to continue in the state of New Jersey, but we want it to work as close to perfect as we can make it." Kosco said the program should be put "on hold" as Fauver had announced last month, but added, "We don't mean stopped." Kosco said the program should not be expanded but that as inmates come out of home detention, new inmates should enter. As of yesterday, 642 state inmates - all within six months of parole - had been released to home confinement with electronic monitoring. Some counties also use electronic bracelet programs. Kosco and Sen. John Girgenti (D-Passaic) said the state should be more selective about the kinds of inmates it releases into the program. "I have problems when I read about people who were armed robbers who are now part of the program," Girgenti said. He said drug dealers and persons with ties to organized crime should also be ineligible for home detention. Girgenti and Kosco have introduced bills to restrict eligibility for home detention. Fauver said he had canceled plans to expand the state's electronic anklet program in the next budget year. He added that he was "still confident" about the program but said it is better suited to county jail inmates than state prison inmates convicted of more serious crimes. Fauver said he was awaiting a consultant's report on the technical as pects of the home detention program and the procedures used in other states with similar programs.
Recently an old friend tried to call me at work, in response to a call from me. He discovered that his moble phone on the Cellnet network would not reach an 081-966-nnnn number, while he could do so from a standard BT phone. Being a comms specialist, he called Cellnet, after a discussion with me. The end result was that Cellnet had in fact left this exchange out of their routing tables. It is now in! The reason behind this is that Cellnet (although partly owned by VBT) has to pay for any access to the BT phone network. To prevent calls being made to exchanges that do not exist and thus return a number unobtainable, but still raise a charge on Cellnet, but nothing that can be charged to the customer, Cellnet blocks such calls. When 966 came into being, no one added the route to make it available. Lord John - The First Programming Peer on INTERNET!
Hi, all. I just received this and tho't you'd be interested. --jim >From autodesk!megalon!wsgr Thu May 14 08:31:36 1992 To: megalon!jwarren Subject: Software Patent Report Jim - Just in case you hadn't heard, Congress' Office of Technology Assessment has released a new report on the state of protection for computer software. According to an article in the Daily Journal, the report entitled "Finding a Balance: Computer Software, Intellectual Property and the Challenge of Technology Change" has drawn praise for its sophisticated look at the unique problems in safeguarding technology rights. The report is available through the U.S. Government Printing Office ($11). - MarkB
The following item is in the latest issue of Mother Jones. Cybervirus warfare anyone? The Pentagon has a dream: An enemy soldier is attempting to pull up vital information on his computer screen. Suddenly, a peace sign flashes, along with the message, "You are STONED!'' A virus has destroyed his files. If you can make this dream a reality, Secretary of Defense Dick Cheney wants <it>you<>! His department's Innovative Research program is enlisting an unlikely group--computer hackers--to create strategic computer viruses that can attack enemy systems via radio signals. According to an official at the Army's Center for Signal Warfare, one hacker has already been awarded a $500,000 contract for the program's production phase. The exact nature of the work is classified, but the Signal Warfare official told <it>Mother Jones<> magazine that the virus project is based at Fort Monmouth, New Jersey, and described the work as "serious stuff.... Some believe these [viruses] exhibit lifelike tendencies, reproducing themselves like animals or plants.'' Critics fear that the Pentagon's viruses pose a greater threat to computer networks at home than do any potential enemies overseas. Last year, for example, the "STONED!'' virus and several others somehow found their way into nearly five thousand battlefield computers awaiting shipment to the Persian Gulf.
I decided to see what other sinister secret messages were lurking in Windows 3.1's "WingDings" font. If you type "IBM", you get a waving hand, a hand making an "OK" symbol, then a bomb. Obviously a reference to OS/2. If you type "GOD", you get a hand pointing to heaven, a white flag, and a thumbs down symbol. Clearly Microsoft are a bunch of atheists. If you type "MAC", you get a bomb, a V for victory sign, and a thumbs up. Plainly inspired by the recent legal bombshell in the look-and-feel lawsuit. If you type "UN", you get a crucifix followed by a skull and crossbones. Obviously Microsoft knows something about the United Nations that we don't. Another potentially interesting bit of information: In the beta-test versions of Windows 3.1, three "dingbats" fonts were supplied — Lucida arrows, Lucida stars and Lucida icons. WingDings seems to have been formed by condensing the three into one single font. It's interesting to note that whereas Lucida icons had both black and white coloured hand symbols, WingDings has only the white-skinned variety. mathew [Clever disclaimer omitted, as usual]
Following are items relating to two different newsgroups on PRIVACY. Dennis Rears' DIGEST is purposefully on the permissive side, less stringently moderated than RISKS; it is ideal for people who want relatively open newsgroups. Lauren Weinstein's FORUM will be on the selective side, substantially more closely moderated than RISKS; it is suitable for people who have little time, but have a vital interest in privacy. Both gentlemen are serious in their efforts. I think there are many reasons for both groups to coexist. Perhaps one or the other will satisfy those people interested in privacy issues who complain to RISKS that they want LESS MODERATION or MORE MODERATION, respectively. I hope that general discussions on privacy issues will continue to appear in RISKS, because those issues represent serious risks. Perhaps both moderators will submit summaries of key discussions to RISKS for our wider audience.
