Subject: RISKS DIGEST 13.45
REPLY-TO: [email protected]

RISKS-LIST: RISKS-FORUM Digest  Tuesday 28 April 1992  Volume 13 : Issue 45

       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
  ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

 Contents:
Software observing daylight savings time when it *shouldn't* (Mike Morton)
Is it getting too easy?  (Spreadsheetology) (Robert Slade)
IEEE/CS Workshop on Ethical Standards for the Profession (Jim Horning)
FBI and Mailing Lists (Mary Culnan)
Re: Voice mail security (Dan Wing)
Re: Tracking by cellular phone (John Karabaic, Phillip. D. Brown)
COMPASS '92: Conference on Computer Assurance (Laura Ippolito)

The RISKS Forum is moderated.  Contributions should be relevant, sound, in
good taste, objective, coherent, concise, and nonrepetitious.  Diversity is
welcome.  CONTRIBUTIONS to [email protected], with relevant, substantive
"Subject:" line.  Others may be ignored!  Contributions will not be ACKed.
The load is too great.  **PLEASE** INCLUDE YOUR NAME & INTERNET FROM: ADDRESS,
especially .UUCP folks.  REQUESTS please to [email protected].
Vol i issue j, type "FTP CRVAX.SRI.COM<CR>login anonymous<CR>AnyNonNullPW<CR>
CD RISKS:<CR>GET RISKS-i.j<CR>" (where i=1 to 13, j always TWO digits).  Vol i
summaries in j=00; "dir risks-*.*<CR>" gives directory; "bye<CR>" logs out.
The COLON in "CD RISKS:" is essential.  "CRVAX.SRI.COM" = "128.18.10.1".
<CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.
ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
Relevant contributions may appear in the RISKS section of regular issues
of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.

----------------------------------------------------------------------

Date: Tue, 28 Apr 92 10:45:47 HST
From: Mike Morton <[email protected]>
Subject: Software observing daylight savings time when it *shouldn't*

From the Honolulu Star-Bulletin's "Streetwise" column, 27 April 1992:

Time change leaves stoplights out of sync (By David Oshiro)

Here's a story on how the clever machines that run our lives are sometimes too
clever.

Three weeks ago, most of the mainland switched to daylight savings time.
Unbeknown to city transportation officials here, a microchip controlling
traffic signals on Kalanianaole Highway contained a program written on the
mainland that contained an automatic conversion to daylight-saving [sic] time.

So, *voila*!  On Monday, April 6, the timing for peak traffic hours kicked in
an hour earlier, throwing signals off.  Signals that were changing in
200-second cycles began to change in 185-second cycles.

It was only a 15-second difference, and it only lasted an hour, but that was
enough to mess up morning rush-hour traffic [which is pretty bad on this
highway].

City workers, however, were able to figure out the problem and fix it that day.

A city transportation official said that there was no easy way to test that
chip in advance, to see it [sic] would have worked properly when the switch to
daylight-saving time occurred.
                                  Mike Morton  <[email protected]>

------------------------------

Date: Mon, 27 Apr 1992 20:52:50 GMT
From: [email protected] (Robert Slade)
Subject: Is it getting too easy?  (Spreadsheetology)

This past week I was at a Microsoft Technical Seminar (read "boasting session")
and saw an interesting promotional piece.  Although longer than a normal ad, I
suspect it is planned to use the "playlet" for some kind of media presentation.
The "plot" is that Microsoft's Excel spreadsheet is so easy to use, and has so
many "labour saving" features that two dolts who have forgotten to put together
their presentation are able to do so in a one minute elevator ride to
"executive territory".

Other than stylistic aids, the primary function promoted is an "extension"
function which will "forecast trends".  With so much spreadsheet use being
devoted to business plans and cash flow projections, the attraction of such a
function is obvious.

