RISKS-LIST: Risks-Forum Digest Thursday 21 December 2006 Volume 24 : Issue 52 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/24.52.html> The current issue can be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: [Happy Holidays!] Report blames Denver election woes on flawed software (PGN) Digital cameras converted to weapons (Mark Brader) Secure Passports and IT Problems (Diomidis Spinellis) RFIDs in Malaysian license plates (PGN) An Ominous Milestone: 100 Million Data Leaks (ACM TechNews) Risks of using spelunker's tools inside the genome (Denise Caruso) Re: Yet another canceled public sector IT project (Steve Taylor, Richard Karpinski) Re: Flat train wheels (Olivier MJ Crepin-Leblond) Re: Trig error checking (Mike Martin, Richard A. O'Keefe, Dik Winter, PGN) USENIX Annual Tech '07 Call for Papers (Lionel Garth Jones) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Fri, 15 Dec 2006 10:30:17 PST From: "Peter G. Neumann" <neumann@private> Subject: Report blames Denver election woes on flawed software [Thanks to Gene Spafford for spotting this one.] November 2006 Election Day problems in Denver were attributed to flawed ePollBook software from Sequoia Voting Systems ("decidedly subprofessional architecture and construction"). A consultants' report said "The ePollBook is a poorly designed and fundamentally flawed application that demonstrates little familiarity with basic tenets of Web development." Local election officials were also slammed for their "casual approach" to important technology. Source: Todd Weiss, *ComputerWorld*, 13 Dec 2006 http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9006038 ------------------------------ Date: Tue, 12 Dec 2006 17:29:25 -0500 (EST) From: msb@private (Mark Brader) Subject: Digital cameras converted to weapons One of the quotes in my signature collection reads: "Every new technology carries with it an opportunity to invent a new crime." That was Laurence Urgenson (an assistant chief US attorney), speaking in 1987 about the first arrests for what was later called cellphone cloning. Well, here's another example of criminal technological improvisation: electric shock weapons, like a Taser, produced by teenagers from disposable digital cameras! http://www.cbc.ca/canada/edmonton/story/2006/12/12/teens-cameras.html Mark Brader, Toronto, msb@private ------------------------------ Date: Wed, 13 Dec 2006 13:12:38 +0200 From: Diomidis Spinellis <dds@private> Subject: Secure Passports and IT Problems In 2003 Greece, in response to new international requirements for secure travel documents, revised the application process and contents of its passports. From January 1st 2006 passports are no longer issued by the prefectures, but by the police, and from August 26th passports include an RFID chip. The new process has been fraught with problems; many of these difficulties stem from the IT system used for issuing the passports. On December 12th, the Greek Ombudsman (human rights section) issued a special 22-page report on the problems of the new passport issuing process. The report is based on 43 official citizen complaints. In the report's introduction the Ombudsman stresses the sinister symbolism of transferring the authority for issuing passports to the police - a body organized under quasi-military principles: international travel has nowadays become mainly a security issue. The Ombudsman details many procedural problems of the new process. At least three of them appear to be related to the new IT system handling the passport application. 1. The system used can't handle the correct entry of some names, apparently because it doesn't support some characters or symbols, like the hyphen. 2. If a passport application is rejected, and the citizen subsequently appeals successfully against that decision, the IT system doesn't offer a way to resubmit the original application; a new application has to be completed and submitted. 3. The passport IT system appears to have been linked against databases containing the details of wanted persons, such as fugitives and those with pending penalties. Thus persons appearing in the wanted person database get arrested when they go to a police station to apply for a passport. According to the Ombudsman, this is problematic for two reasons. First, the data in the wanted person file may be wrong. Second, through this procedure the police performs a blanket screening of all citizens that wish to exercise their right to travel outside the country. Paradoxically, one other database, that listing persons actually prohibited to leave the country, is not consulted when the application is filed. In sum the Ombudsman finds that the new system of issuing passports emphasizes the security of the travel documents at the expense of citizens' rights, decent governance, and efficiency. The report