Subject: RISKS DIGEST 14.66
REPLY-TO: [email protected]

RISKS-LIST: RISKS-FORUM Digest  Tuesday 1 June 1993  Volume 14 : Issue 66

       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
  ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

 Contents:
Possible RISK in data retrieval? (Dale Drew)
X application to finger (Nandakumar Sankaran)
Re: Fake ATM Machine Steals PINs (Brinton Cooper)
COMPASS '93 ANNOUNCEMENT (14-17 June) (Dolores Wallace) [Extended Early Reg]

The RISKS Forum is a moderated digest discussing risks; comp.risks is its
Usenet counterpart.  Undigestifiers are available throughout the Internet,
but not from RISKS.  Contributions should be relevant, sound, in good taste,
objective, cogent, coherent, concise, and nonrepetitious.  Diversity is
welcome.  CONTRIBUTIONS to [email protected], with appropriate, substantive
"Subject:" line.  Others may be ignored!  Contributions will not be ACKed.
The load is too great.  **PLEASE** INCLUDE YOUR NAME & INTERNET FROM: ADDRESS,
especially .UUCP folks.  REQUESTS please to [email protected].

Vol i issue j, type "FTP CRVAX.SRI.COM<CR>login anonymous<CR>AnyNonNullPW<CR>
CD RISKS:<CR>GET RISKS-i.j<CR>" (where i=1 to 14, j always TWO digits).  Vol i
summaries in j=00; "dir risks-*.*<CR>" gives directory; "bye<CR>" logs out.
The COLON in "CD RISKS:" is essential.  "CRVAX.SRI.COM" = "128.18.10.1".
<CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.

For information regarding delivery of RISKS by FAX, phone 310-455-9300
(or send FAX to RISKS at 310-455-2364, or EMail to [email protected]).

ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
Relevant contributions may appear in the RISKS section of regular issues
of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.

----------------------------------------------------------------------

Date: Thu, 20 May 93 12:26:27 PDT
From: [email protected] (Dale Drew)
Subject: Possible RISK in data retrieval?

Has anybody seen this?  I can forsee many potential risks in an on-line
data retrieval system involving Probationers.  How do the Probation Officers
call in to check or (:gasp:) update their data?  I've asked BI Inc., but
have not heard a reply:


  BOULDER, Colo., May 12 /PRNewswire/ -- BI Inc. (NASDAQ-NMS: BIAC), the
nation's leading provider of electronically monitored systems for corrections,
today announced receipt of notification from the United States Patent Office
of issuance of a patent to BI on April 20, 1993.  BI's newly granted patent
includes the application presented in the BI PROFILE(TM) automated
administrative caseload management system.
   At no cost to corrections agencies, BI PROFILE provides automated
administrative caseload management via a computer located at BI Monitoring
Corp.'s central station.  Probationers are assigned individual PIN numbers and
security passwords, and required to call a 900 number once a month to report
any administrative changes.  BI's computer asks the callers a series of
questions (i.e., change in home telephone number, address, employment, etc.).
Each call placed averages 2 or 3 minutes in duration and is charged to the
probationer's home telephone bill.  Considered exception reporting, BI PROFILE
only provides reports to corrections agencies if probationers fail to call in
on their pre-assigned monthly date or if any status changes are reported
during the calls.  Prior to BI PROFILE, administrative caseload management of
probationers has been via a manual system which has put a significant burden
on corrections agencies as the number of probationers continues to rise at the
federal, state and local levels.
   Additional options available on BI PROFILE are features to insure that
probationers are calling from the designated telephone number, that
probationers have not previously called in for the month, collection of
monthly probation supervision fees and 800 telephone service for the indigent
population.  BI has additional patents pending on these and other BI PROFILE
options as well.
   BI PROFILE services are offered to the corrections market by BI through
its wholly owned subsidiary, BI Monitoring Corp. (BIMCORP).  "BI PROFILE is
another service offering from BI Monitoring Corporation that is the direct
result of BI's strategy to expand its recurring revenue base," said John K.
Fulda, Jr., BI's corporate vice president in charge of BI Monitoring.  "We
believe that the BI PROFILE family of services offers tremendous growth
potential for BI Monitoring Corporation in the years ahead," he concluded.

