[RISKS] Risks Digest 23.58

From: RISKS List Owner (risko@private)
Date: Thu Nov 04 2004 - 12:02:43 PST


RISKS-LIST: Risks-Forum Digest  Thurs 4 November 2004  Volume 23 : Issue 58

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/23.58.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Some thoughts on the 2004 U.S. election process (PGN)
Touchscreen voting spawns glitches (NewsScan)
Preferential voting software breaks down in San Francisco (PGN)
Clocks set back a week too early (Dave Stringer-Calvert)
Nuclear Regulatory Commission lab info on Web (Dave Brunberg)
Battlefield Robotics are risk to the world public (Edward G. Nilges)
Spyware epidemic threatens to stall computer industry (NewsScan)
Swedish Hospital forces persons to change names (Peter H)
Election candidates' web pages hacked during Finnish election (Erka Koivunen)
Re: Internet voting (Hamilton Richards)
Address-form glitch proves an easy scam (Gabe Goldberg)
Re: TV emits international distress signal (Steve Summit)
Re: Is Windows up to snuff for running our world? (Atom 'Smasher')
Re: Do vendors read their own security policies? (jmeissen)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Wed, 3 Nov 2004 18:21:20 PST
From: "Peter G. Neumann" <neumann@private>
Subject: Some thoughts on the 2004 U.S. election process

It is important to recognize that the election process is a long and arduous
one in which Election Day is just one highly visible manifestation.  The
integrity of our elections depends on almost every step along the way.  That
obviously includes the actual casting of ballots and the creation,
evaluation, certification, testing, and maintenance of voting equipment.
But it also includes the registration of voters; identification,
authentication, and challenging of voters; creation of the actual appearance
of ballots and setting up the voting machines; distribution and handling of
ballot and polling-place information, absentee ballots, and especially
provisional ballots; processing of ballots; tabulation and collection of
results; and proper assurance that voters' ballots are treated with adequate
respect for privacy -- along with oversight of each of the steps in the
entire process.

Historically, many past elections have encountered serious anomalies.  (See
my Illustrative Risks document,
http://www.csl.sri.com/neumann/illustrative.html and click on Election
Problems; that summary of RISKS cases will eventually be upgraded to include
the most relevant of a large number of reported November 2004 anomalies.)
Yesterday's election reminds us once again that each of the steps in the
overall election process represents various potential weak links with
respect to security, system integrity, accountability, recountability,
privacy -- and, indeed, the democratic process.  For example, some exit
polls differed rather substantially from the actual results in some states.
However, in the absence of meaningful audit trails, it is impossible to
determine definitively whether this was the result of a lack of integrity
and accuracy in the exit polls or in the election systems themselves; a
voter's intent remains unknown in the absence of voter-verified audit trails
when using unauditable machines.  On the other hand, having to believe in
exit polls to evaluate whether the unauditable electronic machines were
accurate and noncompromised is also a ludicrous proposition.

When everything comes down to one state -- in it did again this year -- we
are left with unanswered and indeed unanswerable questions about the
integrity of the unauditable all-electronic machines in Ohio.  Among other
vendors, Diebold is known for numerous transgressions.  We have previously
noted here that in California in 2002, the software that was used by Diebold
in 17 counties was not the software that had been certified; the actual
versions in use were different.  In Georgia in 2002, Diebold's had
unmonitored dedicated lines into computer systems during the election
process (in case it was necessary to fix (!) problems).  (This is also true
of other vendors, and is apparently used to download software upgrades and
offload results.)  In Ohio in 2003, Diebold's CEO Wally O'Dell wrote to
would-be contributors that he is "committed to helping Ohio deliver its
electoral votes to the President next year."  Overall, the use of
unauditable machines is of particular concern when it is impossible to
determine the presence of bad software, human error, and intentional fraud
-- unless the anomalies are totally egregious, as in the case in Boone
County, Indiana, of 144,000 votes being recorded when only 5,352 people had
voted (RISKS-23.03) or where -16,022 votes were reported in Volusia County,
Florida (RISKS-22,93,94).  Of course, other voting machine companies are
also involved in many other irregularities, so Diebold is not the only
source of problems.

Returning to the notion that the voting problem is a total-system problem,
here are a few more issues.

