Subject: RISKS DIGEST 13.45
REPLY-TO:
[email protected]
RISKS-LIST: RISKS-FORUM Digest Tuesday 28 April 1992 Volume 13 : Issue 45
FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
Contents:
Software observing daylight savings time when it *shouldn't* (Mike Morton)
Is it getting too easy? (Spreadsheetology) (Robert Slade)
IEEE/CS Workshop on Ethical Standards for the Profession (Jim Horning)
FBI and Mailing Lists (Mary Culnan)
Re: Voice mail security (Dan Wing)
Re: Tracking by cellular phone (John Karabaic, Phillip. D. Brown)
COMPASS '92: Conference on Computer Assurance (Laura Ippolito)
The RISKS Forum is moderated. Contributions should be relevant, sound, in
good taste, objective, coherent, concise, and nonrepetitious. Diversity is
welcome. CONTRIBUTIONS to
[email protected], with relevant, substantive
"Subject:" line. Others may be ignored! Contributions will not be ACKed.
The load is too great. **PLEASE** INCLUDE YOUR NAME & INTERNET FROM: ADDRESS,
especially .UUCP folks. REQUESTS please to
[email protected].
Vol i issue j, type "FTP CRVAX.SRI.COM<CR>login anonymous<CR>AnyNonNullPW<CR>
CD RISKS:<CR>GET RISKS-i.j<CR>" (where i=1 to 13, j always TWO digits). Vol i
summaries in j=00; "dir risks-*.*<CR>" gives directory; "bye<CR>" logs out.
The COLON in "CD RISKS:" is essential. "CRVAX.SRI.COM" = "128.18.10.1".
<CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.
ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
Relevant contributions may appear in the RISKS section of regular issues
of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.
----------------------------------------------------------------------
Date: Tue, 28 Apr 92 10:45:47 HST
From: Mike Morton <
[email protected]>
Subject: Software observing daylight savings time when it *shouldn't*
From the Honolulu Star-Bulletin's "Streetwise" column, 27 April 1992:
Time change leaves stoplights out of sync (By David Oshiro)
Here's a story on how the clever machines that run our lives are sometimes too
clever.
Three weeks ago, most of the mainland switched to daylight savings time.
Unbeknown to city transportation officials here, a microchip controlling
traffic signals on Kalanianaole Highway contained a program written on the
mainland that contained an automatic conversion to daylight-saving [sic] time.
So, *voila*! On Monday, April 6, the timing for peak traffic hours kicked in
an hour earlier, throwing signals off. Signals that were changing in
200-second cycles began to change in 185-second cycles.
It was only a 15-second difference, and it only lasted an hour, but that was
enough to mess up morning rush-hour traffic [which is pretty bad on this
highway].
City workers, however, were able to figure out the problem and fix it that day.
A city transportation official said that there was no easy way to test that
chip in advance, to see it [sic] would have worked properly when the switch to
daylight-saving time occurred.
Mike Morton <
[email protected]>
------------------------------
Date: Mon, 27 Apr 1992 20:52:50 GMT
From:
[email protected] (Robert Slade)
Subject: Is it getting too easy? (Spreadsheetology)
This past week I was at a Microsoft Technical Seminar (read "boasting session")
and saw an interesting promotional piece. Although longer than a normal ad, I
suspect it is planned to use the "playlet" for some kind of media presentation.
The "plot" is that Microsoft's Excel spreadsheet is so easy to use, and has so
many "labour saving" features that two dolts who have forgotten to put together
their presentation are able to do so in a one minute elevator ride to
"executive territory".
Other than stylistic aids, the primary function promoted is an "extension"
function which will "forecast trends". With so much spreadsheet use being
devoted to business plans and cash flow projections, the attraction of such a
function is obvious.