 CONTACT:  Joanna Manley of BI, 303-530-2911; or Tom Dean of
Innovative Research, 212-421-2543, for BI

 [Dale Drew, Sr. Information Security Specialist, BT North America, Inc.
 (408) 922-6004   [email protected]]

------------------------------

Date: Fri, 21 May 93 13:54:00 EDT
From: [email protected]
Subject: X application to finger

Here is an interesting episode.

I run an X application (public domain) that, given a list of remote sites and
a list of userids, periodically "finger"s the sites, searching to see if the
named users are logged on. If yes, they are updated on a small screen window.

Following is a mail I received from the security officer at one of the
sites...It was interesting to note that sys admins *are* on the lookout
for even those minor chances of hacking

-------- The mail --------

I assume since you're logged into the console, you have some responsibility
for machine.cs.univ.edu:

It appears that somebody may have cracked your system, and is using it as a
base to attempt to break into other systems: every six minutes, some process
on your machine contacts the finger daemon on cs.anotheruniv.edu and attempts
to see who is logged on.  This is generally taken as an attempt to extract
usernames, preparatory to hacking the system.

Strangely, this seems to be correlated to your being logged in.  It appears
to have started on May 12th.  I've ignored it before now since until this
point it has been only a minor annoyance.  We would appreciate your looking
into this matter, and seeing that it ceases.

Nandakumar Sankaran, Graduate Student, Computer Science Department

G34, Jordan Hall, Clemson University, Clemson, SC 29634    (803) 656 6979
[email protected]

------------------------------

Date:     Wed, 19 May 93 17:13:49 EDT
From: Brinton Cooper <[email protected]>
Subject:  Re: Fake ATM Machine Steals PINs

<[email protected]> describes the now-well-known fake ATM scam for capturing
account and PIN numbers for subsequent forging in order to relieve consumers
of the burden of large account balances.  Recall that the ATM "scam artists"
obtained permission from officials of the shopping Mall where the scam took
place.

He asks, "How are you supposed to stop this new trick???"  Like many RISKS,
you don't "stop" the trick but you minimize the RISK:

       1. You needn't be the first in your block to use the new ATM.

       2. Watch for announcements from your bank or credit union of new
locations.  Our credit union announces in its newsletter *every* new ATM which
it owns/installs (i.e., were members pay no fee for access).  One could have
been suspicious of the (around here) then-uncommon installation in local
groceries, but they were announced as mentioned.

       3. You could always phone the bank whose name appears on the
ATM.  If there's no name, who's running the machine?

_Brint

------------------------------

Date: Tue, 1 Jun 93 11:37:52 EDT
From: Dolores Wallace <[email protected]>
Subject: COMPASS '93 ANNOUNCEMENT

   [FOR SOME REASON THE CONFERENCE MANAGEMENT DID NOT SEND THIS ANNOUNCEMENT
   TO RISKS UNTIL 1 JUNE, WHICH IS AFTER THE ANNOUNCED DEADLINE FOR DISCOUNTED
   REGISTRATION.  Karen Ferraiolo (see below) has agreed to give a special
   deal to RISKS SUBSCRIBERS, SO THAT YOU MAY REGISTER UNTIL THE END OF THIS
   WEEK AT THE REDUCED RATE.  However, she asks that you let her know ASAP.
   We do not generally run conference announcements in full, but in light of
   the closeness of the date and the special consideration for RISKS readers,
   it seemed appropriate.  This conference has always been closely related to
   the RISKS subject matter.  PGN]


                                  COMPASS '93
                Eighth Annual Conference On Computer Assurance:
           Systems Integrity, Software Safety, and Process Security

                              June 14-17, 1993
                               Gaithersburg, MD

                          U.S. Department of Commerce
                           Technology Administration
                National Institute of Standards and Technology

