Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…
I bought a CD by the hardcore group ``Shelter'' yesterday. They're a straight edge (that is, no drugs, alcohol, tobacco, etc) band who are also quite into Krsna consciousness.
Track number 11 of this CD is a 5 minute section of Hare Krsna chanting and music. I told my girlfriend this, and she thought that it sounded kind of ``interesting.'' So, when I called her up just a second ago and her answering machine picked up, I thought it would be humorous to play the chants REALLY loud so that it would be picked up over the phone. Thinking that she might be there but just not have answered, I was holding the receiver to my ear, when to my surprise, I heard the answering machine say, ``enter access code for remote operation...''!
I was quite amazed, and speculated that the chanting had had some sort of tone in it that triggered an attempt to use the remote operation facility present in most modern answering machines.
The risk? Things like this go to illustrate how far our modern technical society has come, and how it has grown in many different directions at once. It is possible to say that we have advanced to such a point in so many areas that seemingly innocuous things in one (such as a track of music on a CD) can trigger *very* unexpected results in another.Dan C.
Here is an item reminding us of the pervasiveness of RISKS problems:
From Public Citizen's Health Research Group *Health Letter*
(HRG founded by Ralph Nader and Dr. Sidney Wolfe), Mar 1996, p.8:
Point of View Heart Rate and Blood Pressure Monitor (Class II Recall) Monitor resets itself causing information to be suspended, necessitating reprogramming.
Model #:0998-00-0105-01, 424 units distributed world-wide
Manufacturer: Datascope Corporation, Paramus NJ 800-288-2121
Recalled By: Manufacturer
Emily Green, of New Jersey, has been called to jury-duty — but she will not be serving; she has what is being considered a "valid excuse": She needs to go to school... Emily is only 8 years old and, therefore, is not *eligible* for jury duty... So why was she even summoned in the first place? Because Governor Christine Whitman has banned all automatic exemptions from jury duty... [Source: WPVI-TV6, Philadelphia]
I think the RISKs here are obvious!Varda Reisner Bruhin <firstname.lastname@example.org> <email@example.com>
The Federal Trade Commission is conducting a "wholesale crackdown" on perpetrators of allegedly deceptive marketing schemes that are advertised in Internet news groups or on the World Wide Web. Charges were filed against nine individuals or companies accused of misleading the public, and agency officials say this is only the beginning: "The Internet opens a world of opportunities for consumers. Unfortunately, it also presents opportunities for scam artists. We intend to monitor the Internet rigorously and act decisively when we see deceptive and misleading marketing," says the director of the FTC's Bureau of Consumer Protection. (*Investor's Business Daily*, 15 Mar 1996, A4)
Iomega, maker of high-capacity removable disk drives, is the focus of controversy on America Online's Motley Fool bulletin board. Company officials have complained to the SEC that postings on Motley Fool and other BBSs have contained false information and may be contributing to the volatility of its stock. Online exposure has "raised the visibility of some stocks as well as the interest in those stocks," says an outside spokesman for Iomega. "At the same time, we're very concerned about how online services can be used to attempt to drive stock prices higher or lower through misinformation." Postings about Iomega escalated to flaming and physical threats last month, causing Motley Fool to pull some of the more offensive ones, but critics of online BBSs note Iomega's problems are a result of the practice of using "screen names" and the lack of verification of information that's posted. "You don't know if the person is a Ph.D. or in Sing Sing," says one critic. (*Wall Street Journal*, 15 Mar 1996, A5C)
A friend of mine is the general manager of a company called Excalibur that makes simulators of airline computers. He was recently sitting with a rep of a different company that happens to be a co-pilot of 747s. The guy wanted to buy some of Excalibur's processor cards to test out the system they are designing. What system? Turning all online airline manuals into an intelligent information system. Turns out that each 747 has a shelf of books the size of telephone books describing what to do and when to do it.
The pilot was describing that it is constantly being updated by Boeing or by a specific airline and that it is close to impossible to find anything or understand anything in these onboard manuals. As an example, he produced a page from Northwest Airlines updates to the B-747 Emergency/Abnormal Procedures when there is a fuel-line blockage (17 Oct 1995, page 2.28.13):
# 5. Scavenge center tank until empty.
# If, after the center tank is empty, the NO 2 MAIN tank quantity is greater
# than the NO 1 MAIN tank quantity plus the NO 1 RES and/or the NO 3 MAIN
# tank quantity is greater than and NO 4. MAIN tank quantity plus the NO 4
# RES: Accomplish the "Inboard Dual Boost Pump Failure or Inboard X-Feed
# Valve Failure Without Center Tank Fuel" procedure in this section.
The pilot said ``Imagine you are 30,000 feet up and you have a fuel blockage and the co-pilot starts reading this?'' He said this is a typical type of page. The risks are obvious.Hank Nussbacher Israel
There are two aspects of the censorship of the Internet that haven't been published in the Risks-Forum yet:
I gave a talk at Sun's Dutch JavaDay last Thursday. In keeping with the WWW atmosphere, I presented my slides from HTML pages, and (stupidly) without notes. Two unpleasant things happened to me whilst on stage. When I walked on, the previous speaker handed me a mouse and said "You will have to plug this in". He had used it to illustrate some of the basic problems Java has to overcome (1 button vs 3 button mice). Now whilst you can unplug a mouse from a PC with out much risk, Sparcs (which is what was sitting in front of me) tend to halt if they lose contact with their rodent. Fortunately this one didn't.
