[1011] in RISKS Forum

home help back first fref pref prev next nref lref last post

RISKS DIGEST 15.72

daemon@ATHENA.MIT.EDU (RISKS Forum)
Thu Mar 31 19:03:43 1994

From: RISKS Forum <risks@csl.sri.com>
Date: Thu, 31 Mar 94 15:55:57 PST
Reply-To: risks@csl.sri.com
To: RISKS-LIST:;@csl.sri.com

RISKS-LIST: RISKS-FORUM Digest  Thursday 31 March 1994  Volume 15 : Issue 72

         FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS 
   ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

***** See last item for information on RISKS (comp.risks) *****

  Contents:
Mud Slide Cuts East Coast Phones (PGN)
Briton Survives "Monster" Attack due to computer glitch (Will Deatrick)
Risk Evasion Measures Create New Risks (Stephen A. Stough)
Rental cars and financial derivatives (Phil Agre)
White collar crime in Australia (Mich Kabay)
Hotline reassignment (Mich Kabay)
Electronic purse (Mich Kabay)
Dials! (Bob Frankston)
Re: Spelling Checkers (Geoff Cole, Mary Shafer, Scott A. Siege, 
    Simson L. Garfinkel)
Disclaimers in software (PGN)
Junior Exec's Reverse Alchemy (Martin Howard)
Yet another SSN misuse (Brian Clapper)
EFF Summary of Public Interest NII Summit 29 Mar 1994 (Stanton McCandlish)
Info on RISKS (comp.risks), contributions, subscriptions, FTP, etc.  

----------------------------------------------------------------------

Date: Thu, 31 Mar 94 15:05:32 PST
From: "Peter G. Neumann" <neumann@csl.sri.com>
Subject: Mud Slide Cuts East Coast Phones

Telephone service to thousands of MCI Communications Corp. East-Coast customers
was disrupted early in the morning of 30 Mar 1994 when a mud slide severed a
fiber-optic cable.  Calls into and out of the Washington D.C., Maryland, and
Richmond VA areas were affected.  Custromers in Miami, Atlanta, and St.
Petersburg also reported disruptions.  [Source: San Francisco Chronicle, 
31 Mar 1994]

------------------------------

Date: 31 Mar 1994 12:20:48 -0800
From: "Will Deatrick" <Will_Deatrick@smtp.esl.com>
Subject: Briton Survives "Monster" Attack due to computer glitch

The 30 March 1994 issue of the San Diego Union contained a Reuters story from
Land's End, England.  It reads in part:

   A mechanical sea monster designed to terrify tourists attacked and injured
   a set designer working on it ... the hydraulic tentacled beast went out of
   control because of a temporary fault in its computer program and held 
   designer George Thain in its 3-foot toothed jaws for nearly a minute."

The man was badly bruised, but otherwise unharmed. The story does not state
what corrective action is planned, but the town chairman ``assured visitors
they would have nothing to fear from the monster, which will be kept 3 feet
away from spectators.''

Will   will_deatrick@smtp.esl.com

    [Also heard on NPR by gat@aig.jpl.nasa.gov (Erann Gat).  PGN]

------------------------------

Date: Wed, 30 Mar 1994 18:25:42 -0800 (PST)
From: "Stephen A. Stough" <sastough@rahul.net>
Subject: Risk Evasion Measures Create New Risks

