[risks] Risks Digest 23.13

From: RISKS List Owner (risko@private)
Date: Fri Jan 16 2004 - 16:08:46 PST

  • Next message: RISKS List Owner: "[risks] Risks Digest 23.14"

    RISKS-LIST: Risks-Forum Digest  Friday 16 January 2004  Volume 23 : Issue 13
    
       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
       ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
    
    ***** See last item for further information, disclaimers, caveats, etc. *****
    This issue is archived at http://www.risks.org as
      http://catless.ncl.ac.uk/Risks/23.13.html
    The current issue can be found at
      http://www.csl.sri.com/users/risko/risks.txt
    
      Contents:
    Is the F-35 fighter jet is too reliant on foreign software (Lillie Coney)
    Some rental cars keep tabs on drivers (Dewayne Hendricks via IP)
    Israeli Post Office break-in (Gadi Evron)
    Online poll rigging (Keith C. Ivey)
    Students' data on Web, and NYU. on defensive (Monty Solomon)
    Bruce Schneier on Orange Alert in Salon (Cory Doctorow via IP)
    Some .mil and .gov subscribers of Risks Spammed (Dennis G Rears)
    Errant weather alert (David Kennedy)
    Moscow ML fails because of time overflow bug (Paul E. Black)
    Re: Happy 2**30'th birthday, time_t! (Alistair McDonald, Ed Ravin,
      Massimo Dal Zotto)
    Re: The dangers of PGN-ing (Peter Riocreux, Huge)
    E-mail scam attacks AT*T Worldnet (John Reinke)
    PayPal spoofing (Jacob Palme)
    Announcement: Third Bieleschweig Workshop (Peter B. Ladkin)
    Abridged info on RISKS (comp.risks)
    
    ----------------------------------------------------------------------
    
    Date: Fri, 09 Jan 2004 16:27:49 -0500
    From: Lillie Coney <lillie.coney@private>
    Subject: Is the F-35 fighter jet is too reliant on foreign software
    
    Defense: The House Government Reform Committee expects to hold hearings this
    year to determine whether the Lockheed Martin-made F-35 fighter jet is too
    reliant on foreign software, Defense Daily reported Thursday. The concern,
    according to a congressional source, is that the fighter, which has been
    hailed as a model for international cooperation, could require foreign
    software for integral parts of the aircraft's computer system. The
    <http://www.gao.gov/>General Accounting Office (GAO) is preparing a report
    on the issue and expects to brief committee members in about three to four
    weeks, the source added. The National Security, Emerging Threats and
    International Relations Subcommittee, chaired by Christopher Shays, R-Conn.,
    frequently holds hearings on the status of such weapons-acquisition
    programs. The subcommittee's decision to look at the software issue is part
    of a broader concern about foreign software development and what effect that
    could have on the availability or security of the software.
    
    ------------------------------
    
    Date: Wed, 14 Jan 2004 00:33:21 -0800
    From: Dewayne Hendricks <dewayne@private>
    Subject: Some rental cars keep tabs on drivers (via Dave Farber's IP)
    
    Byungsoo Son (from Georgetown, Ontario) rented a car at a Payless Car Rental
    outlet in California for 12 days, with a contract rate of $259.51.  When he
    returned the car, he was charged $3,405.05 and given a map showing his
    actual itinerary, tracked by GPS (including Las Vegas Nevada and the Grand
    Canyon in Arizona).  He was charged $1 for each mile driven outside of
    California -- in violation of his contract, whose stipulated the car must
    remain in California.  [Source: Christopher Elliott, *The New York Times*,
    13 Jan 2004; PGN-ed] http://www.nytimes.com/2004/01/13/business/13gps.html
    
      [This is a classical cautionary RISKS case: READ THE FINE PRINT!  PGN]
    
    Archives at: <http://Wireless.Com/Dewayne-Net>
    IP Archives at: http://www.interesting-people.org/archives/interesting-people/
    
    ------------------------------
    
    Date: Sun, 11 Jan 2004 11:16:56 -0600 (CST)
    From: Gadi Evron <ge@private>
    Subject: Israeli Post Office break-in
    
