[risks] Risks Digest 23.37

From: RISKS List Owner (risko@private)
Date: Tue May 18 2004 - 13:19:12 PDT

  • Next message: RISKS List Owner: "[risks] Risks Digest 23.38"

    RISKS-LIST: Risks-Forum Digest  Tuesday 18 May 2004  Volume 23 : Issue 37
    
       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
       ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
    
    ***** See last item for further information, disclaimers, caveats, etc. *****
    This issue is archived at <http://www.risks.org> as
      <http://catless.ncl.ac.uk/Risks/23.37.html>
    The current issue can be found at
      <http://www.csl.sri.com/users/risko/risks.txt>
    
      Contents:
    Las Vegas monorail delayed due to computer glitch (Chuck Weinstock)
    False Positive Risks (John Lettice via R.G. Newbury)
    'Blue Screen of Death' on hotel TV screen (Henry Baker)
    New UK Driving Licence puts Identity at risk (Adam Laurie)
    Forrester speeds up timeline on white-collar offshoring (NewsScan)
    Researchers find WiFi flaw (NewsScan)
    Sasser creator turned in for the reward (NewsScan)
    German Toll-Collect announces another delay... (Debora Weber-Wulff)
    Listen to your CPU and break RSA? (Gadi Evron)
    Banks don't understand phishing social risks (Samuel Liddicott)
    Fines reimbursed, drivers reinstated; faulty speed camera (Bertrand Meyer)
    Re: Hybrid vehicles may be hazardous to rescuers' health (Stephen Fairfax)
    Re: Auto-Blacklisting is a bad idea (Kyler Laird)
    Formal Methods for Industrial Critical Systems CFP (Diego Latella)
    Abridged info on RISKS (comp.risks)
    
    ----------------------------------------------------------------------
    
    Date: Tue, 11 May 2004 09:46:17 -0400
    From: Chuck Weinstock <weinstock@private>
    Subject: Las Vegas monorail delayed due to computer glitch
    
    The Las Vegas strip $650M 3.9-mile monorail project is months behind
    schedule.  The opening, which had been scheduled for 20 Jan 2004, was first
    postponed to March, and now to the summer.  In January, a train drive-shaft
    fell off in a test.  In February, a glitch was detected in the computer
    control system that keeps trains spaced safely while moving at 50mph.
    Bombardier (Canada) and Granite Construction Co. (Watsonville, California)
    are paying about $85,000 a day in penalties.  The control system uses
    Alcatel's SelTrac S40 Automatic Train Operating System.  Source: Associated
    Press, 11 May 2004
    
    ------------------------------
    
    Date: Tue, 11 May 1982 13:25:18 -0400
    From: "R.G. Newbury" <newbury@private>
    Subject: False Positive Risks (John Lettice)
    
    Roger Benson and Miguel Espinoza brought a lawsuit against Identix and
    California and Oregon because Identix's Livescan 10-print fingerprint
    scanner assigned each of them an ID that was also assigned to someone else
    who had a criminal record.
    
    Benson was imprisoned for 43 days for carrying a firearm after he was
    stopped in California for a traffic violation; the ID derived from his
    fingerprint scan (incorrectly) matched that of someone with a completely
    different name (William Lee Kellogg) who had been convicted for three
    felonies in Oregon.  Records show that Benson's and Kellogg's biometric
    fingerprint records are completely different -- with Benson having only nine
    fingertips!  Similarly, Espinoza claimed his restaurant business was
    destroyed because his ID was shared by someone with a criminally negligent
    homicide conviction.
    
    The ability of this system to generate duplicate IDs has been known since
    1996, but evidently not corrected.  In fact, Oregon has a list of 97 such
    cases.  As usual, there is significant blame to go around -- the system
    itself, and the rather unimaginative use of it by law enforcement.  (On 11
    May 2004, Identix sought to have the suit dismissed in San Jose Superior
    Court.)
    
    Incidentally, the Department of Homeland Security has a contract for
    Identix's fingerprint system, reportedly worth $27M.  The UK Passport
    Service is also using this system.
    
