Subject: RISKS DIGEST 15.75 REPLY-TO: risks@csl.sri.com RISKS-LIST: RISKS-FORUM Digest Weds 13 April 1994 Volume 15 : Issue 75 FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator ***** See last item for information on RISKS (comp.risks) ***** Contents: [Huge backlog. I've been a grindstone Cowboy and travelling.] E-Mail saves a man's life Risks of powerful computers to the quality of science (Dan Ruderman) Robot mower (Pete Mellor) God Grants Granite Gift to RISKS Punsters (Peter Wayner) The Soft Pork Underbelly of Efficient Markets (Peter Wayner) A creative, HONEST software disclaimer (Neil MacKay) E-mail problems (Andrew W Kowalczyk) Holiday Inn extra key requirements (Lance A. Brown) Fingerprinting & welfare (Mich Kabay) Re: More jail-door openings (Al Stangenberger) WAIS (Peter Wayner) Info on RISKS (comp.risks), contributions, subscriptions, FTP, etc. ---------------------------------------------------------------------- Date: Sat, 2 Apr 94 13:24:39 PST From: "Peter G. Neumann" Subject: E-Mail saves a man's life RISKS is always delighted to find cases in which the benefits of computing technology manifest themselves in a critical way. Here is such a case. Jack Miller, a computer analyst from Paramus NJ, was experiencing severe chest pains and called his doctor, who put him on hold. As his condition worsened to the point that he felt a strange coldness and could barely breathe, he was just barely able to type a piece of E-mail to coworkers: HELP. FEEL SICK. NEED AID. Apparently he had intended to sent it just to a few nearby colleagues, but instead it appeared as an alert message on the screen of each of the 80 people in his department. Some of those who responded were trained in cardiopulmonary resuscitation, and his life was saved. [Source: an AP item in the San Francisco Chronicle, 2 Apr 1994, p.A1.] ------------------------------ Date: Wed, 30 Mar 94 14:54 BST From: dlr1002@cus.cam.ac.uk (Dan Ruderman) Subject: Risks of powerful computers to the quality of science Much of modern-day science relies on computer models for simulation and the testing of various hypotheses. The use of large scale simulations now permeates many fields, from the Monte Carlo algorithms employed by physicists and computer scientists to genetic mutation simulations performed by evolutionary biologists. As computers gain speed and data storage capacity, science's dependence on simulation will only increase. I see two grave risks in this trend. First, the uses I mentioned above both rely heavily on having a "good" random number generator. But it is well known that even the best pseudorandom number algorithms posses large amounts of redundancy (and thus predictability) when viewed in high-dimensional spaces. But this is exactly the regime in which they are mainly used in science to simulate many-body dynamics. The second edition of "Numerical Recipes" discards its previous random number generator for a "better" one. Should all the thousands of simulations which used the first version now be redone? The second potential danger is to the fundamental quality of scientific ideas. How long should you think about a problem before letting the computer take a brute-force crack at it for you? As computers become more powerful the temptation to stop thinking and start coding looms ever more prominently. As a high school computer nerd turned postdoc physics nerd, I am acutely aware of this seduction. One aspect of this problem is that we may not think as hard as we used to. Another may be the predominance of work being on computer simulations rather than basic ideas. Since these simulations generally have many adjustable parameters, the space of possible exploration is huge, and not all of it relevant. This also makes the interpretation of results that much more difficult to grasp, since there is a large number of parameters to visualize. Pedagogically speaking, simulations should be used sparingly either to illustrate an idea or to perform an essential computation which cannot be carried out analytically. A proliferation of mediocre models with many arbitrary parameters can only spell disaster for the industry. Dan Ruderman The Physiological Laboratory Cambridge CB2 3EG England ------------------------------ Date: Sun, 3 Apr 94 03:54:47 BST From: Pete Mellor Subject: Robot mower (designed by Belgians, built by Swedes, driven by no-one) The Daily Mail of 1st April 1994 carried a full-page report (p3) of a new design of mower called the Solar Turtle. This is a little robot that runs around your lawn on wheels, cutting the grass ALL ON ITS OWN! The picture that accompanies the article shows a low-profile object about 3 feet long by 2 feet wide, elliptical in outline, and with its top surface sloping down from about one foot at the front to 6 inches at the back. (I am guessing: the exact dimensions are not given.) It is so light that "it can be carried by a child." It is also (mercifully!) almost completely silent. Its flat upper surface is covered with an array of solar