Subject: RISKS DIGEST 17.70

RISKS-LIST: Risks-Forum Digest  Thursday 8 February 1996  Volume 17 : Issue 70

  FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
  ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

***** See last item for further information, disclaimers, etc.       *****

 Contents:
Train operators get permission to use manual backup (Tom Comeau)
Electronic Medical Records and Images (Jay Brown)
Risks of web robots (Joe A. Dellinger)
Air Traffic Control Dependability (Jim Wolper)
So many RISKS, where do you start? (Steve Doig)
CFP : Dependable Computing for Critical Applications (Catherine A. Meadows)
ABRIDGED info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Sun, 04 Feb 1996 21:22:05 EST
From: "Tom Comeau @ Space Telescope Science Institute" <[email protected]>
Subject: Train operators get permission to use manual backup

During the early hours of the "Blizzard of '96" in the Washington
metropolitan area, a Metro train operator was killed when his train
ran into the back of a parked train at the Shady Grove Metro
station. Shady Grove is one of the endpoints of the system, and is
located in Gaithersburg, Maryland, a northern suburb of Washington.

The train was being taken out of service for the night, and had
moved past the station platform and into a railyard at the terminus.
Press reports at the time indicated the train rolled past the
station at normal track speed, and struck a parked train. The
operator, who sits in a very small (< 2m square) compartment at the
very front of the train, was pinned in the car and died of his
injuries.

There were early conflicting reports about the cause of the
accident. Several sources reported hearing radio calls from the
train to the track supervisor, asking for permission to take the
train off automatic control and manually move into the yard. There
was disagreement over whether permission had been granted, and one
source suggested the operator had failed to pay attention to his
speed after taking manual control.  More recent reports suggest that
permission was refused, and the train was under automatic control at
the time of the collision.

While the investigation is ongoing, Metro announced today that changes in
operational procedures were being made immediately in light of what had
already been learned.  The change announced today is that operators will
have discretion at all times to take trains out of automatic mode.

A local radio station reports that the operator asked for permission
to take the train under manual control, that permission was refused,
and the train proceeded through the station at fairly high speed,
applied the brakes normally, but failed to stop on the icy rails.

Some of the risks are obvious: The automatic system is unable to determine
if traction on the rails is poor, and so does not adequately adjust a
train's speed.  The trains are routinely operated in automatic mode in
crowded rail yards, which builds confidence in the system under ideal (dry)
conditions.  Supervisors must approve taking a train out of manual mode, and
those supervisors may not be fully aware of track conditions.

Particularly tragic in this case is that a manual system was available, and
the train operator wanted to use that system, but was prevented by the rules
from doing so.  Today's change at least reduces that risk.

Tom Comeau  [email protected]  Space Telescope Science Institute

------------------------------

Date: Wed, 7 Feb 1996 15:14:53 -0500
From: Jay Brown <[email protected]>
Subject: Electronic Medical Records and Images

>From Communications of the ACM, February 1996, Newstrack:

"Heart of the matter...  The first film-less heart imaging system that
stores its pictures of the human heart on CD-ROM disks has been built at the
North Shore University Hospital in Manhasset, L.I., in collaboration with
General Electric. The disks store full-motion pictures of cardiac
catheterization tests, or angiograms, and within a year North Shore doctors
hope to be transmitting medical records electronically between hospitals in
its growing network, as well as to outside specialists.  North Shore
officials say the computerized records will save the hospital $12,000 a year
on film, processing chemicals, and labor and storage in outside warehouses.
"The advantage is in instantaneous retrieval of the images at a level of
clarity that is better than a filmed angiogram," says the hospital's chief
of cardiology."

One potential risk with this type of system would be the "configuration
management" challenge - what image goes with what patient?  As any sotware
developer knows, keeping track of a lot of different files on disk, many of
which have more than one version, is not a trivial task.  While many
solutions to this problem exist in the form of version control systems for
source code and document management systems for large amounts of
documentation, electronic medical records and images may introduce some new
dimensions to this challenge, especially in a distributed environment. A
system like the one described above must have the necessary facilities to
help insure that the right images are associated with, and retrieved for,
the right patient.  In cases where the wrong image is retrieved, whether for
diagnosis or to guide a procedure, the risks are, as they say, obvious.
These types of problems can and do occur with the current "manual"
procedures.  The shift to electronic record keeping approaches must be
accompanied by changes to the procedures used to prevent these kinds of
situations, and will require a lot of electronic "support".

Jay Brown, Applied Systems Intelligence, [email protected]

------------------------------

Date: Sun, 4 Feb 96 20:50:03 CST
From: [email protected] (Joe A. Dellinger)
Subject: Risks of web robots

       Here are three risks of "web robots" I've run across recently that
I think Risks readers might find interesting.

1)      The first is probably already well known to Risks readers: password
files accidentally being exported to the world. Web servers are just yet
another way of making that mistake.