    [Source: John Lettice, DHS and UK ID card biometric vendor in false ID lawsuit,
    *The Register*, 11 May 2004; PGN-ed]
      http://www.theregister.co.uk/2004/05/11/identix_false_id_suit/
    
    ------------------------------
    
    Date: Wed, 12 May 2004 05:59:35 -0700
    From: Henry Baker <hbaker1@private>
    Subject: 'Blue Screen of Death' on hotel TV screen
    
    I'm staying in New York City at the Mandarin Oriental Hotel,
    where every room has a 'high definition' flat panel TV screen
    powered by a PC running Windoze XP Media edition.  This is
    massive overkill, since the 'web' feature of the setup is
    no better than what you would get with a 'thin' web browser.
    (The quality of the TV picture also left a lot to be desired,
    indicating that the $$ spent on the PC would have been better
    spent on the TV itself, but that is a different story.)
    
    Unfortunately, the PC malfunctioned in the middle of the
    night, and completely froze -- not responding to the IR wand,
    or even trying to power cycle the various components using the
    power on/off button..  Note: on this system, the power buttons
    are all software interpreted, so when the software screws up,
    there's no easy way to even power cycle it.
    
    I was forced to pull a _very_ heavy dresser away from the wall
    so I could get access to the power plug and power cycle the
    system in this way.  It's only a matter of time before hotels
    will disable this option as well, by hard wiring the power to
    the system.
    
    The risks of disabling the power buttons are clear -- what if the system
    were melting down and starting a fire?
    
    ------------------------------
    
    Date: Wed, 05 May 2004 08:29:39 +0100
    From: Adam Laurie <adam@private>
    Subject: New UK Driving Licence puts Identity at risk
    
    To obtain the new UK photocard driving licence, you are required to
    provide proof of your identity (see item 6 here):
    
       http://www.dvla.gov.uk/drivers/photocard_licences.htm
    
    My wife recently applied for one, and submitted her passport as proof of
    identity. In due course, the licence arrived, but not the passport. When she
    contacted the DVLA, she was told that they were always sent separately, and
    the passport should have come first.
    
    Given the following story, showing that the post office is losing 14.4M
    letters a year, and the fact that the DVLA take no special precautions such
    as registered post, we assumed the worst:
    
       http://news.bbc.co.uk/1/hi/uk/3681547.stm
    
    Fortunately, the passport eventually arrived, but a system that sends
    crucial documents through a service that is losing such vast quantities of
    its charges is clearly putting valuable documents, and thereby identities,
    at grave risk, which seems to me to be criminally irresponsible of those in
    charge of the DVLA.
    
    Adam Laurie, A.L. Digital Ltd., The Stores, 2 Bath Road, London W4 1LT UK
    +44 (20) 8742 0755  http://www.thebunker.net http://www.aldigital.co.uk
    
    ------------------------------
    
    Date: Mon, 17 May 2004 10:10:36 -0700
    From: "NewsScan" <newsscan@private>
    Subject: Forrester speeds up timeline on white-collar offshoring
    
    Forrester Research says the export of [U.S.] white-collar jobs is happening
    faster than it had first predicted back in 2002, but that its long-term
    outlook for offshore outsourcing hasn't changed much since that report,
    which estimated that a cumulative 3.3 million white-collar jobs would be
    shifted to other countries by 2015.  Forrester's revised numbers project a
    total of 830,000 jobs offshored by 2005, up from its earlier estimate of
    just under 600,000.  Ironically, Forrester analyst John McCarthy says the
    media's focus on the issue has encouraged more companies to experiment with
    offshore outsourcing.  "While the press visibility has spurred offshoring's
    emergence as a political third rail, it has also fostered an increase in
    overall offshore alternatives," says Forrester's revised report.  [*Wall
    Street Journal*, 17 May 2004; NewsScan Daily, 17 May 2004]
      http://online.wsj.com/article/0,,SB108474869663912901,00.html (sub req'd)
    
    ------------------------------
    
    Date: Fri, 14 May 2004 08:23:38 -0700
    From: "NewsScan" <newsscan@private>
    Subject: Researchers find WiFi flaw
    
