The RISKS Digest
Volume 14 Issue 31

Friday, 5th February 1993

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…

Contents

"Computer Blamed For Phone Jam" [Ohio Bell]
Joe Brownlee
BNFL prosecuted for unauthorised software changes
Martyn Thomas
Residues in a surplus bank computer
Fred Cohen
Re: Educational computer game banned
Guy K. Haas
Re: Clever Tactics Against Piracy
Gerd Meissner
Anecdotes Wanted on the Risks of Information Security
Dorothy Denning
Re: The FBI and Lotus cc:Mail
Isaac Rabinovitch
Roger D Binns
Bill Stewart
Dorothy Denning
Dorothy Denning
Dorothy Denning
Dick Joltes
Dick Joltes
Ray Ozzie via Peter Wayner
Anyone can get your U. of Illinois transcript
Carl M. Kadie
Phone Company Cleverness
Jon Leech
Info on RISKS (comp.risks)

"Computer Blamed For Phone Jam"

<joe@cbcosmos.att.com>
Fri, 29 Jan 93 7:42:40 EST
  from the 1/28/93 Columbus (Ohio) "Dispatch"
  by Ron Lietzke and Bruce Cadwallader

  A three-minute computer failure at an Ohio Bell central office disrupted
  phone service for 42,000 telephone lines in the Downtown business district
  for about 45 minutes yesterday morning.  The computer problem cleared after
  a few minutes, but the disruption snowballed when a surge of callers seeking
  dial tones caused a telephone traffic jam of sorts, Ohio Bell spokesman
  David Kandel said.

  Outgoing and incoming calls on 15 Downtown prefixes were disrupted by the
  problem, which started at 9:42 AM.  The Columbus police, the Franklin County
  Sherrif's Department, Columbus Public Schools, and state offices were among
  those disrupted by the outage, Kandel said.

  Callers in the affected prefix areas who dialed 911 could not reach Columbus
  police or the Franklin County Sherrif's office for at least 3 minutes.
  However, those agencies reported that they did not receive any complaints
  after the dial tones returned.  "It was starting to clear itself within
  minutes, but because you're looking at such a huge volume of calls Downtown,
  it took the system time to recover," Kandel said.  "The system was
  delivering a very, very slow dial tone."

  Problems started when one of two computer processors failed.  The other took
  over, but it took about three minutes for it to retrieve the information
  from the failed processor, Kandel said.  Ohio Bell technicians were working
  with the equipment manufacturer yesterday to determine what caused the
  processor to fail.  It still was not working late yesterday.  [...]

  Columbus police dispatchers reported having problems for about 30 minutes.
  Chief Deputy Robert Taylor of the sheriff's department said this radio room
  used cellular phones until the problem cleared.  Neither department knew of
  any emergencies missed because of the computer problem.  Columbus
  firefighters said they were receiving 911 calls throughout the period of
  disruption.

Two items of interest I note.  One is that even a brief delay in grabbing data
from the failed computer resulted in a large backlog.  Perhaps the system was
not designed to account for the large number of lines in downtown Columbus,
which boomed during the 1980's.  Phone systems tend to use less than state-of-
the-art technology (to avoid many of the "bleeding edge" problems often noted
here), but in this case, perhaps a faster processor or live mirroring of the
data in question would have helped.

As to my second point, twice the article points out that nobody knew of any
emergency calls that were missed, with the implication that no harm was done.
Dead men tell no tales?

Joe Brownlee, Analysts International Corp. @ AT&T Network Systems 471 E Broad
St, Suite 2001, Columbus, Ohio 43215 (614) 860-7461 joe@cbcosmos.att.com


BNFL prosecuted for unauthorised software changes

Martyn Thomas <mct@praxis.co.uk>
Thu, 4 Feb 93 15:48:16 GMT
According to Computing (4 Feb), British Nuclear Fuels Ltd is being
prosecuted for making alleged unauthorised software changes to a safety
mechanism on a shield door at Sellafield.

