The RISKS Digest
Volume 16 Issue 28

Friday, 22nd July 1994

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…


Hoods Hit the Highway
Jon Loeliger
Dutch police victim of phone-tapping criminals
Ralph Moonen
As the Worm Turns--Ant-icipating Problems
Mich Kabay
It's a real world out there, and the Internet is part of it.
Phil Agre
Automated mail listserver causes "Spamming" on the Internet
Jean Renard Ward
Leahy Statement on Gore Statement on Clipper
Marc Rotenberg
Privacy Journal this month
Robert Ellis Smith
CFP: IEEE Symposium on Security and Privacy
Catherine A. Meadows
Info on RISKS (comp.risks)

Hoods Hit the Highway

Jon Loeliger <>
Fri, 22 Jul 1994 09:49:25 -0500
From Jon Loeliger, Healthcare Communications Inc.

Hoods Hit the Highway; Computer users warned of scams

By Charlotte Anne Lucas
Austin Bureau of The Dallas Morning News
Dallas Morning News, 1 July 1994,

AUSTIN — Computer users, beware: Driving on the information highway,
it's possible to get fleeced.

Scam artists have hit the cyberspace, offering high-tech ponzi schemes,
sending illegal electronic chain letters and hyping virtually worthless
stock, according to state securities regulators across the nation.

In Texas, regulators say an Austin retiree lost $10,000 in a fake mutual
fund deal sold by a man who promoted his "money managing" skills through
an on-line computer service.

"The danger here is that cyberspace, which could be a beneficial way for
consumers to do a better job of informing themselves, will instead be
discredited as a haven for fast-buck artists," said Denise Voigt
Crawford, the Texas Securities Commissioner.

In New Jersey and Missouri on Thursday, securities regulators filed
cease and desist orders against promoters who used computer links to
tout allegedly fraudulent deals.  Texas regulators say it is likely that
they will seek an indictment in the case of the nonexistent mutual fund.

But with nearly 4 million computer users nationwide linked into
commercial computer services and 20 million people on the internet,
a world-wide computer network, "it is almost too big to police
effectively," said Jared Silverman, chief of the New Jersey Bureau of
Securities and chairman of a multi-state team that investigates computer

In response, regulators in all 50 states issued a bulletin to
investigators, describing the potential frauds and listing steps small
investors can take to protect themselves.  "We're trying to tell people
to be careful," said Ms. Crawford, "there is a new fraud on the

Although regulators are concerned about the problem, Ms. Crawford
acknowledges enforcement will be a challenge.  Because electronic
conversations, or E-mail, are considered private, "we don't know what
difficulties we are going to have getting subpoenas enforced or what
kind of cooperation we will get from (commercial bulletin board
systems)." [sic]

Officials say promoters tend to advertise offers or stock tips on the
financial bulletin board sections of on-line computer services such as
CompuServe, America Online and Prodigy, or in the specialized discussion
forums in the Internet.

Regulators said that of 75,000 messages posted on one computer service
bulletin board during a recent two-week period, 5,600 were devoted to
investment topics.  While some commercial computer bulletin board
services try to control the publicly posted investment tips, most do not
try to control most communications on the service.

What begins as innocent E-mail can end with an unwary investor "getting
cleaned out by high-tech schemers," said Ms. Crawford.

In Texas, the case under investigation began when an Austin retiree
posted a public note in a commercial bulletin board system looking for
conversations about the stock market, according to John A. Peralta,
deputy director of enforcement at the Texas Securities Board.

"He was contacted.  It turned into a private E-mail conversation, a
telephone conversation and then exchanges through the mail," said
Mr. Peralta.  But the person who promoted himself on the computer as a
skilled money manager turned out to be unlicensed — and the mutual fund
the retiree invested in turned out to be nonexistent.

Mr. Peralta said at least one other person, not from Texas, invested
$90,000 in the same deal, "We are aware of two, but we don't really
know," he said.  "There may be dozens of victims."

Securities regulators began taking interest in on-line scams last fall,
after Mr. Silverman — a computer junkie — raised the issue at a
national meeting of regulators.  "I heard stories about things going on
on computer bulletin board services, and I have been monitoring these
things for close to a year," he said.