* The federal election standards are inherently incomplete and extremely
  weak.  This is true of the 2002 standards that replaced the 1990
  standards, although most of the current systems were evaluated against
  the even weaker old standards.

* The evaluation process is normally secret, and funded by the voting
  machine purveyors themselves -- some of whose employees have felony
  conviction records or otherwise questionable backgrounds.

* Many state election officials are overtly partisan, some also serving in
  party positions (as in Ohio).

* The National Institute of Standards and Technology is supposed to be
  involved in setting standards, but its funding is grossly inadequate for
  this task.

* The U.S. Election Assistance Commission has also been seriously
  shortchanged in its funding.

* Legislation cannot reflect all of the possible things that can go wrong,
  but it is absolutely essential that nonpartisan actions and guidelines be
  as carefully and proactively constructed as possible.

* In the 2004 national election, it is already clear that numerous
  irregularities have occurred leading up to and during the election
  (including a variety of what might be called "dirty tricks"), some of
  which even appear to have been illegal.  For example, numerous efforts to
  disenfranchise or harass legitimate new voters were reported in various
  states.  Further complicating the need for a level playing field, there
  were many reports of long lines -- with some voters having to wait two
  hours or four hours to vote, and even a few who had to wait for 9.5 hours!
  The fact that some voters persevered despite such discouraging
  circumstances is truly amazing.

* There were also reports from New Orleans that all of the Sequoia machines
  throughout the city had failed (for example, could not be booted up), and
  that there were inadequate paper backups.

* Training of precinct workers is also a significant problem under confusing
  conditions, as was misinformation and a lack of standards regarding
  provisional ballots mandated by the Help America Vote Act.

* The Election Incident Reporting System (https://voteprotect.org) is
  currently showing 29007 reported incidents (many of which were relatively
  minor, but the total of which suggests some real problems), with
  Pennsylvania, Florida, California, New York, and Ohio leading the pack in
  that order.

And I feel as if I have only scraped a little off the top of the iceberg.
Correcting all of these and other problems is not an easy task, and requires
objective approaches.  But the primary lesson from this election --
irrespective of the eventual outcome -- is that we still urgently need
meaningful election reforms.  It is not too early to do this for the future.

------------------------------

Date: Wed, 03 Nov 2004 09:52:25 -0700
From: "NewsScan" <newsscan@private>
Subject: Touchscreen voting spawns glitches

U.S. voters across the country reported some 1,100 problems with e-voting
machines, bearing out scientists' concerns that touchscreen machines are
prone to tampering and unreliable unless they're equipped to print out paper
records for recounts. Some problems were blamed on factors as mundane as
power outages and incompetent poll workers, but there were a number of
voters in six states -- especially Democrats in Florida -- who said that
although they voted for John Kerry, when the computer asked them to verify
their choice, it indicated that they had voted for President Bush. One voter
in Clearwater reported that it took her about 10 tries and a quick
touchscreen clean-up with a wet-wipe towel before she could successfully
select Kerry. A spokesperson for Sequoia Voting Systems said the machines'
monitors may need to be recalibrated periodically to ensure the touchscreen
is sensitive enough to record users' votes.  [AP/CNN.com 3 Nov 2004;
NewsScan Daily, 3 Nov 2004]
  http://www.cnn.com/2004/TECH/11/03/electronic.voting.ap/index.html

------------------------------

Date: Thu, 4 Nov 2004 10:07:12 PST
From: "Peter G. Neumann" <neumann@private>
Subject: Preferential voting software breaks down in San Francisco

In the election of 2 Nov 2004, San Francisco's district supervisor election
used ranked-choice voting for the first time.  It went just fine on Tuesday
during the election.  Preliminary results showed candidates in three
districts had won by a majority (so no reranking is needed), whereas the
other four seats remained to be determined by the preferential ballot
counting process.  However, the computer processing broke down completely on
Wednesday afternoon when election workers began to merge the first, second,
and third choices into the program that is supposed to sequentially
eliminate low-vote candidates and redistribute voters' second and third
choices accordingly.  However, no San Francisco ballots were lost, because
each ballot has a paper trail.