also contains recommendations for minimizing the effects of the current seasonal rush, which has resulted in queues forming at 3:30 in the morning. The Ombudsman recommends a system for setting up appointments by phone and the addition of seasonal staff. However, an obvious way of streamlining the process is overlooked. Currently citizens fill-in data entry application forms. Police officers then enter the details from the forms into the IT system; typically at a snail's pace, because most of them can't touch-type. The whole process can easily last 15-20 minutes for a single application. Allowing the citizens to complete the forms on-line, would allow the police officers to print the forms from a reference number supplied by the applicant, and have them signed in person. This would speed up many of the applications and would also eliminate transcription errors. Diomidis Spinellis - Athens University of Economics and Business http://www.dmst.aueb.gr/dds ------------------------------ Date: Sat, 9 Dec 2006 12:55:02 -0500 From: Peter G Neumann <neumann@private> Subject: RFIDs in Malaysian license plates [Thanks to Marc Rotenberg for this one.] Malaysia to embed car license plates with microchips to combat theft The Associated Press, 8 Dec 2006 http://www.iht.com/articles/ap/2006/12/09/asia/AS_GEN_Malaysia_Car_Thefts.php Malaysia's government, hoping to thwart car thieves, will embed license plates with microchips containing information about the vehicle and its owner, a news report said Saturday. With the chips in use, officials can scan cars at roadblocks and identify stolen vehicles, the *New Straits Times* reported. The "e-plate" chip system is the latest strategy to prevent car thieves from getting away with their crimes by merely changing the plates, the report said. (Nearly 30 cars -- mostly luxury vehicles -- are stolen every day in Malaysia.) ... The microchips, using radio frequency identification technology, will be fixed into the number plates and can transmit data at a range of up to 100 meters (yards), and will have a battery life of 10 years. ------------------------------ Date: Mon, 18 Dec 2006 14:05:25 -0500 From: TechNews <technews@private> Subject: An Ominous Milestone: 100 Million Data Leaks *Wired News* senior editor Kevin Poulsen announced on his blog last Thursday that with announcements from UCLA (800,000 records stolen), Aetna (130,000 records stolen) and Boeing (320,000 records stolen), over 100 million records had been stolen since the ChoicePoint breach almost two years ago. While perpetrators of the Aetna and Boeing laptop thefts were probably not after personal records, the same cannot be said for the UCLA data theft, where a hacker had been accessing the university's database of personal information for over a year before being discovered. A Public Policy Institute study, using data from the Identity Theft Resource Center, showed that of the 90 million records stolen between 1 Jan 2005, and 26 Mar 2006, 43 percent were at educational institutions. ... ------------------------------ Date: Wed, 20 Dec 2006 10:47:40 -0800 From: Denise Caruso <caruso@private> Subject: Risks of using spelunker's tools inside the genome I just published a book called 'Intervention: Confronting the Real Risks of Genetic Engineering and Life on a Biotech Planet.' (Details at http://hybridvigor.org/intervention.) It focuses on the flaws in risk assessment methods for innovations in science and technology, specifically the scientific uncertainties that biotech risk evaluations dismiss or ignore. While a lot of the issues are pretty much straight-up biology and public-policy atrocities, there are several technical foibles in the brave new world of industrial genomics that are in serious need of some attention. I ended up cutting most of them out of the book because of excessive nerditude from the layperson's perspective, but I thought RISKS folk might find them interesting. 1. 95 percent of the gene-disease links that make headlines every time they're reported (i.e., the gene for diabetes, Alzheimer's, obesity, schizophrenia, depression, and many others) are false positives, attributed to the speed and efficiency with which new equipment can automatically sequence and analyze genes. Since "reading" genes can take about a day now instead of several months, thousands of them at a time can be scanned quickly. But because the sequences are analyzed in bulk and quickly, some of them by chance alone seem linked to a disease in a statistically significant way even though they aren't. 2. There are no standards for PCR equipment, the machines that can synthetically "amplify" or reproduce a single DNA sequence into a few bazillion identical sequences. It's so key to research that it's been called the "duct tape" of genomics. Virtually every genetics experiment uses PCR. But PCR is ultrahypersensitive, a situation that's exacerbated by way the equipment itself performs. It's not just that results of DNA measurements from experiments performed on different PCR platforms are not necessarily comparable. One NIST staffer says that results may not be repeatable *even with the same equipment.