However, the ad immediately triggered an alarm.  The feature is introduced, in
the ad, by the fact that the executive "wants to see ten percent growth".  The
original figure is $1000, so the user fills in the next column as $1100.  No
problem.  Then the extension feature is brought into play, and I mentally
follow along with the arithmetic.  The next column should say $1210.  But the
spreadsheet fills in $1200.  The fourth column should be $1331, but instead is
filled in as $1300.  Ah, to the numerate person, the reason is obvious: the
function is not a geometric "ten percent growth" but an arithmetic adding of an
additional hundred dollars each time.

To the numerate person, obvious.  To the general public?  How many of the
"average" business computer users would even notice?

The RISK of this particular choice of "extension" algorithm might not be all
that important.  However, it points out the increasing addition of "aids" in
computerized systems, and the need to note carefully the use that the using
audience is likely to put those aids to.  Business computer users, in my
experience, tend to want to think in "percentage" figures (eg. annual growth).
A simple "adding" function for forecasting will not give them the "correct"
answer appropriate to their mental model.

Small though this RISK might be in this instance, we have seen this same
principal at work in situations with much higher stakes.

------------------------------

Date: Mon, 27 Apr 92 17:47:20 -0700
From: [email protected]
Subject: IEEE/CS Workshop on Ethical Standards for the Profession

This workshop is discussed at length in the April issue of COMPUTER, pp. 76-78.
I don't recall seeing it on RISKS, although the general topic has certainly had
its share of discussion and flame in the past.
                                                        Jim H.

------------------------------

Date: Mon, 27 Apr 1992 19:42 EDT
From: [email protected]
Subject: FBI and Mailing Lists

The 20 April 1992 issue of DM News, a direct marketing trade publication,
reports that within the past two weeks, Metromail and Donnelly Marketing (two
of the very largest mailing list companies) were approached by the FBI which is
seeking mailing lists for use in investigations.  Other mailing list firms also
received feelers according to the story. "Neither of the identified firms would
discuss details, but one source familiar with the effort said the FBI
apparently is seeking access to a compiled consumer database for investigatory
uses."

"The FBI agents showed 'detailed awareness' of the products they were seeking,
and claimed to have already worked with several mailing list companies,
according to the source."

Metromail, according to the article, has been supplying the FBI with its
MetroNet address lookup service for two years.  The FBI said that the database
is used to confirm addresses of people the FBI needs to locate for an
interview.

This marks the first time since the IRS tried to buy mailing lists in 1984 that
a government agency has attempted to use mailing lists for enforcement
purposes.

In a separate but related story in the April 24 issue of the Friday Report, a
direct marketing newsletter, the RBOC's are teaming up with other firms to
develop white page directories on CD-ROM.  For example, US West has a joint
venture with PhoneDisc USA of Marblehead, Ma.  The article states that the
company offers lists failing mailing list enhancements to law enforcement
agencies.  [NOTE: an enhanced list means the names and addresses were matched
with a marketing database and additional demographic information was added to
the list from the marketing database].

Mary Culnan, School of Business Administration, Georgetown University
[email protected]

------------------------------

Date: 27 Apr 1992 21:25:31 -0600 (MDT)
From: Dan Wing <[email protected]>
Subject: Re: Voice mail security (Dickson, RISKS-13.44)

>Are call loggers a problem when you give your password to a mail retreival
>system form a hotel or an office.  Is there a hacker market for this info?
>Finally how prevelant is this problem in various parts of the world?

Many hotels detail your phone bill and include the phone numbers you called
during your stay.  How often does the hotel phone system capture your
MCI/Sprint/AT&T calling-card number (which you touch-toned into the MCI,
Sprint, or AT&T computer), too?

I can easily change the PIN on my voice-mail system; changing the PIN on my
calling card requires a call to the long-distance carrier, and possibly a new
card - something the long-distance carrier isn't going to want to do too often.