Announcing the global Internet PRIVACY Forum! The PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond. Topics include a wide range of telecommunications, information/database collection and sharing, and related issues, as pertains to the privacy concerns of individuals, groups, businesses, government, and society at large. The manners in which both the legitimate and the controversial concerns of business and government interact with privacy considerations are also topics for the digest. Except when unusual events warrant exceptions, digest publication will be limited to no more than one or two reasonably-sized digests per week. Given the size of the Internet, this may often necessitate that only a small percentage of overall submissions may ultimately be presented in the digest. Submission volume also makes it impossible for unpublished submissions to be routinely acknowledged. Other mailing lists, with less stringent submission policies, may be more appropriate for readers who prefer a higher volume of messages regarding these issues. The goal of PRIVACY Forum is to present a high quality electronic publication which can act as a significant resource to both individuals and organizations who are interested in these issues. The digest is best viewed as similar in focus to a journal or specialized technical publication. The moderator will choose submissions for inclusion based on their relevance and content. The PRIVACY Forum is moderated by Lauren Weinstein of Vortex Technology. He has been active regarding a wide range of issues involving technology and society in the ARPANET/Internet community since the early 1970's. The Forum also has an "advisory committee" consisting of three individuals who have offered to act as a "sounding board" to help with any questions of policy which might arise in the course of the Forum's operations. These persons are Peter Neumann of SRI International (the moderator of the excellent and renowned Internet RISKS Forum digest), Marc Rotenburg of Computer Professionals for Social Responsibility (a most clear and articulate spokesman for sanity in technology), and Willis Ware of RAND (one of the U.S.A.'s most distinguished champions of privacy issues). Feel free to distribute this announcement message to any interested individuals or groups, but please keep this entire message intact when doing so. Thanks! How to subscribe to PRIVACY Forum ================================= Individual subscriptions for the PRIVACY Forum are controlled through an automated list server ("listserv") system. To subscribe, send a message to: firstname.lastname@example.org or: email@example.com with a line in the BODY of the message of the form: subscribe privacy
Computer Privacy Digest/comp.society.privacy"Dennis G. Rears " <firstname.lastname@example.org> Wed, 13 May 92 13:59:53 EDTI am the moderator of the Computer Privacy Digest. The computer Privacy Digest is an Internet mailing list that is dedicated to the discussion of how technology impacts privacy. This list is gatewayed into the moderated USENET newsgroup comp.society.privacy. In lot of ways it is a subsection on the risks digest but it concentrates on the risks of technology on privacy. The charter is: comp.society.privacy Effects of technology on privacy (Moderated) This newsgroup is to provide a forum for discussion on the effect of technology on privacy. All too often technology is way ahead of the law and society as it presents us with new devices and applications. Technology can enhance and detract from privacy. This newsgroup will be gatewayed to an internet mailing list. Submissions go to: email@example.com and administrative requests go to firstname.lastname@example.org. dennis Dennis G. Rears MILNET: email@example.com UUCP: ...!uunet!cor5.pica.army.mil!drears INTERNET: firstname.lastname@example.org USPS: Box 210, Wharton, NJ 07885 Phone(home): 201.927.8757 Phone(work): 201.724.2683/(DSN) 880.2683 USPS: SMCAR-FSS-E, Bldg 94, Picatinny Ars, NJ 07806
MDC, the C-17 and the F-15E<John_Karabaic@NeXT.COM> Fri, 15 May 92 10:57:17 EDT>END OF STORY. Mark Seecof asks: has anyone seen the report itself? >I'd like to know in what way it was a mistake to give McDonnell-Douglas >control over software development for a plane it was building? ---flame on Well, since I was the Software Manager on the F-15E I can give you lots of reasons from personal experience about why any Government agency should think long and hard before giving McDonnell Douglas control over any software project: 1. Their insistence that flight-control software is not flight-safety critical, since there was a hydraulic backup in the F-15E aircraft. 2. Refusal to perform software Formal Qualification Tests prior to first flight, stating that the FQT is required only on production aircraft, and F-15E-1 was not a production aircraft. FQT should be an iterative testing process, but according to MCAIR, it was an acceptance test. 3. Refusal to define software stored in ROM as software, defining it instead as "firmware", and thus not subject to formal review and testing. These are just a few off the top of my head, five years after the fact. Don't get me wrong; I think MCAIR did a fantastic job on the F-15E. It's one great weapon system. But McDonnell Douglas's biggest problem on the F-15 project was, even though they could build excellent aircraft and systems, they wouldn't tell us government types (including this pitiful second lieutenant) anything unless we pried it out of them with a crowbar. And sometimes not even then, parroting the tired line, "Out of scope [of the contract]!" This makes it extremely difficult to get enough information to enable "organic support" (support by US Government personnel) or second-sourcing of software after the systems are delivered. Since the Advanced Tactical Fighter Program Office was right across the hall at that time, every time I had a problem, I would go tell the people writing the contracts for that program how responsive my contractor was being. (In Air Force talk: "Check six!") --flame off But there may be another, more simple reason for the GAO's finding: I believe that the US Government, not the prime contractor (MDC, in this case) has "total system performance responsibility" for the C-17. That is, a program office residing at Wright-Patterson AFB has the responsibility for integrating and testing every aspect of the aircraft, not the contractor who is building it. Since software is the glue that holds a modern military aircraft together, this may be why the GAO is faulting the C-17 SPO for not "controlling" the software. John S. Karabaic, Systems Engineer, jkarab@NeXT.com, 513 792 5904 NeXT Computer, Inc.; 4434 Carver Woods Dr.; Cincinnati, OH 45242 cellular: 513 532 0224; fax: 513 792 5913; territory: OH, IN & KY
Please report problems with the web pages to the maintainerxTop