The software is provided by ES&S (Election Systems and Software, in Omaha).
This system has undergone federal and state testing, as well as pre-election
testing in which everything seemed to work perfectly.  [No surprise to RISKS
readers there.]  The results of four contested supervisors' races are
expected to be delayed up to two weeks.  [Source: Suzanne Herel, *San
Francisco Chronicle*, 4 Nov 2004, front page continued on A7; PGN-ed]

------------------------------

Date: Thu, 28 Oct 2004 19:20:13 -0700
From: Dave Stringer-Calvert <david.stringer-calvert@private>
Subject: Clocks set back a week too early

Brussels has been "blamed" for bringing winter a week early to parts of the
country.  About 2,000 clocks on public buildings and railway stations across
the UK have gone back an hour seven days too soon.  An EU directive
dictating clocks should change on the last Sunday of October has been blamed
by clock makers.  Traditionally, clocks changed on the fourth Sunday of
October and most were pre-programmed to do so.  There are five Sundays in
October this year.  [...]  [Source: BBC News]

------------------------------

Date: Wed, 20 Oct 2004 08:46:35 -0400
From: "Dave Brunberg" <DBrunber@private>
Subject: Nuclear Regulatory Commission lab info on Web

Today's cnn.com (http://www.cnn.com/2004/US/10/19/terror.nrc/index.html) has
a story on floor plans, chemical lists, and other "sensitive" data on
licensed nuclear facilities in the U.S. being made available through the
Nuclear Regulatory Commission's web site.

The article discusses what types of information are available, and how it
may be useful to terrorists planning attacks against such facilities, or
raids to obtain radioactive material.  Interestingly enough, little is said
about why the information was up in the first place.  The reason is likely
regulations requiring disclosure of hazardous substances and publication of
floor plans for use in fire/rescue training and other safety-related
regulations.

While most of us can agree that security through obscurity is a dead end,
the article's author seems mildly outraged and disbelieving that such
information would ever be publicly available.

However, it's nice to know that some people who are discussing physical
security understand the failures of security through obscurity: Money quote:

  "It [the Web site] may help a little, but if someone's determined to do
  this, it won't help them much. If someone wanted to find this out, they
  can," said David Albright of the Institute for Science and International
  Security.

  "If secrecy is your only security, then you don't have it. Because
  everybody that has a brain knows that physics departments use radioactive
  sources ... and it's not that hard to find where they are," he said.

It's always a delicate balance, when you have to weigh government secrecy
against the public right to know what's going on in their government.  In my
mind, it's better to err on the side of public knowledge, while implementing
true security measures.  The alternative is to try to hide everything and
then have to explain to a few thousand people why their loved ones died in
an attack that could have been prevented by a security policy driven by the
assumption that the enemy can find out whatever they need.  The latter takes
more work, but it's more honest and more reliable.

David W. Brunberg, Engineering Supervisor, The F.B. Leopold Company, Inc.

------------------------------

Date: 25 Oct 2004 21:03:51 -0700
From: spinoza1111@private (Edward G. Nilges)
Subject: Battlefield Robotics are risk to the world public

http://news.yahoo.com/news?tmpl=story&u=/ap/20041025/ap_on_bi_ge/battle_ready_robot
  http://news.yahoo.com/news?tmpl=story
  &u=/ap/20041025/ap_on_bi_ge/battle_ready_robot

No consideration appears to be given here by the John Deere corporation
(engaged enthusiastically in beating plowshares into high-tech swords) that
battlefield robots may represent the existing hazards of land mines to
children and others...raised to a power.

Dazzled by the glitter of the hardware and the apparent perfection of the
software in the showroom, we seem to systematically forget what happens to
old systems of this nature.

The unusable laptop, that boots up to a Blue Screen of Death and is too
expensive to repair, becomes closet clutter as does the desktop outdated by
the next big thing.

But what happens to military hardware, as is evident from the known problem
of unexploded ordnance (still a problem in northern France, almost a century
after the First World War), is much more serious.

It becomes an attractive nuisance for children growing up in former
battlegrounds.

A partially functional, unmanned and unaccounted for battlefield robot will
attract children, but since it is logically impossible to program these
pernicious things with Asimov's First Law (see below), its partially
corrupted software (corrupted by low power and environmental stress causing
memory losses, for example) may well interpret the random actions of
children as a threat...especially when the children play "war", as children
tend to do in real war zones.