However, the ad immediately triggered an alarm. The feature is introduced, in
the ad, by the fact that the executive "wants to see ten percent growth". The
original figure is $1000, so the user fills in the next column as $1100. No
problem. Then the extension feature is brought into play, and I mentally
follow along with the arithmetic. The next column should say $1210. But the
spreadsheet fills in $1200. The fourth column should be $1331, but instead is
filled in as $1300. Ah, to the numerate person, the reason is obvious: the
function is not a geometric "ten percent growth" but an arithmetic adding of an
additional hundred dollars each time.
To the numerate person, obvious. To the general public? How many of the
"average" business computer users would even notice?
The RISK of this particular choice of "extension" algorithm might not be all
that important. However, it points out the increasing addition of "aids" in
computerized systems, and the need to note carefully the use that the using
audience is likely to put those aids to. Business computer users, in my
experience, tend to want to think in "percentage" figures (eg. annual growth).
A simple "adding" function for forecasting will not give them the "correct"
answer appropriate to their mental model.
Small though this RISK might be in this instance, we have seen this same
principal at work in situations with much higher stakes.
------------------------------
Date: Mon, 27 Apr 92 17:47:20 -0700
From:
[email protected]
Subject: IEEE/CS Workshop on Ethical Standards for the Profession
This workshop is discussed at length in the April issue of COMPUTER, pp. 76-78.
I don't recall seeing it on RISKS, although the general topic has certainly had
its share of discussion and flame in the past.
Jim H.
------------------------------
Date: Mon, 27 Apr 1992 19:42 EDT
From:
[email protected]
Subject: FBI and Mailing Lists
The 20 April 1992 issue of DM News, a direct marketing trade publication,
reports that within the past two weeks, Metromail and Donnelly Marketing (two
of the very largest mailing list companies) were approached by the FBI which is
seeking mailing lists for use in investigations. Other mailing list firms also
received feelers according to the story. "Neither of the identified firms would
discuss details, but one source familiar with the effort said the FBI
apparently is seeking access to a compiled consumer database for investigatory
uses."
"The FBI agents showed 'detailed awareness' of the products they were seeking,
and claimed to have already worked with several mailing list companies,
according to the source."
Metromail, according to the article, has been supplying the FBI with its
MetroNet address lookup service for two years. The FBI said that the database
is used to confirm addresses of people the FBI needs to locate for an
interview.
This marks the first time since the IRS tried to buy mailing lists in 1984 that
a government agency has attempted to use mailing lists for enforcement
purposes.
In a separate but related story in the April 24 issue of the Friday Report, a
direct marketing newsletter, the RBOC's are teaming up with other firms to
develop white page directories on CD-ROM. For example, US West has a joint
venture with PhoneDisc USA of Marblehead, Ma. The article states that the
company offers lists failing mailing list enhancements to law enforcement
agencies. [NOTE: an enhanced list means the names and addresses were matched
with a marketing database and additional demographic information was added to
the list from the marketing database].
Mary Culnan, School of Business Administration, Georgetown University
[email protected]
------------------------------
Date: 27 Apr 1992 21:25:31 -0600 (MDT)
From: Dan Wing <
[email protected]>
Subject: Re: Voice mail security (Dickson, RISKS-13.44)
>Are call loggers a problem when you give your password to a mail retreival
>system form a hotel or an office. Is there a hacker market for this info?
>Finally how prevelant is this problem in various parts of the world?
Many hotels detail your phone bill and include the phone numbers you called
during your stay. How often does the hotel phone system capture your
MCI/Sprint/AT&T calling-card number (which you touch-toned into the MCI,
Sprint, or AT&T computer), too?
I can easily change the PIN on my voice-mail system; changing the PIN on my
calling card requires a call to the long-distance carrier, and possibly a new
card - something the long-distance carrier isn't going to want to do too often.
