RISKS-LIST: Risks-Forum Digest Monday 11 June 2007 Volume 24 : Issue 68 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/24.68.html> The current issue can be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: US Flight Service Privatization system problems (Don Poitras) FDA issues Class I recall for an algorithm (Richard Cook) New Hampshire federal judge overrules privacy law (Ethan Ackerman) IT industry has failed in desktop security (Munir Kotadia via PGN) Belgian biometric passport (Jean-Jacques Quisquater) Flawed Symantec update cripples Chinese PCs (PGN) Facebook doesn't allow friends born before 1910 (Henry Baker) Royal Bank of Scotland total failure of cash access systems (PGN) Keyloggers used to steal city funds (Rick Damiani) Want to Write a Virus? Take a Class (Erik Larkin via George Ledin) Windows' ATMs (Mark Barnabas Luntzel) Round Up, Round Down, or How one cent became a profitable event (Leon Kuunders) Re: UK judge: "What's a website?" (Rob Slade) Re: Broken Microsoft + Daylight saving (Len Spyker) Engaging Privacy and Information Technology in a Digital Age (Jim Horning) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Thu, 24 May 2007 08:36:48 -0400 (EDT) From: Don Poitras <poitras@private> Subject: US Flight Service Privatization system problems Lockheed Martin has been converting Flight Service Stations (FSSs) to use new software and digital interfaces to FAA computers since it won the contract to run the stations in 2005. Part of the contract were guarantees that certain response times were achieved. Phone calls were to be answered in 20 seconds, radio calls answered with 5 seconds and flight plans filed within 3 minutes. With the start of fair-weather flying by the majority of US private pilots this spring, the system has come under stress and response times have been abysmal, flight plans have been dropped and weather briefings have been conducted by briefers with no local knowledge of weather conditions. CONTROLS OVER THE FEDERAL AVIATION ADMINISTRATION'S CONVERSION OF FLIGHT SERVICE STATIONS CONTRACT OPERATIONS <http://www.oig.dot.gov/item.jsp?id=2051> "Several FAA officials indicated that the use of call off-loading has increased significantly since the contract was put in place. In some cases, we found multiple facilities that had to adjust their operations in order to cover off-loaded calls from short-staffed facilities, which created a cascading effect across the country." and: "FS-21 requires digital capabilities and, per terms of the contract, must interface with FAA's Telecommunications Infrastructure Network. To meet this requirement, FAA plans on installing digital connections between the Lockheed Martin hub facilities and the closing and continuing flight service stations. While FAA has begun installing the digital connections, one FAA official noted that, based on the current schedule, there are only about 75 days between when the digital connections are installed and when operations at closing and continuing flight service stations are cut over. Given the tight timeframe, any delays or problems with the installation of these connections could hamper testing and operation of FS-21, possibly delaying the transition and increasing contractual costs." AOPA's (Aircraft Owners and Pilots Association) Phil Boyer had this to say: "In short, the FS21 (twenty-first century) system is in crisis and failing pilots. Based on the hundreds of complaints that AOPA has received in the past month, it is clear that the technical and operational problems plaguing FS21 are now affecting safety," said AOPA President Phil Boyer in a letter to FAA Administrator Marion Blakey. "The FAA and Lockheed Martin must immediately address the problems and implement a plan to bridge the service gap and provide critical FSS safety of flight services." There are several safety issues. If the automated system ends up sending you to a weather briefer in another state, he might not be aware of local conditions, e.g., wind coming over a local mountain might produce severe turbulence, but he wouldn't know that and wouldn't have any reason to mention it. A more serious safety risk is just that pilots my avoid getting pre- flight briefings altogether because they can't get through. Personally, (and the reason I'm making this post) I was trying to get an IFR clearance and ended up getting bounced around the system and ended up with a briefer in Macon, GA (I'm in Raleigh, NC). He had to fumble through what was obviously a labor