      Martyn Thomas, Praxis plc, 20 Manvers Street, Bath BA1 1PX UK.
Tel:    +44-225-444700.   Email:   mct@praxis.co.uk     Fax: +44-225-465205


Residues in a surplus bank computer

Fred Cohen <fc@turing.duq.edu>
Wed, 3 Feb 93 18:35:52 -0500
This one goes in the `When will they ever learn?' category:

    I just got a call from a person who recently purchased a Unix based PC
as junk from a bank, and low and behold, the computer was not cleaned before
sale.  How hard is it to break in?  Not too!  All you have to do is boot from
a DOS floppy, run Norton Utilities or any similar tool, search for the `root:'
part of the password file, and change that line to look like `root::0:1::/:'.
Then you reboot from Unix and login as root with no password!

    So that's too simple to be believed, but of course it works, and now
comes the real problem.  I am not sure it's illegal to use that data however
you want! That's right, the computer crime laws don't cover computers that are
not attached to any networks, aren't part of the banking system, etc.  This
system is no longer a banking computer, the data was sold along with the
system to the new owner by the bank with no stipulations or warnings (as-is),
and the new owner, as far as I can tell, has the right to use anything on the
computer as their own.

    It's a little upsetting that the bank didn't bother to do a secure
deletion before giving all this data away (only about 120Mbytes worth of
information on customers, etc.).  How about the privacy of the customers of
the bank? How about the EFT codes stored on-line! How about all the passwords
that can now be guessed and exploited to enter the bank as if you were an
employee? Oh well, anyone want to buy a used computer - no longer so cheap?

            [Expletives deleted if there were expletives UNDELETED.
               By the way, remember that the C2 Orange Book requirement is
               for deletion prior to initial assignment and reallocation.
               Somewhere there should be a requirement for deletion prior
               to permanent deallocation as well.  PGN]


Re: Educational computer game banned (Shaun, RISKS-14.30)

<ghaas@informix.com>
Thu, 4 Feb 93 07:43:33 PST
With all due respect to Christina Kirby, the "Wizards" game is NOT a computer
game.  It is a pencil-and-paper game, like other adventure simulations.  The
students gain points by achieving goals in spelling (and perhaps other
language-related tasks), and translate these points into progress around a
game board.  It bears a superficial resemblance to "Dungeons and Dragons,"
with magicians, wizards, a winged dragon, a pit — symbols that some
(fundamentalist) Christians equate with Satanism and/or disregard for Biblical
symbolism.  The symbols were the basis of the argument made against the game.

The teachers had two objections — the issue of choice of instructional
materials, and that of the way the District imposed the ban.  One result of
the uproar was a rewrite of the "Challenged Instructional Materials" policy.
making the evaluation process much more accessible to the concerned public.
Another was the motivation of a parent in the district who fought the ban to
mount a (successful) run for a School Board seat last election, unseating an
incumbent.

--Guy K. Haas     (active in the MUSD since 1987)


Re: Clever Tactics Against Piracy (RISKS-14.30)

Gerd Meissner <100064.3164@compuserve.com>
03 Feb 93 04:28:01 EST
It might be interesting for readers who want to know more about the "Clever
Tactics Against Piracy" (RISKS 14.30) that the story, including some technical
details, was first published in the German news magazine DER SPIEGEL (#36,
1992, August 31st), titled "Trojanisches Pferd" (Trojan Horse). The company
used a 12-digit key that looked like the serial number of the
"free-demonstration coupon", which had to be printed out and sent back, to
identify the pirated copies found on the "customers" machine and some details
about the computer it was found on.

                 [Mark Brader just reminded me in a different context
                 of always looking a Trojan horse in the mouth.  PGN]


Anecdotes Wanted on the Risks of Information Security

Dorothy Denning <denning@cs.cosc.georgetown.edu>
Thu, 4 Feb 93 13:26:04 EST
I am seeking anecdotes of incidents where information security mechanisms or
practices led to a problem (e.g., lost work or data, wasted time, down time,
being locked out because of lost crypto keys or access tokens).  I am also
interested in descriptions of security features that are difficult to use and
lead to problems.  If you send me something, please indicate whether I can
attribute it to you or you wish to remain anonymous.