In fact, the New Jersey case came from Mr. Siverman's off-hours cruising
of an on-line service.  "I sit at a keyboard two hours a day — to the
chagrin of my wife — scanning these things," he said.

What he found was a promoter pushing an E-mail chain letter.  The
promoter, identified only as from San Antonio, claimed that in exchange
for $5, investors could earn $60,000 in three to six weeks.

Regulators said participants were told to send $1 to each of five people
on a list in the computer bulletin board, add their own name to the list
and post it on 10 different computer bulletin board sites.

That, regulators said in a statement, "amounted to a high-tech
variation on the old pyramid scam, which is barred by federal and state

In Missouri, regulators Thursday moved against an unlicensed stockbroker
for touting his services and "making duubious [sic] claims for stocks
not registered for sale in the state."  Among other things, regulators
said, the promoter falsely claimed that Donald Trump was a "major,
behind-the-scenes player in a tiny cruise line" whose stock he pitched.

Ms. Crawford said that while computer users may be sophisticated in some
ways, they still are attractive targets because they tend to have
discretionary income and frequently are looking for ways to invest their

Some of the commercial services also allow users to use various aliases,
making it all the more difficult for investigators to figure out who
they are really communication with.

Dutch police victim of phone-tapping criminals

Ralph Moonen <>
Fri, 22 Jul 1994 11:59:33 +0200
Usually law enforcement's arguments for regulated encryption center around
their ability to tap criminal's conversations. In the Netherlands this
discussion has taken a whole new twist when Dutch newspaper De Telegraaf
laid hands on phone-tap recordings not from the police, but from
criminals who had tapped various high police officials' home and work
phones. Needless to say the newspaper published transcripts of the
recordings which proved to be quite interesting. (Proving police used
several illegal means of gathering evidence and revealing a lot of
internal trouble in the police dept.)

Soon after publication police officials called for more funding to be
able to buy encryption  devices. Was this just naivety on the part of the
police to assume criminals couldn't wire-tap or was it an isolated
incident where the criminals got lucky? Evidence supports only the first
assumption. Hopefully this incident will lead to more discussion on
encryption technology. A while ago legislation was proposed to ban
encryption without having a permit for such devices. This proposal was
cut down in light of strong opposition from industry and commerce. After
that, no-one in the Netherlands really took up the issue, which I think
we all agree upon is one of the most important ones of the information age.

Oh, the RISK? I dunno, but I think it's obvious :-)


As the Worm Turns--Ant-icipating Problems

"Mich Kabay [NCSA Sys_Op]" <>
22 Jul 94 08:47:44 EDT
>From the United Press International newswire (94.07.21 @ 12:17 EDST) via
CompuServe's Executive News Service (GO ENS):

Ants help BT improve computers


   "LONDON, July 21 (UPI) — British Telecom scientists are exploring ways of
making computer programs more robust and adaptable by using ant colonies as
models for interactive programs that respond to changing conditions in computer
   A team of computer specialists based at BT's Martlesham Heath
laboratories in Ipswich, east England, has been studying research material
on ants for the past two years and using their findings on developing

Key points from the article:

o   "Our system is made up of small, autonomous, reactive, mobile
blocks of computer code that interact in a way derived from ant behavior,"
said scientist Simon Steward. "The control system that emerges from all of
these mobile software agents working together is inherently adaptable and
robust unlike normal computer programs."

o   The goal of the work is to prevent system crashes when an
unanticipated [PGN, please forbear] condition occurs.

o   The distributed computing model uses message-passing to coordinate

o   "The programs are mobile like ants, moving from one computer to
another, when needed."

o   After making software or parameter changes, the "mobile programs"
would "leave messages for other programs on how the system has been

o   Modules will display "a certain amount of random behavior...."

o   The system will display heuristic, goal-seeking behaviour.

[Comments from MK follow:]

Programs that move from system to system are usually called worms.  The
work described above is related to Von Neumann's concepts of cellular
automata, and I guess would count as an example of "artificial life" or
a-life.  The idea that semi-autonomous computer programs would migrate
from place to place reminds one of the debate about "useful viruses."