    My summary/article on what happened is at
      www.math.org.il/post-office.rtf
    
      [Thanks to Tom Van Vleck for alerting me to Gadi's article.  A wireless
      gateway was surreptitiously installed in a computer rack in a Haifa branch
      of the Israeli Post Office (which also serves as a bank), perhaps allowing
      sniffing of passwords and other access.  The perpetrators then remotely
      accessed the system to transfer money to newly opened accounts.  The
      computer heist reportedly netted 56,000 shekels (USD$13,000) in the few
      days it was in operation.  Although withdrawals from the new accounts
      reportedly caused the perpetrators to be apprehended, Gadi speculates that
      with a little more care, the fraud could have gone undetected for much
      longer.  PGN-ed]
    
    ------------------------------
    
    Date: Thu, 15 Jan 2004 07:58:42 -0500
    From: "Keith C. Ivey" <kcivey@private>
    Subject: Online poll rigging
    
    The Senate Republican Conference has a Web poll on its front page about the
    capture of Saddam Hussein.  Apparently the results weren't turning out the
    way they like (what a surprise for a Web poll!), so they changed the form to
    switch the way two answers are recorded.  Now if you choose the 1st choice,
    it's recorded as the 2nd, and vice versa.  But there's no feedback to let you
    know it's happening.  The change has been confirmed by checking Google's
    cache of the page.  Here's the story:
      http://atrios.blogspot.com/2004_01_11_atrios_archive.html#107414565730750569
    
    If politicians are willing to tamper with something as insignificant as a
    Web poll, how much more tempting is it to tamper with the results of a real
    election?
    
    Keith C. Ivey, Washington, DC <kcivey@private> 
    
      [Added note: There was something very similar in November 2003 
      on Bill Frist's Senate site, too:
        http://reason.com/hitandrun/003421.shtml
      KCI]
    
    ------------------------------
    
    Date: Mon, 12 Jan 2004 00:41:53 -0500
    From: Monty Solomon <monty@private>
    Subject: Students' data on Web, and NYU. on defensive
    
    Three years ago, when Brian Frank entered New York University, he signed up
    for intramural basketball, providing his name and his university
    identification number, which was also his Social Security number.
    
    Yesterday morning, Mr. Frank, who is now a senior, learned from N.Y.U. that
    these details had been posted on the Internet. He was among about 1,800
    N.Y.U. students who received the same e-mail notification from the
    university. In some cases, students' phone numbers were posted, too.  ...
    [Source: Karen W. Arenson, *The New York Times*, 10 Jan 2004]
      http://www.nytimes.com/2004/01/10/nyregion/10identity.html
    
      [An unidentified poster of the entire item in Dave Farber's IP list 
      added this pithy comment:
        >Dave:  Not mentioned in this article is that at the start of 2003,
        >NYU laid off its senior system and network security manager, who
        >had been with the university for nearly 18 years, in a budget-cutting
        >round.  At the time of the layoff, the manager was working on privacy
        >issues, including HIPAA compliance.
      PGN]
    
    ------------------------------
    
    Date: Fri, 09 Jan 2004 15:55:59 -0800
    From: Cory Doctorow <cory@private>
    Subject: Bruce Schneier on Orange Alert in Salon (from Dave Farber's IP)
    