Thanks,

Dorothy Denning   denning@cs.georgetown.edu


Re: The FBI and Lotus cc:Mail (Joltes, RISKS-14.29)

Isaac Rabinovitch <ergo@netcom.com>
Sun, 31 Jan 1993 18:49:01 GMT
>Happily, the presenter said that Lotus refused to honor the FBI's request.
>Bravo!

Do not relax.  So what if an official back door doesn't exist?  Other federal
agencies are more discreet than the FBI, and would consider "their" back door
useless if any notice were taken of its existence.  Furthermore, somebody is
bound to see the profit in covertly adding a back door to a product and
quietly selling it to individuals with a commercial interest in violation of
privacy.

I checked with Lt. Colonel North, Admiral Yamamoto, and especially Captain
Murphy, and they all agree: never assume a publically-accessible medium is
secure just because it's encrypted!

    ergo@netcom.com             Isaac Rabinovitch
        {apple,amdahl,claris}!netcom!ergo   Santa Cruz, CA


The FBI and Lotus cc:Mail (Joltes, RISKS-14.29)

Roger D Binns <cs89rdb@brunel.ac.uk>
Mon, 1 Feb 93 11:47:57 GMT
: Happily, the presenter said that Lotus refused to honor the FBI's request.

Are you sure?  Lotus could quite easily have honoured their request, and
merely tell everyone they haven't.  The FBI is happy, the consumer is happy.
This brings to a mind a phrase 'ignorance is bliss'.

Roger

cs89rdb@brunel.ac.uk     Roger Binns    Brunel University - UK              |


The FBI and Lotus cc:Mail

Bill Stewart +1-908-949-0705 <wcs@anchor.ho.att.com>
Tue, 2 Feb 93 12:52:36 EST
In RISKS 14.29, joltes@husc.harvard.edu reports that Lotus says that the FBI
had asked them to place backdoors into Notes and cc:Mail, and they refused.
Assuming that they told the truth, I'll second Dick's "Bravo!".

But one RISK here is that, without *sources*, it's hard to tell -
does Lotus provide sufficient documentation on file formats and encryption
algorithms that users can verify that the program does what it claims?

Bill Stewart, AT&T Bell Labs, Holmdel, NJ, wcs@anchor.att.com

     [Even WITH sources it can be hard to tell.  Recall Ken Thompson's
     C-compiler Trojan horse in which there were no changes to the
     source code of either the C compiler or the UNIX login routine.  PGN]


Re: The FBI and Lotus cc:Mail (Joltes, RISKS-14.29)

Dorothy Denning <denning@cs.cosc.georgetown.edu>
Fri, 29 Jan 93 13:34:41 EST
In RISKS-14.29, Dick Joltes said the following about a presentation he
attended on Lotus Notes and the response of the Lotus representative to a
question about how the encryption was done:

    The presenter said that the data was considered very secure, so
    much so that the FBI had approached Lotus to ask that a "back
    door" be left in the software in order to give the Bureau a
    method for infiltrating suspects' filesystems.  She said they
    were specifically targeting "drug dealers and other bad
    people."

    Given this backdoor, what was to stop the Bureau from
    inspecting confidential materials on any system?  The risks
    seem obvious. ...

There are, in fact, very good controls to stop the FBI or any other law
enforcement agency from doing this.  They're called warrants.  In order to
execute a search and seizure on any system, the government needs to have a
court order.  To get a court order, they have to demonstrate that there is
probable cause that a crime has been commited.  Neither the FBI nor any other
law enforcement agency is allowed to "infiltrate" someone's system and poke
around to see what's there.

The "obvious" risk here is not from the government.  If the government is
unable to break through the crypto or get the key, they may be unable to
obtain evidence needed to prosecute someone who has commited a crime.  This is
potentially a very serious problem, especially as records become more heavily
computerized.