Final report blames Lucas design, Lockheed's procedures for HTTB crash

      Federal safety officials yesterday blamed an inadequate actuator
 design by Lucas Aerospace and Lockheed's failure to take account of its
 shortcomings for the crash last year of Lockheed's one-of-a-kind High
 Technology Test Bed plane.
      In its final report on the Feb. 3, 1993, crash at Dobbins AFB, Ga.,
 the National Transportation Safety Board said the plane lost all rudder
 control during a high-speed taxi test with a simulated No. 1 engine
 failure when an experimental fly-by-wire control system for the rudder
 disengaged.
      "The disengagement was a result of the inadequate design of the
 rudder's integrated actuator package by its manufacturer," NTSB said.
      A design feature in the actuator removes hydraulic pressure if the
 rudder position commanded by the pilot exceeds the actual rudder
 actuator position for a specified time, and the rudder position trails,
 according to the report.
      Lucas Aerospace designed the package, a self-contained unit
 configured to be a drop-in replacement for the existing Hercules/HTTB
 dual tandem rudder actuator.
      The HTTB had recently been modified to evaluate power-by-wire
 flight control systems developed by Lockheed, along with some 50
 suppliers.  Lucas' package was demonstrated on two flights in March
 1992, which Lockheed, claiming success, noted was the first time the
 concept had been tested on a manned flight.
      Still, NTSB said that on at least one occasion the actuator had
 previously disengaged in flight, but "the company did not conduct a
 system safety review of the rudder bypass feature and its consequences
 to all flight regimes, nor of the (ground minimum control speed) test."
      The fact that neither pilot was trained as a flight test engineer
 contributed to the accident, the report said.
      "I do want to emphasize that the seven crew members were extremely
 qualified for the jobs they were doing," a Lockheed spokesman said in a
 prepared statement. "We still feel a great sense of loss for these
 colleagues and we praise their contributions to aviation. Beyond that,
 we prefer not to comment on the NTSB report, the investigation, or the
 accident."
      The highly modified L-100-20 Hercules transport was not programmed
 to become airborne, NTSB Chairman Carl Vogt said shortly after the
 accident (DAILY, Feb. 5, 1993, page 200). But an NTSB spokesman told The
 DAILY yesterday that "it is the analysis of the board that (the pilot)
 attempted to get the plane airborne at that moment," although to this
 day nobody knows why the takeoff was attempted.
      The report noted that the flight test plan specified that engine
 power be retarded if the rudder became ineffective. The aircraft was at
 full power but had not reached takeoff speed when it briefly became
 airborne, clipped a Navy clinic and crashed about 200 yards north of the
 runway, killing all seven aboard.
      Lockheed said it was reviewing the NTSB's data, adding that "action
 will be taken as appropriate."

------------------------------

Date: Thu, 31 Mar 1994 15:34:26 -0800
From: Phil Agre <pagre@weber.ucsd.edu>
Subject: Rental cars and financial derivatives

The 3/30/94 New York Times includes two articles that illustrate the
vexatious trade-offs inherent in emerging computer-based systems.

  Matthew L. Wald, Two technologies join to assist lost drivers, New 
  York Times, 30 March 1994, page A13.

This article is about a computer system that Nynex is developing, and that
Avis will be testing, in which rental cars are kept in close contact with the
rental agency through wireless communication.  The technology is sold as a way
of protecting drivers such as the tourists who were attacked in Florida; the
cars will be equipped with "panic buttons" and the like.  The article also
says that drivers will be able to call in for directions on wireless phones,
with the phone operators having access to digitally encoded GPS information
plotted against detailed maps, enough to be able to say "take the next left"
remotely.

So far so good.  But, at least the way the article describes it, the system
will also allow the company to track all drivers for all purposes, regardless
of whether they are in danger or need directions.  A natural suspicion is that
this generalized tracking capability is a major part of Avis's actual motives
for promoting the systems.  Motives aside, the privacy concerns may be serious
in any case.  How might these concerns be weighed against the advantages?  How
might the system be designed to obtain the advantages without the
disadvantages?  The article contains no hint that such questions are being
asked, and this is unfortunate.

  Barnaby J. Feder, Sophisticated software set for exotic financial
  trades, New York Times, 30 March 1993, pages C1, C5.

This article concerns "a marriage made in techno-geek heaven" between computer
people and high finance, specifically software for analyzing and administering
complex financial transactions based on so-called "derivatives" (see Risks
15.66).  One virtue of these systems is that they reduce the possibilities for
error, which are pretty serious when these kinds of transactions are done by
hand.  At the same time, such systems allow derivatives to be traded in much
larger volumes, and in much more complex ways.