* 3. For another lab workhorse, the "gene chip," the problem seems simply to be that it isn't sensitive enough. Gene chips are based on a different, far less sensitive technology than PCR called hybridization. Hybridization is like having 20-20 tunnel vision -- it does great within its limited range, but it can detect absolutely nothing outside it. What gene chips can produce is a false negative result. False negatives in other kinds of tests would indicate that test subjects don't have HIV, when they do. Or that anthrax DNA isn't present on the envelope in the Senate mailroom, when in fact it is. In the context of risk and in the most obvious example -- genetic contamination -- the ability to detect a specific DNA or RNA sequence, or to be able to notice that a certain gene is not being expressed, would be a key element in determining whether or not there's cause for alarm. With so many different points in the scientific process where the tools themselves can introduce fundamental errors in the data, it doesn't seem out of the question to ask what research results might be overlooking, mistaking for something else, or simply not seeing at all. I'd like to see this whole area broken wide open. In my opinion, we are messing around with the fundamental building blocks of living organisms using tools that look very sophisticated, but seem to me more like the equivalent of a spelunker's lamp and a pick and shovel. Denise Caruso, Executive Director, The Hybrid Vigor Institute http://hybridvigor.org Blog: http://hybridvigor.net [We have long been concerned here with the risks of overendowing risk assessment techniques -- and especially quantitative approaches -- along with the risks of misusing the results of such analyses. Although Denise's book might seem to be less computer related than many other topics discussed in RISKS, I think there are many problems and lessons to be learned from what we have in common. It is important for everyone to see that these problems are generic and relevant to essentially all technologies, not just computer systems. PGN] ------------------------------ Date: Mon, 18 Dec 2006 15:45:21 -0000 From: "Steve Taylor" <steve.taylor@private> Subject: Re: Yet another canceled public sector IT project (R-24.49) The commentary on this item so far has been quite interesting and I believe does address a key reason for why so many public projects fail. Unfortunately, here in the UK at least and I suspect elsewhere as well, there are serious problems with public projects using incremental development. The UK OGC (Office of Government Commerce) has been promoting "stronger" contracts between government and suppliers. These have now become quite onerous and they create a situation where the whole project is managed in a legalistic way. This results in both sides focusing very strongly on the original requirements as specified at time of contract. The incorporation of changes is seen by both sides as an opportunity for the supplier to make some real money and as such is subject to a rigorous and expensive change management procedure. The overall effect is to act as a brake on any change preventing all but the most important changes taking place. The end result is all too easy to predict and the trend is in completely the opposite direction to those being suggested. The only way out of this mess is for government and their suppliers to find a more cooperative model for operating these projects. I strongly believe incremental development is the way to go and it would be sensible for suppliers to use it but in all too many cases there is insufficient flexibility in the requirements. The suppliers best interests are served by doing what they agreed to do rather than something that will work. Even where a supplier is willing to be helpful the purchasing body will often make the administrative cost of supplier suggested changes so high that none are suggested. ------------------------------ Date: Sat, 16 Dec 2006 15:42:13 -0800 From: Richard Karpinski <dick@private> Subject: Re: Yet another canceled public sector IT project (Ganssle, R-24.49) Management needs to learn more about projects so they don't fall into that trap. They can't get and don't need a price, and if they believe in one that they are given, then they should immediately resign as they have already demonstrated their incompetence. All they need to know is that the initial budget is affordable and that the initial steps of the project will probably deliver