    Happily, the presenter said that Lotus refused to honor the
    FBI's request.  Bravo!

Encryption of files and communications is going to make it much more
difficult, and in some cases impossible, for law enforcers to get evidence
needed for conviction.  Unless we want a society with greater crime, we need
to find some way of meeting both our needs for information security and our
needs for law enforcement.  Then we can cheer.

Dorothy Denning
Professor & Chair, Computer Science, Georgetown University


Re: The FBI and Lotus cc:Mail

<joltes@husc.harvard.edu>
Mon, 1 Feb 93 14:16:33 EST
Dorothy Denning, responding to my posting regarding cc:Mail, says:

> There are, in fact, very good controls to stop the FBI or any other law
> enforcement agency from doing this.  They're called warrants.  In order
...
> the FBI nor any other law enforcement agency is allowed to "infiltrate"
> someone's system and poke around to see what's there.

The key word here is "allowed."  As we've seen with such scandals as Watergate
and Iran-Contra, what is allowed by law and what is actually done sometimes
are two different things.  What is to stop an agency from conducting an
initial covert search of a person or corporation's records, then requesting
the warrant after they find questionable or illegal material?

Dorothy's comments presuppose that all operatives within all governmental
bodies are completely honest.  While I would say that a majority of these
workers are honest, the risk that some are not makes the presence of known
back doors in supposedly "secure" software a highly questionable situation.

> The "obvious" risk here is not from the government.  If the government
> is unable to break through the crypto or get the key, they may be
> unable to obtain evidence needed to prosecute someone who has commited
> a crime.  This is potentially a very serious problem, especially as
> records become more heavily computerized.

Certainly it is.  However, we must evaluate whether the risks to the public
at large outweigh the advantage of having such back doors available to
legitimate authorities.  What if the codekey sequence used to activate the
alternative access method became known due to a security leak (disgruntled
Lotus employee or government agent, espionage, etc)?  Lotus would then need
to issue a binary patch to change the codekey (at their expense, no doubt).
Customer confidence in the product would sag and businesses would begin to
question the security of their own supposedly encrypted software.

If I were running a business and knew that a product I was evaluating had a
built-in back door, it would end my interest in the product.

> Encryption of files and communications is going to make it much more
> difficult, and in some cases impossible, for law enforcers to get
> evidence needed for conviction.  Unless we want a society with greater
> crime, we need to find some way of meeting both our needs for
> information security and our needs for law enforcement.  Then we can
> cheer.

My cheer was in regard to Lotus' refusal (well, they *said* they refused) to
blindly install a security hole in their most successful product simply
because a government agency said "please do it."  Knowing that acquiescence
to such a demand was a violation of the trust placed in Lotus products by
their customers, they did the "right thing" and said "no."

I agree that some balance needs to be stuck, but the scales must not be tilted
to the needs of law enforcement at the expense of the public.  Given some
recent incidents (such as "Operation Sun Devil," which nearly put a legitimate
business into bankruptcy due to the actions of paranoid and uninformed agents)
it seems obvious to me that few Federal agencies currently possess the basic
skills needed to differentiate between criminals and "fringe groups" such as
gamers and hackers whose participation in society is outside the "norm" of
American experience.

The subject of "Computing and the Law" is one that is just beginning to make
an impact on society, and both the public and the government need to feel
through the tangle of issues that surround it.  We must not make the mistake
of infringing on privacy simply to deter crime, since this will establish
legal precedents that could easily become Draconian in their use if unchecked.

Dick Joltes, Harvard University Science Center      joltes@husc.harvard.edu
Hardware & Networking Manager, Computer Services    joltes@husc.bitnet


Re: The FBI and Lotus cc:Mail

Dorothy Denning <denning@cs.cosc.georgetown.edu>
Wed, 3 Feb 93 12:03:53 EST
Dick Jotes, responding to my response to his post on cc:Mail, says:

    The key word here is "allowed."  As we've seen with such
    scandals as Watergate and Iran-Contra, what is allowed by law
    and what is actually done sometimes are two different things.
    What is to stop an agency from conducting an initial covert
    search of a person or corporation's records, then requesting
    the warrant after they find questionable or illegal material?