Boom...and, as usual, nobody is responsible: the great good John Deere
corporation has moved on.

It is logically impossible to program these things with Asimov's First Law,
which was never to harm a human being. That's because their whole purpose is
to harm human beings.

Software people make mistakes, called bugs, all the time. Perhaps this
inures them to not admitting what may be The Grand Fallacy of software.

This is that one is not morally accountable for all phenomena of the
software system one has fabricated, including "unexpected" phenomena.  Of
course, an early lesson, learned and taught by hero computer scientist
Dijkstra, was that one was indeed responsible for outlier conditions.

We have been told that cruise missiles are pinpoint accurate even though
they have destroyed innocent lives. The destruction is explained away as
unusual combinations of circumstances or operators who in the heat of battle
misprogram the final parameters.

Trivially, there is no boundary between field modification of parameters,
whether of a cruise missile on board a naval vessel or behind the lines.

More important, it can be concluded that the seriousness of a final result
(a child's life destroyed) when considered as a number makes the final ratio
of our "input" to the magnitude of the crime something which has to be taken
into account.

Of course, for this reason, many software and hardware engineers simply
avoid defense work. But one hopes that the military types write all their
own goddamn software all the way down so that Open Source coders are not
indirectly responsible.

There is some fantasy that if we put enough steps between our actions and a
final result, the amplitude of the moral signal, the level of our guilt, is
attenuated and not amplified into a cry to heaven.

But September 11 may have brought home to many Americans that other people
do not feel the same way. Other people, if we implement battlefield robotics
and after the battle they are running amuck, will ask us why we constructed
such cowardly and unnecessary devices.

------------------------------

Date: Mon, 01 Nov 2004 10:08:46 -0700
From: "NewsScan" <newsscan@private>
Subject: Spyware epidemic threatens to stall computer industry

Computer makers say that their technical support lines are lit up by
consumers frustrated over sluggish performance and increasingly they're
tracing the problems back to one culprit: spyware. Companies are concerned
about the cost of the calls, but they're even more worried that that
customers will wrongly blame them for performance deficiencies. Russ Cooper,
senior scientist with TruSecure Corp., says now that spyware has become
epidemic, it's time for Microsoft and other technology companies to launch a
public education campaign along the lines of the old "Only *you* can prevent
forest fires" concept. The industry's incentive is pure survival, says
Cooper. Microsoft officials blame rogue software for up to a third of
applications crashes on Windows XP computers and AOL estimates that just
three such programs together cause about 300,000 Internet disconnections per
day. Forrester Research analyst Jonathan Penn says spyware-related customer
support can cost $15 to $45 per phone call, but it's worth it. "Security is
a component of loyalty. People, they want all these various services, but
they expect security to come with it."  [AP, 31 Oct 2004; NewsScan Daily, 1
Nov 2004]
  <http://apnews.excite.com/article/20041031/D862JARG0.html>

------------------------------

Date: Fri, 29 Oct 2004 20:27:52 +0200 (CEST)
From: Peter H <prisk@private>
Subject: Swedish Hospital forces persons to change names

Swedish hospital forces users to change their officially registered name!

According to an article in "Computer Sweden" (29 oct 2004) the users at
karolinska university hospital have adopted a rigorous naming-scheme, that
uses *only* a person's name with spelling and order as existing in official
population register.  Bad, you think?  Well it is even worse; many people
has several given names, among which most persons pick one and use it for
everyday life. But this hospital's administrators refuse to use the chosen
name, instead insisting on using the first given name + surename as e-mail
address.

Reason? "It's about making sure it's the right person logging in and it's
also important with law and order."

For those unhappy souls not recognizing their names, the IT department has
ready-made forms for changing the official population register (which costs
money in sweden, something the unhappy souls is not reimbursed for).

The article does not mention that some persons still has to use other
combinations, there is two cases where the "dream-scheme" does not work (not
even in sweden):

  (1) for the duplicates (or do they refuse employment for these??)
  (2) for the persons christened to names containing non-ascii characters.

Orwell, you are way behind !