    Researchers at Queensland University of Technology in Australia have
    discovered an easily-exploited vulnerability that can be used to take down
    most 802.11 wireless networks. The flaw operates at lower network layers
    than most previously-discovered security flaws in 802.11 networking, and
    affects any network operating at the 2.4GHz frequency -- which is the sole
    frequency used by the most popular wireless protocol, 802.11b.  [*The
    Australian*, 13 May 2004; NewsScan Daily, 14 May 2004, rec'd from John Lamp,
    Deakin U.]
    http://australianit.news.com.au/articles/0,7204,9549723%5E15306%5E%5Enbv%5E,00.html
    
    ------------------------------
    
    Date: Mon, 10 May 2004 08:45:38 -0700
    From: "NewsScan" <newsscan@private>
    Subject: Sasser creator turned in for the reward
    
    The German teenager who created the computer worm Sasser was identified by
    acquaintances seeking a $250,000 reward from Microsoft. The young man was
    arrested in the village of Waffensen, near Bremen, and appeared shaken by
    the extent of the damage his program had caused around the world. He faces
    charges of computer sabotage, which under German law could mean his
    imprisonment for five years. If the teenager is convicted, Microsoft will
    make good on its pledge for the full $250,000 reward.  {*The Washington
    Post*, 9 May 2004; NewsScan Daily, 10 May 2004]
      http://www.washingtonpost.com/wp-dyn/articles/A11160-2004May8.html
    
    ------------------------------
    
    Date: Tue, 11 May 2004 12:47:13 +0200
    From: Debora Weber-Wulff <weberwu@fhtw-berlin.de>
    Subject: German Toll-Collect announces another delay... (Re: RISKS-23.21)
    
    ... but in newspeak it is, of course, not announced as such.  The
    public-private partnership Toll Collect, which was to have helped the German
    Government rake in tolls starting last year, has kept posting delays. This
    led to the Transport Secretary throwing them out in February 2004 but
    reinstating them the beginning of March because they promised to start
    testing in the summer and would have the first stage fully functional by Jan
    1, 2005.
    
    Experts laughed, but the government reinstated the consortium, and they got
    to work.  AP reports (quoting the *Berliner Zeitung* from 10 May 2004) that
    testing will now commence until October or November. [Well, I guess that's
    Indian Summer... dww] The company is currently looking for errors in the
    individual systems, the head of Toll Collect, Christop Bellmer, announced.
    "The recent tests of the on board units are promising. The error rate was
    just under3%, about 2% of that are software and 1% are hardware problems. "
    [Translation dww].
    
    THREE PERCENT error rate? For a security system of this size? But reading a
    snippet from the proposal makes it clear where the error rate is coming from
    [my translation]:
    
      http://www.heise.de/tp/deutsch/special/eco/16684/1.html (in German)
    
      TollChecker measures the vehicles three-dimensionally and determines a
      geometric vehicle model. With this, the number of axles are determined and
      trailers are recognized. From this data, the system determines the class
      of vehicle, in order to determine the appropriate fee. In addition,
      pictures of the vehicles and the license plates are taken with an infrared
      flash lighting that is invisible to the driver.  With this, the license
      plate can be automatically determined.
    
      The information from the control system is then compared by way of the
      communication interfaces [satellite!] with the data from the on-board unit
      and the data that was registered with the central computer system. Should
      it appear that some sort of falsification has occurred, the data will be
      stored as evidence.
    
    All this computational effort to determine how many axles the vehicle has?
    No wonder they are having problems! It seems to me that it would be a lot
    easier to have the trucks buy stickers and police the use of the stickers!
    For this they have built ugly toll station information collectors over all
    the autobahns, have installed terminals that don't work in rest stops, and
    are using satellite technology.
    
    It seems that the assumption is that people are hell-bent on deceiving the
    system, so they are trying to solve the social problem with technology, and
    that is not working. Germany is suffering from this wild scheme because the
    money was planned for repairing roads for the World Cup in 2006. Oh well,
    anyone for a train? Just a few minor signalling and switching problems
    there.....
    
