Subject: RISKS DIGEST 14.73
REPLY-TO: [email protected]

RISKS-LIST: RISKS-FORUM Digest  Saturday 12 June 1993  Volume 14 : Issue 73

       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
  ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

 Contents:  [CLEAN-UP OF BACKLOG.  *END* OF SOME OF THE Re: SUBJECTS?]
Palo Alto library computer system calamity (PGN)
Computer errors in Spanish elections (Miguel Gallardo)
Seattle Hackers Fined (Dave Weingart)
Re: Flight control computers 'to bypass pilots' (Timothy Buchanan)
Across the Computer Divide (Marty Leisner)
The Internet is international (Frederick Roeber)
Re: Whitehouse mail (Marcus J Ranum)
Re: Grassroots vs. Astroturf Movements (Max Stern)
Re: French Fry Robots! (Hugh JE Davies)
Re: Citibank ATM risk (Jerry Hollombe, Dave Weingart, Greg Brail)
Re: Cryptography, Free Speech, and so on (Carl Ellison)
Re: Clipper (Dave Banisar)
Re: Health effects of VDTs (correction) (Kenneth R Foster)
Re: Errors in the correction of the error (Bruce Limber, BillV)
Re: What's in it for the grocer? (Geraint Jones, David Carroll, Mike Olson,
   Brad Hicks)

The RISKS Forum is a moderated digest discussing risks; comp.risks is its
Usenet counterpart.  Undigestifiers are available throughout the Internet,
but not from RISKS.  Contributions should be relevant, sound, in good taste,
objective, cogent, coherent, concise, and nonrepetitious.  Diversity is
welcome.  CONTRIBUTIONS to [email protected], with appropriate, substantive
"Subject:" line.  Others may be ignored!  Contributions will not be ACKed.
The load is too great.  **PLEASE** INCLUDE YOUR NAME & INTERNET FROM: ADDRESS,
especially .UUCP folks.  REQUESTS please to [email protected].

Vol i issue j, type "FTP CRVAX.SRI.COM<CR>login anonymous<CR>AnyNonNullPW<CR>
CD RISKS:<CR>GET RISKS-i.j<CR>" (where i=1 to 14, j always TWO digits).  Vol i
summaries in j=00; "dir risks-*.*<CR>" gives directory; "bye<CR>" logs out.
The COLON in "CD RISKS:" is essential.  "CRVAX.SRI.COM" = "128.18.10.1".
<CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.

For information regarding delivery of RISKS by FAX, phone 310-455-9300
(or send FAX to RISKS at 310-455-2364, or EMail to [email protected]).

ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
Relevant contributions may appear in the RISKS section of regular issues
of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.

----------------------------------------------------------------------

Date: Sat, 12 Jun 93 11:24:09 PDT
From: "Peter G. Neumann" <[email protected]>
Subject: Palo Alto library computer system calamity

On 13 May 1993, the computer system used by the Palo Alto Library's six
branches began to make a few small errors in processing requests.  The staff
considered the errors not too serious at that time.  However, by 22 May, the
problems had escalated seriously, and the service folks were called in.

The system is an eight-year-old Ultimate System from Honeywell.  Only used or
reconditioned replacement parts are available.  Unfortunately, the replacement
parts turned out to be lemons, which further aggravated the situation.  As a
backup, the staff resorted to a read-only file that tells only what books the
library owns, but not what is supposedly on the shelves.  Consequently, all
book-borrowing transactions had to be done by hand, while no returned books
could be reshelved.  A power surge on 25 May did further damage to the system,
and on the 26th, the system was shut down completely for another week.
Finally, the system was available again on 2 June, although considerable effort
had to be devoted to processing the accumulation of returned books before
operations returned to normal.

[Source: an article by Rufus Jeffris in the Palo Alto Weekly, 9 June 1993,
p. 11]

------------------------------

Date: Fri, 11 Jun 1993 14:21:14 UTC+0200
From: "(Miguel Gallardo)" <[email protected]>
Subject: Computer errors in Spanish elections

On 6th of June several Spanish cities and towns had too high number of people
that could not vote because their name were not in the right list.

