💾 Archived View for gemini.quux.org › h › Archives › mirrors › risks › illustrative.html captured on 2024-12-17 at 10:11:00.

View Raw

More Information

⬅️ Previous capture (2024-08-25)

🚧 View Differences

-=-=-=-=-=-=-

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<!-- HTML file produced from file: sigdish.tex --
 -- using Hyperlatex v 2.3.1 (c) Otfried Cheong--
 -- on Emacs 20.7.1, Mon Jan 15 15:43:53 2001 -->
<HEAD>
<TITLE>Untitled</TITLE>

</HEAD><BODY BGCOLOR="#ffffff">


<FONT SIZE=+1><BLOCKQUOTE><CENTER>
<B><FONT SIZE=+1>Illustrative Risks to the Public</FONT></B><BR><B><FONT SIZE=+1>in the Use of Computer Systems</FONT></B><BR><B><FONT SIZE=+1>and Related Technology</FONT></B> <BR>Peter G. Neumann, Computer Science Laboratory, <BR>SRI International, Menlo Park CA 94025-3493<BR></CENTER></BLOCKQUOTE>
<FONT SIZE=+0><P>Risks cases as of <B>15 January 2001,</B> 
Copyright 2001, Peter G. Neumann, SRI
International EL243, Menlo Park CA 94025-3493 (e-mail Neumann@csl.sri.com;
<A HREF="http://www.CSL.sri.com/neumann/">http://www.CSL.sri.com/neumann/</A>;
telephone 1-650-859-2375; fax 1-650-859-2844): Editor, ACM SIGSOFT Software
Engineering Notes, 1976-93, Assoc.Ed., 1994-; Chairman, ACM Committee on
Computers and Public Policy (CCPP); Moderator of the Risks Forum
(comp.risks); cofounder with Lauren Weinstein of People For Internet
Responsibility (<A HREF="http://www.pfir.org">http://www.pfir.org</A>, 
announced in RISKS-20.65).  See also Lauren's Privacy Forum Digest
(<A HREF="http://www.vortex.com">http://www.vortex.com</A>), 
partially sponsored by the ACM CCPP.
<H1><A NAME="1">Contents</A></H1>
<MENU>
<LI><A HREF="#1">Contents</A>
<LI><A HREF="#2">Descriptor Symbols</A>
<LI><A HREF="#3">Items Listed by Categories</A>
<MENU>
<LI><A HREF="#4">Recent Items (yet to be merged in)</A>
<LI><A HREF="#5">Space</A>
<LI><A HREF="#6">Defense</A>
<LI><A HREF="#7">Military Aviation</A>
<LI><A HREF="#8">Commercial Aviation</A>
<LI><A HREF="#9">Rail, Bus, and Other Public Transit</A>
<LI><A HREF="#10">Automobiles</A>
<LI><A HREF="#11">Motor-Vehicle and related Database Problems</A>
<LI><A HREF="#12">Electrical Power (nuclear and other) and Energy</A>
<LI><A HREF="#13">Medical, Health, and Safety Risks</A>
<LI><A HREF="#14">Other Environmental Risks</A>
<LI><A HREF="#15">Robots and Artificial Intelligence</A>
<LI><A HREF="#16">Other Control-System Problems</A>
<LI><A HREF="#17">Other Computer-Aided-Design Problems</A>
<LI><A HREF="#18">Accidental Financial Losses, Errors, System Outages</A>
<LI><A HREF="#19">Financial Frauds and Intentionally Caused Losses</A>
<LI><A HREF="#20">Stock-Market Phenomena</A>
<LI><A HREF="#21">Telephone Frauds</A>