COMPASS              IEEE Aerospace and Electronics Systems Society
Sponsors             IEEE National Capital Area Council

In Cooperation with  British Computer Society

Conference           Arca Systems, Inc.
Sponsors             ARINC Research Corporation
                    Control Systems Analysis, Inc.
                    CTA, Inc.
                    IBM
                    Logicon, Inc.
                    National Institute of Standards and Technology
                    Naval Research Laboratory
                    Naval Surface Warfare Center
                    Systems Safety Society
                    TRW Systems Division
                    U.S. General Accounting Office

The goal of COMPASS, an acronym formed from COMPuter ASSurance, is to advance
the theory and practice of the creation and use of critical systems through
the medium of scientific and engineering meeting and publications.  COMPASS
expresses the idea of "Pointing the Way" and of "enCOMPASSing" many
technologies and technical disciplines.  The logo, a variation of yin-yang
overlaying a compass rose, symbolizes both of these ideas.  We invite you to
participate in COMPASS activities and increase the benefits of COMPASS.

Monday, 14 June 1993
--------------------
8:00 am                    Registration Opens
9:00 am - 4:00 pm          Tutorials (Parallel Sessions)

      1.     "Formal Methods with Automated Support Using PVS", John
             Rushby, SRI International

      This tutorial provides an introduction to formal methods with
      special focus on the use of automated support tools such as
      PVS, a Prototype "next generation" Verification System that
      attempts to provide the benefits of powerful and effective
      automation for an expressive specification language.  Worked
      examples will be demonstrated "live" and include examples from
      hardware design, fault tolerance, and real-time.

      2.     "Federal Criteria (New Orange Book)", Janet Cugini, NIST

      This tutorial, on the preliminary draft of the Federal
      Criteria for Information Technology Security, will cover
      background, future work, protection profiles, TCB functional
      components, development assurance requirements, and evaluation
      assurance requirements.  It includes constructing a protection
      profile and the seven defined protection profiles.

Tuesday, 15 June 1993
---------------------
8:00 am      Registration Opens

9:00 am      Welcome
             James H. Burrows
             Director, Computer Systems Laboratory, NIST

             Opening Remarks
             Judith Bramlage, COMPASS '93 General Chair

9:15 am      Program Information
             John J Marciniak, COMPASS '93 Program Chair

9:30 am      Keynote
             Peter Neumann, SRI International
             "Myths of Dependable Computing: Shooting the Straw
             Herrings in Midstream"

10:30        Break

11:00 am     Technical Session 1  "Verification Technology"
             Moderator: Connie Heitmeyer, Naval Research Laboratory

             "A Tool for Reasoning about Software Models", Sidney
             Bailin, CTA, Inc.

             "An Incremental Protocol Verification Method for ECFSM-based
             Protocols", C. Huang, National Cheng Kung University

             "A Verifier for Distributed Real-Time Systems with Bounded
             Integer Variables", Farn Wang and Al Mok, University of Texas

1:00 pm      Lunch

2:00 pm      Special Topics (Invited talks)
             Moderator: Peter Neumann

             "Global Protection against Limited Strikes (Trusted
             Software Methodology)", Carol Taylor, National Security Agency

             "Application of the High Trust Process Model to
             Complexity Management and System Architecture in the
             SDI", John McHugh, University of North Carolina, and Greg
             Chisholm, Argonne National Laboratory

3:00 pm      Break

3:30 pm     Special Topics continued

             "Using Ada in Secure Systems", Roberta Gotfried,
             Hughes Aircraft Company

             "A Risk-Based Approach to Cost-Benefit Analysis of
             Software Safety Activities", Stephen C. Fortier, Intermetrics,
             and James Bret Michael, Argonne National Laboratory

4:30         Adjourn from NIST

7:00 pm      Birds of a Feather (Parallel Sessions; held at Marriott)
             "Processes (Capability Maturity Model)", John Baumert, CSC
             "Standards for Formal Methods", Roger Fujii, Logicon, Inc.