In Spain, Instituto Nacional de Estadistica (INE) is responsible for computing
and updating the polling lists.

As the election was nation wide, these mistakes did not change any parliament
member. However, next election will be a local one, and it seems that INE will
not perform better, it will be much more difficult to explain to the people
why they will not have the chance to change their majors.

Miguel A. Gallardo Ortiz, PX86 Engineer UNIX&C freelance working on RSA crypto
P.O. Box 17083 - E-28080 Madrid (Spain) Tel: (341) 474 38 09 - FAX: 473 81 97
[email protected] President of APEDANICA (Spanish Legal Computer Crime
Research Association) ASOCIACION PARA LA PREVENCION Y ESTUDIO DE DELITOS
ABUSOS Y NEGIGENCIAS EN INFORMATICA Y COMUNICACIONES AVANZADAS

------------------------------

Date: Fri, 11 Jun 1993 09:20:36 -0500
From: [email protected] (the person your mother warned you about)
Subject: Seattle hackers fined (from Reuters via the NYTimes)

I found this little piece buried in the NYTimes, 11 June 1993.  No real
mention is made of what the "hackers" (I suppose the word will never be
rescued) did.  Is anyone on RISK familiar with the details?

And you have to wonder, given the size of notebook computers, and the ease of
purchasing and storing them secretly, how the last clause mentioned could
possibly be enforced.

COMPUTER HACKERS ARE GIVEN FINES AND 5 YEARS' PROBATION

 SEATTLE, June 10 (Reuters) -- Two hackers who illegally infiltrated the
computer systems last fall at the Boeing Company and the United States
District Court here were each sentenced to five years of probation and 250
hours of community service, a clerk at the court said Wednesday.

 Magistrate David Wilson also ordered the two Seattle residents, Charles
Anderson and Costa George Katsaniotis to pay a combined $30,000 in
restitution.  Boeing, which said at the time that none of its systems or data
had been damaged by the unauthorized access, will get $28,000 of the fine and
the court $2000 to defray costs of changing security and checking files.  "As
part of the probation they're not allowed to own a computer or computer
accounts without the permission of the probation officer," the clerk added.

73 de Dave Weingart KB2CWF [email protected]
[email protected]

------------------------------

Date: Thu, 10 Jun 93 09:18 MDT
From: [email protected]
Subject: Re: Flight control computers 'to bypass pilots' (RISKS-14.65)

I would like to address this subject; I am an Air Traffic Controller with 13
years experience in most control functions, including Radar and Oceanic
Non-Radar.

Most communications with pilots over or near land take place under VHF or UHF
A/G radio. If, for example, I want to descend a flight to FL 240 (24,000 feet)
I say "Flight No., descend and maintain flight level two four zero." The pilot
will acknowledge by repeating his flight number and the assigned altitude,
then begin a descent. (Well, lots of times they will question the altitude but
let's not get into that <g>).

At the same time I'm speaking, I will punch the flight id and altitude into my
computer, and the assigned altitude will be displayed on the scope. But that
bears no relation to what I've said, or the pilot heard or said back to me.

I might be thinking 240, punch 240 into the computer, but say 220. I should
catch the error when the pilot reads back the clearance, but I might not. I
might say 240, but the pilot hears 220, and I don't catch the error on
read-back. He might read back 240, but put 220 into his flight director. Each
of these errors happens from time to time, and can cause problems.

Using Mode S, I would enter the flight id and altitude and that would be sent
to the cockpit, where the pilot would acknowledge by pressing a button. My
display would indicate the acknowledgement. The pilot could still question the
clearance via voice radio.

Mode S would not eliminate errors; I might for example punch in the wrong
flight id or altitude. But it should reduce greatly incidents in which the
pilot is doing something other than what is shown on my display. Since I am
continually scanning that display for potential conflicts, it is vital that it
accurately reflect the intentions of the pilots.