       Here is a post that has already had wide circulation (and may have
already appeared in Risks... I'm unable to scan back issues to check right now
because of heavy network load):

>Subject: BoS: Misconfigured Web Servers
>
>     A friend of mine showed me a nasty little "trick" over the weekend. He
>     went to a Web Search server (http://www.altavista.digital.com/) and
>     did a search on the following keywords -
>
>             root: 0:0 sync: bin: daemon:
>
>     You get the idea. He copied out several encrypted root passwords from
>     passwd files, launched CrackerJack and a 1/2 MB word file and had a
>     root password in under 30 minutes. All without accessing the site's
>     server, just the index on a web search server!
>
     ....
>
>     The guy that showed me this found it funny, but I find it disturbing.
>     Are there that many sites that are that poorly configured?
>
>     [email protected]

       I just verified that indeed this search does work, although to my
relief the majority of the "hits" found are legitimate documents discussing
UNIX security. The risks are fairly obvious.

1')     Here is a variation on the above risk that I HAVEN'T seen discussed
before, however. See what happens if you search AltaVista for THESE keywords:

"unpublished proprietary source code actual intended reserved copyright notice"

       The results of this search are even more frightening, at least to me.

       The general risk is not just that you can conveniently find password
files, but ANY kind of document that shouldn't be widely distributed:
material useful for breaking into your system, copyrighted material, illegal
material, libelous material, incriminating or embarrassing material, etc...

2)      The second risk works the other way: fooling stupid web robots so
as to lure people to your web site.

       A month ago I tried searching for "eisner reciprocity paradox" on
WebCrawler, hoping to find that it had indexed a paper of mine that I had
reprinted electronically under my home page. Nope, it hadn't (or at least
I was unable to find it using any of the likely keywords I could think of!).
Instead the single match was on a URL intriguingly entitled
"The information source".

       Gee, this "information source" must have an article in it about
Eisner's Reciprocity Paradox, one that I hadn't known of before! So I followed
the link, and ended up at something unexpected: "http://www.graviton.com/red/",
"The Red Herring Home Page"! (It comes complete with gifs of red fish!)

       A little experimentation revealed that almost ANY obscure search would
match "The information source", often as the only matching document found.
As near as I could figure out, his site recognized probes by web robots and
then threw a dictionary at them! (His point made, he has since stopped,
although the Red Herring page is still there for your perusal.)

       I contacted the author, Tom White, and asked for more details. He
didn't want to give his secrets away, but did reply:

> I will say that I spent no more than an hour on the whole thing, including
> writing the page, and it was effective far beyond what I thought a silly
> trick like that would muster.  I think that by virtue of not hiding what
> I am trying to do, people who write web indexers may see the page and think
> of ways to subvert feeble attempts like mine - which is a good thing since
> the page could have as easily been any propaganda I wanted to push on people.

       The risk? It can be frustratingly difficult (or impossible) to get a
web robot's attention for a legitimate page you WANT indexed, or to find a
page you know is there amist all the distractions of "false hits". Part of
the clutter may be wildly off-topic pages engineered to fool web robots into
thinking that almost anything matches them. (Or simply long rambling pages
containing lots of poems and such... documents that "fool" the robots more
by accident than design.)

3)      Finally, the act of being searched can cause problems for certain kinds
of sites: ones that carry hundreds of thousands of distinct URLs, often
generated only on demand, and that don't expect any one site to ever have
reason to download ALL of them, whether all at once or a few at a time.

       See for example "http://xxx.lanl.gov/RobotsBeware.html". The authors
state there: "This www server has been under all-too-frequent attack from
`intelligent agents' (a.k.a. `robots') that mindlessly download every link
encountered, ultimately trying to access the entire database through the
listings links. In most cases, these processes are run by well-intentioned but
thoughtless neophytes, ignorant of common sense guidelines."

       They have been forced to take a "proactive" stance to protect
themselves: "We are not willing to play sitting duck to this nonsensical
method of `indexing' information." The rather UNIQUE hot link that follows,
"(Click here to initiate automated `seek-and-destroy' against your site.)",
doesn't actually do anything but pause for 30 seconds, I'm told...

       I'll let readers examine the page and draw their own Risks!

------------------------------

Date: 2 Feb 1996 15:14:04 -0700
From: [email protected] (Jim Wolper)
Subject: Air Traffic Control Dependability

The US National Transportation Safety Board has released a report stating
that the Air Traffic Control system is "very safe", although they do
recommend more training in the use of backup features and making the
features easier to use.  This is according to an article in Aviation Week,
1/29/96.  They characterised the backup modes as "inefficient".

RISKs contributors (and, presumably, readers) seem to jump on every incident
involving aircraft as identifying a new RISK, and I guess I resent the
implicit accusation that those of us in aviation (I work part-time as a
pilot and flight instructor, although my "real" occupation is mathematics
professor) have not identified any of these RISKS.  In fact, the entire
corpus of aviation regulatory and training materials exists to address and
reduce RISK.  I won't claim that we have thought of everything, but very
little has escaped our notice.  If a new RISK is uncovered, regulations and
procedures change quickly (alas, sometimes regulations change for no good
reason, but that is the RISK of a bureaucracy at work).