-Dan Wing, [email protected], [email protected]
Systems Programmer, University Hospital, Denver

------------------------------

Date: Tue, 28 Apr 92 16:10:47 EDT
From: [email protected]
Subject: Re: Tracking by cellular phone (Kush, RISKS-13.44)

I had the same experience myself recently.  But, in addition to instructions,
it was also a telemarketing call by the local carrier!  Since I use my cellular
phone as a contact line for technical support and am always expecting calls (I
subscribe to a nationwide switching service), I was rather angry that they used
my time on the line like that.  Especially since it was during a driving
rainstorm while I was on the Interstate in the hills of northern Kentucky!  I
called *611 and told the person on the line to get me off whatever list I was
on to get this unnecessary greeting and unwanted telemarketing.  I haven't been
bothered since, but I don't know if my call got me off any "list".

John S. Karabaic, Systems Engineer, [email protected], 513 792 5904
NeXT Computer, Inc.; 4434 Carver Woods Dr.;  Cincinnati, OH 45242

------------------------------

Date: 28 Apr 92 15:29:00 UT
From: PHILLIP.D.BROWN#m#[email protected]
Subject: Re: Tracking by Cellular Phone (Kush, RISKS-13.44)

Not only *could* the cellular phone company track one's movement "all over the
country" (although with great difficulty and expense using today's switches),
it is an active industry goal for the next generation of technology.  "Call
Delivery" -- making your phone ring when someone dials your number, regardless
of your geographic location and serving carrier of the moment -- is an integral
part of the standard being developed for interswitch communication (EIA/TIA
IS-41).  It is also seen as a key to making Personal Communication Networks
(PCN) work.

What happened to you in Georgia is the result of a feature known as "autonomous
registration", by which the serving switch instructs a mobile unit to register
(i.e. transmit its identity information including mobile phone number and
serial number) as soon as radio contact is established (as indicated on the
mobile's handset display by the "service light" or "service bars").  When the
system detected you were a roamer, it placed a call to your phone and played
the recorded greeting for your edification (although I don't know BellSouth's
policy, it is quite unlikely you were charged for this call).

Furthermore, Automatic Vehicle Location (AVL) services are also seen as highly
desirable by a significant subgroup of wireless communication users (truckers
and victims of car thieves come immediately to mind).  There are companies that
claim to be able to determine the position of a mobile unit in a cell site to
within 100 feet using only the received 800 MHz radio signal, but the
technology is unreliable and expensive.  The more popular solution is to marry
a Global Positioning System (GPS) receiver to a cellular phone or other
wireless terminal, but this is both proprietary and also expensive.

As long as the user retains the ability to "disappear" by turning the phone
off, I see the benefit as outweighing the risk in this form of network
tracking.  I squirm a lot more when I read about "beacons" placed in every car
for automatic toll collection and vehicle monitoring, because these specialized
systems exist solely for the purpose of tracking and accounting (NOTE: does
anyone really expect there to be an "off" switch on such a device?).  It's one
thing to choose to be tracked, and quite another to have an "Eye in the Sky"
checking up on you...

Phil Brown, Project Engineer, GTE Mobile Communications
Internet address: phillip.d.brown#m#[email protected]

------------------------------

Date: Fri, 24 Apr 92 09:20:30 EDT
From: Laura Ippolito <[email protected]>
Subject: COMPASS '92: Conference on Computer Assurance

                      First Announcement
 COMPASS '92: SEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE
   Systems Integrity, Software Safety, and Process Security

                       June 15-18, 1992
                       Gaithersburg, Md.

        National Institute of Standards and Technology
                  Technology Administration
                  U.S. Department of Commerce

Department of Defense Approval: "In reviewing the Institute for Electrical and
Electronics Engineer's Plans for COMPASS '92, the Assistant Secretary of
Defense (Public Affairs) finds this event meets the standards for participation
by DoD personnel under instruction 5410.20 and DoD Standards of Conduct
Directive 5500.7.  This finding does not constitute endorsement of attendance
which must be determined by each DoD component."