<LI><A HREF="#22">Other Telephone and Communication Problems</A>
<LI><A HREF="#23">Election Problems</A>
<LI><A HREF="#24">Insurance Frauds</A>
<LI><A HREF="#25">Security Problems</A>
<LI><A HREF="#26">Cryptography</A>
<LI><A HREF="#27">April Foolery and Spoofs</A>
<LI><A HREF="#28">Privacy</A>
<LI><A HREF="#29">Spamming, Junkmail, and Related Annoyances:</A>
<LI><A HREF="#30">Other Unintentional Denials of Service:</A>
<LI><A HREF="#31">Law Enforcement Abuses, False Arrests, etc..</A>
<LI><A HREF="#32">Identity Theft, Mistakes, Related Problems</A>
<LI><A HREF="#33">Other Legal Implications</A>
<LI><A HREF="#34">Other Aggravation</A>
<LI><A HREF="#35">Calendar/Date/Clock Problems including Y2K</A>
<LI><A HREF="#36">The Game of Chess:</A>
<LI><A HREF="#37">Further Miscellaneous Hardware/Software Problems</A>
<LI><A HREF="#38">Other Computer System Development Difficulties</A>
<LI><A HREF="#39">Achieving Better System Development and Operation</A>
<LI><A HREF="#40">The Proper Role of Technology?</A>
</MENU>
<LI><A HREF="#41">Reference Materials</A>
<MENU>
<LI><A HREF="#42">Books</A>
<LI><A HREF="#43">Inside Risks</A>
</MENU>
</MENU>
<P>This list summarizes items that have appeared in the Internet Risks Forum
Digest (RISKS) - which I moderate (comp.risks newsgroup) - and/or
published ACM SIGSOFT Software Engineering Notes (SEN).  In this collection
of mostly one-liner summaries, (R i j) denotes RISKS volume i issue j; (S
vol no:page) denotes an issue of SEN, where there has been one volume per
year, with vol 25 being the year 2000; page numbers are given primarily only
from 1993 on; (SAC vol no) indicates an item in the quarterly SIGSAC
Security and Control Review, where vol 16 is 1998, which was the final
volume.  The SEN material prior to 1995 is summarized in my Computer-Related
Risks book (see below).  Later material is gradually being brought on-line,
as noted below.
<P>Some incidents are well documented, while others need further study.  A few
are of questionable authenticity, and are noted as such ("bogus???").
Please send me corrections and new cases, along with suitable references.
This list is updated at least quarterly and is browsable on-line
(<CODE>ftp://ftp.CSL.sri.com/neumann/illustrative.html</CODE> courtesy of Otfried
Cheong's Hyperlatex), also printable in a two-column 8-point format
(<A HREF="illustrative.pdf">illustrative.pdf</A> and
<A HREF="illustrative.ps">illustrative.ps</A>).  [Incidentally, Hyperlatex
is wonderful Free Software:
(<A HREF="http://www.cs.ust.hk/~otfried/Hyperlatex/">http://www.cs.ust.hk/~otfried/Hyperlatex/</A>,
and after September 2000:<BR><A HREF="http://www.cs.uul.nl/~otfried/Hyperlatex">http://www.cs.uul.nl/~otfried/Hyperlatex</A>).]