-Dan Wing,
[email protected],
[email protected]
Systems Programmer, University Hospital, Denver
------------------------------
Date: Tue, 28 Apr 92 16:10:47 EDT
From:
[email protected]
Subject: Re: Tracking by cellular phone (Kush, RISKS-13.44)
I had the same experience myself recently. But, in addition to instructions,
it was also a telemarketing call by the local carrier! Since I use my cellular
phone as a contact line for technical support and am always expecting calls (I
subscribe to a nationwide switching service), I was rather angry that they used
my time on the line like that. Especially since it was during a driving
rainstorm while I was on the Interstate in the hills of northern Kentucky! I
called *611 and told the person on the line to get me off whatever list I was
on to get this unnecessary greeting and unwanted telemarketing. I haven't been
bothered since, but I don't know if my call got me off any "list".
John S. Karabaic, Systems Engineer,
[email protected], 513 792 5904
NeXT Computer, Inc.; 4434 Carver Woods Dr.; Cincinnati, OH 45242
------------------------------
Date: 28 Apr 92 15:29:00 UT
From: PHILLIP.D.BROWN#m#
[email protected]
Subject: Re: Tracking by Cellular Phone (Kush, RISKS-13.44)
Not only *could* the cellular phone company track one's movement "all over the
country" (although with great difficulty and expense using today's switches),
it is an active industry goal for the next generation of technology. "Call
Delivery" -- making your phone ring when someone dials your number, regardless
of your geographic location and serving carrier of the moment -- is an integral
part of the standard being developed for interswitch communication (EIA/TIA
IS-41). It is also seen as a key to making Personal Communication Networks
(PCN) work.
What happened to you in Georgia is the result of a feature known as "autonomous
registration", by which the serving switch instructs a mobile unit to register
(i.e. transmit its identity information including mobile phone number and
serial number) as soon as radio contact is established (as indicated on the
mobile's handset display by the "service light" or "service bars"). When the
system detected you were a roamer, it placed a call to your phone and played
the recorded greeting for your edification (although I don't know BellSouth's
policy, it is quite unlikely you were charged for this call).
Furthermore, Automatic Vehicle Location (AVL) services are also seen as highly
desirable by a significant subgroup of wireless communication users (truckers
and victims of car thieves come immediately to mind). There are companies that
claim to be able to determine the position of a mobile unit in a cell site to
within 100 feet using only the received 800 MHz radio signal, but the
technology is unreliable and expensive. The more popular solution is to marry
a Global Positioning System (GPS) receiver to a cellular phone or other
wireless terminal, but this is both proprietary and also expensive.
As long as the user retains the ability to "disappear" by turning the phone
off, I see the benefit as outweighing the risk in this form of network
tracking. I squirm a lot more when I read about "beacons" placed in every car
for automatic toll collection and vehicle monitoring, because these specialized
systems exist solely for the purpose of tracking and accounting (NOTE: does
anyone really expect there to be an "off" switch on such a device?). It's one
thing to choose to be tracked, and quite another to have an "Eye in the Sky"
checking up on you...
Phil Brown, Project Engineer, GTE Mobile Communications
Internet address: phillip.d.brown#m#
[email protected]
------------------------------
Date: Fri, 24 Apr 92 09:20:30 EDT
From: Laura Ippolito <
[email protected]>
Subject: COMPASS '92: Conference on Computer Assurance
First Announcement
COMPASS '92: SEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE
Systems Integrity, Software Safety, and Process Security
June 15-18, 1992
Gaithersburg, Md.
National Institute of Standards and Technology
Technology Administration
U.S. Department of Commerce
Department of Defense Approval: "In reviewing the Institute for Electrical and
Electronics Engineer's Plans for COMPASS '92, the Assistant Secretary of
Defense (Public Affairs) finds this event meets the standards for participation
by DoD personnel under instruction 5410.20 and DoD Standards of Conduct
Directive 5500.7. This finding does not constitute endorsement of attendance
which must be determined by each DoD component."
