precedence: bulk Subject: Risks Digest 20.23 RISKS-LIST: Risks-Forum Digest Monday 1 March 1999 Volume 20 : Issue 23 FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at and at ftp.sri.com/risks/ . Contents: Intruders commandeer UK military satellite (PGN) Software snafu slowed key data during Iraq raid (Paul Walczak) Schwab Squab Swabbed (PGN) Errant police computer wakes hundreds of Texans (Keith A Rhodes) Mobile phones cause memory loss (Martin Minow) Doctors to perform surgery over next-generation Internet (Keith A Rhodes) Digital broadcasting could hit cardiac monitoring gear (Andrew Robert Mitchell) Computer system results in errors in patient medical records (Doneel Edelson) Pentium III serial number is soft-switchable after all (PGN) Limiting liability for Y2K breakdowns (Edupage) CIA predicts serious Y2K problems around the globe (Keith A Rhodes) Y2K Test Fine Test Data Causes Problem (Barry Frankel via Dave Farber) Self-inflicted single point of failure (Malcolm Pack) Rhode Islander sentenced for hacking (PGN) Profiling (Andrew Koenig) Re: Store Baelt Bridge not Y2K safe (Mark Brader, Chris Bagge) Computers, Freedom, and Privacy, 6-8 April 1999, Washington, DC (Dave Banisar) IEEE Security and Privacy Symposium, 9-12 May 1999 (Jon Millen) USENIX Workshop on Smartcard Technology, 10-11 May 1999 (Jennifer Radtke) '99 USENIX Technical Conference, 6-11 June, Monterey CA (Jennifer Radtke) FastAbstracts at FTCS29, 15-18 Jun 1999 (Chuck Weinstock) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Mon, 1 Mar 99 8:42:12 PST From: "Peter G. Neumann" Subject: Intruders commandeer UK military satellite According to security sources cited by *The Sunday Business*, intruders have seized control of one of Britain's four military communication satellites -- over two weeks ago -- and demanded blackmail for them to stop interfering with the satellite. [Source: Reuters item 28 Feb 1999, PGN-ed. (*)] [Several respondents remarked on this item, suggesting either that it was a hoax, or a very serious event that has been largely covered up. PGN] [* For those of you who might ask, "PGN-ed" is a new verbal noun form (or, if you prefer, a nounal verb pun) implying that the item has been abstracted, summarized, or otherwise adapted for RISKS without violating any copyrights, that is, ``PGN-ed'', which is intended to be pronounced either as ``pee-gee-en'd'' or ``pee-gee-en-ed'', according to your verbal and nounal linguistic preferences, respectively.] ------------------------------ Date: Fri, 26 Feb 1999 17:18:53 -0500 From: Paul_Walczak@mail.arl.mil Subject: Software snafu slowed key data during Iraq raid The U.S. Department of Defense is still studying the software glitch that caused DOD's $184 million Global Transportation Network (GTN) to have up to eight-hour delays in the availability of updated worldwide logistics information during the December 1999 Desert Fox bombing operations, despite GTN having being designed to provide updates worldwide within 30 seconds. GTN has 23 interfaces with other systems. [Source: Article by Daniel Verton (dan_verton@fcw.com), Federal Computer Week, week of 22 Feb 1999.] [Reference added in archive copy. PGN] ------------------------------ Date: Mon, 1 Mar 99 15:12:06 PST From: "Peter G. Neumann" Subject: Schwab Squab Swabbed Charles Schwab & Co's electronic brokerage Website and Street Smart computer system were off the air for an hour and one-half, beginning 5 minutes after trading opened on the NYSE on 24 Feb 1999. The outage was the result of a software upgrade to hook in a new mainframe system in Phoenix, which failed to take flight. This follows failures of other on-line brokerage systems (E-Trade, Waterhouse, Ameritrade, and Datek) in recent weeks. I guess the market pressures are too great for anyone to take the time to do it right. [Source: *San Francisco Chronicle*, 25 Feb 1999, B1. PGN-ed. However, the fledgling Phoenix system eventually rose from its ashes. Pigeon pennies, anyone?] ------------------------------ Date: Fri, 26 Feb 1999 08:16:39 -0500 From: "Keith A Rhodes" Subject: Errant police computer wakes hundreds of Texans A police computer in Fort Worth TX made 1,300 phone calls to invite residents to a police community forum -- beginning at 3 a.m. Sunday morning, instead of during the day. [Source: Reuters item 25 Feb 1999, PGN-ed. At least 400 people answered, and heard the programmed caller identified as "reverse 911" -- which sounds like "YOU ARE IN TROUBLE" rather than "I AM IN TROUBLE".) ------------------------------ Date: Mon, 1 Mar 1999 16:20:38 -0800 From: Martin Minow Subject: Mobile phones cause