intensive effort to get the call switched to Raleigh. While talking to Raleigh, the call disconnected. As I was going through this, the plane behind me was doing the same thing. After about ten minutes he says to me (via the radio), "I'm on hold, the ASOS (automated local weather recording) says 1500 feet, so I'm going VFR." I ended up doing the same thing. Leaving VFR in marginal conditions means that ATC will not be providing IFR separation services. They don't even know you've left until you call them up. Well, they might see your VFR transponder code, but they won't have any idea where you're going. ------------------------------ Date: Wed, 06 Jun 2007 06:59:20 -0500 From: Richard Cook <ri-cook@private> Subject: FDA issues Class I recall for an algorithm > Date: Tue, 5 Jun 2007 13:01:43 -0400 > From: CDER MEDWATCH LISTSERV <MEDWATCHLIST@private> > Subject: FDA - MedWatch- Alcon Refractive Horizons LADAR6000 Excimer > Laser System Class I Recall Because The Algorithm For Myopia With and > Without Astigmatism Caused Cornea Abnormalities > > MedWatch - The FDA Safety Information and Adverse Event Reporting Program > > Alcon Refractive Horizons and FDA notified healthcare professionals and > patients of a Class I Recall of the LADAR6000 Excimer Laser System for > CustomCornea algorithm for myopia with astigmatism (M3) and myopia > without astigmatism (A7). This system is used for LASIK and wave-front > guided LASIK treatment for the reduction or elimination of mild to > moderate nearsightedness (myopia) and farsightedness (hyperopia) with or > without astigmatism or for mixed astigmatism in patients who are 21 > years of age or older with documented stability of refraction for the > prior 12 months. The product was recalled because use of the Alcon > Refractive Horizons CustomCornea algorithm for myopia with and without > astigmatism with the LADAR6000 Excimer Laser caused corneal > abnormalities ("central islands") and decreased visual sharpness (visual > acuity) in patients with myopia with and without astigmatism. These > "central islands" may not be correctable with lasers and the decrease in > visual acuity may not be correctable with glasses or contact lenses. > Patients with questions should call the company at 1-877-523-2784. > > Read the complete 2007 Safety Summary, including a link to the FDA > Recall Notice regarding this issue at: > > http://www.fda.gov/medwatch/safety/2007/safety07.htm#LADAR6000 Recalling an algorithm is a relatively new phenomenon. Devices such as infusion pumps typically have firmware and software that is integral to the device. Complex devices such as LASIK systems allow the operator to select amongst multiple functions using different algorithms. In February of this year, Alcon told customers to stop using two algorithms (M3 and A7) and went on to 'deactivate' these algorithms in U.S. devices. A Class I recall is for "dangerous or defective products that predictably could cause serious health problems or death. Examples of products that could fall into this category are a food found to contain botulinal toxin, food with undeclared allergens, a label mix-up on a life saving drug, or a defective artificial heart valve." Richard I. Cook, MD, University of Chicago, Anesthesia and Critical Care, Chicago IL 60637 1-773-702-4890 http://www.ctlab.org/Cook.cfm ------------------------------ Date: May 22, 2007 5:30:43 PM EDT From: Ethan Ackerman <eackerma@private> Subject: New Hampshire federal judge overrules privacy law 1st Amendment protects reselling medical records. [via Dave Farber's IP] The New Hampshire Legislature recently enacted a law that bars pharmacies, insurance companies, and similar entities from transferring or using both patient-identifiable data and prescriber-identifiable data for certain commercial purposes. The law was enacted to protect patient privacy, prescriber privacy, and to prevent drug industry 'targeting' of doctors who prescribed generics. It was promptly challenged by 2 data-mining companies who buy up prescription records from pharmacies and resell the info to drug manufacturers, and on April 30th was overturned by US District Court Judge Paul Barbadoro. Judge Barbadoro ruled that the data-miners had a 1st Amendment right to resell the prescription records and the State of New Hampshire violated that right in passing this law. http://www.washingtonpost.com/wp-dyn/content/article/2007/05/21/AR2007052101701.html has a "big picture" treatment of the issue which mentions