I was getting antsy about this (the idea was really bugging me), so I
searched on "ant or ants" in the Ziff Computer Database Plus (GO COMPDB on
CompuServe) and located an article in Computergram International (June 10,
1994), p. 15 entitled, "British Telecom's research lab claims to have
found the fastest Travelling Salesman algorithm."  In this application,
which runs on a single RISC workstation, "The search algorithm is set in
motion on a problem to find the shortest travelling distance between
several cities, for example.  In effect a whole series of `ants' are
thrown on a map of the area and if the system doesn't find a destination
city, it dies, whereas if it does find a chosen destination city it `gives
birth' and grows."  A path is then established between cities.  The
algorithm is very fast--two seconds for a 100-point optimization problem
and 2.5 minutes for 1000 points.

All this is fascinating, and I naturally wondered about the implications
for system reliability.  Turning back to the UPI story, it seems to me
that there must be a lot of work to include quality assurance principles
into heuristic, semi-autonomous algorithms that change system or network
configuration.  The consequences of malfunction increase when the problems
occur in control structures e.g., a hole in your hose can swamp your lawn,
but a bug in your electronic shutoff valve that reverses inputs (off ->
on) can really put a bee in your bonnet.

One of the main objections to free-roaming software worms and viruses is
that they (themselves) offer no opportunity for a system manager or owner
to block their activity (one can usually do so with antivirus tools,
though).  When a system is seeded with these rogue programs, one never
knows what will flower.  Who wants untested software making changes in her
computer system?  Similarly, how do we cope with "genetic" algorithms that
spontaneously make changes in, say, operating system tables or even
executable code?  How does one test a real-time change in the operating

It will be interesting to follow this work and see how concerns for reliability
are worked into this evolving field.

Michel E. Kabay, Ph.D. / Dir Education / Natl Computer Security Assn

It's a real world out there, and the Internet is part of it.

Phil Agre <>
Fri, 22 Jul 1994 14:21:17 -0700
Many denizens of the Internet think of it as a place of untrammeled free
speech and decentralized democracy.  Evidence is accumulating that it's
more complicated than that.  Writing in the liberal journal _The Nation_,
Jon Wiener (a historian at UC Irvine whose does a sort of investigative
journalism) outlines some of the complications.  The full reference is:

  Jon Wiener, Free Speech on the Internet, The Nation 258(23), 13 June
  1994, pages 825-828.

He describes the Karla Homolka trial in Canada, a group of Turks who swamp
newsgroups with automatic messages denying the Armenian genocide, gun
activists taking over alt.motherjones, libel suits provoked by on-line
statements, gender imbalances, abusive behavior by unreformed net-guys,
and more.  None of which means the net is bad; it just means the net is
part of reality.  At one level the Risk is computer-related: bad stuff can
happen on-line, just like in real life.  But the real Risk comes from
believing the hype: just because it's decentralized doesn't make it
democratic.  If we want democracy we have to actively make it.  Just like
in real life.

Phil Agre, UCSD

Automated mail listserver causes "Spamming" on the Internet

Jean Renard Ward <>
Fri, 22 Jul 94 08:49:50 EDT
The past week I have been getting filled-out copies of a survey form completed
by beta users of the services.  Each day up to a half-dozen of
these forms would show up in my Internet mailbox.

Evidently the problem caused by three factors: (1) the original survey form
had in the "cc:" field the listserv address for mailing to the entire beta
user group, (2) many of the beta users had "reply to all" set as the default
for their mailer software, and (3) the folks at hat configured
their listserver to remail the incoming Emails with the completed forms back
out to the addresses on their beta user list.

The only interesting thing about getting the completed survey forms is
that most of the respondents to the survey seemed to be middle-aged males
with "erotica" as one of their interests in using the Internet.  Netsurf's
questionnaire specifically stated that they had no interest in invading
anyone's privacy, so that the questionnaire would be effectively
confidential, even though they could not guarantee that formally.

Notes Emailed to had no effect.  Finally, out of frustration,
I did a "reply to all" on one of the incoming forms with a note about the
problem back out to the same listserver.  Although this was an act of
"spamming" on its own, it did get the people at to address
(intentional pun) the problem.

A last note: I got a note from blaming __me__ and all those users
who had set "reply to all" as the default in their mail software for spamming
their beta user list, rather than admitting that they had overlooked the
possible effects of their listserver and mailing configuration.