memory loss Today's [London] *Daily Mail* reports that mobile phones cause memory loss. This link was demonstrated by a hospital in Bristol, which attached transmitters to the heads of volunteers, some with microwaves, others with none. On subsequent tests of mental acuity, the radiated patients did significantly worse than the rest. [Presumably relative to their previous behavior. The report is rather vague. PGN-ed] ------------------------------ Date: Wed, 24 Feb 1999 11:08:44 -0500 From: "Keith A Rhodes" Subject: Doctors to perform surgery over next-generation Internet The $500M Abilene Network is planned as a 2.4 gigabit/sec link among a few dozen research universities. To demonstrate this, a doctor in Washington DC's Union Station will work with a surgical team at Ohio State performing laparoscopic surgery on a volunteer patient suffering from a gastrointestinal disorder [an Internaut? seeking gut reactions?]. [Source: Article by Ted Bridis, Associated Press, 23 Feb 1999, PGN Abstracting] [Plans for live surgery rather than just remote advice are in the offing. Hopefully, by then the reliability, security, and general availability of networked systems will have improved sufficiently that would avoid risks of computer and network outages during open-brain surgery. PGN] (Stephen Wolff of Cisco Systems Inc. was quoted as asking one of the RISKS-related questions that comes to mind: "Can a surgery and multiplayer Doom coexist on a network?" [Cisco supplied about $5 million worth of high-tech network equipment for Abilene.] [NOTE: They never discuss the stability of the network, do they? Why does this article remind me of the Star Trek episode where Dr. McCoy is rewiring Mr. Spock's brain? About half-way through the surgery -- which McCoy had described as "child's play" just prior to the commercial break -- McCoy starts to realize that he doesn't know what he's doing because the helmet he's wearing with all the knowledge in it is starting to fail? Anyone should be able to figure out when to launch the denial-of-service attack against the remote connection. Aren't there plenty of critical moments in just routine surgery? In this case, there's a world-class specialist helping out a not-so-world-class specialist, because the surgery is important for some reason. A bunch of untraceable broken packets have no place in delicate vascular surgery. KAR] [Archive copy corrected to Abilene. PGN] ------------------------------ Date: Fri, 26 Feb 1999 20:54:42 +1100 From: Andrew Robert Mitchell Subject: Digital broadcasting could hit cardiac monitoring gear [Source: ABC News Australia, http://www.abc.net.au/news/state/vic/metvic-26feb1999-15.htm] > Cardiac monitoring equipment in a number of Australian hospitals is at > risk of malfunctioning due to digital broadcasting interference. > Melbourne's Epworth Hospital claims heart patients were put at risk > recently because a television station was given the same digital channel > it uses to monitor heart patients. The hospital was unaware Channel Seven > had been sold a licence to use part of the spectrum for tests ahead of > digital broadcasting. The risk is obvious: causes panic at hospitals as all cardiac monitoring equipment falsely measures zero ;) Andrew Mitchell [Also noted by Iain "Kaos" Holmes . PGN] ------------------------------ Date: Fri, 26 Feb 1999 12:26:31 -0500 From: "Edelson, Doneel" Subject: Computer system results in errors in patient medical records Vancouver Hospital installed a new computer system in mid 1997 that sends pathology reports on-line to the attending physicians. However, the software did not automatically update the patients' charts (unless staff members used a special code, which apparently they usually did not), significantly delaying treatments and discharges, and increasing costs. [From Leonard Lee's Glitches of the week, Newsbytes News Network , 24 Feb 1999, PGN-ed] ["Leonard Lee is a nationally recognized consultant and frequent speaker on computer errors. Readers are encouraged to e-mail news clippings of interesting computer glitches at www.homestead.com/doctorglitch ."] ------------------------------ Date: Mon, 1 Mar 99 15:17:47 PST From: "Peter G. Neumann" Subject: Pentium III serial number is soft-switchable after all After all the fuss about the risks of the Pentium III unique serial number, and Intel's claim that it can be permanently masked, a report from the German C't News says that despite Intel's claims, the ability to read the serial number can be turned on and off remotely under software control, without the user's knowledge. The trick uses only documented features. [Source: Christian Persson, *Computer Technology*, c't news, translated by Juergen Kuri, dated 24 Feb 1999, also noted by Leander Kahney in Wired News, 23 Feb 1999 [note the time difference; c't article preceded Wired], http://www.wired.com/news/news/technology/story/18078.html . PGN ------------------------------ Date: Thu, 25 Feb 1999 13:35:16 -0500 (EST) From: Edupage Editors Subject: Limiting liability for Y2K breakdowns A bipartisan group in the U.S. House of Representatives has introduced legislation that would limit litigation, lawyers' fees, and damages caused by Y2K-related computer breakdowns. Supporters of the bill claim that it would help avert Year 2000 problems, since the legislation would protect only those businesses and individuals who take reasonable actions to prevent them from occurring. (*The New York Times*, 24 Feb 1999, Edupage, 25 February 1999) [CA, FL, GA, HA, NV, and VA have already passed such laws. 31 other states are considering such legislation. There are of course also risks of this making the situation worse as well. PGN] ------------------------------ Date: Thu, 25 Feb 1999 09:12:16 -0500 From: "Keith A Rhodes" Subject: CIA predicts serious Y2K problems around the globe Amidst all the discussion of possible Y2K effects is the issue of foreign government preparedness. Air Force Gen. John Gordon, deputy director of the CIA, appeared at a hearing of the Senate Armed Services Committee and testified that other countries (including Russia) are far behind in preparing for possible crises, noting in particular breakdowns in nuclear reactors and strategic missile systems, midwinter power outages and disruptions in world trade and oil shipments. However, he discounted the possibility of accidentally missile launches due to Y2K. But he did add that malfunctions in temperature and humidity monitors could lead to incorrect information. He said that China will probably experience failures in key sectors such as telecommunications, electric power and banking. [Source: AP item by Jim Abrams, 25 Feb 1999, PGN Abstracting] ------------------------------ Date: Sat, 27 Feb 1999 09:19:42 -0500 From: Barry Frankel Subject: Y2K Test Fine Test Data Causes Problem (via Dave Farber) Last October, PSE&G sent incorrect bills to 61,000 of their customers as a result of an operator error. Subsequent to testing their billing system for Y2K compliance, the residues from the test data were not properly removed, resulting in erroneous statements of past payments and amount owed. However, this error was announced only recently. [Source: New Jersey Online, *The Times* (Mercer County, NJ); this item has been PGN-ed from http://www.nj.com/mercer/times/stories/02-27-Q2BBFUMB.html .] ------------------------------ Date: Mon, 22 Feb 1999 06:51:30 GMT From: m.pack@cableinet.co.uk (Malcolm Pack) Subject: Self-inflicted single point of failure At approximately 04:10 on Sunday 21 Feb 1999, a transatlantic communications link belonging to Teleglobe developed a fault. By 19:30 that evening the fault (whatever it was) was repaired. In the interim period, almost all Internet connectivity, both within and outside the UK, was lost to customers of Teleglobe, of one of its major partners (and my main ISP) Cable Internet, and other ISPs taking their feeds from these two companies, including many of the UK's new "free" services such as Telinco and Aardvaak. The situation was compounded by a mail server upgrade which Cable Internet started at 4am, as part of which *all* routes and DNS caching were reset. With no easy path to other countries, routers failed to discover new routes and DNS lookups failed consistently. I have access to another free ISP apparently unaffected by the cable outage; but found it too slow to be of any use. That this was caused by increased traffic as new routes were found, and increased logging-in by users abandoning their primary ISPs, is mere speculation; but my son had to do without a better translation than the one I could offer of a key passage in "Le Roman de la Rose" because of timeouts on many search engines and their results. All this is normal fare for the Internet. It is a non-guaranteed service, after all. That there were no backup routes in place even 12 hours after the failure is annoying, but I await an explanation of this from Cable Internet. I was more bemused by the number of people posting messages on Cable Internet's support newsgroup complaining that they were unable to run their Internet-reliant businesses because of Cable Internet's failure to provide a backup service. Naturally, not one of them had made his or her own provision for