Compass IEEE Aerospace and Electronic Systems Society
Sponsors IEEE National Capital Area Council
In cooperation with The British Computer Society
Conference Sponsors: ARINC Research Corporation, Computer Sciences Corporation
Control Systems Analysis, Department of Defense, George Mason University
Logicon, Inc., National Institute of Standards and Technology,
Naval Research Laboratory, Naval Surface Warfare Center
Research Triangle Institute, Systems Safety Society, TRW Systems Division
Program Committee:
Paul Ammann, George Mason University
Greg Chisholm, Argonne National Laboratory
John Dobson, University of Newcastle Upon Tyne
Frank Houston, Food and Drug Administration
William S. Junk, University of Idaho
John Knight, University of Virginia
D. Richard Kuhn, NIST
John McDermid, University of York
John McHugh, University of North Carolina
Gerry Masson, Johns Hopkins University
Reginald Meeson, Institute for Defense Analyses
Andrew Moore, Naval Research Laboratory
Matthew Morgenstern, Xerox Advanced Information Technology
Jim Purtilo, University of Maryland
Edgar H. Sibley, George Mason University
Tony Zawilski, The Mitre Corporation
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST)
A principal agency of the Department of Commerce's Technology Administration,
NIST has as its mission to strengthen U.S. industry's competitiveness, advance
science, and improve public health, safety, and the environment.
NIST conducts basic and applied research in the physical sciences and
engineering, developing measurement techniques, test methods, standards, and
related services. The Institute does generic and precompetitive research and
development work on new advanced technologies.
NIST researchers work at the frontiers of science and technology in such areas
as chemical science and technology, physics, materials science and engineering,
electronics and electrical engineering, manufacturing engineering, computer
systems, building technology and fire safety, and computing and applied
mathematics.
INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS (IEEE)
The Institute of Electrical and Electronics Engineers is the world's largest
technical professional society. Founded in 1884 by a handful of practitioners
of the new electrical engineering discipline, today's Institute is comprised of
more than 320,000 members who conduct and participate in its activities in 147
countries. The men and women of the IEEE are the technical and scientific
professionals making the revolutionary engineering advances which are reshaping
our world today.
The technical objectives of the IEEE focus on advancing the theory and practice
of electrical, electronics and computer engineering and computer science. To
realize these objectives, the IEEE sponsors technical conferences, symposia and
local meetings worldwide; publishes nearly 25% of the world's technical papers
in electrical, electronics and computer engineering; and provides educational
programs to keep its members' knowledge and expertise state-of-the-art. The
purpose of all these activities is two fold: To enhance the quality of life for
all peoples through improved public awareness of the influences and
applications of its technologies; and, to advance the standing of the
engineering profession and its members.
The IEEE, through its members, provides leadership in areas ranging from
aerospace, computers and communications to biomedical technology, electric
power and consumer electronics. For the latest research and innovations in the
many diverse fields of electrical and electronics engineering, industry and
individuals look to the IEEE.
COMPASS '92 June 15-18, 1992
About the Conference
COMPASS is an acronym formed from COMPuter ASSurance, the subject of this
conference, the seventh of a series that began with COMPASS '86. According to
its charter, "The purpose of COMPASS is to advance the theory and practice of
critical systems through the medium of scientific and engineering meetings and
publications. The organization, under the IEEE, is dedicated to the study of
critical systems, especially those using digital computers or other new
technologies."
Critical systems are defined as systems whose failure could cause injury, loss
of life, or significant property loss or damage. Such failures may be failures
of commission, doing what should not be done, or of omission, not doing what
should be done. Critical systems have failed in the past. Radiation therapy
machines have killed cancer patients; industrial robots have killed workers;
spacecraft have been destroyed; and, hackers have vandalized and/or stolen from
information systems. The goal of COMPASS is to find and publicize ways to
prevent unacceptable failures of critical systems.
COMPASS expresses the idea of "Pointing the Way" and of "encompassing" many
technologies and technical disciplines. The logo, a variation of yin-yang
overlaying a compass rose, symbolizes both of these ideas.