    >Homeland insecurity
    >The fact that U.S. intelligence agencies can't tell terrorists from children
    >on passenger jets does little to inspire confidence.
    >
    >By Bruce Schneier
    >
    >9 Jan 2004  |  Security can fail in two different ways. It can fail to
    >work in the presence of an attack: a burglar alarm that a burglar
    >successfully defeats. But security can also fail to work correctly when
    >there's no attack: a burglar alarm that goes off even if no one is there.
    >
    >Citing "very credible" intelligence regarding terrorism threats, U.S.
    >intelligence canceled 15 international flights in the last couple of weeks,
    >diverted at least one more flight to Canada, and had F-16s shadow others as
    >they approached their final destinations.
    >
    >These seem to have been a bunch of false alarms. Sometimes it was a case of
    >mistaken identity. For example, one of the "terrorists" on an Air France
    >flight was a child whose name matched that of a terrorist leader; another
    >was a Welsh insurance agent. Sometimes it was a case of assuming too much;
    >British Airways Flight 223 was detained once and canceled twice, on three
    >consecutive days, presumably because that flight number turned up on some
    >communications intercept somewhere. In response to the public embarrassment
    >from these false alarms, the government is slowly leaking information about
    >a particular person who didn't show up for his flight, and two
    >non-Arab-looking men who may or may not have had bombs. But these seem more
    >like efforts to save face than the very credible evidence that the
    >government promised.
    >
    >Security involves a tradeoff: a balance of the costs and benefits. It's
    >clear that canceling all flights, now and forever, would eliminate the
    >threat from air travel. But no one would ever suggest that, because the
    >tradeoff is just too onerous. Canceling a few flights here and there seems
    >like a good tradeoff because the results of missing a real threat are so
    >severe. But repeatedly sounding false alarms entails security problems, too.
    >False alarms are expensive -- in money, time, and the privacy of the
    >passengers affected -- and they demonstrate that the "credible threats"
    >aren't credible at all. Like the boy who cried wolf, everyone from airport
    >security officials to foreign governments will stop taking these warnings
    >seriously. We're relying on our allies to secure international flights;
    >demonstrating that we can't tell terrorists from children isn't the way to
    >inspire confidence.
    >
    >Intelligence is a difficult problem. You start with a mass of raw data:
    >people in flight schools, secret meetings in foreign countries, tips from
    >foreign governments, immigration records, apartment rental agreements, phone
    >logs and credit card statements. Understanding these data, drawing the right
    >conclusions -- that's intelligence. It's easy in hindsight but very
    >difficult before the fact, since most data is irrelevant and most leads are
    >false. The crucial bits of data are just random clues among thousands of
    >other random clues, almost all of which turn out to be false or misleading
    >or irrelevant.
    >
    >In the months and years after 9/11, the U.S. government has tried to address
    >the problem by demanding (and largely receiving) more data. Over the New
    >Year's weekend, for example, federal agents collected the names of 260,000
    >people staying in Las Vegas hotels. This broad vacuuming of data is
    >expensive, and completely misses the point. The problem isn't obtaining
    >data, it's deciding which data is worth analyzing and then interpreting it.
    >So much data is collected that intelligence organizations can't possibly
    >analyze it all. Deciding what to look at can be an impossible task, so
    >substantial amounts of good intelligence go unread and unanalyzed. Data
    >collection is easy; analysis is difficult.
    >
    >Many think the analysis problem can be solved by throwing more computers at
    >it, but that's not the case. Computers are dumb. They can find obvious
    >patterns, but they won't be able to find the next terrorist attack. Al-Qaida
    >is smart, and excels in doing the unexpected. Osama bin Laden and his troops
    >are going to make mistakes, but to a computer, their "suspicious" behavior
    >isn't going to be any different than the suspicious behavior of millions of
    >honest people. Finding the real plot among all the false leads requires
    >human intelligence.
    >
    >More raw data can even be counterproductive. With more data, you have the
    >same number of "needles" and a much larger "haystack" to find them in. In
    >the 1980s and before, East German police collected an enormous amount of
    >data on 4 million East Germans, roughly a quarter of their population. Yet
    >even they did not foresee the peaceful overthrow of the Communist
    >government; they invested too heavily in data collection while neglecting
    >data interpretation.
    >
    >In early December, the European Union agreed to turn over detailed passenger
    >data to the U.S. In the few weeks that the U.S. has had this data, we've
    >seen 15 flight cancellations. We've seen investigative resources chasing
    >false alarms generated by computer, instead of looking for real connections
    >that may uncover the next terrorist plot. We may have more data, but we
    >arguably have a worse security system.
    >
    >This isn't to say that intelligence is useless. It's probably the best
    >weapon we have in our attempts to thwart global terrorism, but it's a weapon
    >we need to learn to wield properly. The 9/11 terrorists left a huge trail of
    >clues as they planned their attack, and so, presumably, are the terrorist
    >plotters of today. Our failure to prevent 9/11 was a failure of analysis, a
    >human failure. And if we fail to prevent the next terrorist attack, it will
    >also be a human failure.
    >
    >Relying on computers to sift through enormous amounts of data, and
    >investigators to act on every alarm the computers sound, is a bad security
    >tradeoff. It's going to cause an endless stream of false alarms, cost
    >millions of dollars, unduly scare people, trample on individual rights and
    >inure people to the real threats. Good intelligence involves finding meaning
    >among enormous reams of irrelevant data, then organizing all those disparate
    >pieces of information into coherent predictions about what will happen next.
    >It requires smart people who can see connections, and access to information
    >from many different branches of government. It can't be seen by the various
    >individual pieces of bureaucracy; the whole picture is larger than any of
    >them.
    >
    >These airline disruptions highlight a serious problem with U.S.
    >intelligence. There's too much bureaucracy and not enough coordination.
    >There's too much reliance on computers and automation. There's plenty of raw
    >material, but not enough thoughtfulness. These problems are not new; they're
    >historically what's been wrong with U.S. intelligence. These airline
    >disruptions make us look like a bunch of incompetents who cry wolf at the
    >slightest provocation.   [...]
    