    [Added note from Debora: Here's a later followup on the Toll Collect:]
    
    There are reports (for example http://www.pcwelt.de/news/vermischtes/40102/)
    that 3 high school students have developed a toll collection system as part
    of the "Jugend forscht" (Young Scientist Award given every year in Germany).
    They spent only 1300 Euros on their system which uses WLAN technology and
    broadcasts information on the number of axles to access points mounted over
    the autobahns.  The data are then sent to a central computer, and when the
    truck leaves the highway via an exit ramp, a bill is automatically sent to
    the owner. This is similar to the toll system used, for example, on the
    bridge between Denmark and Sweden.
    
    The students won first prize in the Geosciences division. They were invited
    to speak with TollCollect (the consortium that has not actually produced a
    toll system yet but is burning money by the hayloads), but TollCollect said
    that they would not use the technology because so much has already been
    invested in the method that they are using.
    
    I would give TollCollect first prize in the "Never-admitting-we-were-wrong"
    category....
    
    Prof. Dr. Debora Weber-Wulff, FHTW Berlin, FB4, Treskowallee 8, 10313 Berlin
    GERMANY  +49-30-5019-2320  http://www.f4.fhtw-berlin.de/people/weberwu/
    
    ------------------------------
    
    Date: Sat, 08 May 2004 18:46:09 +0200
    From: Gadi Evron <ge@private
    Subject: Listen to your CPU and break RSA?
    
    A story hit slashdot today about a research done by Adi Shamir and Eran
    Tromer on how you can perhaps break RSA keys by listening to a CPU.
    
    The idea by itself i snot new. If you are interested you can look up
    information on DPA and SPA as well.
    
    I won't talk about how and what, you can find more information on the
    following URL's, and they are pretty easy to read an understand.
    
    /. article at:
    http://slashdot.org/article.pl?sid=04/05/08/117242&mode=thread&tid=126&tid=172
    
    Original article at: http://www.wisdom.weizmann.ac.il/~tromer/acoustic/
    
    As much as this technology is a risk and therefore a potential threat,
    unless you are of the really paranoid (which would mean this interests you
    considerably) there are far easier ways of attacking a computer.
    
    This attack came to show how to attack the key, which is why it interests
    these folks, I suppose, but it would be much easier to use TEMPEST if you
    get access to actually install some tool to hear && (record || transmit) the
    audio. Then again, if you get that close you could always install a Trojan
    horse (which doesn't have to be software).
    
    I would suggest TEMPEST would also be more reliable, but some testing is in
    order and the POC is impressive in its simplicity and efficiency. I would
    think a lot of research would be required for every CPU you intend to
    attack, but I am apparently wrong (?).
    
    Cost vs. benefit? I can't really see it. But it works!
    
    This is pretty cool though! I have to admit that!
    (adding another mark on my paranoia list).
    
    +972-50-428610 (Cell)   ge@private Backup: ge@private
    
      [See also an article by Dmitri Asonov and Rakesh Agrawal, Keyboard
      Acoustic Emanations, 2004 IEEE Symposium on Security and Privacy,
      pages 3--11.  PGN]
    
    ------------------------------
    
    Date: Mon, 17 May 2004 10:48:38 +0100
    From: "Samuel Liddicott" <sam@private>
    Subject: Banks don't understand phishing social risks
    
    [This post has been edited slightly since being sent to the Co-operative
    Bank (UK). No response had been received from the bank after 4 weeks]
    
    Normally there are subtle differences between the way a bank operates and
    the way phishing scams operate; typically any client initiated contact with
    the bank is safe (typos aside).
    
    Phishing scams generally work by initiating a fake contact from the bank
    that directs users to transactions that scam the user.
    
    The Coop bank is engaging in marketing practices indistinguishable from
    those practiced by phishers, encouraging customers to believe that callers
    claiming to be from the bank are indeed from the bank, making it easy for
    phishers to impersonate the bank for the purposes of obtaining customers
    security information.
    
    Scammers would also need account number and sort code information that could
    be had from disposed receipts, personal cheques, stolen/found wallets etc,
    or obtained from the same phone call used to obtain the answers to security
    questions.
    