There will, I think, always be a pilot (though perhaps someday only one) but
the pilot in command already leaves many tasks to the computer. A commercial
airliner is on auto-pilot most of the time after take-off, and can begin a
landing approach. The most advanced systems can make a landing in zero
visibility conditions, which a human pilot cannot.

Timothy Buchanan

------------------------------

Date: Fri, 11 Jun 1993 21:28:03 GMT
From: [email protected] (Marty Leisner x71348 )
Subject: Across the Computer Divide, NY Times

"Across the Computer Divide, The Nerds face the Dummies" (Sunday NY Times, 6
June, p. 1) talked about "DOS for Dummies", and the lack of training.  This
has to do with productivity (computers with out training and expertise don't
improve productivity).

Marty Leisner   [email protected]   [email protected]

------------------------------

Date: Thu, 10 Jun 1993 10:50:34 GMT
From: [email protected] (Frederick Roeber)
Subject: The Internet is international (Rothwell, RISKS-14.72)

A little while ago someone at tis.com announced (on alt.security, among other
places) that a reference PEM implementation was "freely" [sic] available for
ftp in the US and Canada.

Just for kicks, I tried it from here (the evil CH empire):

% ftp ftp.tis.com
Connected to AZALEA.TIS.COM.
530 Only DNS registered hosts in the US/Canada can use this server.

I haven't extensively played with their system, but I'd suspect they
are reverse-resolving the IP address to a fully-qualified domain name,
and seeing if the top-most domain is an old three-letter type (or
possibly ".us" or ".ca"), or an international two-letter (e.g, ".uk" or
".ch").  I'm sure we can all evaluate the security of this method.

> I don't see anything to stop (for example) groups from outside the US
> lobbying this email service by pretending to be "the people" from "this
> country."

Well, the system for the USA's House of Representatives requires that any
would-be e-mail sender first send a (real) postcard to their rep, listing
their actual address and their e-mail address.  This would provide a link from
any e-mail message to a real location in the rep's district.  All replies are
via real mail, anyway, presumably to the address on the postcard.

BTW, ftpmail to ftp.tis.com works ;-)

Frederick G. M. Roeber | CERN -- European Center for Nuclear Research
CERN/PPE, 1211 Geneva 23, Switzerland [email protected] +41 22 767 31 80

  [Postcard scheme also noted by [email protected] (John Bruner).
  REAL SECURITY, eh?  PGN]

------------------------------

Date: Wed, 9 Jun 93 21:41:59 EDT
From: Marcus J Ranum <[email protected]>
Subject: Re: Whitehouse mail -

       It is possible that some whitehouse mail that is "correctly" addressed
is being rejected because the recipient addresses contain mail metacharacters.
This is a draconian mechanism to prevent folks from routing mail so it appears
to have originated from whitehouse.gov, by talking to the SMTP port, I.e.:

sol-> telnet whitehouse.gov 25
Trying 198.137.240.100 ...
Connected to whitehouse.gov.
Escape character is '^]'.
220 whitehouse.gov SMTP/smap Ready.
helo whitehouse.gov
250 (whitehouse.gov) pleased to meet you.
mail From: clinton
250 clinton... Sender Ok
rcpt To: [email protected]
550 Recipient must be in form of: user, [email protected], or [email protected]

       This has the unfortunate side effect that mailers that generate cruft
like IN%[email protected] will run afoul of the destination check.

------------------------------

Date: Thu, 10 Jun 93 09:17:38 PDT
From: Max Stern 310-524-6152 <[email protected]>
Subject: Re: Grassroots vs. Astroturf Movements (RISKS-14.72)

I also heard the NPR report cited in 14.72 by Shyamal Jajodia
<[email protected]>.  NPR described more than the preparation of lobbying
letters for targeted mailing lists to send on to their representatives.  The
new Astroturf (r) lobbying techniques also include the following horror:

 The consulting outfit contracts with a lobbyist to generate not mail, but
 PHONE CALLS, to congressional offices.  They then telephone "grass roots"
 citizens and, having given them a sketch of the issue, say "If you agree
 with us that this issue is important, we can connect you with Congressman
 Wintergreen right now, so that you can express your opinion to him."  Then
 they "patch" the callee through to the congressperson's office, get off the
 line, and it's on to the next call.  In this way they can generate a
 constant flux of phone calls, seemingly spontaneous, from private citizens,
 in support of any issue.