Compass             IEEE Aerospace and Electronic Systems Society
Sponsors            IEEE National Capital Area Council

In cooperation with The British Computer Society

Conference Sponsors: ARINC Research Corporation, Computer Sciences Corporation
 Control Systems Analysis, Department of Defense, George Mason University
 Logicon, Inc., National Institute of Standards and Technology,
 Naval Research Laboratory, Naval Surface Warfare Center
 Research Triangle Institute, Systems Safety Society, TRW Systems Division

Program Committee:
 Paul Ammann, George Mason University
 Greg Chisholm, Argonne National Laboratory
 John Dobson, University of Newcastle Upon Tyne
 Frank Houston, Food and Drug Administration
 William S. Junk, University of Idaho
 John Knight, University of Virginia
 D. Richard Kuhn, NIST
 John McDermid, University of York
 John McHugh, University of North Carolina
 Gerry Masson, Johns Hopkins University
 Reginald Meeson, Institute for Defense Analyses
 Andrew Moore, Naval Research Laboratory
 Matthew Morgenstern, Xerox Advanced Information Technology
 Jim Purtilo, University of Maryland
 Edgar H. Sibley, George Mason University
 Tony Zawilski, The Mitre Corporation

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST)

A principal agency of the Department of Commerce's Technology Administration,
NIST has as its mission to strengthen U.S.  industry's competitiveness, advance
science, and improve public health, safety, and the environment.

NIST conducts basic and applied research in the physical sciences and
engineering, developing measurement techniques, test methods, standards, and
related services. The Institute does generic and precompetitive research and
development work on new advanced technologies.

NIST researchers work at the frontiers of science and technology in such areas
as chemical science and technology, physics, materials science and engineering,
electronics and electrical engineering, manufacturing engineering, computer
systems, building technology and fire safety, and computing and applied
mathematics.


INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS (IEEE)

The Institute of Electrical and Electronics Engineers is the world's largest
technical professional society. Founded in 1884 by a handful of practitioners
of the new electrical engineering discipline, today's Institute is comprised of
more than 320,000 members who conduct and participate in its activities in 147
countries. The men and women of the IEEE are the technical and scientific
professionals making the revolutionary engineering advances which are reshaping
our world today.

The technical objectives of the IEEE focus on advancing the theory and practice
of electrical, electronics and computer engineering and computer science. To
realize these objectives, the IEEE sponsors technical conferences, symposia and
local meetings worldwide; publishes nearly 25% of the world's technical papers
in electrical, electronics and computer engineering; and provides educational
programs to keep its members' knowledge and expertise state-of-the-art. The
purpose of all these activities is two fold: To enhance the quality of life for
all peoples through improved public awareness of the influences and
applications of its technologies; and, to advance the standing of the
engineering profession and its members.

The IEEE, through its members, provides leadership in areas ranging from
aerospace, computers and communications to biomedical technology, electric
power and consumer electronics. For the latest research and innovations in the
many diverse fields of electrical and electronics engineering, industry and
individuals look to the IEEE.

                 COMPASS '92  June 15-18, 1992
                     About the Conference

COMPASS is an acronym formed from COMPuter ASSurance, the subject of this
conference, the seventh of a series that began with COMPASS '86. According to
its charter, "The purpose of COMPASS is to advance the theory and practice of
critical systems through the medium of scientific and engineering meetings and
publications. The organization, under the IEEE, is dedicated to the study of
critical systems, especially those using digital computers or other new
technologies."

Critical systems are defined as systems whose failure could cause injury, loss
of life, or significant property loss or damage. Such failures may be failures
of commission, doing what should not be done, or of omission, not doing what
should be done. Critical systems have failed in the past. Radiation therapy
machines have killed cancer patients; industrial robots have killed workers;
spacecraft have been destroyed; and, hackers have vandalized and/or stolen from
information systems. The goal of COMPASS is to find and publicize ways to
prevent unacceptable failures of critical systems.

COMPASS expresses the idea of "Pointing the Way" and of "encompassing" many
technologies and technical disciplines. The logo, a variation of yin-yang
overlaying a compass rose, symbolizes both of these ideas.

COMPASS '92 has adopted the slogan "Building The Right System, Right." This
expresses the need for the developers of critical systems to rigorously define
the right requirements and ensure that they are satisfied, resulting in systems
that function as intended.