a backup by using another ISP. What this all says about single points of failure is self-evident. Malcolm Pack ------------------------------ Date: Tue, 23 Feb 99 18:14:24 EST From: "Peter G. Neumann" Subject: Rhode Islander sentenced for hacking Sean Trifero was sentenced to one year in prison by a U.S. District Judge for intentionally damaging computer systems (Harvard, Amherst, a Florida ISP, and Alliant Technologies, including planting sniffers and denial-of- service attacks) and unauthorizedly accessing others (Arctic Slope Regional Corp. and Barrows Cable, Alaska), three years subsequent probation, 150 hours of community service, and $31,650 restitution. [Source: PRNewswire, 23 Feb 1999] ------------------------------ Date: Fri, 26 Feb 1999 11:08:01 -0500 (EST) From: Andrew Koenig Subject: Profiling Recently, my wife and I ordered a bunch of tableware from a local jewelry-and-china-and-crystal store. Because of our slightly unusual taste, we had the honor of being the first customers ever to order some of those items, which meant that the store had no entries in their database for them. They therefore separated our order into two orders, one for the items that their database knew about, and the other for the new ones. Because there were two orders, there were two charge tickets. Four days later, after we had finished dinner in a restaurant, and half an hour before curtain time for the play we were about to see, our waiter informed us that he had put our credit card through the machine twice, that it had been declined twice, and that he could call them and talk to them if we liked. The ensuing confusion, which took long enough to clear up that we came within eight minutes of missing our play, involved not only our waiter but the restaurant manager, who said that the credit card people had eventually approved the purchase, but that we were to call them at our earliest convenience. The problem, of course, was that two purchases in rapid succession at a jewelry store had tripped the credit card company's fraud detectors, so they wanted to be sure that we were still in possession of the card and that we had actually made those purchases. They had been meaning to call us, but hadn't gotten around to it yet. The risk? Expert-system profilers are adding all kinds of unwritten rules to our lives, with various kinds of inconvenience and harassment as the penalty for violating them. Andrew Koenig, ark@research.att.com, http://www.research.att.com/info/ark ------------------------------ Date: Sun, 28 Feb 1999 22:48:55 -0500 (EST) From: Mark Brader Subject: Re: Store Baelt Bridge not Y2K safe (Weber-Wulff, Risks-20.22) Not quite right. The west half of the Storebaelt crossing consists of a side-by-side road and rail bridge, but the east half has a separate road bridge while the railway uses a tunnel. It's the east bridge that opened last year; the railway (which is presumably the part with a Y2K problem) opened in April 1997 to freight and June 1997 to passenger trains. See for a description of the crossing in English. (However, it never had the world's longest main span, as claimed; the Akashi-Kaikyo Bridge in Japan is longer and opened a month or two earlier.) Mark Brader, Toronto, msbrader@interlog.com ------------------------------ Date: Mon, 22 Feb 1999 11:14:14 +0100 From: Chris Bagge Subject: Re: Store Baelt Bridge not Y2K-safe (Weber-Wulff, RISKS-20.22) The problem is mainly not with the bridge, but with the double train-tunnel running in parallel. This tunnel was heavily delayed during construction, due to 'the-fault-that-cannot occur', as both tunnel were flooded! The only limit on the road bridge would be the toll-gates, and there is a fast (and cheap :-)) solution to that problem. Regards Chris Bagge ------------------------------ Date: Sat, 20 Feb 1999 15:01:54 -0500 From: Dave Banisar Subject: Computers, Freedom, and Privacy, 6-8 April 1999, Washington, DC Register now for the cyber event of the year (cfp99.org) COMPUTERS, FREEDOM, AND PRIVACY: THE GLOBAL INTERNET WASHINGTON, DC Omni Shoreham Hotel April 6-8, 1999 For almost a decade, the conference on Computers, Freedom and Privacy has shaped the public debate on the future of privacy and freedom in the online world. Register now for the number one Internet policy conference. Join a diverse audience from government, industry, academics, the non-profit sector, the hacker community and the media. Enjoy the U.S. Capital in the Spring at one of Washington's premier hotels. * Keynote speakers include Tim Berners-Lee (Director, World Wide Web Consortium), Vint Cerf (President, Internet Society), Congressman