The more sophisticated congressional staffs have already learned to detect
this kind of lobbying; they ask a few detailed questions about the issues and
find that the caller completely lacks any substantive background information.
The RISK is that it becomes increasingly difficult for the congressional staff
to winnow the wheat (sincere opinion from concerned citizens) from the
Astroturf chaff, and that modern information technology is what enables the
consulting firm to provide this "service."

[email protected]

------------------------------

Date: Thu, 10 Jun 1993 10:38:24 GMT
From: [email protected] (Hugh JE Davies)
Subject: Re: French Fry Robots! (McKay, RISKS-14.71)

This [risk] has been routinely dealt with in the process control industry for
decades. About 15 years ago, I was working on systems for the potato chip
(US)/crisp (UK) manufacturing industry which handled hundreds of tons of
sliced potato per hour being run through a fryer containing 3 tons of corn
oil. As long as the oil level/oil pump/heater thermostat interlocks didn't
fail spectacularly, there was no problem.

Admittedly, we had a rotating orange light and a *loud* siren on top of the
control panel that was the "if all else fails, run away" warning.

And I won't mention the time a supervisor dropped a clipboard onto the fryer
input belt (which ran at several hundred feet a minute.)

Cheese & onion clipboard, anyone?

[email protected]       Rank Xerox Technical Centre, WGC, UK.

------------------------------

Date: Wed, 9 Jun 93 18:32:50 PDT
From: [email protected] (The Polymath)
Subject: Re: Citibank ATM risk (Kass, RISKS-14.72)

}... I've never made two transactions in a row on a Citibank ATM, so I
}can't be sure that the language question is routinely presented again ...

It isn't.  Language is chosen at start of session.  The only way to arrive
at the situation you found is for someone to dip their card, then change
their mind and walk away.  Further, if you check I think you'll find the
ATM asks for the PIN _after_ language selection (so the PIN entry screen
will be in the correct language).  Thus, what you saw was much less of a
security risk than it seemed.

Jerry Hollombe, aka: [email protected] Head Robot Wrangler at Citicorp
Usual disclaimers  [not Citicorp policy or official Citicorp anything]

------------------------------

Date: Thu, 10 Jun 1993 09:30:32 -0500
From: [email protected] (the person your mother warned you about)
Subject: ATM RISKS (Kass, RISKS-14.72)

Generally speaking (at least, among the many ATM's I've used in the NYMet
area), if an ATM sits idle for a period of time (and this period seems to be
less than one minute, admittedly a fairly long period of time), it will prompt
you for your PIN again before allowing you to make a withdrawal, presumably as
a protection against just such opportunistic attacks on your account.  This
protection is lessened if you aren't carful about shielding your PIN as you
punch it in to the extremely large and easy-to-read display.

What's interesting to note about the Citibank ATM's (if not a RISK associated
with them), is the braille strips around the slots.  Since it's a touch screen,
with no physical keypad, someone who's blind (ooops, pardon me..."optically
challenged") can't use it anyway!

73 de Dave Weingart KB2CWF [email protected] [email protected]

------------------------------

Date: Fri, 11 Jun 1993 18:35:27 -0400
From: Greg Brail <[email protected]>
Subject: Re: Citibank ATM Risk (Kass, RISKS-14.72)

To start with, I am a programmer and I do work at Citibank, but I don't know
any more about the design of the ATMs than the average person. Nonetheless, I
use them all the time.

Anyway, the ATMs, at least the ones in most of the Manhattan locations, ask
"What language to you want to speak?" before asking for the PIN. Since the
ATMs support languages that don't use the Roman alphabet (like Chinese and
Japanese, although I don't know either so I can't tell which is which from the
buttons) , the numbers on the PIN keypad would have to be different for those
languages.