the case. It also looks like the state plans to appeal: http://www.citizen.com/apps/pbcs.dll/article?AID=/20070504/NEWS0201/70504029/-1/CITIZEN [IP Archives: http://v2.listbox.com/member/archive/247/=now] ------------------------------ Date: Fri, 25 May 2007 13:54:55 PDT From: "Peter G. Neumann" <neumann@private> Subject: IT industry has failed in desktop security (Munir Kotadia) The IT industry has failed when it comes to desktop security for all major operating systems. Ivan Krstic, director of security architecture for the One Laptop per Child project, kicked off the AusCert 2007 conference Monday morning with a keynote speech that blasted desktop computer security -- including that of Windows, Linux and Macintosh machines -- because it is based on a 35-year-old premise where software can run with the same privilege as a user. ... One example of such a program, he said, is Minesweeper <http://en.wikipedia.org/wiki/Minesweeper_(computer_game)>, a single-player game that has shipped with virtually all versions of Microsoft Windows. [Source: Munir Kotadia, ZDNet AUStralia, Expert: IT industry has failed in desktop security, *News.com*, 22 May 2007; PGN-ed] http://news.com.com/Expert+IT+industry+has+failed+in+desktop+security/2100-1002_3-6185295.html http://www.zdnet.com.au ------------------------------ Date: Sat, 09 Jun 2007 14:26:55 +0200 From: Jean-Jacques Quisquater <jjq@private> Subject: Belgian biometric passport A research team in cryptography (Gildas Avoine, Kassem Kalach and Jean-Jacques Quisquater) from the Catholic University of Louvain (Louvain-la-Neuve) disclosed serious weaknesses in the Belgian biometric passport, the only type of passport distributed in Belgium since the end of 2004. The work carried out in Louvain-la-Neuve during the course of May 2007 show that Belgian passports issued between end 2004 and July 2006 do not include any security mechanism to protect the personal data embedded in the passport's microchip. Passports issued after July 2006 do benefit from security mechanisms but these ones are flawed. This means that anyone possessing a little electronic reading device, which is easy and cheap to acquire, can steal the passport content while it is still in the pocket of the victim owners and thus without their knowing. Face and signature are among the data at risk. This news is all the more surprising because Karel De Gucht, the Belgian Minister for Foreign Affairs, declared in the Belgian Parliament on 9th January 2007 that the Belgian passport benefited from the security mechanisms advocated by the International Civil Aviation Organization. Skimming (that is, reading remotely these passports without the consent of the holder) is thus very easy and is true for 720.000 passports valid till end 2009 at least, out of all 1.500.000 valid Belgian passports. [Probably gratuitous for most of you but note that Belgian "." = American ","] The risk is evident for the privacy of their holders. From the obtained information such flawed passports are the only ones in the world. More at http://www.dice.ucl.ac.be/crypto/passport/index.html ------------------------------ Date: Thu, 24 May 2007 12:58:05 PDT From: "Peter G. Neumann" <neumann@private> Subject: Flawed Symantec update cripples Chinese PCs [TNX to Keith A Rhodes. PGN] An erroneous Symantec antivirus signature update caused Norton Internet Security 2007 and Norton 360 antivirus software to identify two critical system files (netapi32.dll and lsasrv.dll) as the Backdoor.Haxdoo Trojan in the Simplified Chinese version of Windows XP (with Service Pack 2 and a particular patch), resulting in those files being quarantined. As a result, millions of PCs throughout China were crippled, unable to be rebooted. ``According to Symantec, the problem was caused when Symantec made a change to the automated process used by the company's security response team to detect malicious software.'' [Source: Article by Aaron Tan, CNET News.com; PGN-ed] http://news.com.com/Flawed+Symantec+update+cripples+Chinese+PCs/2100-1002_3-6186271.html?tag=st.ref.goo http://www.cctv.com/program/bizchina/20070524/103599.shtml ------------------------------ Date: Thu, 24 May 2007 14:43:23 -0700 From: Henry Baker <hbaker1@private> Subject: Facebook doesn't allow friends born before 1910 Facebook discriminates against centenarians! You can't get an account unless your birthday is 1910 or later. (Of course, most centenarians won't have the prettiest faces for Facebook, but everything is