    IP Archives at: http://www.interesting-people.org/archives/interesting-people/
      [Also, See Bruce's Crypto-gram: http://www.schneier.com/crypto-gram.html
      PGN]
    
    ------------------------------
    
    Date: Wed, 14 Jan 2004 18:11:39 -0500
    From: "Rears, Dennis G [AMSTA-AR-FSP-S]" <d.rears@private>
    Subject: Some .mil and .gov subscribers of Risks Spammed
    
    It was just recently brought to my attention that over the last week readers
    of RISKS with e-mail addresses in the .mil and .gov domains have been
    getting spam that was sent to risks-mil@private  That address was set
    up years ago to help Peter manage the huge RISKS e-mail list.  As a favour
    to Peter, I managed all .mil and .gov e-mail addresses for most of the
    1990s.  As part of the Risks Distribution he would send mail to
    risks-mil@private, which then resent the mail to over 500 .mil/.gov
    subscribers.  The risks-mil address was hidden so that people would not send
    to it.  Last year I stopped the exploder list and all e-mail addresses from
    that list were forwarded to Peter to be included in his master list (with
    risks-mil@private being deleted from the master list).  However I
    never got around to disabling the risks-mil@private address.  Thus
    spammers were able to exploit this oversight via risks-mil@private  I
    have now taken steps to solve that problem by disabling the address.  Yet
    another risk of not cleaning up things.
    
    ------------------------------
    
    Date: Tue, 13 Jan 2004 00:13:10 -0500
    From: David Kennedy CISSP <david.kennedy@private>
    Subject: Errant weather alert
    
    http://www.washingtonpost.com/wp-dyn/articles/A63858-2004Jan7.html  
    
    01/07/04: The National Weather Service's Office of Science and Technology in
    Silver Spring sent a test weather-alarm message on Wednesday afternoon.
    Intended for internal use only, it was instead sent via the Internet around
    the world.  The alarm forecast a blizzard in the Washington DC area.
    
      "We thought all of the systems that were capable of going live out of this
      other facility where they do development had been disconnected, so that
      this could not happen again," Travers said. "Well, I guess they found out
      that something had not been disconnected."
    
    [It gets better.]
    
    Other weather-related services using the NWS feed contributed to the false
    alarm by re-sending it to their customers, some of whom use proprietary
    desktop weather clients like Weatherbug and Accuweather.
    
      Jack Hayes, director of the Office of Science and Technology, said bogus
      messages have snuck out before. His office wrestles with the challenge of
      getting weather hazard information out as quickly as possible.  Any human
      who had looked out the window would have known this warning was a
      mistake. But humans can gum up the works when trying to issue lifesaving
      alerts.  "Any time you have a human [in the process], you introduce a
      delay in getting an important warning out to the public," Hayes said.
      
        [NOTE a similar previous case: NOAA training session test message warns
        of hotter weather as Earth nears the Sun (RISKS-23.07).  PGN]
    
    ------------------------------
    
    Date: Fri, 16 Jan 2004 10:50:12 -0500
    From: "Paul E. Black" <paul.black@private>
    Subject: Moscow ML fails because of time overflow bug
    
    HOL, a system for proving theorems in Higher Order Logic,
      http://sourceforge.net/projects/hol/
    is implemented in Moscow ML, an implementation of Standard ML.
      http://www.dina.dk/~sestoft/mosml.html
    For soundness, HOL records the time along with new types or theories
    (collections of theorems, types, values, etc.)  which are created.  When
    time values overflowed on Saturday 10 January in a few libraries of the
    underlying Moscow ML 2.00, HOL was rendered unusable.
    
    Moscow ML represents time as seconds since midnight 1 January 1970.  After
    10 January the number of seconds exceeded 2^30.  Although this was
    anticipated and most code for time handled this, a few libraries did not.
      http://www.dina.kvl.dk/~sestoft/mosml/y2004bug.html
    
    Maintainers issued a patch for HOL and fixes for Moscow ML within days.
    