Much popular imagery associates derivatives with speculation, for example
high-stakes gambling in commodity futures, but the real issue is almost the
opposite.  The usual purpose of these transactions is to engineer little
islands of stability and predictability within the swirling chaos of global
financial markets.  Indeed the metaphor of "engineering" is frequently used --
the software discussed in the article is referred to as "financial CAD
(computer-aided design)".  The potential trouble comes when massive financial
edifices are engineered badly.  When a steel-and-concrete building falls down,
the earth is there to catch it and a limited number of people get killed.  But
that's not how financial engineering works -- one collapsing structure has the
capacity to take others down with it (again, see Risks 15.66).  Obviously it's
in their interest to be careful, but let's hope they know what they're doing.

Phil Agre, UCSD

------------------------------

Date: 30 Mar 94 08:20:52 EST
From: "Mich Kabay [NCSA]" <75300.3232@CompuServe.COM>
Subject: White collar crime in Australia

>From the Reuter newswire via Executive News Service on CompuServe (GO ENS):

  CANBERRA, March 24 (Reuter) - White-collar crime is the most costly crime in
  Australia, totalling as much as Australian $13.7 billion ($9.8 million) a
  year, according to a report on Australia's law enforcement agencies.

Key points:

o	Committee included "representatives from the Australian Federal
Police, the National Crime Authority, the Attorney-General's Department, the
Finance Ministry and the Prime Minister's office."

o	Most white-collar crime is fraud.

o	Fraud "imposes the greatest economic cost on the Australian community
of all forms of major and organised crime."

o	Annual cost of fraud A$6.9-A$13.7 billion (U$4.9-$9.8 billion) (about
2/3 of cost of all crime in Australia, estimated at A$11-20 billion)

Michel E. Kabay, Director of Education, National Computer Security Assn

------------------------------

Date: 30 Mar 94 08:20:47 EST
From: "Mich Kabay [NCSA]" <75300.3232@CompuServe.COM>
Subject: Hotline reassignment

>From the Associated Press newswire via Executive News Service on CompuServe
(GO ENS):

  Telephone Sex
  ST. JOSEPH, Mich. (AP, 25 March 1994) -- People calling a hot line for
  victims of domestic violence got a phone sex line instead when authorities
  didn't notice that the agency operating the hot line had closed.

Police habitually distribute cards with numbers of support services to
victims.  Seems that the hot line was reassigned to a number advertising
various aural sex <g> services.  No one bothered to check the accuracy of the
card for two years.

[Consequence of poor quality assurance.]
	
Michel E. Kabay, Ph.D., Director of Education, National Computer Security Assn

------------------------------

Date: 30 Mar 94 08:20:56 EST
From: "Mich Kabay [NCSA]" <75300.3232@CompuServe.COM>
Subject: Electronic purse

>From the Associated Press newswire via Executive News Service on CompuServe
(GO ENS):  [presumably 30 Mar 1994]

MARY BETH SHERIDAN, AP Business Writer, reports on new developments in
electronic money.

  NEW YORK (AP) -- Visa International is developing a do-it-all credit card
  that could pay for highway tolls, telephone calls or chocolate bars from
  vending machines.
    The company said Tuesday it is joining with an international group of nine
  other financial companies to develop the product, called the Electronic
  Purse."

Key points:

o	Consortium working on standards for interoperability.

o	Plastic smartcard with embedded processor.

o	Transfer money from their accounts to the smartcard.
        perhaps at automated teller machines.

o	Trials planned for late 1995.

o	Must equip phones, vending machines, stores with I/O devices.

o	Current costs $3-$8/card; expect drop to $1 in high volume.

Michel E. Kabay, Director of Education, National Computer Security Assn

------------------------------

Date: Thu, 31 Mar 1994 09:47 -0400
From: Bob_Frankston@frankston.com
Subject: Dials!

My son (11) confronted a dial phone this past weekend and couldn't figure out
how to use it. He tried pressing the "buttons" but nothing happened. We
finally had to show him the concept of turning the dial. It took a little
practice to get it smooth.

I guess we've reached a milestone. What if he were confronted by the 
"anti-drug" pay phones with dials and had to dial 911? He'd be stuck.

In designing UI's we make assumptions about cultural norms or icons. Most 
people see the phone dial as a very obvious interface. It isn't, it's just 
something most of us learned at an early enough age to assume it is a part of 
the natural world.