------------------------------

Date: Thu, 28 Oct 2004 09:07:55 +0300
From: "Erka Koivunen" <Erka.Koivunen@private>
Subject: Election candidates' web pages hacked during Finnish election

The web pages of two candidates from the Finnish National Coalition Party
were hacked last Thursday, just three days before the Finnish municipal
elections.  The pages were a part of a public service provided by Finnish
Broadcasting Company YLE. The candidates were supposed to type in their
answers along with opinions for predefined multiple-choice questions. In
turn, the citizens could compare the candidates' answers against their own
preferences. The service has grown to be quite popular during the latest
Finnish elections - at least I found my candidate by using the service!

According to YLE's project manager Erkki Vihtonen, somebody had gotten hold
of the party's passwords and used a PC in a public library to log in and
type in bogus answers for two candidates who hadn't completed the
questionnaire. The material was distinctively racist and sexist.

The webmasters were finally notified on the eve of the election by a tip
from the public and bogus answers were removed. The police is currently
investigating the suspected crime.

The service contained information about 16,000 candidates and it was visited
250,000 times before the election. No information about hits to the bogus
pages was released. According to Mr. Vihtonen, they have "7,000 suspects".

For the record: the two candidates - one in Helsinki, the other in Kemi -
didn't win.

Link to the original news story, dated 2004-10-27 (only in Finnish):
  http://www.helsinginsanomat.fi/tuoreet/artikkeli/1076154360595

Erka.Koivunen@private +358-50-5066317 http://iki.fi/Erka.Koivunen/

------------------------------

Date: Wed, 27 Oct 2004 14:24:12 -0500
From: Hamilton Richards <ham@private>
Subject: Re: Internet voting (Stevens, RISKS-23.57)

PGN's comment on a couple of proposals to stage Internet-election hacking
contests --

   [I continue to be amazed that folks persist on focusing only
    on the risks of penetrations by outsiders.  Insiders are by
    far the greatest concern here.  PGN]

-- is well-taken as it applies to all software that's involved in ballot
counting, but Internet voting is a nonstarter for reasons that are more
fundamental.

The problem is that Internet voting compromises the secret ballot's
secrecy.  Although it's often assumed that ballot secrecy is a matter of
individual privacy, it's more than that. Ballot secrecy benefits not only
the individual voter whose ballot is secret, but all other citizens, who can
be sure that their fellow citizens can't be bribed or coerced into voting
contrary to their true preferences. The voter is alone in the voting booth,
and takes away nothing that she could use to prove how she voted.

Now picture a voter casting his ballot, via the Internet, from the comfort
and convenience of his home or office. How do we know that his employer, or
a party official with pockets full of cash, is not watching over his
shoulder?

It's true that absentee ballots have already opened this door a crack, but
that's no reason to throw it open wide.

Hamilton Richards, Senior Lecturer, Dept. of Computer Sciences, UT Austin

  [... not to mention that you have to trust everything along the way.  PGN]

------------------------------

Date: Mon, 25 Oct 2004 22:07:27 -0400 (EDT)
From: Gabe Goldberg <gabe@private>
Subject: Address-form glitch proves an easy scam

Credit-card thieves find sneaky way to beat fraud checks
http://www.msnbc.msn.com/id/6297815/

  It's a harmless-looking part of every a Web site retailer's checkout page.
  The form filled out by customers ordering products almost always has a
  second line -- sometimes it's used for apartment numbers or other
  information; it's usually left blank.  But that innocuous-looking second
  line could become a big headache for Internet merchants soon, says one
  fraud expert.  Credit card criminals have figured out a simple way to use
  that second line to foil the most basic anti-fraud measures online
  merchants use.  [...]  Designed long ago, most address verification
  systems only check numerical values at the beginning of the address and
  zip code fields in the billing address form.  Letters, such as street
  names and cities, are ignored.  That means if the legitimate address is
  123 Elmwood Street, and a criminal enters "123 XXTRTWW," the fraud
  software will return a "yes" value, indicating the address is valid.  [...]

This is of course not a "glitch", it's people specifying, designing, coding,
approving, and *continuing to use* a system in which "letters, such as
street names and cities, are ignored". And then being all shook up when
something bad happens.