    Paul E. Black, NIST, 100 Bureau Drive, Stop 8970, Gaithersburg, MD 20899-8970
    +1 301 975-4794  http://hissa.nist.gov/~black/ paul.black@private
    
    ------------------------------
    
    Date: Tue, 13 Jan 2004 00:00:59 -0000 (GMT)
    From: "Alistair McDonald" <alistair@private>
    Subject: Re: Happy 2**30'th birthday, time_t! (RISKS-23.12)
    
    Paul Eggert ends his piece with a thought that a lot of applications will
    break in 2038. I think that the problem will appear much sooner than that,
    as some software (reservation systems, timetabling, and so on) looks into
    the future.
    
    I hope that the time_t wraparound will be a thing of the past by 2010, but
    I also hope that some legacy systems from "way back" will still be
    running. These systems, maybe embedded, might just fail once and carry on,
    or they might be useless as they interface with the real world and their
    dates will be 2^32 seconds out.
    
    Alistair McDonald    InRevo Ltd.  http://www.inrevo.com  (+44)(0)7017-467386
    
    ------------------------------
    
    Date: Tue, 13 Jan 2004 01:27:14 -0500
    From: Ed Ravin <eravin@private>
    Subject: Re: Happy 2**31 birthday, time_t! (RISKS-23.12)
    
    > About 13 hours ago, the POSIX time_t counter exceeded 2**30, thus reaching
    > half its useful positive range (which counts seconds since 1970) on
    > traditional hosts with 32-bit signed integer time_t.
    
    My shop uses an old version of the Heimdal implementation of the Kerberos
    authentication system (supplied with NetBSD 1.5), and we found
    that after the Unix time_t "birthday", our Kerberos clients were issuing
    erroneous requests.  The result was that many of our staffers coming in to
    work on Monday morning couldn't log in to their workstations.
    
    It's moments like this that make me appreciate the necessity of diverse
    software implementations - since we had other versions of Kerberos available
    (i.e. MIT Kerberos and a newer version of Heimdal with the bug fixed), all
    of which worked, we were able to quickly identify the buggy client program.
    
    ------------------------------
    
    Date: Tue, 13 Jan 2004 21:59:19 +0100 (CET)
    From: Massimo Dal Zotto <dz@private>
    Subject: Re: Happy 2**30'th birthday, time_t! (RISKS-23.12)
    
    We have another interesting precedent:
    
       http://catless.ncl.ac.uk/Risks/21.69.html#subj7
    
    Massimo Dal Zotto <dz@private>
    
    ------------------------------
    
    Date: 12 Jan 2004 23:30:33 +0000
    From: Peter Riocreux <peter.riocreux@private>
    Subject: Re: The dangers of PGN-ing (Hogg, RISKS-23.12)
    
    > As I'm sure many of the RISKs readers are aware, the Bank of England is a
    > Central Bank and hence does not issue its own Visa (or any other credit
    > cards) at least for consumers.  
    
    Except that it *does* have consumer accounts, it is just that eligibility is
    severely limited.  Current (and possibly past) employees are certainly able
    to hold an account, but I know not what other persons may hold one.  As
    such, it is perfectly possible that they could have been the target of a
    phishing expedition.
    
    The RISK is assuming that the system is the same as in the US, something
    which, despite the UK government's best efforts, is still commonly not the
    case.
    
    ------------------------------
    
    Date: Fri, 16 Jan 2004 17:04:55 +0000 (GMT)
    From: huge@private (Huge)
    Subject: The dangers of PGN-ing (Hogg, RISKS-23.12)
    
      [PGN: Peter Riocreux's point above was also noted by Huge, who added this:]
    
    > How many programmers does it need to be able to analyse a piece of code to
    > be able to work out what it does?
    
    In this case, none!  The attachment was conveniently [and correctly] named
    as a keystroke logger.
    