panels which provide it with sufficient power to trundle around even on dull days, and charge its little batteries so that it can keep going if it runs into a shaded patch of garden. Its maximum speed is 1.8 kph (slower in the shade). Three separate electric motors drive its two front wheels and rotating cutting blade. Since it is intended to operate continuously, the grass never gets a chance to grow. Therefore trimmings are very fine, and are simply left on the lawn as a mulch, so that no collector box is required, and it doesn't even require periodic attention from the gardener to empty it. A single machine can look after 2000 sq. ft. of lawn. Price {pounds} 1,500 to 2,000 (still TBA). Manufacturers are Husqvarna of Sweden, and the inventor is Andre Coles (Belgian). So far, it has been demonstrated at the Spring Gardening Fair at Olympia, London. Look out for it next at the Chelsea Flower Show. It will probably go on sale next year. (British outlet: Husqvarna Forest and Garden.) Risks? Well, what if it a) cuts your toe off, b) mows your prize dahlias, c) gets stuck, or d) gets nicked? This is where the relevance of all this to the RISKS forum becomes apparent. For the Turtle is controlled by (you've guessed it, folks!) "an on-board computer [which] analyses conditions 500 times a second, enabling it to adapt to the amount of light, humidity and temperature, and to negotiate slopes and particularly overgrown patches." a) Safety (1): If it hits anything (tree, chair, foot) "a shock detector stops it in its tracks". The picture shows a sort of white band around the front edge, which is presumably a collision sensor. Since it moves "backwards and forwards a few feet at a time", it presumably has a similar sensor at the rear. Its sensor seems to be a few inches off the ground. Could it give a sleeping cat a short back and sides? b) Safety (2): It will not operate outside an area delimited by a buried "boundary cable". An "electronic sensor" detects the cable, and "tells it to turn back". The article does not go into this, but (IMHO) this is a serious marketing weakness. The photo shows the Turtle standing proudly in the foreground with a smiling and highly photogenic young lady (who obviously never got her hands dirty with a bit of weeding in her life!) lolling in a deck-chair in the background. The scenery includes (as well as the happy Turtle user) about 50 acres of garden containing a lake, irregular patches of shrubbery, occasional trees, and artistically arranged lumps of rock. Even assuming the Turtle can negotiate the rocks, shrubs and trees without help, burying a boundary cable around that little lot must be a major logistical exercise. c) Reliability: This must depend on precisely how intelligent its program is. It can't simply stop when it hits a tree, so what does it do? Back up and charge again? Try a random turn? What happens if it hits your foot, and you then move out of the way? You can bet that even if you have more sense than to get in its way, your kids will have hours of fun trying to convince it that they are a tree! If it maintains a database of the terrain, this could seriously blow its tiny mind! :-) On the other hand, it must somehow avoid mowing the same little patch over and over again. Does it remember where it's been? (Software Engineering coursework assignment: "Design an algorithm using a pseudo-random number generator to ensure that a Turtle covers the whole of a piece of lawn 2,000 sq. ft. in area in a given time irrespective of the shape of the perimeter or the presence of interior obstructions." - That should keep the students busy! :-) d) Security: If the Turtle is picked up, "a loud alarm goes off ... and is turned off only when an individual code is punched in. And it cannot operate outside the electronic boundary." ("I say, Alice! What's the code for this ****** Turtle? I can't turn the frigging alarm off!") Also, if it's *carried* outside the boundary cable, how does it detect this? Mmmm ... After all that, risks to the public? Err ... getting fat through not having to mow the lawn? :-) [There is a disclaimer in the Mail article which states that this is NOT an April Fool joke! :-) ] Peter Mellor, Centre for Software Reliability, City University, Northampton Sq. London EC1V 0HB +44 (71) 477-8422, p.mellor@csr.city.ac.uk ------------------------------ Date: Tue, 5 Apr 1994 15:25:20 -0400 From: pcw@access.digex.net (Peter Wayner) Subject: God Grants Granite Gift to RISKS Punsters The financial pages will be burning up with stories about a relatively small investment fund called "Granite." The fund was set up by "really smart guy" named David Askin to provide "RISK-free" investment in the the mortgage backed securities market. As early as middle March, Askin was pretty sure that his fund was still worth $600 million. Now it may not be worth anything. Poof. In two weeks! How could this happen? Everyone understands how money can disappear in the stockmarket. But, the Granite fund was different. Askin et al. used