results whose value is likely to exceed the costs. There is certainly some attraction to the notion that the whole project can be understood and guaranteed before any budget is allocated, but it is completely obvious that such notions are unrealistic and misleading. Management needs to manage, not only at the start of the project, but at many other times before the project completion date is reached. > Management needs a date, up front, to know if the product will hit the > market window. We can waffle and promise to deliver a range of dates and > costs, or we can protest mightily that such expectations are unreasonable. I protest mightily. Even if they get a date, they cannot realistically believe it. Even if they could believe it, they cannot be assured that the market window will appear at the scheduled time. Fixing the product definition, cost, and timing all in advance of the beginning of the project is manifest foolishness. Give engineering a chance to work, a chance to trade off one detail against another to maximize the value delivered to stakeholders. This does make the resulting product less clear at the start of the project, but it IS less clear than the advocates would have you believe. This is to say, the reality is more unknowable than the advocates aver. Skepticism is a required feature of good management practices. When a proposal claims that a two or three year project can be accurately and adequately defined and implemented with a knowable budget and that the result will have a knowable value when it is delivered, years in the future, the only proper management response is to laugh that proposal out of the room. > Yet if the project is late, so there's no revenue being generated, and as > a result our paycheck is a dollar short or a day late, we go ballistic. If that were the only reason for no revenue being generated, this world would be very much easier to understand and deal with. In fact the major reason that no revenue is generated is that the project designers did not plan for any revenue to be generated until the project is completed and all the money spent. Many projects are not intended to produce a product to be marketed and then ignored. In these cases, usable deliveries of improvements can generate revenue, or value, long, long before the completion of the entire project. Neglecting this fact is failing to accomplish the due diligence aspect of management. I suspect that many customers who recognize the need for a product to accomplish X will be only too happy to PAY for a product which does only a portion of the whole task, if it will be improved monthly or quarterly as guided by customer feedback. This notion needs some testing and validation, but several recent works stress the value of carrying on a two way conversation with your customers. See "The Clue Train Manifesto" for example. > Alas, I fear this conundrum will never be resolved. Probably true, but that does not mean it cannot be addressed and managed to accomplish substantial improvements in project management and substantial reduction of the risks involved. Such gains require non-traditional approaches but they do not require silver bullets or magic or slavish adherence to some particular method. They only require open minds, brave hearts, skepticism, and common sense. Would we had more of those. Richard Karpinski, 148 Sequoia Circle, Santa Rosa, CA 95401 dick@private +1 707-546-6760 "nitpicker" in subject line gets past my spam filters. ------------------------------ Date: Sun, 17 Dec 2006 00:27:41 +0100 From: "Olivier MJ Crepin-Leblond" <ocl@private> Subject: Re: Flat train wheels (Ladkin, RISKS-24.51) > In Fall, in areas with deciduous trees, a slippery film deriving > from mulched fallen leaves can build up on rails. More than this, it is a mulch that develops on the wheels themselves that make them slip. The problem appeared in the UK on most new trains which had "new" (at the time) breaking systems consisting of disc brakes, or pads rubbing the *side* of the wheel. British Rail engineers found that the problem was less likely on older trains where the brake pads would be applied to the rolling surface of the wheel itself (the circumference), thus scrubbing the rolling surface clean of all the mulch every time the brakes were applied. Definitely a case where new technology is introducing new problems. Olivier MJ Crepin-Leblond, Ph.D. <ocl@private> Tel:+44 (0)7956 84 1113 [This leaves mulch to be desired. PGN] ------------------------------ Date: Mon, 18 Dec 2006 21:27:26 +1100 From: "mike martin" <mke.martn@private> Subject: Re: Trig error checking (Ewing, RISKS-24.51 Martin Ewing wrote of a VAX floating point unit that exhibited intermittent faults (RISKS-24.51 <http://catless.ncl.ac.uk/Risks/24.51.html>). Computers' arithmetic-logic units ((ALUs) don't