    ------------------------------
    
    Date: Sat, 10 Jan 2004 10:44:00 -0500
    From: "John Reinke" <reinke@private>
    Subject: E-mail scam attacks AT*T Worldnet
    
    -----Original Message-----
    From: attwns-announcement-system
    [mailto:CustomerNotifications@private] 
    Sent: Saturday, January 10, 2004 1:04 AM
    To: AT&T Worldnet Customers
    Subject: ALERT: E-mail scam - [Billing Update Requested (URGENT)]
    
    Dear AT&T Worldnet Service Member,
    
    You may have received a fraudulent e-mail with the Subject line of "Billing
    Update Requested (URGENT) " from a sender's address that is either
    att.billing@private or billing@private This counterfeit
    e-mail requests that you resubmit your credit card information for billing
    purposes.
    
    [That] e-mail is not from AT&T Worldnet Service.  Please do not respond to
    it -- instead disregard and delete it. 
    
    If you have already provided your credit card information in response to the
    fraudulent e-mail, we recommend you notify your credit card issuer
    immediately.
    
    If at any time you receive an e-mail requesting billing information, please
    be aware that it is likely to be a scam. Authentic billing notifications
    sent by AT&T Worldnet Service will always direct you to visit the AT&T
    Worldnet Member Services secure site, where you will login with your userid
    and password to update your billing information.)  Please forward any
    suspicious e-mail to AT&T Special Investigations at scam@abuse-att.net."
    
    For more information on how to protect yourself against identity theft,
    please visit the US Federal Trade Commission's Identity Theft web site, at
    http://www.consumer.gov/idtheft
    
    AT&T Worldnet Service
    
      [But they overlook the fact that the message did direct the reader to a
      site that APPEARED to be an AT&T site. Sheesh, doesn't anyone read over
      there?  John]
    
    ------------------------------
    
    Date: Sat, 10 Jan 2004 13:58:53 +0100
    From: Jacob Palme <jpalme@private>
    Subject: PayPal spoofing
    
    I received a message which is abbreviated below [and even more by PGN]:
    
    > Received: from unknown (HELO reva) (81.196.161.141)
    >    by 0 with SMTP; 6 Jan 2004 01:55:14 -0000
    > Reply-To: "service@private" <spooff@private> 
    > From: "service@private" <service@private> 
    > To: <jpalme@private> 
    > Subject: Account issue
    > Date: Tue, 6 Jan 2004 03:51:33 +0200
    > 
    > Due to concerns, for the safety and integrity of the PayPal
    > community we have issued this warning message.
    > 
    > It has come to our attention that your account information needs
    > to be renew due to inactive members and non-functioning mailboxes.
    > If you could please take 5-10 minutes out of your online 
    > experience and renew your records you will not run into 
    > any future problems with the online service.
    > 
    > However, failure to update your records will result in account 
    > deletation [sic].  This notification expires on January 10, 2004.
    > 
    > Once you have updated your account records your PayPal will not be
    > interrupted and will continue as normal.
    > 
    > Please follow the link below and renew your account information.
    >   http://https-ebay.com   PayPal Service Department
    
    When I clicked on the link, I got to a form which requested a number of
    personal data, including my credit card number, its security code and its
    PIN code! I have put up a copy of the form they asked me to fill in at
      http://dsv.su.se/jpalme/temp/domain-name-spam-2c.pdf
    
    I got suspicious for several reasons:
    
    (a) No company has ever before asked me for my credit card PIN code.
    
    (b) This information was requested by http, not https. But with a domain
    name, http://https-ebay.com which might make some people believe it was
    actually using https.
    
    (c) Looking up in whois indicates that the owner of the domain name
    https-ebay.com is a private person, not a company.
    
    To be on the safe side, I immediately blocked my credit card, since I had
    entered some information before I understood this was a spoof. I also wrote
    to PayPal, who confirmed that the mail was not from them!
    
    I have learnt to be more careful and suspicious in the future!
    
    Jacob Palme <jpalme@private> (Stockholm University and KTH)
    for more info see URL: http://www.dsv.su.se/jpalme/
    
      [This is increasingly becoming a problem!  We desperately need 
      some greater authentication and accountability.  PGN]
    
    ------------------------------
    
    Date: Fri, 09 Jan 2004 08:45:13 +0100
    From: "Peter B. Ladkin" <ladkin@private-bielefeld.de>
    Subject: Announcement: Third Bieleschweig Workshop (abridged for RISKS)
    
    The Third Bieleschweig Workshop on System Engineering.
    Main themes: Risk Analysis and Root-Causal Analysis
    An event of the German Chapter of the System Safety Society
    12-13 February, 2004
    Center for Interdisciplinary Research (ZiF), Bielefeld
    