very sophisticated models to figure out which morgage-backed securities were cheap and which were dear. He would buy the cheap ones and sell out the expensive ones. Eventually, the market would drive the price of the cheap and dear securities together. Then the fund would close out the position and make money based upon the original spread. The great "strength" of plan was that it was supposedly interest-rate neutral. If the rates went up, then both the cheap and the dear securities would lose value in sync. They're both bonds so they tend to lose value as interest rates rise. So any loss in the value of the "cheap" securities that the fund actually bought was offset by a gain the value of the short investment in "dear" securities that fund sold short. The same process would work in reverse if interest rates dropped. The main problem seems to be that no one was willing to buy any mortgage-backed securities as the bond rates went through the roof. The markets just froze. Plus, prices weren't behaving according to the very careful models that he originally created. Bam. Interested parties should check out the various articles in the NYT (April 5, A1), Time magazine (cover), and other sources to find out more details. The message for the comp.risks readers is the same old story of technical hubris that we've grown to love. But it is even better than almost any other case I've read about. People who use computers and mathematics on Wall Street usually have a stronger arrogance than those who use the computers to guide planes, run home security systems, run 911 systems or steer satellites. Why? Derivative securities, like those bought by Granite, are sheer creations of mathematicians. It is very tempting to believe that they're free from real-world problems like wind, noise, pets or other gremlins that keep plenty of engineers up late. I've worked on Wall Street doing these sorts of things. The whole mathematical foundation of the work made things both very fun and very certain. I've always thought that mathematics was a very clubbish pursuit. The proofs were the rites of initiation. Once you made it in you could be sure that you and the other members of this club really did have a superior view of the world. Unlike the all-male, all-female, all-whatever clubs, you had actually _proven_ the truths you held up as self-evident. The mathematicians running these games are probably just as sure. But, when the Bear putsch came to shove and the world tried to get out of the stock market at the same time, all of the mathematical models started breaking down. I can assure you that the people who bought into this fund probably thought that they were buying a sure thing. They had probably worked through the math themselves. There are probably lawyers combing the prospectus hoping that the Granite partners were so sure of themselves that they didn't put the usual disclaimers in the prospectus. At this point, I'm wondering about of the dangers of using mathematics for a guarantee of even things mathematical. The theorem that all maps can be colored with four colors is widely known as the first example of computer-based proofs. Many people don't remember that the theorem was originally considered settled and true back at the turn of the century. People believed the "proof" for several decades. Then someone stumbled upon a loophole and it became famous again. --Peter "I will build my Church/Turing theorem on this Granite" Wayner ------------------------------ Date: Thu, 31 Mar 1994 23:30:20 -0500 From: Peter Wayner Subject: The Soft Pork Underbelly of Efficient Markets The Under Pork Belly of Efficient Markets, or How to Launder Money Using Cattle Futures The great promise of electronic networks and virtual communities is a collection of very efficient markets. In the future, information will be moved, products will be sold and trades will be executed in a blink of an eye. This efficiency is usually considered to be a pretty good thing by everyone in business, in economics or in line at the video store. The underside of this efficiency, though, is a blurring of the line between legitimate and illegitimate business. A good way to understand this effect is to study the case of how to launder money using the futures markets. Laundering money is an age old problem for people who want to move funds from person A to person B without leaving a suspicious trail. Cash is the nieve approach and it has plenty of problems: it is bulky, it can be lost or stolen, and most importantly it often leaves people asking "Hey, where did that come from?" The futures markets, though, make it simple to move funds in a way that is indistinguishable from ordinary commerce. If it is done correctly, the recipiant, person A, looks like a lucky stiff or a market savvy investor. Person B is usually out of the picture or out of luck. The same games can be played with almost any other market, but futures markets are so efficient that the process is actually feasible and easy to do. The basic