<PRE>
SEN regular issues, by year, volume&amp;number 
..1976,vol 1: #1 = May; #2 = Oct
  ==================================
..year 1977 78 79 80 81 82 83 84 85 
  volume  2  3  4  5  6  7  8  9 10 
  ---------------------------------
  Jan    #1  1  1  1  1  1  1  1  1 
  Apr    #3  2  2  2  2  2  2  2  2 
  Jul    #4  3  3  3  3  3  3  4  3 
  Oct    #5  4  4  4  5  4  5  5  5 
  ==================================
..year 1986 87 88 89 90 91 92 93 94 
  volume 11 12 13 14 15 16 17 18 19 
  ---------------------------------
  Jan    #1  1  1  1  1  1  1  1  1 
  Apr    #2  2  2  2  2  2  2  2  2 
  Jul    #3  3  3  5  3  3  3  3  3 
  Oct    #5  5  4  6  5  4  4  4  4 
  ==================================
..1995,vol20: #1=Jan; 2=Apr; 3=Jul; 5=Dec
..1996,vol21: #1=Jan; 2=Mar; 4=Jul; 5=Sep
..1997,vol22: #1=Jan; 2=Mar; 4=Jul; 5=Sep
..1998,vol23: #1=Jan; 3=May; 4=Jul; 5=Sep
..1999,vol24: #1=Jan; 3=May; 4=Jul; 5=Dec
..2000,vol25: #1=Jan; 2=Mar; 3=May; 4=Jul 
..2001,vol26: #1=Jan; 2=Mar;
</PRE>
<P>Read the Risks Forum as comp.risks if you can, or
send e-mail to risks-request@csl.sri.com for a subscription, single text
line "subscribe" (append desired address only if not your From: address), or
"info" for info.  Send contributions to risks@CSL.sri.com.  Archives are
available from <CODE>ftp://ftp.sri.com/risks</CODE> or by "ftp ftp.sri.com",
"login anonymous", "cd risks" (which gets the "dir" for the current volume,
and "cd i" then gets you into the subdirectory for any preceding volume i =
1 to 19).  A mirror at Newcastle
<A HREF="http://catless.ncl.ac.uk/Risks/">http://catless.ncl.ac.uk/Risks/</A>
is maintained by Lindsay Marshall, and includes a nice search facility.
Specific issues can be read directly as
 <CODE>http://catless.ncl.ac.uk/Risks/I.J.html</CODE> [where I=volume#, J=issue#].
An Australian mirror is at
<A HREF="http://the.wiretapped.net/security/textfiles/risks-digest/">http://the.wiretapped.net/security/textfiles/risks-digest/</A>. 
"Inside Risks" distills some of the discussion into a
monthly inside-back-cover column in the <I>Communications of the ACM.</I>
The list columns to date is given at the end of this list.
<P>My book (Peter G. Neumann, <I>Computer-Related Risks,</I> Addison-Wesley
(ISBN 0-201-55805-X) and ACM Press (ACM Order 704943), 1995) summarizes many
of these cases and provides additional analysis.  (A few errata for the
first three printings are on my Web page, noted above.)  Most of the (S vol
no) items listed below for i <I>&lt;</I> 20 are discussed in the book; more recent
items generally include the relevant on-line (R i j) references.  If you
cannot find the book in a bookstore, it is on amazon.com, or call A-W within
the U.S. at 1-800-822-6339 - or if you are outside of the U.S.,
1-617-944-3770 and ask for International Orders.  The book is now also
available in Japanese (ISBN 4-89471-141-9).  Instead of trying to produce a
second edition in the face of a massive influx of new RISKS cases, the
fourth printing of the book gives the URL for the Addison-Wesley Web site
(<A HREF="http:www.awl.com/cseng/titles/ISBN-0-201-55805-X/">http:www.awl.com/cseng/titles/ISBN-0-201-55805-X/</A>),
which includes the first chapter of the book and an extended preface.  That
Web site and my own contain more material that would otherwise have gone
into the second edition.  See
<A HREF="http://www.csl.sri.com/neumann/risks-new.html">http://www.csl.sri.com/neumann/risks-new.html</A> for new material
and
<A HREF="http://www.csl.sri.com/neumann/cal.html">http://www.csl.sri.com/neumann/cal.html</A> 
for an excerpted summary of Y2K and related calendar-clock problems.
<P>Henry Petroski (among others) has noted that we rarely learn from our
successes, and must learn more from our failures.  The collection of cases
cited here provides rich opportunities for reflection that could help us to
avoid similar problems in the future.  Unfortunately, it also demonstrates
that the same types of mistakes tend to recur.  