relative...) [According to Wikipedia, there are 55K centenarians in the US and 25K in Japan, so this is not a small market. I think that the founder of Facebook is about 23 years old, so perhaps he doesn't trust anyone over 100. I've got 40 years before worrying about this, but I don't want to run into a Y2K-type problem with 100+ ages. (Actually, there already is such a problem, as many websites only allow 2 digit ages.) HB] ------------------------------ Date: Sat, 2 Jun 2007 11:58:13 PDT From: "Peter G. Neumann" <neumann@private> Subject: Royal Bank of Scotland total failure of cash access systems The Royal Bank of Scotland (RBS), which also owns NatWest, has apologised after its cashpoint, online, and telephone banking systems all crashed. A spokeswoman said: "We are very sorry, and we're working to sort it out." [Source: BBC, courtesy of Keith Rhodes; PGNed] http://news.bbc.co.uk/nolpda/ukfs_news/hi/newsid_6714000/6714857.stm ------------------------------ Date: Fri, 1 Jun 2007 17:49:37 -0700 From: "Rick Damiani" <rick@private> Subject: Keyloggers used to steal city funds ... ... $450,000.00 in attempted wire transfers, but the city was able to freeze all but $45,000.00. *LA Times* http://www.latimes.com/news/local/la-me-hackers1jun01,1,3026207.story?coll=la-headlines-california Interesting quote: "Avilla said she still doesn't know how her computer was targeted. She said she doubts it had the latest security software patch protections - something sheriff's detectives and bank investigators told her is essential in safeguarding her computer." Two-factor authentication wasn't mentioned, so my guess is that the city's bank doesn't offer it or the city chose not to use it. Rick Damiani, Applications Engineer, The Paton Group California: (310)429-7095 Hawaii: (808)284-3033 ------------------------------ Date: Tue, 22 May 2007 16:10:49 -0700 From: George Ledin <ledin@private> Subject: Want to Write a Virus? Take a Class (Erik Larkin, *PC WORLD*) [Ironically, the story is spreading... like a virus! George] <http://blogs.pcworld.com/staffblog/archives/004452.html> Want to Write a Virus? Take a Class. Erik Larkin, 22 May 2007 A college computer course that teaches students how to write computer viruses is riling up security companies once again, according to a story in a local California paper today. Per the story, a computer science professor [George Ledin] at Sonoma State University in California is teaching the course in order to train his students how to design better defenses. Security companies, on the other hand, have always vigorously decried any attempts to create new malware as automatically unethical, no matter the end goal. And at least three companies are sending Ledin letters saying they will boycott hiring Ledin's students, according to the story. This is an ongoing debate. <http://www.informationweek.com/story/showArticle.jhtml?articleID=10100296> Other colleges have previously taught such classes, and Consumer Reports took major heat when it created new malware to test antivirus software. <http://blog.washingtonpost.com/securityfix/2006/08/antivirus_testing_and_consumer_1.html> So who's right? Is Ledin violating an unwritten Hippocratic oath of computer security? Or is this an important thing to teach, and learn, and test? Personally, I think the genie's out of the bottle. Unlike with biological viruses, it's not hard to create a new piece of malware. You don't need a lab, expensive equipment or even much techie know-how; There has long been software available that allows any aspiring online thug to easily create a new piece of malware. What's more, malware writers are constantly spewing out new variants in an attempt to evade antivirus programs. The recent <http://www.pcworld.com/article/id,130686-page,1/article.html> Storm Worm blast was a great example. So I don't really think it makes us less safe if a few students create new malware in order to learn how they're built. Even if one of them escapes its protected environment, it will be a drop in the bucket compared to the already existing deluge of new virus variants that come out all the time. And such training may help with what's really important: Developing <http://www.pcworld.com/article/id,129883-page,2-c,antivirus/article.html> effective proactive defenses that can block attacks whether they're old or brand new. ------------------------------ Date: Mon, 11 Jun 2007 09:01:00 -0700 From: "Mark Barnabas Luntzel" <mark@private> Subject: Windows' ATMs Here is a Russian