transaction in futures is to buy or sell a contract for the delivery of x pounds/barrels/tons/feet of some commodity at y dollars/yen/marks etc. If you buy a contract, then you're obligated to actually cough up y dollars when the contract comes due. Most people don't hold on to the contracts long enough for them to actually take delivery. They sell another contract and the futures market maintains a clearing house that is responsible for matching up the contracts and cancelling them out. It's a great system. Very efficient and very useful for farmers, manufacturers and others who actually produce and consume commodities. Futures markets are great for laundering money, though, because they can generate big losses or big gains in a short amount of time. It is quite possible for $100 to turn into a $5000 gain overnight. The downside is that it can often turn into a $5000 loss in the same amount of time. In fact, the market is a zero sum game. If you make n dollars, then there is someone out there who just lost n dollars. The sum total of the losses and the winnings equals zero. This zero sum nature is the key to laundering the money. Person A and Person B get together and guess that the price for a commodity is going to go up. That means that who ever buys a contract will make money. So Person A, the intended recipient buys a contract and Person B sells a contract. If they're right, then Person A gets the money and Person B loses the same amount. Bingo. The money moved from B to A and no one can trace how it got there. Person A looks smart or lucky and Person B looks out of luck. There was no direct connection between the two. There are thousands of other people out there winning and losing money at the same time. The marketplace's central clearing house arranges it so each wins and loses their rightful share. You may wonder why B bothered to sell a contract and lose money. This is the safeguard against guessing wrong. No one is correct all of the time. Even the people who try and rig the markets and corner them get burned as often as they succeed. The best investors in the futures markets, the ones who make money time after time, are the arbitrageurs. They spot inefficient pockets and try and remain neutral to the overall shifts in the market. Person B sells the contract so that if the market goes down, i.e., the wrong way, then A and B together have lost no money. It's a zero sum. Now they just have to play the game a bit longer or for stakes that are twice as high. You can think of the process as flipping a coin until you have encounter a heads. Ideally, you play this game with two players with relatively deep pockets. This means that A can cover the short term loses. This is a bit of a disadvantage because many money laundering operations must move cash from the rich to the poor. You can cover up this problem by using the same broker for A and B. The broker executes the trades and then assigns the winning trade to A and the losing trade to B. They fill in the order books after the fact. Using the same broker for A and B can be problematic because it may look too suspicious if the mirrored trades appear on the same ledger. The beauty of this system is that it can look quite indistinguishable from normal business practices. Many companies actively enter the futures markets to hedge themselves against foreign currency movements. Others actively enter the futures markets to guarantee themselves a good supply of their raw materials. The essential point of this lesson is that fast, efficient markets make it possible to move money easily. The futures markets were designed so that is no real other half to every trade. It's literally you against the world with every trade. The RISKS, of course, is that accountability can vanish as the size of the crowd grows to be as big as the world. There is no way to catch up with this. The futures market are so great because there is no need to deal one on one. The effects of speed are not only apparent in big financial markets. Credit cards and overnight delivery are a dangerous combination. You could steal cards, order a fortune of stuff, arrange for it all to be delivered overnight and then jump town quickly before people notice the card was gone. Suddenly, merchants must deal with the fact that something that used to be complete legitimate (exchanging cash for goods) is now a potential theft. Of course, there are other crimes that lose their edge. It is much harder to escape the law by heading to a new town. Computerized fingerprint files are very, very efficient. I think everyone felt that perfect, computerized markets would bring about the right mixture of accountability and efficiency. It would be a perfect mixture of Big Brotherly scrutiny would take care of everything. Every trade, after all, is recorded in the futures market. Yet, the best mechanism for anonymous fund transfer yet discovered exists here in the midsts of all of this record keeping, legal scrutiny and oversight. ------------------------------ Date: Thu, 31 Mar 94 21:11:41 EST From: Subject: A creative, HONEST software disclaimer To add one more to your creative software disclaimers; I read this one in WIRED magazine issue #2.01. It is reprinted without permission. It concerns Haventrees Software's EasyFlow program. If EasyFlow doesn't work: tough. If you lose millions because EasyFlow messes up, it's you that's out the millions, not us. If you don't like this disclaimer: tough. We reserve the right to do the absolute minimum provided by law, up to and including nothing. This is basically the same disclaimer that comes with all software packages, but ours is in plain English and theirs is in legalese. We didn't want to include any disclaimer at all, but our lawyers insisted. Certainly clarifies their position. In a strange, twisted, punkish kind of way I admire them. :-) Neil... ------------------------------ Date: Fri, 1 Apr 94 19:46 EST From: Andrew W Kowalczyk Subject: E-mail problems With all the tribulations you have gone through in trying to mail stuff properly through the various E-Mail systems I thought you might enjoy this joke that was related by columnists Nicholas Petreley and Laura Wonnacott in the March 28, 1994 issue of InfoWORLD: A fellow goes into a bar and says to the bartender, "Hey, I just heard this great E-mail gateway programmer joke." The bartender replies indignantly, "Now, wait a minute. I used to be a gateway programmer. See that guy at the end of the bar? The guy at the other end? Those two guys at the table over there? They are all gateway programmers. Now, do you still want to tell that joke?" And the fellow says, "Well, not if I have to explain it five times." Andy Kowalczyk, Allstate Life Insurance Co., 1415 Lake Cook Road P2A, Deerfield IL 60015-5213 (708)317-6206 AKOWALCZ+aLIFDR1%Allstate_Corp+p@MCImail.com ------------------------------ Date: Thu, 31 Mar 1994 23:50:59 -0500 From: "Lance A. Brown" Subject: Holiday Inn extra key requirements Last weekend, March 27th I checked into a local Holiday Inn for an overnight stay and was given only 1 credit card style mag-stripe key. A few hours later I went back to the desk and requested another key for my wife. The clerk asked for my name and room number, pulled something up on her computer, swiped a key through a card read (writer?) and handed it to me. No photo ID or other ID requested. I asked if it is standard to not request ID for extra keys and was told that is true. I then asked her if she realized anyone could get a key just by knowing the name of a person and what room they were in. She seemed quite startled by this. The RISK is quite obvious. Lance Brown lab@biostat.mc.duke.edu ------------------------------ Date: 01 Apr 94 07:26:21 EST From: "Mich Kabay [NCSA]" <75300.3232@CompuServe.COM> Subject: Fingerprinting & welfare >From the Associated Press newswire via Executive News Service on CompuServe (GO ENS): Welfare Fingerprints, By KATHLEEN HOLDER, Associated Press Writer SACRAMENTO, Calif. (AP, 31 Mar 1994) -- Expanding the use of fingerprinting to flush out welfare cheats, Los Angeles County will soon start taking the prints of applicants for federal dependent children benefits. Officials said the requirement, which won state approval Wednesday, will be the nation's first use of fingerprinting to prevent fraud by applicants for Aid to Families with Dependent Children, the main federal-state welfare program." The author explains the background and details. Key points: o electronic fingerprint scans of applicants are stored in computer database. o fingerprint taken as unique authenticator of identity. o Los Angeles has been using these techniques since 1991 for state general assistance. o Needed and received a waiver from federal govt to add requirement to federal regulations for AFDC. o These techniques will be implemented state-wide if they work. o Several advocates for poor people's rights object to the stigma of fingerprinting. o "In the first six months after Los Angeles County began running fingerprint checks for general assistance in 1991, the county reported cutting its costs by $5.4 million, or more than half." o "More than 3,000 people lost their aid for suspected fraud, and more than 200 applicants were denied assistance because they refused to submit their fingerprints." Michel E. Kabay, Director of Education, National Computer Security Assn ------------------------------ Date: Fri, 1 Apr 1994 20:43:04 -0800 From: Al Stangenberger Subject: Re: More jail-door openings (Markson, RISKS-15.73) > a jail in Marin ... There's something wrong with this -- Polly Klaas's accused killer is housed in Santa Rosa, Sonoma County. Not Marin. I don't think Marin's new jail is finished yet. Al Stangenberger, Dept. of Env. Sci., Policy, & Mgt., 145 Mulford Hall - Univ. of Calif., Berkeley, CA 94720 forags@nature.berkeley.edu (510) 642-4424 ------------------------------ Date: Fri, 8 Apr 1994 13:36:38 -0400 From: pcw@access.digex.net (Peter Wayner) Subject: WAIS Q: What is WAIS? A: It stands for Wide Area