And even though the ATMs don't "eat the card," they ask for the PIN
frequently. At the very least, they appear to ask before every "Get Cash"
transaction, and I think they ask before money transfers as well. However, I
don't know the exact algorithm, so I wonder if they also ask before one tries
to see someone else's account balances or transaction history.

greg  [Disclaimers...]

  [Similar comments from Mark Eckenwiler [email protected] ...!cmcl2!panix!eck]

------------------------------

Date: Thu, 10 Jun 93 15:13:38 EDT
From: [email protected] (Carl Ellison)
Subject: Re: Cryptography, Free Speech, and so on (Leichter, RISKS-14.72)

If Jerry is trying to claim that cryptography is born classified, like nuclear
technology, then I believe he is wrong.  The NSA tried to push this concept
back in the late 1970's and it was tossed out, as I recall.  As a result, I am
allowed to publish anything about cryptography in any international journal or
speak at a conference giving details of my work without getting approval of
any government agency.

The NSA, in the late 1970's, tried to make it otherwise: that a citizen had to
get permission to publish or speak on cryptography and couldn't speak to any
foreigners.

------------------------------

Date: Sat, 12 Jun 1993 12:14:29 EST
From: Dave Banisar <[email protected]>
Subject: Re: Clipper

       On June 9, 1993, Congressman Edward Markey, Chairman of the House
Subcommittee on Telecommunications and Finance held an oversight hearing on
encryption and telecommunications network security.  Panelists were Whitfield
Diffie of Sun Microsystems, Dr. Dorothy Denning, Steven Bryen of Secure
Communications, Marc Rotenberg of the CPSR Washington Office and E.R.
Kerkeslager of AT&T.
       Congressman Markey, after hearing the testimony presented, noted that
the Clipper proposal had raised an *arched eyebrow among the whole committee*
and that the committee viewed the proposal skeptically. This statement was the
latest indication that the Clipper proposal has not been well received by
policy makers.  Last Friday, the Computer Systems Security and Privacy
Advisory Board of NIST issued two resolutions critical of the encryption plan,
suggesting that further study was required and that implementation of the plan
should be delayed until the review is completed.
       At the Third CPSR Cryptography and Privacy Conference on Monday, June
7, the Acting Director of NIST, Raymond Kammer, announced that the
implementation of the proposal will be delayed and that a more comprehensive
review will be undertaken. The review is due in the fall.  Kammer told the
Washington Post that maybe we won't continue in the direction we started out.

The full text is available by anonymous ftp from cpsr.org /cpsr/crypto/clipper

------------------------------

Date: Thu, 10 Jun 93 07:03:49 -0400
From: [email protected] (Kenneth R Foster)
Subject: Re: health effects of VDTs (correction) (Hull-Richter, RISKS-14.72)

The unit should have been mG (milligauss).  The text had been "corrected" by a
typist.  I think that we corrected the error in the galleys.  The book is
_Phantom Risk_ (Foster,Bernstein, Huber, eds), MIT Press 1993.

Strictly speaking, the correct unit should be Tesla; in discussions of health
effects of magnetic fields the unit Gauss is usually used.  For nonmagnetic
materials it is appropriate as well.

Kenneth R. Foster

------------------------------

Date: Thu, 10 Jun 1993 09:45:26 -0400 (EDT)
From: Bruce Limber <[email protected]>
Subject: Re: Errors in the correction of the error

Please forgive me if any of what follows seems uncharitable; I truly don't
mean it to be a personal attack, nor to I wish to appear non-humble.

Two corrections were posted in RISKS-14.72, pointing out errors in the
RISKS-14.71 directions for getting to a conference by Metro (the DC subway
system) from National Airport.  There was indeed an error in the original
directions.

I posted one set of corrections; that set is, to the best of my knowledge,
reliable.  I stand by my correction, and I'm more humble than you are!  :-)

The other correction was posted by one of our esteemed colleagues, and in
correcting the (one) error in the original directions, he regrettably
introduced two new errors.  (Perhaps we should stop before we're even
farther behind?)