ATM with a Windows Product Activation screen: Your Windows product must be activated within 7 days. Do you want to activate Windows now? http://www.geekologie.com/2007/06/11/russian-windows-atm.jpg ------------------------------ Date: Tue, 29 May 2007 09:32:47 +0200 From: Leon Kuunders <leon@private> Subject: Round Up, Round Down, or How one cent became a profitable event One Dutch energy company, Eneco, offers an extra service to other organisations, they act as an collecting agent. My local cable television company Rekam is using that service to have their monthly payments collected. One of the invoices I received recently showed a to-be-collected amount of 5,01. I immediately got triggered by this number: where did this one cent originate from? Quick research showed the cable company charges you with 5,00 for administration costs. Including 19% VAT. When the energy company tried to calculate the costs without VAT they got into a nasty problem: the amount excluding VAT comes down to 4,2016806722 .. etc. Rounded this would be 4,20. When they calculated 19% VAT of 4,20, it equals 0,798. Dutch taxrules require to round down such a number to ... 0,79. This would leave them with a total amount of 4,99. But hey! That wasn't enough! So they decided to round up the amount excluding VAT to 4,21 and then calculate the 19% VAT: 0,7999. Then they decided that this number was close enough to round up to 0,80 (against dutch tax rules ...). The total amount then was 4,21 + 0,80 = 5,01. In a conversation with the general manager of the cable company he ensured me that there was no way around this, and offered to sent me a direct bill of 15,00. Because they had outsourced their billing department they had to increase direct bills with ₁ 10,00 administration costs. ... The risks of this event are as follows: because the energy company automatically debits the accounts of their customers this one cent will automatically be transferred to their account. The cable company does not collect this amount, nor do they pay it to the dutch tax services. So somewhere somebody enjoys these orphaned one cent payments. In the last letter I received from the cable company the general manager told me I could go to court to get this issue resolved. My lawyer has confirmed that that was the best news she had in years. http://leon.kuunders.info M: +31 6411 64 995 F: +31 848 359 359 ------------------------------ Date: Sat, 19 May 2007 17:14:26 -0800 From: Rob Slade <rMslade@private> Subject: Re: UK judge: "What's a website?" (Knowlton, RISKS-24.67) (http://www.thesun.co.uk/article/0,,2-2007220614,00.html) I can't really tell if this is a good thing or a bad. Possibly some of the evidence in regard to identity hangs on who accessed a website (or had ownership of it). In that case I would assume that a solid understanding of the technology would be necessary. A faulty understanding might result in an incorrect decision (as seems to be the situation with the Amero case in the US). Certainly I can have sympathy with another comment in the story: "Later he said he hoped a computer expert would give `simple' evidence when called to the stand -- because otherwise he would not understand it. "Judge Openshaw said: `Will you ask him to keep it simple? We've got to start from basics.'" Being involved in certain aspects of forensics, I recognize that a number of "experts" simply seem to want to be able to give an opinion without being challenged, questioned, or having to explain their reasoning and opinions. (Given the way the story is written, I can easily recognize the risks of admitting that you need help with technical concepts outside your field ...) rslade@private slade@private rslade@private http://victoria.tc.ca/techrev/rms.htm www.syngress.com/catalog/?pid=4150 ------------------------------ Date: Thu, 24 May 2007 13:21:53 +0800 From: "Len Spyker Perth Australia" <lspyker@private> Subject: Re: Broken Microsoft + Daylight saving Dag-Erling Sm=F8rgrav disagrees in RISKS-24.67 to my stating in RISKS-24.66 that fixing the Microsoft RTC design bug would break a few thousand apps. He asserts that as only high level system calls are used and they would see no changes and all would be well. While I agree in principle, reality was different. I recently worked on a 6 months software project involving monitoring many mine sites and ports, in the middle of which our state government introduced daylight saving for the FIRST time ever, on barely 4 week notice. We had the expected