The second thing was *much* worse. I was demonstrating an applet I've written that monitors the status of a UPS. Due to the weight of the UPS and the security restrictions in Java, I had chosen to leave the UPS in my office, attached to my Solaris-2.4-on-intel workstation, and also run a web server there to provide the slides and the application over the live internet link Sun provided.
So there I was on stage with no notes — when the next slide refused to come up. I continued from memory and my colleague in the audience called back to the office to see what had happened. It was quickly fixed, and my talk finished ok — but having aged me considerably.
So, what had happened? One of my colleagues was looking for a PC to do some windows work, and seeing my unoccupied work place decided to shutdown Solaris and reboot it into windows. Conclusions:
PacBell will allow you to do `complete blocking' of caller ID for *free* — but you have to call 1 (800) 298-5000 and specifically request this. You also have to listen to this 2-3 minute canned speech extolling the virtues of caller ID before they'll let you get complete blocking. This number supposedly works 24 hours/day, 7 days/week.
It's very irritating that `complete blocking' wasn't made the default, but perhaps these telecom dinosaurs will learn a lesson if most people sign up for complete blocking. Due to the number of busy signals, I gather that a lot of people aren't interested in caller ID.
BTW, even if you have `complete blocking', I think that you can make your ID available on a per-call basis by predialing `*82' before the number. I understand that even complete blocking does not block (800), (900) and 976- ID's. To do that, you have to call one of these `remailer'-type services, which charge you something like $3/minute.
www/ftp directory: ftp://ftp.netcom.com/pub/hb/hbaker/home.html
Both Mr. Mayer-Schoenberger's original message as well as the response by Messers. Strassmann/Marlow point to an obvious, but often forgotten, risk regarding information on the Internet: Namely, the propensity to take anything posted or submitted at face-value and to trust someone else's words and report explicitly. (If we want to be truly cynical and doubting Thomases, we could also ask if e-mail from Dorothy Denning can be relied on to be Strassmann/Marlow's actual thoughts. I have no doubt, however, that our moderator did some checking of his own to ensure reliability.) Simply put, even in the absence of deliberate misrepresentation, any statement made on the net is subject to a certain degree of human bias.Benjamin Bokich firstname.lastname@example.org
For a taxonomy of risks that includes this very term, see
We've also got weeds, freeloaders, and Flying Dutchmen, as well as the usual Trojan horses, viruses, and worms...David Chess, IBM T. J. Watson Research
Welcome to the computer industry. Companies with a large market share in a particular area are always apt to ignore the "recognized" standardization process and implement features which are (a) great for their product, and (b) probably hard to duplicate in other products.
When applied to operating systems, APIs, and protocols, this can lead to serious problems, especially when those features are "proprietary". Need I cite examples?
While I do not particularly care for the way Netscape and its creators
treat syntax errors, Jonathan goes much too far in his condemnation. In my view a standard is a set of minimum requirements. There are many situations when a designer may want to go beyond the standard. As long as the person responsible for the design is aware the the standard is being broached, and what the consequence of that departure from the standard are, and is willing to take responsibility for those consequences, that person should be allowed to do what he or she wants.
However, the existence of Netscape's or any other extensions to the HTML standard should NOT be subject to debate. Without an ability to try new things, a standard becomes an inescapable cage, and that which is confined to the cage will eventually die of starvation.
Jonathan, in condemning the Netscape extensions, is attacking the wrong problem. If he did succeed in getting what he wanted, we would all loose by it.
On the other hand, the creators of Netscape must recognize that it is one of the tools, and sometimes the only tool other than a simple text editor, used to design web pages and has to provide a mode where departures from the standard can be flagged. While I am not positive what the consequence of a failure to provide such a flag will be, I suspect that Netscape will loose some market share to any decent browser that does provide such a capability.Max TenEyck Woodbury
CALL FOR PAPERS
INTERNET PRIVACY AND SECURITY WORKSHOP
Haystack Observatory, MA
May 20-21, 1996
Privacy and Security Working Group
Federal Networking Council
Research Program on Communications Policy
Center for Technology, Policy, and Industrial Development
Massachusetts Institute of Technology
The Privacy and Security Working Group (PSWG) of the Federal Networking Council (FNC) and the Research Program on Communications Policy of the Center for Technology, Policy, and Industrial Development at the Massachusetts Institute of Technology will hold an invitational workshop at the Haystack Observatory outside of Boston, MA, on May 20-21, 1996. This workshop is intended to bring Federal, academic and private sector participants together in collaboration to develop strategies and potential solutions related to Internet privacy and security.