    Dorothy's comments presuppose that all operatives within all
    governmental bodies are completely honest.  While I would say

I do not assume that everyone in government is totally honest.  Rather,
I acknowledge that the American system of government has extensive
mechanisms to protect against abuses, including the illegality of
breaking into someone's system or conducting a search without a
warrant, Congressional oversight committees and hearings, and the use
of the media to expose abuses.

    What if the codekey sequence used to activate the alternative
    access method became known due to a security leak (disgruntled
    Lotus employee or government agent, espionage, etc)?  Lotus
    would then need to issue a binary patch to change the codekey
    (at their expense, no doubt).  Customer confidence in the
    product would sag and businesses would begin to question the
    security of their own supposedly encrypted software.

Customer confidence is an important concern, but since we don't know
exactly what the FBI requested of Lotus, we don't know what
vulnerabilities might exist and whether businesses would accept
whatever risks might be present.

    I agree that some balance needs to be stuck, but the scales
    must not be tilted to the needs of law enforcement at the
    expense of the public.  Given some recent incidents (such as

The public needs law enforcement.  This is not the public vs. law enforcement.

    "Operation Sun Devil," which nearly put a legitimate business
    into bankruptcy due to the actions of paranoid and uninformed

If you're referring to Steve Jackson Games, it was not part of the Sun Devil
investigation (which was about toll fraud and credit card fraud).

    agents) it seems obvious to me that few Federal agencies
    currently possess the basic skills needed to differentiate
    between criminals and "fringe groups" such as gamers and
    hackers whose participation in society is outside the "norm" of
    American experience.

Please don't make such sweeping generalizations based on one case or
even a few.  There have been hundreds (probably thousands) of cases
that have been handled extremely well.

    The subject of "Computing and the Law" is one that is just
    beginning to make an impact on society, and both the public and
    the government need to feel through the tangle of issues that
    surround it.  We must not make the mistake of infringing on
    privacy simply to deter crime, since this will establish legal
    precedents that could easily become Draconian in their use if
    unchecked.

I agree that this is a difficult issue that needs to be sorted out.  I also
argue that we need to find ways to satisfy both our need to control crime and
our need for privacy & security.  None of these needs will be or indeed can be
satisfied in an absolute way.  The challenge is to find ways that keep the
risks at acceptable levels.

Dorothy Denning


Re: The FBI and Lotus cc:Mail

Dorothy Denning <denning@cs.cosc.georgetown.edu>
Thu, 4 Feb 93 16:39:43 EST
I talked with a knowledgeable person in FBI Headquarters whom I know and
trust about the claim that they asked Lotus to put a "back door" into
the encryption system of Notes.  He was confident that Headquarters had
not made any such request of Lotus and was surprised to hear about it.
He did not know if someone in one of the field offices might have asked
Lotus for help in conjunction with a specific investigation.

Dorothy Denning


Re: The FBI and Lotus cc:Mail

<joltes@husc.harvard.edu>
Fri, 5 Feb 93 9:16:39 EST
There should be additional information on its way to RISKS about this
subject (from another source).  Employees of Lotus were involved in meetings
with the FBI held under the auspices of the EFF over the past 18 months.
Several proposed bills were discussed and tabled.  We have it from one of
the employees who was actually involved.

It is not surprising that Dorothy's source knew nothing (if true) of the
contacts.  Stratification and compartmentalization within federal organizations
is not uncommon, with the result that groups within the same agency do not
know of the activities of others.

Dick Joltes   joltes@husc.harvard.edu


With Regard to Lotus Notes and the FBI...

