Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…
Taken from the San Jose Mercury News, 6/21/89 (from the Kansas City Star): Teen hacker hits satellite guide system A 14-year-old Prarie Village, Kan., boy, using a small home computer, cracked an Air Force satellite-positioning system and browsed the confidential files of at least 200 companies, officials say. The teen-ager, a computer hacker since the age of 8, apparently did not dam- age the computer systems he easily entered during the past six months. He hoped to use his know-how to persuade the companies to hire him as a computer security consultant, police said. At least two military investigators and representatives of several companies, including Hewlett-Packard Co. of Palo Alto, showed up at a meeting this month in Johnson County to try to find out how he did it. Dialing unauthorized long-distance access codes, authorities say, the teen- ager linked his Apple computer with systems throughout the country. He spec- ialized in cracking the H-P 3000, a Hewlett-Packard minicomputer widely used by businesses and the federal government. At one point, authorities say, he gained access to an unclassified Air Force computer system. [Other than in the first paragraph, there's no more mention of what, if anything, the kid did to the satellite positioning system. The comment that he was hoping to be hired seems intriguing to me; I wonder if there's now a wave of "interview by cracking" starting up? --Dave]
Here are excerpts from IEEE INSTITUTE, May 1989, p. 4: ``British train accidents signal systemic problems'' by Fred Guterl and Erin E. Murphy ... Sloppy installation caused (a) recent fatal train accident..., according to Britrail, the state-run railway system ... On Dec. 12 at the busy Clapham junction in south London, ... one commuter train plowed into the back of another, killing 35 and injuring almost 100. ... In that accident, according to British Rail, the evidence found so far points to an installation error made a few years ago, when British Rail replaced the older electromagnetic switches in its signalling system at Clapham. ... during this process an equipment room wire from an old switch was not properly removed and came into contact with the new electromagnetic signaling system. The signaling system regulates the movement of a train from one section of track to another. ... The presence of current indicates both that the next section of track is unoccupied and what the next signal's setting is. ... At Clapham, the loose wire directly operated the signal, overriding the checks in the system and causing the signal to turn green. The signaling system was thought to be fail-safe because a short circuit would simply cause a red light. ... The worker who has taken responsibility for leaving the wire loose testified in the inquiry that on that day he had worked more than 12 hours with only a 5-minute break ... - Jon Jacky, University of Washington
[This comes to me from a friend who lives in Hong Kong. - Jon Jacky] From: kenberkun%hgovc.DEC@decwrl.dec.com (Ken Berkun) Reported in the June 12, 1989 South China Morning Post, apparently reprinted from the London Times, retyped by me, without permission. Headline: "Worried firms pay hush money to 'hacker' thieves" By Richard Caseby Firms in the City of London are buying the silence of hackers who break into their computers and steal millions of pounds. At least six London firms have signed agreements with criminals, offering them amnesties if they return part of the money. The firms fear that if they prosecute they will lose business when customers learn that their computer security is flawed. In several of the case the losses exceeded 1 million pounds but only a tenth of the total was returned. The Computer Industry Research Unit (CIRU) which uncovered the deals and which is advising the Department of Trade and Industry in data security, believes the practice of offering amnesties is widespread. "Companies who feel vulnerable are running scared by agreeing to these immoral deals. Their selfishness is storing up serious problems for everyone else," said Peter Nancarrow, a senior consultant. Police have warned that deals struck with criminals could possibly lead to an employer being prosecuted for perverting the course of justice. Detective Inspector John Austin, of Scotland Yard's computer fraud squad, said: "Employers could find themselves in very deep water by such strenuous efforts to protect the credibility of their image." Legal experts say the firms are mking use of section five of the Criminal Law Act 1967 which allows them to keep silent on crimes and privately agree on compensation. However, an employer becomes a witness to the offence by taking evidence from a criminal when the deal is drawn up. Hackers steal by electronically transferring funds or by programming a computer to round off all transactions by a tiny amount and diverting the money to a separate account. In one case, an assistant programmer at a merchant bank diverted 8 million pounds to a Swiss bank account and then gave back 7 million in return for a non-disclosure agreement portecting him against prosecution. Such thefts have spread alarm throughout the City, with consultants offering to penetrate the computer networks of banks and finance houses to pinpoint loopholes before a hacker does. The biggest contracts cost up to 50,000 pounds and can involve a four month investigation in which every weakness is explored. Detectives have found that computer security at many City institutions is riddled with loopholes. A City of London police operation, codenamed Comcheck, revealed wide spread weaknesses. Firms were asked to track the number of unauthorized logons over Easter bank holiday. Some companies unable to tell whether hackers had penetrated their network, while others lacked any security defences. In addition to theft, companies are vulnerable to blackmail. Hackers can threaton to sabotage computers by inserting "viruses" and "logic bombs" - rogue programs which can paralyse a system. This type of threat has prompted the offer of a new insurance policy underwritten by Lloyd's which specifically covers viruses and other computer catastrophes.
