10-Mar-86 22:52:02-PST,11168;000000000000 Mail-From: NEUMANN created at 10-Mar-86 22:50:34 Date: Mon 10 Mar 86 22:50:34-PST From: RISKS FORUM (Peter G. Neumann, Coordinator) Subject: RISKS-2.25 Sender: NEUMANN@SRI-CSL.ARPA To: RISKS-LIST@SRI-CSL.ARPA RISKS-LIST: RISKS-FORUM Digest, Monday, 10 Mar 1986 Volume 2 : Issue 25 FORUM ON RISKS TO THE PUBLIC IN COMPUTER SYSTEMS ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Contents: Balloting (Barbara E. Rice) Canceling ballots (Jim McGrath) Bank robbery (Curtis Jackson) Earthquake problems with Nuclear Reactors (throopw) Modems DON'T WORK AS SUPPOSED (Brent Chapman, Martin J. Moore, Phil Ngai) *** TIME TO BREAK SOME NEW GROUND. WE'RE MINING THE OLD ONES TOO MUCH. *** The RISKS Forum is moderated. Contributions should be relevant, sound, in good taste, objective, coherent, concise, nonrepetitious. Diversity is welcome. (Contributions to RISKS@SRI-CSL.ARPA, Requests to RISKS-Request@SRI-CSL.ARPA.) (Back issues Vol i Issue j stored in SRI-CSL:RISKS-i.j. Vol 1: MAXj=45) ---------------------------------------------------------------------- Date: Mon, 10 Mar 86 12:43:50 est From: rice@nrl-csr (Barbara E. Rice) Message-Id: <8603101743.AA02828@nrl-csr.ARPA> To: RISKS-Request@SRI-CSL.ARPA Subject: Balloting There has been much discussion on the net as to the secrecy of ballots. No one has mentioned yet the situation I find myself in regularly with the absentee ballot system. My name is printed on the outside of the envelope and I assume checked off when it arrives at its destination to insure that I don't vote 2 or more times. What is to prevent someone from just taking a peek and seeing who I voted for. In fact I have never heard what the method is to insure that my name and who I vote for are not put together. There is a simple way to check this out to see if my vote is secret but I do not have the courage to try it. All I would need to do is vote a straight communist ticket. If my security clearence is revoked in the next six months it would be safe to assume my vote is not secret. Anyone know of a non-career threatening way to check this out? Barb R. ------------------------------ Date: Mon 10 Mar 86 22:12:18-EST From: "Jim McGrath" Subject: Canceling ballots To: risks@SRI-CSL.ARPA cc: MCGRATH%OZ.AI.MIT.EDU@XX.LCS.MIT.EDU, hyde%topcat@DECWRL.DEC.COM Reply-to: mcgrath%mit-oz@mit-mc.arpa Subject: Progress report on computerized voting From: hyde%topcat.DEC@decwrl.DEC.COM (Kurt Hyde DTN 264-7759 MKO1-2/E02) My students at Rivier College will still be investigating further into the proper security controls. One of them is considering a way to let the voter see his/her ballot and abort that ballot. The printer would then print an appropriate message such as "CANCELED" on the bottom. I can see a lot of potential problems with canceling already printed ballots. In particular, any technology that takes a ballot which would, by default, be valid and then modifies it to be invalid could be used to invalidate valid ballots after the polls have been closed. Moreover, if the technology fit in a voting booth, then it is probably portable enough so that such modifications could be done on site (i.e. without physically removing the ballots to an unauthorized location). I would thus suggest that you use some sort of display (CRT, LED, or just light bulbs next to the appropriate names) for voter confirmation. Failing that, you should print out the ballot as before, but on white (say) paper. If the voter confirms the ballot, then the white copy is stamped CANCELED, a duplicate is printed on red (say) paper, and both are deposited in separate boxes. While both copies would be kept, only the red copy would be treated as authoritative. You can still forge red ballots (you can forge any paper ballots). But you cannot turn a red ballot into a white one by using a CANCEL stamp or somesuch. Only gross mutilation or removal of the ballot from an authorized area could cancel the valid ballot - both harder to do (at least undetected). Jim ------------------------------ From: ulysses!burl!rcj@ucbvax.berkeley.edu Date: Sat, 8 Mar 86 20:45:11 est To: ulysses!risks Subject: bank robbery Organization: AT&T Technologies @ Burlington, NC I read an excellent book a few years ago simply entitled "Computer Crime". [PRESUMABLY BY DONN PARKER? PGN] I highly recommend it to the readers of mod.risks. Here are a couple of example horror stories from the book (from memory, sorry): a) A guy gets a bank loan, when he gets his payment book he sends in the *last* payment slip from the book with his first payment. The bank's computer sends him a cheerful letter congratulating him on settling his debt in a timely manner. b) A guy opens an account at a major NYC bank with several thousand dollars. After he gets his personalized checks, he goes to a shady printer friend and has the guy print up identical checks but with a bogus magnetic number on the bottom. He then goes on a $1,000,000 check-writing spree. Every time on large purchases they call his bank and electronically verify that he can cover the check. Every time the sorting machine at the bank sees the leading ?3?