    A few times in this past year I have received a telephone call from the bank
    (I suppose). The caller would identify themselves as being from the Coop
    bank, and that before they could proceed, would I have any objection to
    answering some security questions? I always refused to do so, not being able
    to tell that they were really from the bank and not some fraudster currently
    online to my bank and needing some help to answer my personal security
    questions.
    
    Recently, within the last few weeks, our of curiosity I took the call a
    little further.
    
    I told the caller that I would not answer the questions, for how could I
    tell she really was from the Coop bank.
    
    She assured me she was a genuine caller from the bank, and seemed to think
    this assurance held some weight.
    
    I suggested that for all I knew she was a fraudster who was on the line to
    my bank that very moment and asking me the same security questions the bank
    was asking her.
    
    She finally understood my concerns enough and offered to let me call the
    bank number given on the bank website and then ask for her extension, which
    I did. When I then spoke to her, she said the call was just to make sure
    that I knew, that since the Coop bank and Coop insurance had merged, they
    could offer me combined products!  For some reason "making sure I knew"
    needed me to answer personal security questions.
    
    What is more concerning is not how sure the bank wanted to be that they were
    talking to me, but that they put their customers into the habit of believing
    that callers claiming to be from the bank are indeed from the bank.
    
    And after all, what's the difference TO THE CUSTOMER between an e-mail
    purporting to be from the bank (typical phishing scam) and a phone call
    claiming to be from the bank?
    
    I'll tell you the answer: On the bank website the customer is warned not to
    believe e-mails from the bank. There are no such warnings about telephone
    calls (yet).
    
    Fortunately, while this sort of behaviour makes the banks customers more
    susceptible to believing man-in-the-middle phishers, it doesn't affect me.
    
    It is admirable that the bank authenticates its customers, but before it
    does so the customers need to authenticate the caller as being the bank; I
    don't know how many customers are competent enough to do this, and while
    this is the case I think the bank should be careful what sort of
    expectations they instill into their customers.
    
    ------------------------------
    
    Date: Sun, 16 May 2004 17:22:03 +0200
    From: "Bertrand Meyer" <Bertrand.Meyer@private>
    Subject: Fines reimbursed, drivers reinstated; faulty speed camera (R-23.35)
    
    New developments on the Victoria (Australia) defective speed cameras
    affair (see my note in RISKS 23:35):
    
      Almost 165,000 motorists caught by fixed speed cameras will have their
      fines waived or be paid compensation, costing the State Government $26
      million. This includes waiving $6.1 million in fines.  Hundreds of drivers
      who lost their licenses for speeding may be back on the road.  The State
      Premier Steve Bracks said that every one of the 90,000 speeding fines ever
      issued because of Western Ring Road fixed cameras would be repaid.
    
    (Sums in Australian dollars. Summarized from the Melbourne Age, 15 May 2004,
    http://theage.com.au/articles/2004/05/14/1084289885456.html.)
    
    "Wear and tear, poor installation and electromagnetic interference were
    blamed for faulty readings on ring road cameras". The State Government is
    blaming the supplier, now in "administration", which says it's being
    scapegoated and was not in charge of camera maintenance.
    
    The opposition criticizes the State Government for not releasing the full
    report and is threatening to go to court to get it published
    (http://theage.com.au/articles/2004/05/16/1084646060721.html).
    
    -- Bertrand Meyer
    ETH Zurich http://se.inf.eth.ch -- Eiffel Software http://eiffel.com
    
    ------------------------------
    
    Date: Sat, 08 May 2004 16:10:21 -0400
    From: Stephen Fairfax <fairfax@private>
    Subject: Re: Hybrid vehicles may be hazardous to rescuers' health (R-23.35)
    
    My wife owns a Toyota Prius, and as an engineer interested in power
    electronics and reliability I purchased and studied all the available shop
    manuals and other technical documentation available for the vehicle.
    