1. The yellow train to take from National Airport is labeled "Mt. Vernon
Sq."  It "does not--and never has--" gone to U Street/Cardozo.  (He's
thinking of the green train, which is irrelevant to our intent; when the
end-of-track was extended from Gallery Place to U Street for the new green
line, the yellow train's terminus was extended up the new track beyond
Gallery Place, too--but only to Mt. Vernon Square.)

2. The blue train through Metro center (both of which are ideally
irrelevant to our discussion) says "Addison Road," not "New Carrolton."
The New Carrolton train is the orange line, which is--suffice it to say,
you don't want to hear about it.  :-)

BTW, if you're at the National Airport station and see a blue train
labeled "Addison Road," ignore it:  it's a lot slower than the yellow
train.

TRUST ME :-)  --here are the correct directions, again:

Take the yellow train labeled "Mt. Verson Sq." to Gallery Place; there,
transfer to a red train labeled "Shady Grove."  Your destination is the
Twinbrook station.

Piece of cake.

Unfortunately, the real tragedy of all this confusion is that it will
probably put off lots of people who would otherwise have taken the subway,
which really is an easy and enjoyable way to travel from National Airport
to the hotel.  It's also one of the cheapest.  Buses cost more and
probably take longer.  And the less you have to deal with taxis in this
area, the happier you'll be:  the correct fare is a lot, and hacks here
are notorious for overcharging (not all cabs here use meters).

Take the subway; you'll be glad you did.

You have my word on it.  :-)

------------------------------

Date: Fri, 11 Jun 93 09:41:25 EST
From: BillV <[email protected]>
Subject: Re: And yet, a Risks report contains more errors!

I don't find botched Metro directions at all surprising.  For example, the
Blue line train actually goes to, and is labelled, "Addison Road".  It's the
Orange Line that runs to New Carrolton, which theoretically does not run
from the Airport.

------------------------------

Date: Thu, 10 Jun 93 09:54:00 BST
From: Geraint Jones <[email protected]>
Subject: Re: What's in it for the grocer? (Kristol, RISKS-14.72)

There is a hidden assumption that the use of cash is free to the supermarket.
Whilst cash can be a moderately convenient means of exchange for the small
sums in which individuals deal, or indeed for disguising huge transactions
from the tax man, it is tremendously expensive to move it from place to place,
and to protect it against both pervasive `evaporation' from the surface of the
organisation, and from occasional shotgun-inspired haemorrhages.

I plead relevance to RISKS, because it sometimes seems that things get sent
(t)here because they mention technology -- risky or not -- and we do seem
to assume that the absence of technology must at worst not be a bad thing.

------------------------------

Date:         Thu, 10 Jun 93  10:11:09 EDT
From: David Carroll <BDCARRD1%[email protected]>
Subject:      Re: What's in it for the Grocer?

Dollars, that's what! Dave Kristol posted asking if supermarket "price clubs"
were used for building "buying profiles" detailed everything that you bought
using that card. I have no way of knowing if this happens in other geographic
areas, but in the Albany, NY area, the Price Chopper chain does exactly that.
But wait; there's more (to shamelessly steal Popeil's ad line) the card for
that "price club" is one and the same with the stores check cashing card. If
you don't feel like having a business make a buck selling your personal
information, you have to stand in line at the "courtesy" desk to get a check
approved - amount of purchase only. Friends and I have each tried to get a
card for the sole purpose of check cashing (I don't get their specials and
they don't sell my information; sounds fair?) No way, Jose. So I have another
solution - I won't shop there. Whenever my sad little Grand Union doesn't have
some essential ingredient I must have, I go to Price Chopper and take the
opportunity to complain about their policy (while pointing out that I spent
c.$100 at Grand Union and $10 there.)  The risk? that in an increasingly
automated age, as checks become obsolete (very soon by all reports), they
won't even need this extra card as the electronic hook to tie your purchase
info to your demographic info. If you have to use a card to pay (whether
credit or debit) they'll have the hook. Now is the time to get legislation
passed to outlaw use of private information for purposes unrelated to a
transaction that are not expressly approved.  That principle has been
advocated by the Privacy Commission and countless privacy experts for the past
25-30 years. Are we ready?