------------------------------

Date: Wed, 30 Mar 94 10:15:05 BST
From: Geoff Cole <ln1gec@entoil.co.uk>
Subject: re: Spelling Checkers

It is the bane of my life that spell-checkers offer the following 
suggestions for my name:
	goof, gaffe and guff

Geoff Cole  geoff@entoil.co.uk

------------------------------

Date: Tue, 29 Mar 94 18:36:16 PST
From: shafer@ferhino.dfrf.nasa.gov (Mary Shafer)
Subject: Risks of spelling checkers (Girard, RISKS-15.71)

The DECMate II spell checker offered NAUSEA for NASA.  Singularly appropriate
some days.

Mary Shafer, SR-71 Chief Engineer, NASA Dryden Flight Research Center,
Edwards, CA    shafer@ferhino.dfrf.nasa.gov

------------------------------

Date: Wed, 30 Mar 94 13:12:45 CST
From: Scott A. Siege <sie6@midway.uchicago.edu>
Subject: Risk of Spelling Checkers

I have read with interest the RISKs associated with spelling checkers and
especially one in which a UNIX machine failed to recognize the word UNIX. A
similar thing happened with a spelling checker for the Apple Macintosh which
refused to recognize "Laserwriter" (Apple's printer) and instead suggested
"Laserjet" (HPs printer).

-Scott  s-siege@uchicago.edu

------------------------------

Date: Wed, 30 Mar 94 19:17:59 EST
From: simsong@next.cambridge.ma.us (Simson L. Garfinkel)
Subject: NeXT

NeXT is in the NeXT spell checker, but NeXTSTEP is not.

------------------------------

Date: Wed, 30 Mar 94 16:29:46 PST
From: "Peter G. Neumann" <neumann@csl.sri.com>
Subject: Disclaimers in software

We have had various past discussions on creative disclaimers.  Someone very
well known to me received the following, but I have anonymized everything to
protect whomever.

  You have our permission to use [...] as an NTP server.
  Please do not configure more than two of your systems to communicate
  with [...].

  Please understand that [...] makes absolutely no guarantees about the
  reliability, availability, accuracy, or security of this service.

  Also, please note that this service is likely to disappear fairly soon, 
  as it is based on a satellite that is about to fall out of the sky.

------------------------------

Date: 31 Mar 1994 16:35:09 +0800
From: MARTIN@411.uptown.com (MARTIN)
Subject: Junior Exec's Reverse Alchemy

Next time you get called into the bosses office, spare a thought for Juan
Pablo Davila, who WON'T be winning "Employee of the Month" at Codelco.

An extract from an article in THE ECONOMIST (p.66.Feb 12, 1994):

  SANTIAGO: Juan Pablo Davila claims that last September he made a mistake. He
  punched several 'sell' figures into his computer as 'buy', and vice-versa.
  Mr Davila was a fairly junior executive at Codelco, Chile's mammoth
  state-owned copper company. But he handled all Codelco's minerals futures
  contracts. By the time he noticed his slip he had already lost $40m. So he
  kept on dealing; when his credit lines finally ran out in January, his
  losses had reached $207m.

  Mr Davila's mistakes pose troubling questions for Codelco. Why did nobody
  notice the losses? Did his superiors fraudulently extend Mr Davila's credit
  lines? Can any money be recovered? On February 5th Codelco's president
  resigned, admitting that the losses exposed a failure of internal
  controls...

MARTIN HOWARD, HONG KONG 31/3/93 MARTIN@411.uptown.com Tel: (852) 527 2123
Unit E, 9 Floor, China Overseas Building 139 Hennessy Road, Wanchai, Hong Kong

------------------------------

Date: Thu, 31 Mar 1994 13:48:19 -0500 (EST)
From: Brian Clapper <bmc@tbsi.com>
Subject: Yet another SSN misuse

A colleague informs me that, in conjunction with graduate courses he's
taking at a local university, he was assigned an account on one of the
University's computer systems.  He was appalled to find out that his
assigned computer ID was his social security number.  When he asked whether
he could change the computer account ID, he was told, "No.  That's your
account number."  The system in question is on the Internet and apparently
has a Usenet newsgroup feed, as well.

I won't bother to list the risks.