COMPASS '92 has adopted the slogan "Building The Right System, Right." This
expresses the need for the developers of critical systems to rigorously define
the right requirements and ensure that they are satisfied, resulting in systems
that function as intended.
The sponsors and organizers of COMPASS encourage you to participate in future
COMPASS activities. Contact any member of the conference committee or the
conference board for more information.
Conference Committee
Board of Directors Chair: Dolores R. Wallace, NIST
General Chair: Robert Ayers, ARINC Research Corporation
Program Chair: Edgar H. Sibley, George Mason University
Local Arrangements: Laura M. Ippolito, NIST
Publications: Julie Langston, Computer Sciences Corporation
Publicity: Paul Anderson, Space & Naval Warfare Systems Command Division
Registration: Judy Bramlage, General Accounting Office
Treasurer: Bonnie Danner, TRW Systems Division
Tutorials: Michael Brown, Naval Surface Warfare Center
COMPASS '92, Monday, 15 June 1992
9:00 a.m. Tutorial 1: "Approaches to Developing Safety-Critical Software"
Stephen S. Cha, Charles H. Lavine, and Jeffery C. Thomas, Aerospace
Corporation, El Segundo, Ca.
This tutorial surveys various software safety techniques proposed in
literature or currently in practice. Following an introduction to software
safety concepts, several industrial software development examples will be
examined. The tutorial concludes with a discussion on formal methods and
future research directions.
12:45 p.m. Lunch
2:00 p.m. Tutorial 2: "Interlocks-A Safety Engineering Tool"
Phil Sedgwick, Control Systems Analysis, Newport, RI
This tutorial introduces INTERLOCKS, a methodology and PC-based tool, that
graphically describes and simulates the operation of computer system
controls. INTERLOCKS, in use by the DoD, employs a graphic language familiar
to hardware and software engineers-simple AND and OR logic. The result for
safety engineers is an INTERLOCKS network that models and simulates the
hardware, software, and operator events that are prerequisite to critical
function initiation.
COMPASS '92, Tuesday, 16 June 1992
9:00 a.m. Opening Remarks, Conference General Chair: Robert Ayers, ARINC
Research Corporation, Annapolis, MD.
9:15 a.m. The Technical Program, Program Committee Chair: Edgar H. Sibley,
GMU, Fairfax, VA.
9:30 a.m. Keynote Speaker, John Rushby, SRI International, Menlo Park, CA.
"What Really Goes Wrong, And What Might Fix It?"
11:00 a.m. Session 1 Verification
Chair: Andrew Moore, Naval Research Laboratory, Washington, D.C.
"Using Z Specifications in Category Partition Testing", Nina Amla and Paul
Ammann, George Mason University, Fairfax, VA.
"Verification of Numerical Programs Using Penelope/Ariel", Sanjiva Prasad,
ORA Corporation, Ithaca, N.Y.
"Modular Verification of Ada Library Units", Carla Marceau and Wolfgang
Polak, ORA Corporation, Ithaca, N.Y.
12:45 p.m. Lunch
2:00 p.m. Session 2 Security, Chair: Paul Ammann, George Mason University
"A Probabilistic Approach to Assurance of Database Design", Lucian Russell,
Argonne National Laboratory, Argonne, Ill.
"Formal Security Specifications for Open Distributed Systems", Sead Muftik,
DSV Dept., Stockholm University, Sweden and Univ. of Sarajevo, Yugoslavia
"A Formal Approach for Security Evaluation", John A. McDermid and Qi Shi,
University of York, UK
4:00 p.m. Debate: Resolved: "Certain Safety-Critical Systems Should Not Be
Computerized". Moderated by John Knight, University of VA
5:30 p.m. Close of Daytime Activities
7:00 p.m. Birds of a Feather Session, Marriott
COMPASS '92, Wednesday, 17 June 1992
9:00 a.m. Keynote Speaker, Ted Ralston, Ralston Research Associates, Tacoma,
WA, "Preliminary Report on the International Study on Industrial
Experience with Formal Methods"
10:30 a.m. Panel 1 Formal Methods in Industry
.., Naval Research Laboratory, Washington, D.C.