             (Dessert will be provided)

Wednesday, 16 June 1993
-----------------------
8:00 am      Registration Opens

9:00 am      Keynote Address
             Rona Stillman, Chief Scientist, U.S. GAO

10:00 am     Break

10:30 am     Technical Session 2  "Reliability Measurement"
             Moderator: Reginald Meeson, Institute for Defense Analyses

             "Rare Conditions - An Important Cause of Failures", Herb
             Hecht, SoHaR, Inc.

             "Experimental Evidence of Sensitivity Analysis Predicting
             Minimum Failure Probabilities", Jeffrey Voas, Jeffrey
             Payne, and Chris Michael, Reliable Software Technologies,
             Corp. and Keith Miller, College of William and Mary

             "Assigning Probabilities for Assurance in MLS Data Base
             Design", Lucien Russell, Argonne National Laboratory

1:00 pm      Lunch

2:00 pm      Technical Session 3  "System Safety"
             Moderator: Michael L. Brown, Naval Surface Warfare Center

             "Risk and System Integrity Concepts for Safety-Related
             Control Systems", Ron Bell, Health and Safety Executive (UK)

             "Identifying Generic Safety Requirements", Jarrellann
             Filsinger, Booz-Allen & Hamilton and J.E. Heaney,
             The Mitre Corporation

             "Software Safety and Program Slicing", Keith B.
             Gallagher, Loyola College and NIST, and James R. Lyle, NIST

3:30 pm      Break

4:00 pm      Debate
             Moderator: Emilie J. Siarkiewicz, Rome Laboratory
             Resolved: "Productivity & Techniques of Assurance Can Co-exist"

             Debaters: Peter Neumann (SRI), Charles Bonneau (Mitre),
             Phil Parker (CTA, Inc.), John McHugh (UNC), and Jon Dehn (IBM)

5:00 pm      Adjourn

6:30 pm      Banquet (at Marriott Hotel)
             Speaker: Dorothy Denning, Georgetown University

Thursday, 17 June 1993
----------------------
8:00 am      Registration Opens

9:00 am      Technical Session 4  "Management and Developmental Issues"
             Moderator: Charles Payne, NRL

             "Developing Secure Systems in a Modular Way", Qi Shi and
             John McDermid, University of York

             "On Security Policy Modeling", James Freeman, CTA, Inc.

             "Management Aspect of Software Safety", Stephen Cha,
             Aerospace Corporation

10:30 am     Break

11:00 am     Panel 1  "Developing Standards and Issues"
             Moderator: Dolores Wallace, NIST

             "MIL-STD-SDD (Software Development and Documentation)",
             Raghu Singh, SPAWAR, U.S. Navy

             "Software Safety Standards - A European Perspective",
             Robin Bloomfield, Adelard

             "ISO 9000 Standards", Taz Daughtrey, Babcock & Wilcox

             "MIL-STD-882C", Michael L. Brown, Naval Surface Warfare Center

1:00 pm      Lunch

2:00 pm      Panel 2  "Results of Workshops/Studies"
             Moderator: H.O. Lubbes, Naval Research Laboratory

             "Mitre Critical Assurance Workshop", Chuck Howell,
              Mitre Corporation

             "An International Survey of the Industrial Applications
             of Formal Methods", Susan Gerhart, National Science Foundation

             "Federal Criteria (Report on Comments Workshop)", Eugene
             Troy, NIST

3:30 pm      Awards and Closing Ceremony


Location      NIST, located in Gaithersburg, MD, is approximately 25
             miles northwest of Washington, D.C.  The meeting will be
             held in the Green Auditorium of the Administration Building.

Social Functions
----------------
Birds of a Feather (Dessert) will be held at the Gaithersburg Marriott on
Tuesday, June 15th at 7:00 pm.  A banquet with a cash bar and banquet speaker
will be held at the Gaithersburg Marriott on Wednesday, June 16th at 6:30 pm.