Brian Clapper       Telebase Systems Inc., Wayne, PA

------------------------------

Date: Thu, 31 Mar 1994 17:57:54 -0500 (EST)
From: Stanton McCandlish <mech@eff.org>
Subject: EFF Summary of Public Interest NII Summit 29 Mar 1994 [To many groups]

EFF SUMMARY

PUBLIC INTEREST SUMMIT: SHAPING THE NATIONAL INFORMATION INFRASTRUCTURE

Hyatt Regency Hotel in Washington, DC, MARCH 29, 1994

OPENING REMARKS

Welcoming remarks were delivered by Andrew Blau from the Benton Foundation,
who expressed gratitude to the program sponsors and planning committee. 
Secretary of Commerce Ron Brown delivered pre-taped opening remarks on
video, because he was in Russia at the time of the conference.  Secretary
Brown, who chairs the Information Infrastructure Task Force (IITF),
restated the Administration's commitment to universal service, emphasizing
that no one should be left standing on the side of the road.  


PUBLIC INTEREST SUMMIT PANELS

DELIVERING THE GOODS: MEETING PUBLIC NEEDS?

Moderator: V. Lane Rawlins, President, Memphis State University 
C. Everett Koop, Senior Scholar, Koop Institute
David Lytel, White House Office of Science and Technology 
Jean Armour Polly, NY State Research and Education Network
Anthony Riddle, Chair, Alliance for Community Media 
Connie Stout, Director, Texas Education Network
Patricia Waak, National Audubon Society

This panel discussed the ways in which the National Information
Infrastructure (NII) can improve education, health care, and the
environment by enhancing communication and decisionmaking within
communities, as well as within state, national, and international
boundaries.  There was strong consensus on the panel and from the floor
that teaching people to use the tools is as important as building the
tools.  Choosing the right regulatory model is a difficult issue, but David
Lytel said that the Clinton Administration is committed to making sure that
citizens can be information producers, as well as information consumers. 
He stated that the challenge is to make sure that the NII becomes more than
just a large pipe for television reruns and movies, home shopping,
electronic games, and gambling.  The architecture of the NII must guarantee
that needs outside the commercial marketplace, including cultural and other
public benefits, are met. 


A LINK INTO EVERY HOME: HOW, WHAT, AND WHEN?

Moderator: Allen Hammond, Director, Communications Media Center, NY Law School
Ron Binz, Director, Colorado Office of Consumer Counsel
Mark Cooper, Director of Research, Consumer Federation of America
Deborah Kaplan, Vice President, World Institute on Disability
Robert Larson, President/General Manager, WTVS-Detroit
Michael Nelson, White House Office of Science and Technology
Andrew J. Schwartzman, Executive Director, Media Access Project

The panel explored the challenges in applying the concept of universal
service to the NII to ensure access for everyone.  The panelists discussed
universal service funding mechanisms, the role of government in supporting
a diversity of voices, and the need for public interest advocacy before the
Federal Communications Commission.  Mike Nelson said that the
Administration's model for the NII is the Internet, and its goals for
universal service are to provide subsidies to enable open access for as
many people as possible, to adopt pro-competitive policies, to require
nondiscriminatory prices, to prohibit network providers from controlling
information, and to enhance interoperability and interconnection
requirements.  

Addressing the difference between the common carriage regime for telephone
companies and the market/consumer model for the cable industry, Andrew
Schwartzman argued for the common carriage model instead of the cable
model, because the cable model is passive and connotes people receiving
only limited services such as video-on-demand and home shopping.  Common
carriage would help NII users to be speakers as well as listeners, and
producers as well as consumers.  Ron Binz offered the phrase "Information
Superhypeway" and cautioned that a fully competitive telecommunications
industry is not right around the corner.  The key decision, according to
Binz, is whether to rely on taxing voice communications service to fund the
NII.  Binz also characterized as "industry propaganda" the view that
subsidies should be provided to enable access for as many people as
possible.  Mark Cooper challenged the widely cited statistic that 93% of
the population enjoys telephone service.  Instead, he stated that the 7%
"unsolution" is really closer to 30%, which includes individuals with
disabilities and low incomes.  He argued that those who cannot afford
access to the NII will be assured access if everyone who can afford to use
the NII is required to pay for it.  