<P><I>SEN</I> and RISKS also consider approaches for developing better computer
systems, e.g., safer, more reliable, more secure.  There are many approaches
to developing sound systems; none is guaranteed.  Whereas the emphasis in
the following list is on problems rather than on would-be solutions, the
pervasive nature of the problems suggests that techniques for the effective
development and operation of computer-related systems are frequently
ignored.  Worse yet, even ideal systems can result in serious risks, through
unanticipated technological problems or human foibles.  We include here
primarily cases that have been publically reported, although we know of
various additional cases whose existence for one reason or another has not
seen the light of day.  A few successes are also included, although the
failures seem to predominate.  We are always interested in hearing more
about successes.  Although I receive occasional complaints about the
preponderance of failures in RISKS, there appear to be very few real
successes.  Perhaps not enough folks are heeding some of the advice that you
can gather from RISKS and that are distilled in <I>Computer-Related
Risks.</I>
<H1><A NAME="2">Descriptor Symbols</A></H1>
The following descriptor symbols characterize each entry.
<P>! = Loss of life/lives; * = Potentially life-critical or safety problem
<P>V = Overall system or subsystem sur<B>V</B>i<B>V</B>ability problems 
    (with respect 
    to diVerse adVersities, including attacks <I>and</I> malfunctions).
    Startlingly many cases fit this category; many V-unflagged cases also
    represent failures to continue performing properly, or delays, or other
    cases of misuse that could have led to much more serious survivability 
    problems.
<P>$ = Loss of resources, primarily financial
<P>S = <B>S</B>ecurity/integrity/misuse problem;
P = <B>P</B>rivacy/rights abuse or concern
<P>H = Intentional <B>H</B>uman misuse (e.g., user-administrator-operator-penetrator)
<P>h = Accidental <B>H</B>uman misuse or other inadvertence
<P>I = <B>I</B>nsider; O = <B>O</B>utsider; A = Inadequate <B>A</B>uthentication or 
    <B>A</B>ccess controls
<P>d = System <B>D</B>evelopment problems
<P>e = Improper <B>E</B>volution/maintenance/upgrade. (H,h,i,f,d,e involve human foibles.)
<P>r = Problems with <B>R</B>equirements for system or
    operation (including the overall system concept)
<P>f = <B>F</B>laws (or <B>F</B>eatures in design, or hardware/software
    implementation
<P>i = Mis<B>I</B>nterpretation/confusion/human errors at a man-system 
    <B>I</B>nterface
<P>m = Hardware <B>M</B>alfunction attributable to system deficiencies, the
    physical environment, acts of God, etc.
<P>M = <B>M</B>alfunction specifically due to electronic or other interference
<P>+ = Beneficial; - = problematic with none of the above categories 
<P>@ = This item is also listed in another category
<H1><A NAME="3">Items Listed by Categories</A></H1>
<H2><A NAME="4">Recent Items (yet to be merged in)</A></H2>
Vm
PGN's Univ. Maryland survivable systems course beset with survivability
problems (S 25 1:)
<P>fm
California government agencies' computers fail, cars impounded;
Pac*Bell blamed (R 20 62)
<P>Vfm
Software disaster leaves new Australian submarine unfit;
wide range of pervasive hardware/software failures reported (R 20 48)
<P>*fh
Cancelling errors, serendipity in avoiding risks, and Kepler:
note by Henry Baker (R 20 48,51)
<P>Vm
Weather-predicting Cray C90 supercomputer lost in
fire, weather predictions reduced (R 20 62)
<P>Vm
Netcom file-server hardware outage loses half of the e-mail
customers, depending on first letter of name (R 20 49)
<P>m
Airport security check powers up computer (R 20 55)
<P>f
MIT system weather command gives "Temp: 2147483647 F
(2147483647 C)"; yes, that's <I>2<sup>31</sup> - 1</I>  (R 20 51-52);
<I>USA Today</I> weather page: high of 577 F  (R 20 58)
<P>?
NOAA radio +61 degrees F, wind-chill -64 (R 20 57)
<P>f/m/h?