Peter Wayner <pcw@access.digex.com>
Tue, 2 Feb 1993 23:36:50 -0500
{This is the text of a letter to me from Ray Ozzie, one of the developers of
Lotus Notes.  He said it was okay to forward this to comp.risks to clarify the
recent posting about the FBI's involvement with Lotus.  I believe that the
details of the interaction are much less ominous in this rendition and more
importantly it comes from the head developer's mouth.  -PCW}

 The message entitled "The FBI and Lotus cc:Mail"  is not entirely correct,
 although it is correct "in spirit".

 As one of the developers of Notes, I have represented Lotus twice regarding
 FBI proposals.  In the first (about 18 months ago), the FBI was trying to
 persuade Congress to pass a law requiring communication service providers to
 deliver the original plain text of messages entering their systems, in
 essence requiring us to install a back door.  Lotus was not approached by the
 FBI - rather, the EFF learned of the bill and asked me to participate in a
 round-table discussion with lawmakers and others from the telecommunications
 and computer industries.  The bill was tabled shortly thereafter.

 Last year, we again participated in several discussions with the FBI related
 to a new proposal that would have required manufacturers of communication
 equipment and services to modify their products (in this case, Lotus Notes)
 to be able to, on demand and in a timely fashion and from a single access
 point, grant the FBI access to communications.  This new law would not
 require us to install a backdoor, that is, they took the issue of encryption
 off the table, but would instead require us to install logic into our message
 routers to disable dynamic adaptive least-cost path routing and also to
 disable code that breaks messages into packets for transmission on different
 virtual circuits.  It would also require us to put logic into the message
 routers to deliver copies of messages to a central monitoring point from
 anywhere in the network.  This FBI plan has also been tabled.

 If it weren't for the Electronic Frontier Foundation, we never would have had
 a chance to participate.  EFF and the CPSR are providing a great service for
 our industry, which has a pitifully small lobbying presence in Washington.
 Neither Lotus nor Lotus Notes was singled out by the FBI, rather, I
 represented Lotus voluntarily in order to defend Lotus' commercial
 interests.  Additionally, I was compelled to attend because I believe very,
 very strongly in my right to privacy as a US citizen.

 On the other hand, the FBI has a very difficult job to do, and with the
 onslaught of technology, it fears that it may soon lose its longstanding
 authority to carry out court-ordered wiretaps.  Valid wiretaps - ones that
 you would probably agree with.  From their perspective, why can't a technical
 solution be found to what appears to be a technical problem?

 From my perspective, though, the cat's out of the bag.  It's already very
 easy for the average joe to do effectively unbreakable end-to-end encryption
 of messages on standard PC hardware.  Passing laws won't stop bad guys from
 using encryption, so these laws will just have the effect of increasing the
 cost of every mail system, every PBX, every LAN router, every cellular phone,
 and so on.  Not to say what the laws will do to your privacy.

 Think about it.  And then call the EFF.


Anyone can get your U. of Illinois transcript

Carl M. Kadie <kadie@cs.uiuc.edu>
Sun, 24 Jan 1993 17:47:45 GMT
If you are a student at U. of Illinois, you should know that anyone who knows
your social security number and birthday can now see your official transcript.
To add insult to injury, if someone does looks at your transcript, *you* will
be charged a $5 transcript fee.

The administration building, room 100, now has three computer
terminals. Anyone can walk up to one and type
  1) a social security number
  2) a birthday
  3) an address

If the social security number and birthday match a current student, that
student's transcript will be send to the address and that student's account
will be charged $5.

At the very least, check your university bill. It seems that your only
protection is your ability to track down the destination address of an
improperly send transcript (assuming the university keeps a record of these
addresses).

- Carl Kadie   = kadie@cs.uiuc.edu =


Phone Company Cleverness

Jon Leech <leech@cs.unc.edu>
25 Jan 1993 21:00:58 GMT
    Seen on page 2 (e.g. the part most people throw out) of this month's bill
from Southern Bell:

   "Call RightTouch(R) service [to do various things such as
    disconnecting your phone or ordering extra-cost services]
    ....
    Please protect your access code: ####"
                     ^ actual 4-digit code printed here

Please report problems with the web pages to the maintainer

x
Top