There are computer-controlled drug infusion devices on the market; they are definitely not hobbyist items. IVAC Corporation of San Diego has made several presentations at technical meetings recently about a new product of theirs called the Titrator (registered trademark) Sodium Nitroprusside Closed Loop Module, which began development in 1981 and was finally approved by the FDA in December, 1987. The FDA began regulating medical device software in 1987. IVAC believes its device was the first to be reviewed by the FDA under the new regulations. Two papers about their experience appear in PROCEEDINGS ON THE ENGINEERING OF COMPUTER-BASED MEDICAL SYSTEMS, June 8-10, 1988, Minneapolis, Minnesota, published by the IEEE Computer Society: ``The travail involved in getting FDA approval --- an overview of what it took to get FDA approval of a medical device with computer technology (a recent experience)'' by Albert Paul, pps. 28--29, and ``Failsafe design of closed loop systems'' by Alvis J. Somerville, pps. 23--27. - Jonathan Jacky, University of Washington
Keith Emanuel, brings up the question of responsibility in the case of a microcomputer malfunction. I remember that National Semiconductor data sheets used to have a warning to the effect that the component described should not be used on any life critical application without prior written permission from the company. They defined a life critical application as one whose malfunction or failure to operate could cause human deaths or injury. I have not seen such a warning in data sheets of other manufacturers, so it is probable that this problem has a precise legal answer. Diomidis Spinellis, European Computer Industry Research Centre (ECRC).
Toronto Star, June 27, 1989, page B3: About 6,000 people across Canada have received extra-large refunds after filing their 1988 income tax returns, and must return the excess. Clyde King, spokesman for Revenue Canada's Toronto office, said yesterday the people affected pay quarterly tax instalments. These taxpayers, the self-employed and some retired people, must pay the instalments because they're not subject to withholding at source on the bulk of their income. King said that in some cases Revenue Canada's computer in Ottawa added the first-quarter 1989 tax instalment to the 1988 refund due, resulting in the excessive refund. Though about 70,000 people were affected, the error was caught in all but about 6,000 cases before the cheques were sent. In many cases, taxpayers have contacted Revenue Canada and sent back the excess. Eventually the others will be sent letters of explanation and asked for the return of the money." [Comment 1: I like the "Revenue Canada's computer added" part. People don't create bugs, computers create bugs.] [Comment 2: one hopes that as well as fixing the bug, they have correctly fixed the accounts of people whose 1989 instalments may not have been credited properly as of the date due...] David Sherman, Tax Lawyer, Toronto
The June issue of IEEE Computer Magazine contains an article on a robot vision system which reads analogue and digital meters, lights, and determines valve, slider and switch positions: "A Vision System for Robotic Inspection and Manipulation" M. Trivedi, C. Chen, and S. Marapane Computer Magazine, June 1989, p. 91. <The authors envisage a system such as their's being used to inspect and monitor nuclear power plants: "Although most of our findings relate to a broad class of industrial automation tasks, the specific operational environment we considered was a nuclear power plant, where robotic inspection offers the potential for reduced radiation exposure to personnel and lower plant operating costs." However the authors, who are funded by the Department of Energy, do not discuss the risks of relying on such technology in critical applications such as nuclear power plants. The ONLY allusion to any possible misgivings people might have to this technology is: "These tasks need not be performed totally autonomously; a human observer can interpret images acquired by staionary cameras or those mounted on robots." There would appear to be several, more robust, more easily validated alternatives to this technology. In particular, using a robot vision system to read an LCD display seems to be a rather expensive and error prone implementation of a wire! I feel that anyone proposing a software system for use in critical applications must discuss the risks involved. And an article in a broad readership professional magazine such a Computer would be the ideal place. — Robert Cooper (rcbc@cs.cornell.edu)
Please report problems with the web pages to the maintainer