Date failure on weather.com: 28 Apr not 16 Sep (R 20 58)
<P>$fh
Dispute over membership software used by German SPD (R 20 41)
<P>$f
Reliability of NT in embedded applications (R 20 41)
<P>f
Microsoft Word footnote problems irks federal appeals court:
Word does not count words correctly (R 20 52)
<P>fe
IE2 cannot read www.microsoft.com for upgrade (R 20 55)
<P>if
More anomalies in Microsoft driving directions (R 20 62-63)
<P>?
Risks of "self-destructing e-mail" from Disappearing Inc.
(R 20 62)
<P>h,h
Linux banned after Samba misconfigation blocks NT authentication (R 20 61)
<P>rh
Vending machine default phone number 000 (Australian emergency number)
yields hundreds of false alarms (R 20 47)
<P>f
Kangaroo helicopter responses mess up Australian virtual-reality simulators 
  (R 20 47,76)
<P>hf
Can you trust AT&amp;T Wireless PCS text messaging?  (no)
(R 20 52-53)
<P>f
Risks of financial planning engines with bogus results
(R 20 48)
<P>h
EverQuest is the "digital version of crack" (R 20 52)
<P>rd
More on California's software woes: welfare system problems
(R 20 53)
<P>h (but blamed on computer)
Argos retail offered Sony Nicam TV for 3&#163; instead
of 300&#163; (R 20 57)
<P>f
E*Trade Market Watch shows Dow Jones average at $1,
down $10936.88 (R 20 56)
<P>Vmfm
Power coming back on causes UPS to lose power (R 20 55)
<P>+/-??
Programming competency and the use of FORTH (R 20 49-53)
<P>$f
Toyota smog-warning computer suit (R 20 48)
<P>fh
CNN report on Gary Shandling lawsuit 
names him as "Changeling"; spelling corrected? (R 20 47)
<P>h White House admits over one year of VP's e-mail lost forever (S 25 4:8,
  R 20 91)
<P>f Software fault stops 76,000 customers receiving phone calls (S 25 4:8,
  R 20 87)
<P>h UCITA, the Uniform Computer Information Transactions Act (Schneier, 
  S 25 4:8 and R 20 87, and Simons in August 2000 <I>CACM</I> Inside Risks)
<P>f Microsoft Explorapedia Nature: earth rotates in wrong direction (R 20 87)
<P>+ Patent office revamps Web patent reviews (R 20 87)
<P>h-
50 million U.S. adults at risk for Internet illiteracy (R 21 08-09; S 26 1:18)
<P>(f/m/h?)
Computer-related sewage release into Massachusetts Bay
  (R 21 08; S 26 1:18)
<P>fid
Not-so-smart weapons in Kosovo (R 21 01; S 26 1:18)
<P>de
Satellite system outage hits Associated Press (R 21 04; S 26 1:18)
<P>m/f/h?
Root servers used by Network Solutions failed (R 21 03; S 26 1:18-19)
<P>$dh
$35M San Mateo CAlifornia health system upgrade is a downer;
  receivables backlog over $40M; blame scattered (R 20 98)
<P>$d
WA King County blew $38 million on canceled payroll system (R 21 01; S 26 1:19)
<P>eh
Northeastern University admits 25% too many students (600 extra) after
  DB upgrade loses potential applicants (R 21 01; S 26 1:20)
<P>f CSX crew spots problem signal, averts collision; insulation
  problem? (R 21 04; S 26 1:20)
<P>e
Upgrade to Guildford Station (Surrey, UK) software 
disables hundreds of train tickets for automated gates (R 20 94: S 26 1:20)
<P>fi
DC Metro can't label rerouted holiday trains on 4 Jul 2000: confusion
   (R 20 95; S 26 1:20)
<P>m
Computer crash caused loss of scheduled cab pickups (R 20 98; S 26 1:20)
<P>m
Sliced fiber-optic cable in Lancaster PA disrupts local and long-