Ed Markey (sponsor of "The Electronic Bill of Rights Act"), Congressman Ron Paul (sponsor of the Freedom and Privacy Restoration Act), Henrikas Yushkiavitshus (Associate Director, UNESCO) * Lively and thought-provoking panels on -- "the Creation of a Global Surveillance Network," "Access and Equity on the Global Internet," "Anonymity and Identity in Cyberspace," "Free Speech and Cyber Censorship," "Is Escrow Dead? And what is Wassenaar?", "Self-Regulation Reconsidered" and more * Tutorials -- "The Electronic Communications Privacy Act" (Mark Eckenwiler); "Cryptography: Basic Overview & Nontraditional Uses" (Matt Blaze and Phil Zimmermann), "Free Speech, The Constitution and Privacy in Cyberspace" (Mike Godwin), "Techniques for Circumventing Internet Censorship" (Bennett Haselton and Brian Ristuccia) Early Registration Deadline - March 15, 1999 Register on-line at http://www.regmaster.com/cfp99.html or call +1 407 628 3602. Registration inquiries may also be sent to mann@regmaster.com. For more information about CFP99, visit http://www.cfp99.org/ or call +1 401 628 3186 Sponsored by the Association for Computing Machinery David Banisar (Banisar@epic.org), Electronic Privacy Information Center, 666 Pennsylvania Ave, SE, Suite 301 Washington, DC 20003 http://www.epic.org ------------------------------ Date: Mon, 01 Mar 1999 09:54:36 -0800 From: Jon Millen Subject: IEEE Security and Privacy Symposium, 9-12 May 1999 1999 IEEE Symposium on Security and Privacy Special 20th Anniversary Program 9-12 May 1999 The Claremont Resort Berkeley, California Sponsored by the IEEE Technical Committee on Security and Privacy In cooperation with the International Association of Cryptologic Research Symposium Committee: John McLean, General Chair Jonathan Millen, Vice Chair Li Gong, Program Co-Chair Michael Reiter, Program Co-Chair Advance registration deadline 5 Apr 1999. Abridged for RISKS. Full registration info: http://www.csl.sri.com/~millen/sp99prog.txt PRELIMINARY PROGRAM Monday, May 10, 1999 8:45am-9:00am Welcome: Chairs 9:00am-10:30am Systems, Session Chair: Roger Needham, Microsoft Research Hardening COTS software with generic software wrappers Timothy Fraser, Lee Badger, Mark Feldman TIS Labs at Network Associates, Inc. Firmato: A novel firewall management toolkit Yair Bartal, Alain Mayer, Kobbi Nissim, Avishai Wool, Lucent Bell Labs Flexible policy-directed code safety, David Evans, Andrew Twyman, MIT 11:00am-12:00pm Policy, Session Chair: Ravi Sandhu, George Mason University Local reconfiguration policies Jonathan K. Millen, SRI International A modular, user-centered authorization service built on an RBAC foundation Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo, Iris Associates 12:00pm-12:30pm Surprise 2:00pm-3:00pm Verification, Session Chair: John Mitchell, Stanford University Secure communications processing for distributed languages Martin Abadi, Cedric Fournet, Georges Gonthier Compaq Systems Research Center, Microsoft Research, and INRIA Verification of control flow based security policies T. Jensen, D. Le Metayer, T. Thorn IRISA 3:30pm-5:00pm Panel Discussion Brief History of Twenty Years of Computer Security Research Panel Chair: Teresa Lunt, Xerox PARC Panelists: G.R. Blakley, Texas A&M University 20 years of cryptography Virgil Gligor, U Maryland 20 years of operating system security (Unix as one focus) Steve Lipner, MITRETEK 20 years of criteria development/commercial technology Jonathan K. Millen, SRI International 20 years of covert channel modeling and analysis John McLean, NRL 20 years of formal methods Steve Kent BBN/GTE 20 years of network security Tuesday, May 11, 1999 9:00am-10:30am Intrusion Detection Session Chair: Cynthia Irvine, Naval Postgraduate School A data mining framework for building intrusion detection models Wenke Lee, Sal Stolfo, Kui Mok, Columbia University Detecting intrusions using system calls: Alternative data models Christina Warrender, Stephanie Forrest, Barak Pearlmutter University of New Mexico Detecting computer and network misuse through the production-based expert system toolset (P-BEST) Ulf Lindqvist, Phillip A. Porras, SRI International 11:00am-12:30pm Panel 2 Near Misses and Hidden Treasures in Early Computer Security Research Panel Chair: Stan Ames, MITRE Panelists: Tom Berson, Anagram Labs and Xerox PARC Marv Schaefer, Arca Dick Kemmerer, UC Santa Barbara 2:00pm-3:30pm Information Flow Session Chair: John McHugh, Portland State University A multi-threading architecture for multilevel secure transaction processing Haruna Isa, William R. Shockley, Cynthia E. Irvine U.S. Navy, Cyberscape Computer