Leo Beltracchi, United States Regulatory Commission, Washington, D.C.
12:45 p.m. Lunch
2:00 p.m. Session 3 Safety, Chair: M. Frank Houston, Food and Drug Admin.,
Rockville, Md.
"Efficient Response Time Bound Analysis of Real-Time Rule-Based Systems",
Albert Mo Kim Cheng and Chia-Hung Chen, University of Houston, Houston, TX
"The Use of Ada PDL as the Basis for Validating a System Specified by Control
Flow Logic", Richard B. Mead, ARINC Research Corporation, Annapolis, MD.
One further paper to be selected
4:00 p.m. Panel 2 Software Safety and Economics, Chair: J. Bret Michael,
George Mason University, Fairfax, VA.
Stephen Fortier, Intermetrics, McLean, VA.
William S. Junk, University of Idaho
Edward A. Addy, Logicon, Inc., Dahlgren, VA.
John McHugh, University of North Carolina, Chapel Hill, N.C.
5:30 p.m. Close of Daytime Activities
6:30 p.m. Banquet with Dinner Speaker, Marriott
COMPASS '92, Thursday, 18 June 1992
9:00 a.m. Session 4 Processes, Chair: Reginald Meeson, IDA
"A Review of Computer Controlled Systems Safety and Quality Assurance
Concerns for Acquisition Managers", John R. Friend, U.S. Navy, Polaris
Missile Facility, Charleston, S.C.
"An Analysis of Selected Software Safety Standards", Dolores Wallace, D.
Richard Kuhn, and Laura Ippolito, NIST, Gaithersburg, Md.
"A Process Representation Experiment Using MVP-L", Carol Diane Klinger,
Melissa Neviaser, and Ann Marmor-Squires, TRW, Fairfax, Va.; Christopher M.
Lott and H. Dieter Rombach, University of Maryland, College Park, Md.
11:00 a.m. Panel 3 Software in Trial - Liability and Other
Legal Issues (A Dramatization)
Moderator: Michael S. Nash, Esq., IDA, Alexandria, VA
Jay T. Westermeier, Fenwick and West, Washington, D.C., For the Plaintiff
To be selected, For the Defendant
Richard L. Wexelblat, IDA, Alexandria, Va., As Expert Witness
To be selected, Insurer
To be selected, Harried Software Developer/Programmer
12:45 p.m. Lunch
2:00 p.m. Session 5 Software Safety Standards
"IEEE P-1228: Latest Status", Cindy Wright, DISA, Tysons Corner, Va.
"IEC65A, WG9 and WG10 -- System and Software Safety Standards for
Programmable Electronic Systems", Victor Maggioli, DuPont, Newark, Del.
3:30 p.m. Awards and Closing Ceremony
4:00 p.m. Conference Closing
NIST is located in Gaithersburg, Md., approximately 25 miles northwest of
Washington, D.C. The meeting will be held in the Green Auditorium of the
Administration Building.
Social Functions: A banquet with a cash bar and banquet speaker will
be held at the Gaithersburg Marriott on Wednesday, June 17.
Transportation: BWI Limo, 301/441-2345, offers commercial van service from
Baltimore-Washington Airport to the Gaithersburg area. Call for reservations.
Airport Transfer Van Service, 301/948-4515, is available from Dulles
International and Washington National Airports to Gaithersburg.
The Washington Metro has subway service to Gaithersburg. Metro can be boarded
at Washington National Airport. Take a Yellow Line train marked "Mount Vernon
Square" to Gallery Place and transfer to a Red Line train marked "Shady Grove"
to Shady Grove. Service is every 6 to 15 minutes depending on the time of day.