    The hybrid voltage battery is located in the trunk.  The Prius DC cables are
    colored bright orange for visibility and easy identification. Unlike power
    cables in 12 VDC systems, where the car chassis serves as the return
    circuit, two cables carry the + and - DC to the power electronics.  This
    means that a person would have to accidently touch both terminals to be
    shocked.  In the unlikely but conceivable instance where damaged cable
    insulation connects one cable to the metallic chassis, a ground fault
    detection circuit would open the main DC relays (there are two, normally
    open) and de-energize the cables. Any collision that activates the front
    airbags will also cause the main DC relays to open and de-energize the
    cables and power electronics.
    
    Prius service technicians are taught about an easily accessible bright
    orange plastic plug inside the trunk that can be pulled to physically
    disconnect the battery and remove all power from the high voltage
    electronics and cables.  First responders are trained not to touch anything
    colored bright orange in the Prius.  There is also a control relay under the
    hood that can be removed to open the main DC relays and de-energize the
    cables.  I found instructions for removing that relay in about 15 seconds of
    google searching using the search ("toyota prius" hazmat) at
    www.firehouse.com.  As I am not a first responder I cannot comment on how
    many read firehouse.com.
    
    Using the search ( "toyota prius" "high voltage" site:toyota.com ) I found
    the Toyota Emergency Response Guide (ERG), a 26-page PDF document explaining
    the operation of the vehicle, roadside assistance, and emergency response
    procedures.  During a fire, the car is treated as any other car fire.  As
    the ERG notes, firefighters can not be expected to notice that the car is a
    hybrid until after the fire has been knocked down.  The battery electrolyte
    is potentially hazardous as it is a caustic alkali.  The electrolyte is
    confined in a gel and will not normally leak even if the hybrid battery case
    is cracked.
    
    The DC cables do NOT run through the doors.  Many automobile wires, brake
    hydraulic, and fuel lines run in or near the frames surrounding the doors,
    as these are typically heavily reinforced and so offer good protection from
    both normal wear and accidents.
    
    While the dangers posed by hybrid batteries are real, in context they are
    not very large, and Toyota seems to have done a commendable job of
    anticipating and mitigating the hazards.  The new RISK arises from the fact
    that this is new technology for automobiles and there is a transition period
    where not all first responders have received appropriate training.  During
    that transition period, uninformed speculation and misinformation could
    result in unwarranted delays extracting an injured person or in controlling
    a fire.
    
    The greatest hazard in a damaged and motionless vehicle is almost always the
    tank of gasoline.  Can you imagine the safety, environmental, and other
    regulatory hullabaloo that would arise if we were trying to introduce
    gasoline into vehicles for the first time today?
    
    ------------------------------
    
    Date: Mon, 10 May 2004 14:08:08 GMT
    From: Kyler Laird <Kyler@private>
    Subject: Re: Auto-Blacklisting is a bad idea (RISKS-23.36)
    
    > ... challenge-response system warned that it was going to automatically
    > blacklist my e-mail address if I didn't respond.
    
    Anyone know when auto-blacklisting would be beneficial?  I'm not getting it.
    
    If the message truly is spam, the sending address is probably bogus.  (I use
    TMDA and I think I have the data to back up that assertion.)  Either the
    address belongs to an innocent user (in which case auto-blacklisting has
    negative value, as demonstrated above) or the address points into a bit
    bucket somewhere (in which case blacklisting of any sort has little or no
    value).
    
    On the rare occasion that a spammer sends a message with a legitimate sender
    address, the challenge will be sent to the spammer.  It would be easy enough
    for that spammer to respond to the challenge (even, as we've already seen,
    if it requires some thought such as the image-based challenges) and the auto-
    blacklisting is not engaged.
    
    So now we're down to the tiny chance of a spammer sending a message with a
    legitimate sender address from which he does not respond.  Now the auto-
    blacklist engages and kills further messages from that address.  So?  The
    effect seen by the intended recipient is the same as if auto-blacklisting
    had not been used; either way, no messages are passed.
    
    It's a stretch, but I'm willing to say that there is *some* benefit to not
    sending challenges to the same (unresponsive) address repeatedly.  That
    benefit is so tiny that it disappears in the noise compared to the problems
    caused as a result.  Also, there is no benefit to the intended recipient
    unless bandwidth has a very high cost.
    