seem well protected against intermittent faults. In the early 1970s I worked with a Burroughs B6700 computer that occasionally, when compiling a copy of its operating system, failed the computation with a spurious fault. (The core operating system was written in an Algol dialect and took about 20 minutes to compile.) After much investigation we found that the cause was an occasional bit dropped by the RDIV operator (which calculated the remainder from an integer division). This rarely used operator was used by the operating system in calculating disk segment addresses in the computer's virtual memory paging file. When a bit was dropped in the segment address, the compiler would be fed a chunk of garbage from the wrong page file segment and flag a syntax error. After some detective work I wrote a program that did repeated RDIVs and checked the results, highlighting the problem. The fault was rare, less than once in 1000. Had the problem occurred with a more commonly used operator the result could have been nasty. Perhaps ironically this was one of the first B6700s that was delivered with main memory that included Hamming code single bit error correction and double bit error detection. But nothing detected a faulty ALU. Mike Martin mke.martn@private Sydney ------------------------------ Date: Tue, 19 Dec 2006 14:01:56 +1300 (NZDT) From: "Richard A. O'Keefe" <ok@private> Subject: Re: Trig error checking (Ewing, RISKS-24.51) I used to work at Quintus, who then made a Prolog compiler. We were keen to get our product in the catalogues of various computer vendors. One such vendor had a policy of thoroughly testing programs before accepting them into their catalogue. So one fine day a bug report from them landed on my desk: such-and-such a trig function was delivering answers that were slightly off. That's odd, I thought: I wrote that code and it just calls their code through the foreign interface, I wonder what happens if I call that from C? You guessed it: the bug was in their code. They were testing other people's code much more thoroughly than their own. ------------------------------ Date: Sun, 17 Dec 2006 03:33:54 +0100 (MET) From: Dik.Winter@private Subject: Re: Trig error checking (Ewing, RISKS-24.51) Mark Ewing: > Eventually we found that our > VAX floating point unit (a very large circuit board) was malfunctioning. It > gave slightly wrong results, but quietly - there were no system error > reports. The diagnostic was that sin**2 + cos**2 was intermittently not > quite equal to 1 for various arguments. [NOTE: This is a positive example > of circular reasoning! PGN] Indeed. Even with an optimal implementation of sin and cos it is not necessarily the case that sin**2 + cos**2 equals 1. It is likely, but not necessary. Consider an angle of 45 degrees. In IEEE single precision the best approximation to sqrt(2)/2 is (in binary): 0.101101010000010011110010 the square of that is (with proper rounding): 0.100000000000000000000001 not really equal to 1/2, and I think that similar examples can be created using radian arguments. This one also does not work in IEEE double precision. (And if you want to check with a program, be sure that after each individual operation the result is rounded to the precision you operate with and that you do use that rounded result. Otherwise you will see discussions I have had already a long time ago about another problem with floating-point arithmetic.) There is a lot of relevance here. Assuming that mathematical relations also hold when doing floating-point arithmetic on computers can lead to errors. There is a whole field of mathematics devoted to just this (numerical mathematics). > Field service got us new boards, but how could we have confidence this bug > was not recurring? In the end we ran a background routine that checked > sin**2 + cos**2 forever. (Today, we would make it a screensaver program.) I do not think you checked for the whole range, otherwise you would have found errors forever. > There is a RISKS issue -- how do you know your CPU is giving good results? > There aren't any check bits for trig functions. Trust. Already quite some time ago (1970?) Cody and Waite wrote a book that contained programs that would check the basic elementary functions. There also does exist an elementary program that checks the basic arithmetic of computers (from memory, "elefun" by Kahan). But even these did not help with the Pentium bug. And, of course, some basic knowledge about numerical mathematics. dik t. winter, cwi, kruislaan 413, 1098 sj amsterdam, nederland, +31205924131 home: bovenover 215, 1025 jn amsterdam, nederland; http://www.cwi.nl/~dik/ ------------------------------ Date: Thu, 21 Dec 2006 12:01:27 PST From: RISKS List Owner <risko@private> Subject: Re: Trig error checking (Ewing, RISKS-24.52) Of course, an