Services, and Naval Postgraduate School Specification and enforcement of classification and inference constraints Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati SRI International and University of Milan A test for non-disclosure in security level translations David Rosenthal, Francis Fung Odyssey Research Associates 4:00-5:30pm Work-In-Progress (5-minute Presentations) Session Chair: Heather Hinton, Ryerson Polytechnic University Wednesday, May 12, 1999 9:00am-10:00am Authentication and Key Exchange Session Chair: Dieter Gollmann, Microsoft Research Software smart cards via cryptographic camouflage D. Hoover, B. N. Kausik, Arcot Systems Analysis of the internet key exchange protocol using the NRL protocol analyzer Catherine Meadows, Naval Research Laboratory 10:30am-12:00pm. Panel Discussion Time Capsule -- Twenty Years From Now Panel Chair: Michael Reiter, Lucent Bell Labs Panelists: Mark Weiser, Xerox PARC, Future of computing Roger Needham, Microsoft Research, Cambridge Future of hardware technology Howard Shrobe, MIT AI Lab, Future of software technology Hilarie Orman, DARPA, Future of networking Brian Snow, National Security Agency, Future of Security ------------------------------ Date: Sat, 27 Feb 1999 00:14:52 GMT From: jennifer@usenix.ORG (Jennifer Radtke) Subject: USENIX Workshop on Smartcard Technology, 10-11 May 1999 10-11 May 1999, McCormick Place South, Chicago, Illinois, USA For Researchers, Product Developers and Smart Card Deployers Review the full program and register online at http://www.usenix.org/events/smartcard99/ Save when registering before Friday, April 16, 1999 ------------------------------ Date: Mon, 1 Mar 1999 23:40:46 GMT From: jennifer@usenix.ORG (Jennifer Radtke) Subject: '99 USENIX Technical Conference, 6-11 June, Monterey CA A conference by and for programmers, developers, and system administrators working in advanced systems and software. 1999 USENIX ANNUAL TECHNICAL CONFERENCE June 6-11, 1999, Monterey, California http://www.usenix.org/events/usenix99 TUTORIALS, 23 REFEREED PAPERS, FREENIX TRACK--Quality Technical Forum Devoted To Open Source Software. John Ousterhout, creator of Tcl/Tk, will focus his keynote on a fundamental shift in software development to integration applications. ------------------------------ Date: Tue, 23 Feb 1999 16:52:11 -0500 From: Chuck Weinstock Subject: FastAbstracts at FTCS29, 15-18 Jun 1999 The Fault-Tolerant Computing Symposium is being held in Madison Wisconsin, 15-18 Jun 1999. Continuing a new tradition at FTCS, we are pleased to announce the FastAbstracts session. FastAbstracts are intended as a mechanism to: - report on current work that may or may not be complete - introduce new ideas to the community - state positions on controversial issues ("Outrageous Opinions") Participants in this session will present a short talk (5 to 8 minutes including 1 minute for questions), and publish a concise and succinct (two pages) abstract in a printed proceedings. A web version of the abstract will also be available on the FTCS website. Full details regarding FTCS and the FastAbstracts submisson process are available at . Chuck Weinstock, FastAbstracts Chair, FTCS-29 ------------------------------ Date: 23 Sep 1998 (LAST-MODIFIED) From: RISKS-request@csl.sri.com Subject: Abridged info on RISKS (comp.risks) The RISKS Forum is a MODERATED digest. Its Usenet equivalent is comp.risks. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. Alternatively, via majordomo, SEND DIRECT E-MAIL REQUESTS to with one-line, SUBSCRIBE (or UNSUBSCRIBE) [with net address if different from FROM:] or INFO [for unabridged version of RISKS information] .MIL users should contact (Dennis Rears). .UK users should contact . => The INFO file (submissions, default disclaimers, archive sites, copyright policy, PRIVACY digests, etc.) is also obtainable from http://www.CSL.sri.com/risksinfo.html ftp://www.CSL.sri.com/pub/risks.info The full info file will appear now and then in future issues. *** All contributors are assumed to have read the full info file for guidelines. *** => SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line. => ARCHIVES are available: ftp://ftp.sri.com/risks or ftp ftp.sri.comlogin anonymous[YourNetAddress]cd risks [volume-summary issues are in risks-*.00] [back volumes have their own subdirectories, e.g., "cd 19" for volume 19] or http://catless.ncl.ac.uk/Risks/VL.IS.html [i.e., VoLume, ISsue]. PostScript copy of PGN's comprehensive historical summary of one liners: illustrative.PS at ftp.sri.com/risks . ------------------------------ End of RISKS-FORUM Digest 20.23 ************************