Deborah Kaplan took the discussion beyond the issue of funding to the issue
of access.  She argued that the 7% of the population that is underserved is
a product of the market model.  There is no one-size-fits-all solution, and
policy input from low-income people is essential.  She raised the concern
that access to the NII for disabled individuals may be uniquely difficult,
especially if the NII architecture is modeled on voice-based telephone
service.  Schwartzman emphasized the First Amendment dimension of universal
service, including artistic speech, and the need to protect against any
form of censorship.  Bob Larson explained how public broadcasting's role in
promoting local service responsibilities and public service duties is a
model for what the NII can do to marshall local resources.  The NII could
augment public broadcasting's efforts aimed at reducing violence and
improving the well-being of young people.


SPEECH BY VICE PRESIDENT AL GORE

The Vice President was introduced by Peter Goldmark, President of The
Rockefeller Foundation, who emphasized the historical role of the NII in
charting the future of democracy.  Vice President Gore stated the
Administration's commitment to wiring every classroom, clinic, and library in
the United States to the NII within the next five years.  Every person will
benefit from the NII.  However, while we already have the technology, we do
not yet have the infrastructure.  The National Telecommunication and
Information Administration in the Department of Commerce recently announced
the availability of funding for some of the aspects of the NII and already
have received 3,500 inquiries.

Reforming telecommunications law is essential.  Universal service means
lower prices for everyone.  Open access means receiving and sending
information across the NII.  The future will look like the Internet if we
make sure the NII is open and accessible like the personal computer. 

Networked communities are consistent with our democratic form of government
and distinguish it from  communism and fascism.  We need to increase access
to government information to enhance community decisionmaking.  We are
increasing the availability of government information.  SeniorNet is
providing services to senior citizens.  The Environmental Protection
Agency's toxics release inventory is empowering citizens to ameliorate
environmental hazards in their communities.  HUD has begun to put
information about fair housing and fair lending on the net.  We can empower
our representative democracy.  People closest to the problems are the
smartest about the solutions.  


BUILDING COMMUNITIES AND THE ECONOMY

Moderator: Linda Tarr-Whelan, President and Exec. Dir., Center for Policy
Alternatives
Morton Bahr, President, Communications Workers of America 
Cushing Dolbeare, President, Low-Income Housing Coalition 
Thomas Kalil, National Economic Council for Science and Technology
Anthony Pharr, Counsel, Office of Communication, United Church of Christ
Diana Roose, Research Director, National Association of Working Women
Randy Ross, Vice President, American Indian Telecommunications 

After brief introductory statements, the panelists discussed what the NII
means for generating jobs and economic benefits.  The goal is to use the
NII to create better, high wage jobs.  Development of information policy
must make sure that the NII is a tool for community planning. 
Telecommuting will have an impact on the national economy by enabling
people to live and work anywhere, including in other countries.  We should
use the technology that exists now in order to do the kind of planning
needed to make sure the new technologies produce advances in our national
economy.


MAKING DEMOCRACY WORK

Moderator:  Sonia Jarvis, Exec. Dir., National Coalition for Black Voter
Participation
Brian Banks, Policy Research Action Group
Jim Butler, Director, AARP/VOTE, American Association of Retired Persons 
Mitchell Kapor, Chair, Electronic Frontier Foundation 
Sally Katzen, Chair, Information Policy Committee, IITF 
Ralph Nader, Center for the Study of Responsive Law 
Nadine Strossen, ACLU

This panel addressed whether the NII can support increased civic
participation, free speech and assembly, and privacy.  Brian Banks stressed
the NII's ability to bring about a reconfiguration of hierarchies; enhanced
citizen participation in the decision making process would be the most
fundamental change.  Jim Butler revisited the NII's potential for community
development, educational opportunity, and access to government databases. 
Mitchell Kapor focused on the potential for achieving the Jeffersonian
principles of individual liberty and decentralization.  The Internet has
enormous democratic potential, but it is not easy to use.  The emphasis
should be on the Internet and interactivity, not on the Information
Superhighway and Hollywood reruns. Everyone should become hands-on, start
learning and interacting, and ask for help when needed.  The networks
should be easy to use, but we cannot wait for a national handout.  