Information Server. It's a pretty popular standard for accessing text based information on the Internet. Anyone can use readily available software to create an index for a collection of texts and then make this available to the world on the Internet. Q: How do you use it? A: Get the right software, choose some data bases, type in some keywords and press the button. WAIS will come back with a list of documents and their matching quotient. You can then choose to read the entire text of the documents. Q: Why would RISKS readers care about this? A: Comp.risks digests are indexed with a WAIS server. You can type in "plane crash" and get more than enough information to keep you wondering about one, two and three engine planes that fly-by-wire using code written in Fortran and encrypted with Clipper to prevent terrorist hackers. Q: How can I get the software? A: There are many different ways to access WAIS. Many GOPHER servers offer it as an option. You won't even leave GOPHER to type your query. You can also use TELNET to "quake.think.com" and log in as "wais" to use their link. The interface isn't great, but it is not bad. The best options seems to be to get a copy of the specialized software written for different platforms. One package, which I've used occasionally is called "MacWAIS." It is available via anonymous ftp from ftp.tidbits.com. You need to have a Macintosh computer with an Internet connection using MacTCP to use this. There are other copies for NeXTs, PCs and other machines at ftp.think.com in the "/wais" directory. Q: Are there any tricky parts? A: Well, it is pretty easy in some respects. You just type and go. I've occasionally had trouble getting a good list of servers that are available. The WAIS folks were clever enough to make it possible to use WAIS to search through the lists of servers. You just type in some keywords and back comes a list of servers that have that keyword in their description. So, if you want to access RISKS, try searching the directory of servers for the keyword RISKS. Once you find it, you will be able to save the result on your machine and it will automagically know about the RISKS server. Another solution is to search through the directory of servers using ".src". Several people have recommended this to me, but I've had trouble getting it to work well for a number of reasons. First, it only searches the description string of each server. If the author/creator of the server was parsimonious with the description, then you might not even find the world ".src" in there. I've tried all kinds of keywords, but I've often felt like there are still many sources out there that I just can't find. This problem may be fixed or solved by now. (Please write if it has.) ------------------------------ Date: 13 April March 1994 [LAST MODIFIED] From: RISKS-request@csl.sri.com Subject: Info on RISKS (comp.risks), contributions, subscriptions, FTP, etc. The RISKS Forum is a moderated digest. Its USENET equivalent is comp.risks. Undigestifiers are available throughout the Internet, but not from RISKS. SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup on your system, if possible and convenient for you. BITNET folks may use a LISTSERV (e.g., LISTSERV@UGA) with SUBSCRIBE RISKS or UNSUBSCRIBE RISKS as needed. Users on US Military and Government machines should contact (Dennis Rears). UK subscribers please contact . Local redistribution services are provided at many other sites as well. Check FIRST with your local system or netnews wizards. If that does not work, send requests to (not automated). CONTRIBUTIONS: to risks@csl.sri.com, with appropriate, substantive Subject: line, otherwise they may be ignored. Must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. PLEASE DO NOT INCLUDE ENTIRE PREVIOUS MESSAGES in responses to them. Contributions will not be ACKed; the load is too great. **PLEASE** include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY. Relevant contributions may appear in the RISKS section of regular issues of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise. ARCHIVES: "ftp crvax.sri.comlogin anonymousYourName cd risks: Issue j of volume 15 is in that directory: "get risks-15.j". For issues of earlier volumes, "get [.i]risks-i.j" (where i=1 to 14, j always TWO digits) for Vol i Issue j. Vol i summaries in j=00. "dir" (or "dir [.i]") lists (sub)directory; "bye" logs out. CRVAX.SRI.COM = [128.18.30.65]; =CarriageReturn; FTPs may differ; UNIX prompts for username, password. WAIS and bitftp@pucc.Princeton.EDU are alternative repositories. [See RISKS-15.75 for WAIS info.] FAX: ONLY IF YOU CANNOT GET RISKS ON-LINE, you may be interested in receiving it via fax; phone +1 (818) 225-2800, or fax +1 (818) 225-7203 for info regarding fax delivery. PLEASE DO NOT USE THOSE NUMBERS FOR GENERAL RISKS COMMUNICATIONS; as a last resort you may try phone PGN at +1 (415) 859-2375 if you cannot E-mail risks-request@CSL.SRI.COM . ------------------------------ End of RISKS-FORUM Digest 15.75 ************************