The time from National to Shady Grove is about 50 minutes. The Shady Grove
station is approximately four miles from the Marriott Hotel.
Driving Instructions: From northbound I-270 take Exit 10, Rt. 117 West, Clopper
Road. At the first light on Clopper Road, turn left on to the NIST grounds.
From Southbound I-270 take Exit 11B, Route 124 West, Quince Orchard Road. At
the second light turn left on to Clopper Road. At the first light on Clopper
Road, turn right on to the NIST grounds. To reach the Administration
Building, turn left after passing the guard office. Signs will direct you to
visitor parking. Transportation will be provided to and from the
Gaithersburg Marriott and NIST on Monday through Thursday.
Accommodations: Conference registration does not include your hotel
reservation. A block of rooms has been reserved at the Gaithersburg Marriott
Hotel, 620 Perry Parkway, Gaithersburg, Md. 20877. The hotel phone number is
301/977-8900. The special room rate is $65 single or double. To register for
a room, please use the enclosed hotel reservation form and send it directly
to the hotel no later than June 1, 1992. After that date the rooms will be
released for general sale at the prevailing rates of the hotel.
Registration Information Contact: Judy Bramlage, COMPASS '92 Registration
609 Orrin St., SE, Vienna, Va. 22180-4837, 202/512-6210, Fax: 202/512-6451
Technical Information Contact: Robert Ayers, ARINC Research Corporation,
2551 Riva Rd., Annapolis, Md. 21401, Phone: 410/266-4741 Fax: 410/266-4040
COMPASS '92 June 15-18, 1992
Conference Registration Card
Advance Registration (before June 1, 1992)
___ Conference Registration (includes 1 copy of proceedings)
___ Proceedings Only
___ Extra Proceedings _____ copies
___ Tutorial #1
___ Tutorial #2
Name
Company
Street Address
Rm. No./Mail Code
City, State, Zip
Country
Business Telephone
IEEE Membership No.
Co-Sponsor Name
Total Amount US $
Form of ___ Check enclosed made payable to COMPASS '92.
Payment (Checks from outside USA should be written on a USA bank.)
___ MasterCard No.________________________Exp.____
___ Visa No.______________________________Exp.____
___ Diners Club No._______________________Exp.____
___ American Express No.__________________Exp.____
Authorized Signature
Request for refunds after 1 Jun 1992 will be subject to a $15 admin fee.
Registration:
Advance Registration (before June 1, 1992)
Members Non-Members Students
------- ----------- --------
Conference 250 315 100
Tutorial 50 70 50
Proceedings Only 20 30 20
************************************************
On-Site Members Non-Members Students
------- ----------- --------
Conference 300 375 100
Tutorial 70 90 50
Proceedings Only 20 30 20
Conference fee includes coffee breaks, lunches and social functions.
Please place in an envelope and mail to: Judy Bramlage, COMPASS '92
Registration, 609 Orrin Street, SE, Vienna, Va. 22180-4837
COMPASS '92 June 15-18, 1992
Hotel Registration Card
Marriott Hotel, 301/977-8900
Name
Company
Street Address
Rm. No./Mail Code
City, State, Zip
Country
Business Telephone
Arrival Date
Departure Date
Number of Persons
Rate: $65 single or double (apply 12% tax to rate). All reservations must be
received by June 1, 1992. All room reservations must be guaranteed by a
one-night deposit. Deposit will guarantee first night availability, and will
be credited to last night of reservation. Deposit refunded if request
received 48 hours prior to arrival.
Form of ___ Check enclosed made payable to The
Payment Gaithersburg Marriott
___ One night deposit enclosed $__________________
Guaranteed by______________________________Exp.____
Card #_____________________________________________
Authorized Signature_______________________________
Please place in an envelope and mail to: The Gaithersburg Marriott,
620 Perry Parkway, Gaithersburg, Md. 20877
------------------------------
End of RISKS-FORUM Digest 13.45
************************