Sally Katzen stressed the goal of economic sustainable development.  The
government should not be solely responsible for the nation's information
systems.  The toxics release inventory is a model that has worked well.  Ralph
Nader, who still uses a manual Underwood typewriter, questioned what all this
new technology will do about such problems as violence in the schools.  Will
it just put more people into the Office of Management and Budget and lead to
mega-billion dollar overselling of unused software?  While there needs to be a
window on government databases, there is not reason for them to be
overprivatized or overmonopolized.  Educational efforts, like liberal
arts-type courses, could motivate people to participate.  Nadine Strossen
argued that the common carriage model is important to ensure universal
access--but security and privacy are equally important.  We have to make
certain that there are no censorial controls over content.  All of us must
lobby for privacy protection -- and we must fight the clipper chip.

Stanton McCandlish * mech@eff.org * Electronic Frontier Found. OnlineActivist
"In a Time/CNN poll of 1,000 Americans conducted last week by Yankelovich
Partners, two-thirds said it was more important to protect the privacy of
phone calls than to preserve the ability of police to conduct wiretaps.
When informed about the Clipper Chip, 80% said they opposed it."
- Philip Elmer-Dewitt, "Who Should Keep the Keys", TIME, Mar. 14 1994

------------------------------

Date: ongoing
From: RISKS-request@csl.sri.com
Subject: Info on RISKS (comp.risks), contributions, subscriptions, FTP, etc.  

 The RISKS Forum is a moderated digest.  Its USENET equivalent is comp.risks.
 Undigestifiers are available throughout the Internet, but not from RISKS.  

 SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup on your system, if possible
 and convenient for you.  BITNET folks may use a LISTSERV (e.g., LISTSERV@UGA)
 with SUBSCRIBE RISKS or UNSUBSCRIBE RISKS as needed.  Users on US Military 
 and Government machines should contact <risks-request@pica.army.mil> (Dennis 
 Rears).  UK subscribers please contact <Lindsay.Marshall@newcastle.ac.uk>.
 Local redistribution services are provided at many other sites as well.  
 Check FIRST with your local system or netnews wizards.  If that does not
 work, send requests to <risks-request@csl.sri.com> (not automated).  

 CONTRIBUTIONS: to risks@csl.sri.com, with appropriate,  substantive Subject:
 line, otherwise they may be ignored.  Must be relevant, sound, in good taste,
 objective, cogent, coherent, concise, and nonrepetitious.  Diversity is 
 welcome, but not personal attacks.  PLEASE DO NOT INCLUDE ENTIRE PREVIOUS
 MESSAGES in responses to them.  Contributions will not be ACKed; the load is 
 too great.  **PLEASE** include your name & legitimate Internet FROM: address,
 especially from .UUCP and .BITNET folks.  Anonymized mail is not accepted.
 ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
 Relevant contributions may appear in the RISKS section of regular issues
 of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.

 ARCHIVES: "ftp crvax.sri.com<CR>login anonymous<CR>YourName<CR> cd risks:<CR>
 Issue j of volume 15 is in that directory: "get risks-15.j<CR>".  For issues
 of earlier volumes, "get [.i]risks-i.j<CR>" (where i=1 to 14, j always TWO 
 digits) for Vol i Issue j.  Vol i summaries in j=00.  "dir" (or "dir [.i]") 
 lists (sub)directory; "bye<CR>" logs out.  CRVAX.SRI.COM = [128.18.30.65];
 <CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.
 WAIS and bitftp@pucc.Princeton.EDU are alternative repositories.

 FAX: ONLY IF YOU CANNOT GET RISKS ON-LINE, you may be interested in receiving 
 it via fax; phone +1 (818) 225-2800, or fax +1 (818) 225-7203 for info
 regarding fax delivery.  PLEASE DO NOT USE THOSE NUMBERS FOR GENERAL 
 RISKS COMMUNICATIONS; as a last resort you may try phone PGN at 
 +1 (415) 859-2375 if you cannot E-mail risks-request@CSL.SRI.COM .

------------------------------

End of RISKS-FORUM Digest 15.72
************************

home help back first fref pref prev next nref lref last post