breaking of legacy boxes that had no notion of daylight saving, OK. However the biggest surprise was the number of state of the art corporate databases from well known global companies that broke badly. They appeared to contain code fudges to work around the MS ambiguity and other problems I mentioned. Some of these global databases had no sense of a UTC time stamp and used "local" time stamps only! We uncovered a rat's nests of daylight or no daylight savings kludges at every system level by every vendor and applications writers that another $500K barely made a dent in. If you can't trust your OS high level system time calls 100.0% and you have to work around them, then it still doesn't help. ------------------------------ Date: Fri, 25 May 2007 13:03:42 -0700 From: "Jim Horning" <Jim.Horning@private> Subject: Engaging Privacy and Information Technology in a Digital Age This book <http://books.nap.edu/catalog.php?record_id=11896> will, I think, be of interest to many USACM members interested in IT privacy issues as viewed from a variety of perspectives outside our usual computer-oriented view. Now available for pre-order from the National Academies Press, it is the result of a multi-year study committee on Privacy in the Information Age (of which I was a member), sponsored by the Computer Science and Telecommunications Board (CSTB) of the National Research Council (NRC). Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable. The full draft text is available free online <http://books.nap.edu/catalog.php?record_id=11896>, and will be replaced with the final version when it is published. Much credit is due to the editors, Jim Waldo, Herb Lin, and Lynnette Millett for imposing a substantial amount of coherence to disparate contributions from one of the most diverse committees I have ever served on. (I think that both the lawyers and the philosophers outnumbered the three "computerists" on the committee--it was a very broadening experience.) I must confess that I am now much less confident that much privacy can be salvaged than I was when the study was started. <http://virtualbumperstickers.blogspot.com/2006/05/you-have-zero-privacyanywayget-over-it.html> ------------------------------ Date: 2 Oct 2005 (LAST-MODIFIED) From: RISKS-request@private Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest, with Usenet equivalent comp.risks. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. The mailman web interface can be used directly to subscribe and unsubscribe: http://lists.csl.sri.com/mailman/listinfo/risks Alternatively, to subscribe or unsubscribe via e-mail to mailman your FROM: address, send a message to risks-request@private containing only the one-word text subscribe or unsubscribe. You may also specify a different receiving address: subscribe address= ... . You may short-circuit that process by sending directly to either risks-subscribe@private or risks-unsubscribe@private depending on which action is to be taken. Subscription and unsubscription requests require that you reply to a confirmation message sent to the subscribing mail address. Instructions are included in the confirmation message. Each issue of RISKS that you receive contains information on how to post, unsubscribe, etc. => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> The full info file may appear now and then in RISKS issues. *** Contributors are assumed to have read the full info file for guidelines. => .UK users should contact <Lindsay.Marshall@private>. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you NEVER send mail! => SUBMISSIONS: to risks@private with meaningful SUBJECT: line. *** NOTE: Including the string "notsp" at the beginning or end of the subject *** line will be very helpful in separating real contributions from spam. *** This attention-string may change, so watch this space now and then. => ARCHIVES: ftp://ftp.sri.com/risks for current volume or ftp://ftp.sri.com/VL/risks for previous VoLume <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue. Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r <http://the.wiretapped.net/security/info/textfiles/risks-digest/> . ==> PGN's comprehensive historical Illustrative Risks summary of one liners: <http://www.csl.sri.com/illustrative.html> for browsing, <http://www.csl.sri.com/illustrative.pdf> or .ps for printing ------------------------------ End of RISKS-FORUM Digest 24.68 ************************
This archive was generated by hypermail 2.1.3 : Mon Jun 11 2007 - 15:58:45 PDT