-digit code of a West Coast bank, and automatically mails the check there. The West Coast bank's sorter kicks the check out to manual sorting because it has a bogus account number. The human sorter takes one look at the check and sees the name of the NYC bank and blithely mails it back... They finally got onto him when one of the checks had been through so many sorter and mailer machines it was nearly in shreds, and the human sorter on the West Coast got curious enough to look at the magnetic ink number. c) Guy opens an account in a Washington, D.C. bank. He rips off several pads of blank deposit slips from the lobby of said bank, takes them to a location (?maybe he worked at the place?) that has a magnetic ink typewriter. He laboriously types his own account number on the bottom of all the slips, then places the pads back in the lobby of the bank. A month later he withdraws $100,000 and disappears. The MAD Programmer -- 919-228-3313 (Cornet 291) alias: Curtis Jackson ...![ ihnp4 ulysses cbosgd mgnetp ]!burl!rcj ...![ ihnp4 cbosgd akgua masscomp ]!clyde!rcj [OLD STUFF, BUT WHY NOT? WE HAVEN'T HAD THEM HERE BEFORE. PGN] ------------------------------ From: Date: Mon, 10 Mar 86 17:33:22 est Subject: Re: Earthquake problems with Nuclear Reactors Apparently-To: mcnc!seismo!risks%sri-csl > From: "Lindsay F. Marshall" > Subject: Earthquake problems with Nuclear Reactors. > [...] > So if you hear that Newcastle vanished, you'll know why! > [and we'll be back to carrying coals ... PGN] Ok, ok, cute, I laughed, I liked it. But nuclear paranoia being what it is, and with no smiley, this seems to me to be blatantly inaccurate, and worthy of clarification. As far as I know, nothing short of refining the fuel and making a bomb out of it can cause a power reactor to explode with a large yield. Or perhaps the two of you know of some other way that a power reactor can cause a city to "vanish" (implying a sudden, physical removal of the city from existence or perception)? [Whatever happened to Sverdlovsk -- or was that biological? PGN] ------------------------------ Date: Sun, 9 Mar 86 02:00:47 PST From: chapman%miro@BERKELEY.EDU (Brent Chapman) To: risks@sri-csl.arpa Subject: 103/212 modems DON'T WORK AS SUPPOSED (10% of the time?) Organization: University of California, Berkeley In article <8603081745.AA20185@ucbvax.berkeley.edu> Phil Ngai writes: >RISKS-LIST: RISKS-FORUM Digest, Saturday, 8 Mar 1986 Volume 2 : Issue 24 > >Date: Sat, 8 Mar 86 00:34:30 pst >From: amdcad!phil@decwrl.DEC.COM (Phil Ngai) >To: risks@sri-csl.ARPA >Subject: Re: Misdirected modems > >This is an often repeated wives tale by people who ought to know better. >With ordinary dialup modems of the 103/212 class, it is the *answering* >modem which initiates a tone. The originating modem (the one that dialed) >remains silent until it hears the carrier of the answering modem. > >Thus, if a computer dialed a wrong number, the person receiving >the call would hear nothing, not a "funny whistle". Sorry, maybe that's how it's SUPPOSED to work, but it just doesn't happen that way. I work with several 103/212 class modems, and every one of them, at least 10% of the time, "responds" to a "carrier" before there actually is one. There appear to be no fixed, recognizable reasons for this. They will respond to rings, busy signals, or someone picking up the line. All of these modems are recent models, purchased within the last year, so I don't think it's a problem of out-of-date technology. Brent Chapman chapman@miro.berkeley.edu ucbvax!miro!chapman ------------------------------ Received: from eglin-vax.ARPA ... Mon 10 Mar 86 12:15:57-PST Date: 0 0 00:00:00 CDT From: "MARTIN J. MOORE" Subject: Re: misdirected modems To: "risks" > From: amdcad!phil@decwrl.DEC.COM (Phil Ngai) > This is an often repeated wives tale by people who ought to know better. > With ordinary dialup modems of the 103/212 class, it is the *answering* > modem which initiates a tone. The originating modem (the one that dialed) > remains silent until it hears the carrier of the answering modem. > Thus, if a computer dialed a wrong number, the person receiving > the call would hear nothing, not a "funny whistle". True, the answering modem normally initiates a tone first. However, some 103/212-class modems (e.g., the Hayes Smartmodem 1200 which I use at the office and the similar Prometheus P1200A which I use at home) will start a tone after a few seconds regardless of whether the answering modem starts one. I have the speaker on during the dialing and connection process, and both modems always start a tone whenever a call fails to go through or gets a wrong number (one or the other happens about 10% of the time.) Anyone who is skeptical of this is welcome to drop by my office and I'll be happy to demonstrate it. In fact, I whistled at some poor soul on a wrong number while dialing in for this terminal session! marty moore (mooremj@eglin-vax.arpa) ------------------------------ Date: Mon, 10 Mar 86 17:42:34 pst From: amdcad!phil@decwrl.DEC.COM (Phil Ngai) To: risks@sri-csl.ARPA Subject: Re: misdirected modems I have a Hayes and I just tried it and it does not whistle at me. ------------------------------ End of RISKS-FORUM Digest ************************ -------