incorrect cos(x) could have been computed from an incorrect sin(x) as _______________ / 2 V 1 - [sin(x)] in which case the sum of the squares would be IDENTICALLY 1, modulo roundoff errors. So that check is NOT ENOUGH. [Incidentally, I put a correction to Martin's note in RISKS-24.51, changing "1990s" to "1980s" on the date of the VAX episode. PGN] ------------------------------ Date: Thu, 21 Dec 2006 10:58:20 -0800 From: Lionel Garth Jones <lgj@private> Subject: USENIX Annual Tech '07 Call for Papers Call for Papers 2007 USENIX Annual Technical Conference June 17-22, 2006, Santa Clara, CA Paper Submissions Deadline: January 9, 2007 http://www.usenix.org/usenix07/cfpa/ On behalf of the 2007 USENIX Annual Technical Conference program committee, we request your ideas, proposals, and papers for tutorials, refereed papers, and a poster session. The program committee invites you to submit original and innovative papers to the Refereed Papers Track of the 2007 USENIX Annual Technical Conference. Authors are required to submit full papers by 11:59 p.m. PST, Tuesday, January 9, 2007. We seek high-quality submissions that further the knowledge and understanding of modern computing systems, with an emphasis on practical implementations and experimental results. We encourage papers that break new ground or present insightful results based on experience with computer systems. The USENIX conference has a broad scope. Specific topics of interest include but are not limited to: * Architectural interaction * Benchmarking * Deployment experience * Distributed and parallel systems * Embedded systems * Energy/power management * File and storage systems * Networking and network services * Operating systems * Reliability, availability, and scalability * Security, privacy, and trust * System and network management * Usage studies and workload characterization * Virtualization * Web technology * Wireless and mobile systems More information on these and other submission guidelines is available on our Web site: http://www.usenix.org/usenix07/cfpa/ IMPORTANT DATES: Paper submissions due: Tuesday, January 9, 2007, 11:59 p.m. PST Notification to authors: Monday, March 19, 2007 Final papers due: Tuesday, April 24, 2007 Please note that January 9 is a hard deadline; no extensions will be given. We look forward to your submissions. On behalf of the Annual Tech '07 Conference Organizers, Jeff Chase, Duke University Srinivasan Seshan, Carnegie Mellon University 2007 USENIX Annual Technical Conference Program Co-Chairs usenix07chairs@private ------------------------------ Date: 2 Oct 2005 (LAST-MODIFIED) From: RISKS-request@private Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest, with Usenet equivalent comp.risks. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. The mailman web interface can be used directly to subscribe and unsubscribe: http://lists.csl.sri.com/mailman/listinfo/risks Alternatively, to subscribe or unsubscribe via e-mail to mailman your FROM: address, send a message to risks-request@private containing only the one-word text subscribe or unsubscribe. You may also specify a different receiving address: subscribe address= ... . You may short-circuit that process by sending directly to either risks-subscribe@private or risks-unsubscribe@private depending on which action is to be taken. Subscription and unsubscription requests require that you reply to a confirmation message sent to the subscribing mail address. Instructions are included in the confirmation message. Each issue of RISKS that you receive contains information on how to post, unsubscribe, etc. => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> The full info file may appear now and then in RISKS issues. *** Contributors are assumed to have read the full info file for guidelines. => .UK users should contact <Lindsay.Marshall@private>. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you NEVER send mail! => SUBMISSIONS: to risks@private with meaningful SUBJECT: line. *** NOTE: Including the string "notsp" at the beginning or end of the subject *** line will be very helpful in separating real contributions from spam. *** This attention-string may change, so watch this space now and then. => ARCHIVES: ftp://ftp.sri.com/risks [subdirectory i for earlier volume i] <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue. Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r <http://the.wiretapped.net/security/info/textfiles/risks-digest/> . ==> PGN's comprehensive historical Illustrative Risks summary of one liners: <http://www.csl.sri.com/illustrative.html> for browsing, <http://www.csl.sri.com/illustrative.pdf> or .ps for printing ------------------------------ End of RISKS-FORUM Digest 24.52 ************************
This archive was generated by hypermail 2.1.3 : Thu Dec 21 2006 - 15:17:14 PST