    Anything I'm missing?
    
      [PGN asked Drew Dean if he wanted to answer that question, and this
      is his response was evidently NO, Kyler has it right, although Drew
      added this counterquestion as to what might be added:
    
        That people often assume that things are linear and symmetric even
        when they aren't?
        Granted, much of the real world is linear and symmetric, so it's hard
        to fight against a large number of years of "life experience."  DD]
    
    ------------------------------
    
    Date: Mon, 10 May 2004 11:56:15 +0200
    From: Diego Latella <Diego.Latella@private>
    Subject: Formal Methods for Industrial Critical Systems CFP
    
    The 9th ERCIM "Formal Methods for Industrial Critical Systems" Workshop will
    be held in Linz, Austria (EU) on 20-21 September 2004
    
    The aim of the FMICS <http://www.inrialpes.fr/vasy/fmics/> workshops is to
    provide a forum for researchers who are interested in the development and
    application of formal methods in industry. In particular, these workshops
    are intended to bring together scientists who are active in the area of
    formal methods and interested in exchanging their experiences in the
    industrial usage of these methods. These workshops also strive to promote
    research and development for the improvement of formal methods and tools for
    industrial applications.
    
    Submissions are due by 21 June 2004.  Further information at
      http://www.fmics04.cclrc.ac.uk/
    
    Dott. Diego Latella, Consiglio Nazionale delle Ricerche
    Ist. di Scienze e Tecnologia dell'Informazione - ISTI
    Via G. Moruzzi, 1 - I56124 Pisa, ITALY
    phone: +39 0503152982 or +39 348 8283101
      fax: +39 0503138091 or +39 0503138092
    Diego.Latella@private   http://www.isti.cnr.it/People/D.Latella
    
    ------------------------------
    
    Date: 5 Apr 2004 (LAST-MODIFIED)
    From: RISKS-request@private
    Subject: Abridged info on RISKS (comp.risks)
    
     The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
    => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
     if possible and convenient for you.  Alternatively, via majordomo,
     send e-mail requests to <risks-request@private> with one-line body
       subscribe [OR unsubscribe]
     which requires your ANSWERing confirmation to majordomo@private .
     If Majordomo balks when you send your accept, please forward to risks.
     [If E-mail address differs from FROM:  subscribe "other-address <x@y>" ;
     this requires PGN's intervention -- but hinders spamming subscriptions, etc.]
     Lower-case only in address may get around a confirmation match glitch.
       INFO     [for unabridged version of RISKS information]
     There seems to be an occasional glitch in the confirmation process, in which
     case send mail to RISKS with a suitable SUBJECT and we'll do it manually.
       .UK users should contact <Lindsay.Marshall@private>.
    => SPAM challenge-responses will not be honored.  Instead, use an alternative
     address from which you NEVER send mail!
    => The INFO file (submissions, default disclaimers, archive sites,
     copyright policy, PRIVACY digests, etc.) is also obtainable from
       <http://www.CSL.sri.com/risksinfo.html>
     The full info file may appear now and then in future issues.  *** All
     contributors are assumed to have read the full info file for guidelines. ***
    => SUBMISSIONS: to risks@private with meaningful SUBJECT: line.
     *** NEW: Including the string "notsp" at the beginning or end of the subject
     *** line will be very helpful in separating real contributions from spam.
     *** This attention-string may change, so watch this space now and then.
    => ARCHIVES: ftp://ftp.sri.com/risks [subdirectory i for earlier volume i]
     <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive
     http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
       Lindsay has also added to the Newcastle catless site a palmtop version
       of the most recent RISKS issue and a WAP version that works for many but
       not all telephones: http://catless.ncl.ac.uk/w/r
     <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
    ==> PGN's comprehensive historical Illustrative Risks summary of one liners:
        <http://www.csl.sri.com/illustrative.html> for browsing,
        <http://www.csl.sri.com/illustrative.pdf> or .ps for printing
    
    ------------------------------
    
    End of RISKS-FORUM Digest 23.37
    ************************
    



    This archive was generated by hypermail 2b30 : Tue May 18 2004 - 13:52:12 PDT