Dave Carroll, NYS Div. of the Budget     bdcarrd1%[email protected]

------------------------------

Date: Thu, 10 Jun 1993 10:58:13 -0700
From: Mike Olson <[email protected]>
Subject: Re: What's in it for the grocer? (Kristol, RISKS-14.72)

Dr. Mike Stonebraker here at Berkeley consults for a bunch of big retailers
on database management (Stonebraker started the Ingres project, which he
subsequently commercialized, in the early '70's).  I've heard him give
a talk on exactly this topic.  Here's the gist of his story:

Supermarkets will offer "frequent buyer discount" cards.  If you use the
card, they will automatically apply any manufacturer discount coupons that
apply to your purchases.  You don't need the paper coupons.

The benefit to the consumer is that his grocery bill is lower.

The store is able to track purchases by individual customers, which is
good for the store in two ways.  First, it can break down purchasing
habits by whatever demographic information they can find, which may help
them advertise and stock their shelves.  Second, it can sell the names
of all Coke purchasers to Pepsi, so that Pepsi can clutter up your
mailbox with advertisements.  This way, the store makes some extra money.

The benefit to the manufacturer is that it finds out about your buying
habits and can develop ad campaigns directed at you.

The RISK, of course, is that previously anonymous transactions will be
recorded, and details sold to people you don't know.  If that bothers
you, you should pay cash and not use any kind of discount card.

Stonebraker's talk on the future use of database systems by retailers is
pretty interesting.  Big retailers like K-mart and Walmart in the US capture
every single item sold at every cash register they own.  The data are loaded
into an enormous central database, where they're used in "data mining"
applications to plan future purchases by the store.  The main problem the
retailers have right now is storage space and techniques for digesting the
volume of data they have.  If they could do it, they'd keep all purchase data
forever, and issue queries like "When will knee-length powder-blue dresses
come back into style?"

Mike Olson, UC Berkeley ([email protected])

------------------------------

Date: 10 Jun 93 15:36:41 GMT
From: mc/G=Brad/S=Hicks/[email protected]
Subject: Re: What's in it for the grocer?

To protect my job, I have to put the disclaimer first.  As you can see from my
X.400 address and sig, I work for MasterCard International.  I've read a lot
on the subject in company newsletters, etc., but the following remarks should
be interpreted as cocktail-party conversation, not official statements from
MasterCard International, Inc.

Yes, the credit card companies are offering lower fees to grocers (also to
movie theaters and fast food restaurants, as I recall).  But there are fees,
and as you say, grocers tend to have slender margins.  So what's in it for
them?  Two things: (1) customers like having more payment options and some of
them will pick a grocer who takes MasterCard over one who doesn't, and (2)
people who are paying with plastic instead of "real money" run up higher
bills.  So customer traffic goes up and profit per customer transaction goes
up.  THAT's why MasterCard has been so successful in getting grocery stores to
accept MasterCard.

If any grocer who accepts MasterCard (or Cirrus ATM cards, or Maestro
debit cards) is tracking purchases vs. card number, I haven't heard of it.
On, the other hand, unless you're buying huge amounts of booze or
something, the total RISK of such a database (it seems to me) would be a
bit more junk mail, which hardly seems like a big deal when offset against
the benefit of not having to carry cash or wait while a check is approved.
And actually, since I don't think that grocers subscribe to the service that
lets you look up address against card number, it probably couldn't even be
used for that.

(I know I've been doing all of my grocery shopping with my BankMate
ATM/Maestro debit card for two years now; I love it.)

If anybody wants to try and get an official statment on the subject out of
MasterCard, they could try the following people in our Public Relations
department: [email protected],
[email protected], or [email protected].
(X.400: c=us, admd=attmail, prmd=mastercard, and fill in sn= and gn= from
the above list.)  [Peter, you're "the press," why don't you try?]

J. Brad Hicks     Internet: [email protected]
X.400: c=US admd=ATTMail prmd=MasterCard sn=Hicks gn=Brad

------------------------------

End of RISKS-FORUM Digest 14.73
************************