The sponsors and organizers of COMPASS encourage you to participate in future
COMPASS activities. Contact any member of the conference committee or the
conference board for more information.

Conference Committee
 Board of Directors Chair: Dolores R. Wallace, NIST
 General Chair: Robert Ayers, ARINC Research Corporation
 Program Chair: Edgar H. Sibley, George Mason University
 Local Arrangements: Laura M. Ippolito, NIST
 Publications: Julie Langston, Computer Sciences Corporation
 Publicity: Paul Anderson, Space & Naval Warfare Systems Command Division
 Registration: Judy Bramlage, General Accounting Office
 Treasurer: Bonnie Danner, TRW Systems Division
 Tutorials: Michael Brown, Naval Surface Warfare Center

COMPASS '92, Monday, 15 June 1992

9:00 a.m.  Tutorial 1: "Approaches to Developing Safety-Critical Software"

 Stephen S. Cha, Charles H. Lavine, and Jeffery C. Thomas, Aerospace
 Corporation, El Segundo, Ca.

 This tutorial surveys various software safety techniques proposed in
 literature or currently in practice. Following an introduction to software
 safety concepts, several industrial software development examples will be
 examined. The tutorial concludes with a discussion on formal methods and
 future research directions.

12:45 p.m.     Lunch

2:00 p.m.      Tutorial 2: "Interlocks-A Safety Engineering Tool"

 Phil Sedgwick, Control Systems Analysis, Newport, RI

 This tutorial introduces INTERLOCKS, a methodology and PC-based tool, that
 graphically describes and simulates the operation of computer system
 controls.  INTERLOCKS, in use by the DoD, employs a graphic language familiar
 to hardware and software engineers-simple AND and OR logic. The result for
 safety engineers is an INTERLOCKS network that models and simulates the
 hardware, software, and operator events that are prerequisite to critical
 function initiation.

COMPASS '92, Tuesday, 16 June 1992

9:00 a.m.  Opening Remarks, Conference General Chair: Robert Ayers, ARINC
          Research Corporation, Annapolis, MD.

9:15 a.m.  The Technical Program, Program Committee Chair: Edgar H. Sibley,
          GMU, Fairfax, VA.

9:30 a.m.  Keynote Speaker, John Rushby, SRI International, Menlo Park, CA.
          "What Really Goes Wrong, And What Might Fix It?"

11:00 a.m. Session 1 Verification
          Chair: Andrew Moore, Naval Research Laboratory, Washington, D.C.

 "Using Z Specifications in Category Partition Testing", Nina Amla and Paul
 Ammann, George Mason University, Fairfax, VA.

 "Verification of Numerical Programs Using Penelope/Ariel", Sanjiva Prasad,
 ORA Corporation, Ithaca, N.Y.

 "Modular Verification of Ada Library Units", Carla Marceau and Wolfgang
 Polak, ORA Corporation, Ithaca, N.Y.

12:45 p.m.     Lunch

2:00 p.m.  Session 2 Security, Chair: Paul Ammann, George Mason University

 "A Probabilistic Approach to Assurance of Database Design", Lucian Russell,
 Argonne National Laboratory, Argonne, Ill.

 "Formal Security Specifications for Open Distributed Systems", Sead Muftik,
 DSV Dept., Stockholm University, Sweden and Univ. of Sarajevo, Yugoslavia

 "A Formal Approach for Security Evaluation", John A. McDermid and Qi Shi,
 University of York, UK

4:00 p.m.  Debate: Resolved: "Certain Safety-Critical Systems Should Not Be
          Computerized".  Moderated by John Knight, University of VA

5:30 p.m.  Close of Daytime Activities

7:00 p.m.  Birds of a Feather Session, Marriott

COMPASS '92, Wednesday, 17 June 1992

9:00 a.m.  Keynote Speaker, Ted Ralston, Ralston Research Associates, Tacoma,
          WA, "Preliminary Report on the International Study on Industrial
          Experience with Formal Methods"

10:30 a.m.     Panel 1 Formal Methods in Industry

 .., Naval Research Laboratory, Washington, D.C.
 Leo Beltracchi, United States Regulatory Commission, Washington, D.C.