By the way — this is being sent with a cc: to

Marc Rotenberg <>
Fri, 22 Jul 1994 15:48:32 EST
Subject: Leahy Statement on Gore Statement on Clipper

                U.S. SENATOR PATRICK LEAHY, Vermont

                      STATEMENT OF PATRICK LEAHY ON

                              July 21, 1994

     I have read the July 20th letter from the Vice President about the
Administration's current thinking on Clipper Chip and, to my mind, it
represents no change in policy.  In fact, when this letter was sent, I
would be surprised if the Administration even thought it was news.

     The letter makes clear to me that the Administration continues to
embrace key escrow encryption technology, and stands behind Clipper Chip
as a federal standard for telephone communications.  The official
standard makes clear that this standard applies to any communications
over telephone lines.  Those communications include not only voice, but
also low-speed computer data and facsimile messages.  The Administration
is working on encryption technologies for higher-speed transmissions,
such as for computer networks and video networks.

     The Vice President says that they want to work with industry to
design a key escrow system that could be implemented not just in
hardware, but also in software, that would be voluntary, exportable and
not rely upon a classified encoding formula.  The Administration said all
this last February when the federal standard was approved.  Yet, when
Administration witnesses were questioned about the progress they had made
in this effort at my Judiciary subcommittee hearing in early May, I
learned they had held only a few meetings.

     Last week, the Appropriations Committee accepted strong Report
language I suggested on Clipper Chip.  The Attorney General is directed
to report to Congress within four months on ten areas of concern about
Clipper Chip.

     I agree with the Vice President that balancing economic and privacy
needs with law enforcement and national security is not always an easy
task.  But we can do better than Clipper Chip.

Privacy Journal this month

Robert Ellis Smith <>
Fri, 22 Jul 94 14:38 EST
Here are the headlines from the July 1994 PRIVACY JOURNAL:









Robert Ellis Smith/Publisher 401/274-7861, or

   [The all-caps format makes it begin to sound like a weekly tabloid.  PGN]

CFP: IEEE Symposium on Security and Privacy

Catherine A. Meadows <>
Fri, 22 Jul 94 17:27:46 EDT
                           CALL FOR PAPERS
1995 IEEE Symposium on                              May 8-10, 1995
Security and Privacy                        Oakland, California

                             sponsored by
  IEEE Computer Society Technical Committee on Security and Privacy
                         in cooperation with
    The International Association for Cryptologic Research (IACR)

The Symposium on Security and Privacy has for fifteen years been the
premier forum for the presentation of developments in computer security,
and for bringing together researchers and practitioners in the field.

This year, we seek to build on this tradition of excellence by
re-emphasizing work on engineering and applications as well as theoretical
advances.  We also seek to broaden the scope of the Symposium by
introducing new topics.  We want to hear not only about new theoretical
results, but also about work in the design and implementation of secure
systems and work on policy relating to system security.  We are
particularly interested in papers on policy and technical issues relating
to privacy in the context of the information infrastructure, papers that
relate software and system engineering technology to the design of secure
systems, and papers on hardware and architectural support for secure

The symposium will focus on technical aspects of security and privacy as
they arise in commercial and industrial applications, as well in
government and military systems.  It will address advances in the theory,
design, implementation, analysis, and application of secure computer
systems, and in the integration and reconciliation of security and privacy
with other critical system properties such as reliability and safety.
Topics in which papers and panel session proposals are invited include,
but are not limited to, the following:

Secure systems      Privacy Issues      Access controls
Security verification   Network security    Policy modeling
Information flow    Authentication      Database security
Data integrity      Security Protocols      Viruses and worms
Auditing            Biometrics      Smartcards
Commercial and industrial security      Intrusion Detection
Security and other critical system properties   Distributed systems

A new feature of the symposium this year will be a special session of
very brief (5-minute) talks.  Our goal is to make it possible for us to
hear from people who are advancing the field in the areas of system
design and implementation, and who would like to present their ideas to
the symposium audience but may lack the time and resources needed to
prepare a full paper.  Submissions for this session will be accepted
up to five weeks before the symposium, to permit us to hear of the most
recent developments. Abstracts of these talks will be distributed at
the conference.


Send six copies of your paper and/or proposal for a panel session to
Catherine Meadows, Program Co-Chair, at the address given below.  Papers and
panel proposals must be received by November 7, 1994.  Papers, which
should include an abstract, must not exceed 7500 words.  The names and
affiliations of the authors should appear on a separate cover page
only, as a ``blind'' refereeing process is used.  Authors must certify
prior to December 25, 1994 that any and all necessary clearances
for publication have been obtained.