Transportation
--------------
BWI Limo, 301/441-2345, offers commercial van service from
Baltimore-Washington Airport to Gaithersburg area.  Call for reservations.
Airport Transfer Van Service, 301/948-4515, is available from Dulles
International and Washington National Airports to Gaithersburg.  The
Washington Metro has subway service to Gaithersburg.  Metro can be boarded at
Washington National Airport.  Take a Yellow Line train marked "Mount Vernon
Square" to Gallery Place and transfer to a Red Line train marked "Shady Grove"
to Shady Grove.  Service is every 6 to 15 minutes depending on the time of
day.  The Shady Grove station is approximately four miles from the Marriott
Hotel.  Contact Marriott for shuttle information.

Accommodations
--------------
Conference registration does not include your hotel reservation. A block of
rooms has been reserved at the Gaithersburg Marriott Hotel, 620 Perry Parkway,
Gaithersburg, MD 20877.  The hotel phone number is 301/977-8900.  The special
room rate is $70.00 single or double.  To register for a room, please use the
enclosed hotel reservation form and send it directly to the hotel no later
than May 31, 1993.  After that date the rooms will be released for general
sale at the prevailing rates of the hotel.   [PERHAPS KAREN CAN HELP NEGOTIATE
A LATER DATE HERE...  PGN]

Registration       Karen Ferraiolo
Information        COMPASS '93 Registration
Contact            Arca Systems, Inc
                  8229 Boone Blvd, Suite 610
                  Vienna, VA 22172
                  Phone: 703/734-5611
                  Fax:   703/790-0385

Technical          Judith Bramlage
Information        U.S. General Accounting Office
Contact            441 G Street NW
                  Washington, DC 20548
                  Phone: 202/512-6210
                  Fax:   202/512-6451

Driving Instructions
--------------------
>From northbound I-270 take Exit 10, Rt. 117 West, Clopper Road. At
the first light on Clopper Road, turn left on to the NIST grounds.
>From Southbound I-270 take Exit 11B, Route 124 West, Quince Orchard
Road. At the second light turn left on to Clopper Road. At the
first light on Clopper Road, turn right on to the NIST grounds. To
reach the Administration Building, turn left after passing the
guard office. Signs will direct you to visitor parking.

Transportation will be provided to and from the Gaithersburg
Marriott and NIST Monday through Thursday.

              ==============================

Conference Registration Card

Advance Registration (Before 30 May 1993) [4 JUNE FOR RISKS READERS]

      Conference Registration (includes 1 copy of proceedings)_____
      Proceedings Only                                        _____
      Extra Proceedings _____ copies                          _____
      Tutorial #1 - Formal Methods                            _____
      Tutorial #2 - Federal Criteria                          _____

      Name_________________________________________________________
      Company______________________________________________________
      Street Address_______________________________________________
      Rm. No./Mail Code____________________________________________
      City, State, ZIP_____________________________________________
      Country______________________________________________________
      Business Telephone___________________________________________
      IEEE Membership Nbr__________________________________________
      Co-Sponsor Name______________________________________________
      Total Amount US $____________________________________________

          _____ Check here is you will be using the shuttle to and from
          the Marriott and NIST (free!).

Form of Payment

      _____         Check enclosed made payable to COMPASS '93. (Checks
                    from outside the USA must be written on a USA
                    bank.)
      _____         MasterCard No.________________________Exp._____
      _____         VISA Card No._________________________Exp._____
      _____         Diners Club No._______________________Exp._____
      _____         American Express No.__________________Exp._____
      Authorized Signature_________________________________________

      Request for refunds after 30 May 1993 will be subject to a $15
      administrative fee.

See below for registration fees and mailing instructions.

"In reviewing the Institute for Electrical and Electronics Engineers' plans
for COMPASS Conferences, The Assistant Secretary of Defense (Public Affairs)
finds this event meets the standards for participation by DoD personnel under
instruction 5410.20 and DoD Standards of Conduct Directive 5500.7.  This
finding does not constitute DoD endorsement of attendance which must be
determined by each DoD component."

Registration Fees

      NOTE:         Members belong to sponsoring or cosponsoring
                    organizations.