12:45 p.m.     Lunch

2:00 p.m.  Session 3 Safety, Chair: M. Frank Houston, Food and Drug Admin.,
          Rockville, Md.

 "Efficient Response Time Bound Analysis of Real-Time Rule-Based Systems",
  Albert Mo Kim Cheng and Chia-Hung Chen, University of Houston, Houston, TX

 "The Use of Ada PDL as the Basis for Validating a System Specified by Control
 Flow Logic", Richard B. Mead, ARINC Research Corporation, Annapolis, MD.

 One further paper to be selected

4:00 p.m.  Panel 2 Software Safety and Economics, Chair: J. Bret Michael,
          George Mason University, Fairfax, VA.

 Stephen Fortier, Intermetrics, McLean, VA.
 William S. Junk, University of Idaho
 Edward A. Addy, Logicon, Inc., Dahlgren, VA.
 John McHugh, University of North Carolina, Chapel Hill, N.C.

5:30 p.m.      Close of Daytime Activities

6:30 p.m.      Banquet with Dinner Speaker, Marriott

COMPASS '92, Thursday, 18 June 1992

9:00 a.m.  Session 4 Processes, Chair: Reginald Meeson, IDA

 "A Review of Computer Controlled Systems Safety and Quality Assurance
 Concerns for Acquisition Managers", John R. Friend, U.S. Navy, Polaris
 Missile Facility, Charleston, S.C.

 "An Analysis of Selected Software Safety Standards", Dolores Wallace, D.
 Richard Kuhn, and Laura Ippolito, NIST, Gaithersburg, Md.

 "A Process Representation Experiment Using MVP-L", Carol Diane Klinger,
 Melissa Neviaser, and Ann Marmor-Squires, TRW, Fairfax, Va.; Christopher M.
 Lott and H. Dieter Rombach, University of Maryland, College Park, Md.

11:00 a.m.  Panel 3 Software in Trial - Liability and Other
           Legal Issues (A Dramatization)

 Moderator: Michael S. Nash, Esq., IDA, Alexandria, VA

 Jay T. Westermeier, Fenwick and West, Washington, D.C., For the Plaintiff
 To be selected, For the Defendant
 Richard L. Wexelblat, IDA, Alexandria, Va., As Expert Witness
 To be selected, Insurer
 To be selected, Harried Software Developer/Programmer

12:45 p.m.     Lunch

2:00 p.m.      Session 5 Software Safety Standards

 "IEEE P-1228: Latest Status", Cindy Wright, DISA, Tysons Corner, Va.

 "IEC65A, WG9 and WG10 -- System and Software Safety Standards for
 Programmable Electronic Systems", Victor Maggioli, DuPont, Newark, Del.

3:30 p.m.      Awards and Closing Ceremony

4:00 p.m.      Conference Closing

NIST is located in Gaithersburg, Md., approximately 25 miles northwest of
Washington, D.C. The meeting will be held in the Green Auditorium of the
Administration Building.

Social Functions: A banquet with a cash bar and banquet speaker will
 be held at the Gaithersburg Marriott on Wednesday, June 17.

Transportation: BWI Limo, 301/441-2345, offers commercial van service from
Baltimore-Washington Airport to the Gaithersburg area. Call for reservations.

 Airport Transfer Van Service, 301/948-4515, is available from Dulles
 International and Washington National Airports to Gaithersburg.

 The Washington Metro has subway service to Gaithersburg. Metro can be boarded
 at Washington National Airport. Take a Yellow Line train marked "Mount Vernon
 Square" to Gallery Place and transfer to a Red Line train marked "Shady Grove"
 to Shady Grove. Service is every 6 to 15 minutes depending on the time of day.
 The time from National to Shady Grove is about 50 minutes. The Shady Grove
 station is approximately four miles from the Marriott Hotel.