Papers must report original work that has not been published
previously, and is not under consideration for publication elsewhere.
Abstracts, overlength papers, electronic submissions, late
submissions, and papers that cannot be published in the proceedings
will be rejected without review.  Authors will be notified of
acceptance by January 16 , 1995.  Camera-ready copies are due not later
than March 6, 1995.

Panel proposals should describe, in two pages or less, the objective of
the panel and the topic(s) to be addressed.  Names and addresses of
potential panelists (with position abstracts if possible) and of the
moderator should also be included.

Submitters of abstracts for the special session of five-minute talks
should submit one page abstracts to Catherine Meadows, program co-chair,
at the address given below.  Abstracts must be received by April 3, 1995.
Authors will be notified of acceptance or rejection of abstracts by April
17.  Submitted abstracts that are accepted will be distributed at the

The Symposium will also include informal poster sessions where preliminary
or speculative material, and descriptions or demonstrations of software,
may be presented.  Send one copy of your poster session paper to Carl
Landwehr, at the address given below, by January 31, 1995, together with
certification that any and all necessary clearances for presentation have
been obtained.

Also for the first time this year, we will attempt to counsel prospective
authors.  If you have questions about whether or how to present your work
to the symposium, please send e-mail to the Chair
(, and we will do our best to assist you.

Information about this conference will be also be available by anonymous
ftp from in directory /pub/SP95, by World Wide Web from,
or by sending email to


Ross Anderson, Cambridge University, UK
Steve Bellovin, AT&T, USA
Tom Berson, Anagram Laboratories, USA
Oliver Costich, Independent Consultant, USA
George Dinolt, Loral, USA
Cristi Garvey, TRW, USA
Li Gong, SRI, USA
Sushil Jajodia, GMU, USA
Steve Kent, BBN, USA
Steve Lipner, TIS, USA
Teresa Lunt, ARPA/CSTO, USA
John McLean, NRL, USA
Jonathan Millen, Mitre, USA
Birgit Pfitzmann, Universit"at Hildesheim, Germany
Sylvan Pinsky, DoD, USA
Michael Reiter, AT&T, USA
Jaisook Rho, TIS, USA
Peter Ryan, DRA, UK
Tom Schubert, Portland State University, USA
Paul Syverson, NRL, USA
Vijay Varadharajan, HP, UK
Raphael Yahalom, Hebrew University, Israel

For further information concerning the symposium, contact:

  Carl Landwehr, General Chair       Catherine Meadows, Program Co-Chair
  Naval Research Lab., Code 5542     Naval Research Laboratory, Code 5543
  4555 Overlook Ave., SW             4555 Overlook Ave., SW
  Washington DC 20375, USA           Washington DC 20375, USA
  Tel: +1 (202) 404-8888             Tel: +1 (202) 767-3490
  FAX: +1 (202) 404-7942             FAX: +1 (202) 404-7942

  Dale Johnson, Vice Chair       John McHugh, Program Co-Chair
  The MITRE Corporation          Computer Science Department
  Mailstop A156              Portland State University
  202 Burlington Rd          P.O. Box 751
  Bedford, MA 01730-1420, USA        Portland OR 97207-0751, USA
  Tel: +1 617-271-8894           Tel: +1 (503) 725-5842
  Fax: +1 617-271-3816           Fax: +1 (503) 725-3211        

  Charles Payne, Treasurer
  Naval Research Lab., Code 5542
  4555 Overlook Ave., SW
  Washington DC 20375, USA
  Tel: +1 (202) 404-8763
  FAX: +1 (202) 404-7942

  Peter Ryan, European Contact       Jim Gray, Asia/Pacific Contact
  Defence Research Agency        Department of Computer Science
  Room NX17              Hong Kong Univ. of Science & Technology
  St Andrew's Rd             Clear Water Bay, Kowloon, Hong Kong
  Malvern                Tel: +852 358-7012
  Worcs WR14 3PS,UK          Fax: +852 358-1477
  Tel +44 (0684) 895845
  Fax +44 (0684) 894303

Please report problems with the web pages to the maintainer