      Advanced (before 30 May 1993)  [4 JUNE FOR RISKS READERS]
      -----------------------------
                                                   Speakers,
                                       Non-        One-Day &
                         Members      Members      Students
      Conference           250          315          100
      Tutorial              50           70           50
      Proceedings Only      20           30           20

      On-Site (after 30 May 1993)  [4 JUNE FOR RISKS READERS]
      ---------------------------
                                                   Speakers,
                                       Non-        One-Day &
                         Members      Members      Students
      Conference           300          375          100
      Tutorial              70           90           50
      Proceedings Only      20           30           20

      Fee includes coffee breaks, lunches, and social functions

Place Conference Registration Card in envelope and mail to :

                  Karen Ferraiolo
                  COMPASS '93 Registration
                  Arca Systems, Inc
                  8229 Boone Blvd, Suite 610
                  Vienna, VA 22172
                  Phone: 703/734-5611
                  Fax:   703/790-0385

              ==============================

Hotel Registration Card
Marriott Hotel, 301/977-8900

      Name________________________________________________________
      Company_____________________________________________________
      Street Address______________________________________________
      Rm. No./Mail Code___________________________________________
      City, State, ZIP____________________________________________
      Country_____________________________________________________
      Business Telephone__________________________________________
      Arrival Date________________________________________________
      Departure Date______________________________________________
      Number of Persons___________________________________________

      Rate $70 single or double (apply 12% tax to rate).  All
      reservations must be received by 30 May 1993.  All room
      reservations must be guaranteed by a one-night deposit.
      Deposit will guarantee first night availability, and will be
      credited to last night of reservation.  Deposit refunded if
      request received 48 hours prior to reserved arrival.

Form of Payment

      _____         Check enclosed made payable to The Gaithersburg
                    Marriott
      _____         One night deposit enclosed $___________________
      Guaranteed by_______________________________________Exp._____
      Card No._____________________________________________________
      Authorized Signature_________________________________________

Please place in envelope and mail to:

                The Gaithersburg Marriott
                620 Perry Parkway
                Gaithersburg, MD 20877

              ==============================

Board of Directors
------------------
Chair:               Dolores R. Wallace, NIST
Vice-Chair:          Anthony Shumskas, Logicon, Inc.
Treasurer:           Dario DeAngelis, Logicon, Inc.
Secretary:           Michael L. Brown, Naval Surface Warfare Center
IEEE AESS:           Robert Ayers, ARINC, Inc.
IEEE NCAC:           Arthur Cotts
Members:             Judy Bramlage, U.S. General Accounting Office
                    John Cherniavsky, National Science Foundation
                    Frank Houston, Weinberg Associates
                    H.O. Lubbes, Naval Research Laboratory
                    Juan Zumbado, IBM

Conference Committee
--------------------
General Chair:       Judith L. Bramlage, U.S. General Accounting Office
Program Chair:       John J. Marciniak, CTA, Inc.
Arrangements:        Laura M. Ippolito, NIST
Publications:        Ann Boyer, Control Systems Analysis
Publicity:           Paul Anderson, Space and Naval Warfare Systems Command
Registration:        Karen Ferraiolo, Arca Systems, Inc.
Treasurer:           Bonnie P. Danner, TRW Systems Division
Tutorials:           Michael L. Brown, Naval Surface Warfare Center

Program Committee
-----------------
Paul Ammann, George Mason University
Michael L. Brown, Naval Surface Warfare Center
Albert Mo Kim Cheng, University of Houston
Jarrellann Filsinger, Booz-Allen & Hamilton
John J. Marciniak, CTA, Inc.
Reginald N. Meeson, Jr, Institute for Defense Analyses
Matthew Morgenstern, Xerox Design Research Institute
Adam Porter, University of Maryland
James Purtilo, University of Maryland
Marvin Schaefer, CTA, Inc.
Cynthia Wright, Defense Information Systems Agency
Tony Zawilski, The Mitre Corporation

------------------------------

End of RISKS-FORUM Digest 14.66
************************