Driving Instructions: From northbound I-270 take Exit 10, Rt. 117 West, Clopper
 Road. At the first light on Clopper Road, turn left on to the NIST grounds.
 From Southbound I-270 take Exit 11B, Route 124 West, Quince Orchard Road. At
 the second light turn left on to Clopper Road. At the first light on Clopper
 Road, turn right on to the NIST grounds. To reach the Administration
 Building, turn left after passing the guard office. Signs will direct you to
 visitor parking.  Transportation will be provided to and from the
 Gaithersburg Marriott and NIST on Monday through Thursday.

Accommodations: Conference registration does not include your hotel
 reservation. A block of rooms has been reserved at the Gaithersburg Marriott
 Hotel, 620 Perry Parkway, Gaithersburg, Md. 20877. The hotel phone number is
 301/977-8900. The special room rate is $65 single or double. To register for
 a room, please use the enclosed hotel reservation form and send it directly
 to the hotel no later than June 1, 1992.  After that date the rooms will be
 released for general sale at the prevailing rates of the hotel.

Registration Information Contact: Judy Bramlage, COMPASS '92 Registration
 609 Orrin St., SE, Vienna, Va. 22180-4837, 202/512-6210, Fax: 202/512-6451

Technical Information Contact: Robert Ayers, ARINC Research Corporation,
 2551 Riva Rd., Annapolis, Md. 21401, Phone: 410/266-4741 Fax: 410/266-4040

                 COMPASS '92  June 15-18, 1992
                 Conference Registration Card

Advance Registration (before June 1, 1992)
    ___  Conference Registration (includes 1 copy of proceedings)
    ___  Proceedings Only
    ___  Extra Proceedings _____ copies
    ___  Tutorial #1
    ___  Tutorial #2
               Name
            Company
     Street Address
  Rm. No./Mail Code
   City, State, Zip
            Country
 Business Telephone
IEEE Membership No.
    Co-Sponsor Name
  Total Amount US $

Form of        ___  Check enclosed made payable to COMPASS '92.
Payment             (Checks from outside USA should be written on a USA bank.)
              ___  MasterCard No.________________________Exp.____
              ___  Visa No.______________________________Exp.____
              ___  Diners Club No._______________________Exp.____
              ___  American Express No.__________________Exp.____
Authorized Signature

Request for refunds after 1 Jun 1992 will be subject to a $15 admin fee.

Registration:
 Advance Registration (before June 1, 1992)
                Members    Non-Members   Students
                -------    -----------   --------
 Conference         250          315       100
 Tutorial            50           70        50
 Proceedings Only    20           30        20
 ************************************************
 On-Site        Members    Non-Members   Students
                -------    -----------   --------
 Conference         300          375       100
 Tutorial            70           90        50
 Proceedings Only    20           30        20

 Conference fee includes coffee breaks, lunches and social functions.

Please place in an envelope and mail to: Judy Bramlage, COMPASS '92
 Registration, 609 Orrin Street, SE, Vienna, Va. 22180-4837

                 COMPASS '92  June 15-18, 1992
                    Hotel Registration Card
                 Marriott Hotel, 301/977-8900

               Name
            Company
     Street Address
  Rm. No./Mail Code
   City, State, Zip
            Country
 Business Telephone
       Arrival Date
     Departure Date
  Number of Persons

Rate: $65 single or double (apply 12% tax to rate). All reservations must be
 received by June 1, 1992. All room reservations must be guaranteed by a
 one-night deposit. Deposit will guarantee first night availability, and will
 be credited to last night of reservation. Deposit refunded if request
 received 48 hours prior to arrival.

Form of        ___  Check enclosed made payable to The
Payment             Gaithersburg Marriott
              ___  One night deposit enclosed $__________________
              Guaranteed by______________________________Exp.____
              Card #_____________________________________________
              Authorized Signature_______________________________

Please place in an envelope and mail to: The Gaithersburg Marriott,
 620 Perry Parkway, Gaithersburg, Md. 20877

------------------------------

End of RISKS-FORUM Digest 13.45
************************