Gabriel Goldberg, Computers and Publishing, Inc., 6580 Bermuda Green Court,
Alexandria, VA 22312-3103  http://www.cpcug.org/user/gabe  1-703-941-1657

------------------------------

Date: Fri, 29 Oct 2004 20:00:06 -0400
From: Steve Summit <scs@private>
Subject: Re: TV emits international distress signal (Hogsett, RISKS-23.57)

Mike Hogsett wrote about a flat-screen TV in Corvallis, Oregon, that
inadvertently summoned a search-and-rescue operation.

I just heard a similar story about the Civil Air Patrol in New York.
Evidently they get repeated calls which can be traced to a United Parcel
Service depot in the Bronx.  Now, it turns out that a company that makes
Emergency Locator Transmitters is serviced out of that UPS depot, and these
ELTs are often returned via UPS for repair.  But sometimes the boxes get
dropped, at which point the supposedly malfunctioning ELT inside senses the
high-G impact of a "crash" and starts to transmit.

And then there's the story (perhaps an urban legend) about people mailing
supposedly-defective electronic toll tokens back to the issuing highway
authority, and being billed for the tollbooths the mail truck passed
through...

------------------------------

Date: Wed, 27 Oct 2004 01:02:18 -0400 (EDT)
From: "Atom 'Smasher'" <atom@private>
Subject: Re: Is Windows up to snuff for running our world? (Smith, R-23.57)

About a week ago i stopped by a local bank to cash a check and their windows
computers where all down. they had no way to determine if the account had
sufficient funds to cash the check. when i asked how often the system went
down, they replied "once or twice a day" for 10-20 minutes.

They have a computer system that spends 10-40 minutes of every workday
taking a siesta!

Apparently they knew the owner of the account that i was cashing the check
from, and determined that he never writes bad checks so it should be OK to
give me the money and sort it out later. hhmmm... might there be a risk of
someone trying to cash a bad check during a hectic time?

related link - Is Microsoft Licensing Forcing Banks to Break The Law?
http://www.cioupdate.com/article.php/10493_1485861

------------------------------

Date: 26 Oct 2004 23:26:02 GMT
From: jmeissen@private
Subject: Re: Do vendors read their own security policies?

I have the same problem with Fidelity Investments. Their official website is
at http://www.fidelity.com. Yet in spite of having the problem pointed out
to them they continue to send email that directs the recipient to various
pages at m0.net, such as
  http://fidelity2.m0.net/m/s.asp?HB16244124889X4152973X503473

The domain 'm0.net' is owned by Digital Impact in San Mateo. There is no way
on the face of it to know that this is legitimate. For some reason they
don't think it's a problem. The risk, of course, is that users won't be able
to recognize a phishing attempt by the URL.

------------------------------

Date: 2 Jun 2004 (LAST-MODIFIED)
From: RISKS-request@private
Subject: Abridged info on RISKS (comp.risks)

 The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.  To subscribe or unsubscribe via
 e-mail to mailman your FROM: address, send a message to
   risks-request@private
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit the process by sending directly to either
   risks-subscribe@private or risks-unsubscribe@private
 depending on which action is to be taken.
 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

   INFO     [for unabridged version of RISKS information]
 .UK users should contact <Lindsay.Marshall@private>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> The INFO file (submissions, default disclaimers, archive sites,
 copyright policy, PRIVACY digests, etc.) is also obtainable from
   <http://www.CSL.sri.com/risksinfo.html>
 The full info file may appear now and then in future issues.  *** All
 contributors are assumed to have read the full info file for guidelines. ***
=> SUBMISSIONS: to risks@private with meaningful SUBJECT: line.
 *** NOTE: Including the string "notsp" at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.
=> ARCHIVES: ftp://ftp.sri.com/risks [subdirectory i for earlier volume i]
 <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive
 http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
   Lindsay has also added to the Newcastle catless site a palmtop version
   of the most recent RISKS issue and a WAP version that works for many but
   not all telephones: http://catless.ncl.ac.uk/w/r
 <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    <http://www.csl.sri.com/illustrative.html> for browsing,
    <http://www.csl.sri.com/illustrative.pdf> or .ps for printing

------------------------------

End of RISKS-FORUM Digest 23.58
************************



This archive was generated by hypermail 2.1.3 : Fri Jan 28 2005 - 10:23:57 PST