Though a principal focus of the workshop will be on the Federal portion of the Internet, the FNC recognizes that the Federal Internet is tightly coupled with the Global Internet, whose security policies, practices, and goals are complementary to those of the Federal Government. To define those practices, procedures and goals, the PSWG has undertaken two major initiatives:
This workshop will bring together principal players in the Federal and overall Internet community to discuss the problems and challenges of privacy and security on the Internet, and will:
Abstracts or complete paper drafts related to the topics listed above are welcome. Accepted papers will be a part of the published record of the workshop. All points of view on Federal policies affecting Internet privacy and security are welcome. Please make all electronic submissions in ASCII format.
For further information or to submit an abstract or paper contact:
Internet Security and Privacy Workshop c/o Joseph Reagle
Research Program on Communications Policy
Massachusetts Institute of Technology
One Amherst St. (E40-218)
Cambridge, MA 02139
Voice: (617) 253-4138.
Fax: (617) 253-7326
SCHEDULE and DEADLINES
Call for papers - March 14, 1996
Abstracts Due - April 14, 1996
Invitations to Participants - April 20, 1996
Revised/Completed papers due - May 19, 1996
Workshop - May 20-21, 1996
Participation in the workshop is by invitation, based primarily on submitted papers and abstracts. Additional individuals may be invited to ensure that participation reflects a broad cross-section of the Internet community.
Dennis Branstad - Trusted Information Systems (TIS) Rich Pethia - Computer Emergency Response Team (CERT) Jeffrey Schiller - Massachusetts Institute of Technology (MIT) Richard Solomon - Massachusetts Institute of Technology (MIT) Rick Stevens - Department of Energy /Argonne National Labs (DOE)
Stephen Squires, DARPA (FNC/PSWG Co-Chair)
Dennis Steinauer, NIST (FNC/PSWG Co-Chair)
Tice DeYoung, NASA
Phillip Dykstra, Army Research Laboratory (ARL)
Mike Green, NSA
George Seweryniak, Department of Energy (DOE)
Walter Wiebe, Federal Networking Council (FNC)
Federal Internet Security Plan: In September 1995, the PSWG published the draft Federal Internet Security Plan (FISP). The FISP is oriented toward a scalable, continual improvement process, based on common principles and mechanisms compatible with
Internet community values and needs. See <http://www.fnc.gov/SWG.html>. The plan addresses Internet security
requirements, including interoperability, from the perspective of the goals and objectives outlined in the National Performance Review (NPR), http://www.npr.gov/. The Federal Networking Council developed this framework in conjunction with its Advisory Committee which represents industry, academia, and non-profit sectors.
Action Items, from the FISP, to be addressed during the Workshop:
Internet Security Policy and Policy Support Activities
In recognition of these needs, the Federal Networking Council's Privacy & Security Working Group (FNC/PSWG) has been awarded a National Performance Review (NPR) Innovation Fund grant to compare and validate agency approaches to security. This Collaborations in Internet Security (CIS) project aims to test the strength of these technologies beyond individual agency networking environments, emphasizing the inter-agency and agency-commercial sector communications. The CIS will result in the development of a new and sustainable process for developing, integrating, and deploying security technology that is interoperable at all levels of the Federal Government and within the commercial and academic sectors.
The governing principles behind the Security Testbeds include: employment of an open process (with the activities and results open to participation and comment by both public and private sector participants); a focus on multivendor technologies; an emphasis on testing and experimentally deploying security technologies emerging from research and private sectors as well as security technologies currently in use in the commercial environment; and an underlying objective to ensure interoperability among the broad Internet community (federal, private, and academic). Initial tests will include demonstrations of Kerberos v.5, testing of single-use passwords, and digital signatures. For more information, please see (http://www.fnc.gov/cis_page.html)
InfoWarCon 5, 1996
Fifth International Information Warfare Conference
"Dominating the Battlefields of Business and War"
September 5-6, 1996
Winn Schwartau, Interpact, Inc.
National Computer Security Association
Robert Steele, Open Source Solutions, Inc.
Information Warfare represents a global challenge that faces all late-industrial and information age nation states. It also represents the easiest and cheapest way for less developed nation-states and religious or political movements to anonymously and grievously attack major nations and international corporations.
This Fifth International Conference on Information Warfare is an unclassified, open source conference, and will examine US and global perspectives on all three classes of Information Warfare:
Class One: Personal Privacy: In Cyberspace You Are Guilty Until Proven Innocent
Class Two: Industrial and Economic Spying and Warfare
Class Three: Global Conflict, Terrorism and the Military
The three planned tracks will be:
The papers should offer new perspectives, attitudes, studies, and technologies that can be used for the advancement of the field. You are free to submit on any subject matter, including, but not limited to:
For sponsorship opportunities and registration information at InfoWarCon V 1996, please contact: National Computer Security Association
1.800.488.4595 email@example.com or firstname.lastname@example.org
Please report problems with the web pages to the maintainer