    Convened by
    University of Bielefeld, Faculty of Technology, RVS Group
    Siemens Transportation Systems, Rail Automation
    Technical University of Braunschweig, Institute for Railway
            Systems Engineering and Transport Safety
    
    In the Third Bieleschweig Workshop, we shall have causal-analysis
    presentations on the 1994 "Friendly Fire" shootdown of two helicopters (WBA,
    comparison with existing sociological and STAMP analyses), the Herald of
    Free Enterprise capsize (SOL, MES, ECF, comparison), the Brühl derailment
    (SOL) and the Royal Majesty grounding (SOL), and the development of
    CausalML, all of which work had been planned during the First and Second
    Workshops. On the new theme of risk analysis, we shall have presentations on
    the PROFUND method, and on the Improved Risk Priority Number concept
    recently developed at Siemens. We shall hold moderated discussions on the
    causal analysis comparison criteria, as well as on one of the themes:
    visualisation, system safety tasks, investigative processes, and
    countermeasures.
    
    We invite additional papers on themes in system engineering, especially
    concerned with risk analysis, from all applications areas. Please send
    proposals for talks (max. 2 pages) to
    
         Peter Ladkin ( ladkin@private-bielefeld.de )
         by Friday, January 23, 2004.
    
    Further details, including travel information, may be found in the Third
    Bieleschweig Workshop announcement in the Bieleschweig pages available
    through www.rvs.uni-bielefeld.de .
    
    Peter B. Ladkin, University of Bielefeld, www.rvs.uni-bielefeld.de
    
    ------------------------------
    
    Date: 7 Oct 2003 (LAST-MODIFIED)
    From: RISKS-request@private
    Subject: Abridged info on RISKS (comp.risks)
    
     The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
    => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
     if possible and convenient for you.  Alternatively, via majordomo,
     send e-mail requests to <risks-request@private> with one-line body
       subscribe [OR unsubscribe]
     which requires your ANSWERing confirmation to majordomo@private .
     If Majordomo balks when you send your accept, please forward to risks.
     [If E-mail address differs from FROM:  subscribe "other-address <x@y>" ;
     this requires PGN's intervention -- but hinders spamming subscriptions, etc.]
     Lower-case only in address may get around a confirmation match glitch.
       INFO     [for unabridged version of RISKS information]
     There seems to be an occasional glitch in the confirmation process, in which
     case send mail to RISKS with a suitable SUBJECT and we'll do it manually.
       .UK users should contact <Lindsay.Marshall@private>.
    => SPAM challenge-responses will not be honored.  Instead, use an alternative 
     address from which you NEVER send mail!
    => The INFO file (submissions, default disclaimers, archive sites,
     copyright policy, PRIVACY digests, etc.) is also obtainable from
     http://www.CSL.sri.com/risksinfo.html  ftp://www.CSL.sri.com/pub/risks.info
     The full info file will appear now and then in future issues.  *** All
     contributors are assumed to have read the full info file for guidelines. ***
    => SUBMISSIONS: to risks@private with meaningful SUBJECT: line.
     *** NEW: Including the string "notsp" at the beginning or end of the subject
     *** line will be very helpful in separating real contributions from spam.
     *** This attention-string may change, so watch this space now and then.
    => ARCHIVES: http://www.sri.com/risks
     http://www.risks.org redirects you to the Lindsay Marshall's Newcastle archive
     http://catless.ncl.ac.uk/Risks/VL.IS.html      [i.e., VoLume, ISsue]
       Lindsay has also added to the Newcastle catless site a palmtop version 
       of the most recent RISKS issue and a WAP version that works for many but 
       not all telephones: http://catless.ncl.ac.uk/w/r
     http://the.wiretapped.net/security/info/textfiles/risks-digest/ .
     http://www.planetmirror.com/pub/risks/ ftp://ftp.planetmirror.com/pub/risks/
    ==> PGN's comprehensive historical Illustrative Risks summary of one liners:
        http://www.csl.sri.com/illustrative.html for browsing,
        http://www.csl.sri.com/illustrative.pdf or .ps for printing
    
    ------------------------------
    
    End of RISKS-FORUM Digest 23.13
    ************************
    



    This archive was generated by hypermail 2b30 : Fri Jan 16 2004 - 16:40:38 PST