Jim Wolper  Department of Mathematics  Idaho State University
Pocatello, ID  83209-8085  USA    <http://math.isu.edu/~wolperj>

------------------------------

Date: Thu, 1 Feb 96 11:04 EST
From: Steve Doig <[email protected]>
Subject: So many RISKS, where do you start?

This news item, seen on Dave Farber's "interesting people" list, suggests
that RISKS folks still will have plenty to discuss in the coming century...
Steve Doig

WASHINGTON (Reuter) - The Air Force Wednesday projected a
dazzling array of new U.S. arms and space sensors for the 21st
century, from pilotless hypersonic attack jets to microwaves
that cripple enemy electronics.
        The possible high-tech weapons listed in a year-long study
released by the service are so advanced that special training
would be essential to make sure humans are not overwhelmed by
science. ``The keyboard and the mouse are simply not adequate
for the 21st Century,'' said Gene McCall of Los Alamos National
Laboratory, chief of the Air Force Scientific Advisory Board.
        Air Force Secretary Sheila Widnall and McCall presented the
2,000-page study, telling a Pentagon press conference these and
other systems could be built in 10 to 50 years:
        -- Warplanes that fly at speeds as high as 7,000 miles an
hour without pilots, guided by brain waves and using lasers or
microwaves to attack the enemy.
        -- Low-flying families of satellites that help aircraft and
missile-launchers send their weapons to targets
instantly and assure delivery of relief supplies accurately in
any kind of weather at any time.
  ***************************************
        -- Stables of disruptive ``information warfare'' weapons
that confuse and disable enemy electronics and communications
systems such as commercial computers.
  ***************************************
        -- Satellite-based global positioning systems that tell
aircraft and ground troops where they and their targets are
located within a half-inch).
        ``Let me assure you that this study is not going to sit on
the shelf and gather dust. We have already set aside funding for
some of these promising new areas of research,'' Widnall said.
        McCall said some space and communications systems could be
ready within a decade but hypersonic aircraft and missiles that
could maneuver sharply would be a major challenge. He also said
machines must not outpace human ability to use them.
        ``What we have to make sure of is that people are the
primary actors at the major points,'' he said, showing a video
of a blinking pilot, concentrating to use brain waves to control
maneuvers in a flight simulator.
        McCall said the Air Force could advance ``stealth''
technology, allowing an aircraft to better avoid ground radar by
making the underbelly completely smooth and putting the wheels
on top -- landing the plane in a flip maneuver.
        ``The pilots don't like that,'' he smiled.
        Laser-guided bombs used to defeat Iraq in the 1991 Gulf War
were only the beginning, the report suggested. But it stressed
that speed was the hallmark of the future.
        Aircraft and satellite sensors, cooperating in the future,
will tell U.S. forces within one second when an anti-aircraft
missile site anywhere in the world is activated, sending a
hypersonic missile to attack the site from 200 miles away within
a minute.
        The board also suggested that high-tech research will
produce non-lethal or ``sub-lethal'' microwaves that attack the
enemy's information systems. ``You could produce impulses that,
if you are attacked by an airplane, you could simply turn off
all the warning lights in that airplane and send it home. Or,
force the pilot to bail out,'' McCall told reporters.

------------------------------

Date: Thu, 8 Feb 1996 15:22:58 -0500 (EST)
From: [email protected] (Catherine A. Meadows)
Subject: CFP : Dependable Computing for Critical Applications

                          DCCA-6 Call for Papers
    ********************************************************************
             Sixth IFIP International Working Conference on
             Dependable Computing for Critical Applications

                        Can We Rely on Computers?

                             March 5-7, 1997
                     Garmisch-Partenkirchen, Germany
    ********************************************************************

Organized by
       IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance
In cooperation with
       IFIP Technical Committee 11 on Security and Protection in Information
         Processing Systems
       IEEE Computer Society Technical Committee on Fault-Tolerant Computing
       EWICS Technical Committee 7 on Systems Reliability, Safety and Security

Computer systems are used to perform many critical tasks, including guiding
aircraft, scheduling railroads, assisting in surgery, controlling nuclear
reactors, performing financial transactions, military command and control,
and a host of other applications. Properties that such a system must have can
include availability, reliability, safety, and security. Although the study
of these properties evolved as separate disciplines, they have in common the
fact that a user must have a high degree of confidence in the service that the
system delivers. The notion of dependability captures these concerns within
a single conceptual framework, making it possible to approach the different
requirements of a critical system in a unified way.

The sixth IFIP Working Conference on Dependable Computing for Critical
Applications aims at bringing together researchers and developers from
academia, industry, and government who are advancing the state-of-the-art
in dependable computing. Papers are sought in all areas of dependable
computing, including but not limited to models, methods, algorithms, tools
and practical experience with specifying, designing, implementing, assessing,
validating, operating, and maintaining dependable computing systems. Papers
that deal with man-machine interface issues (as they relate to dependability)
are specifically encouraged. Of particular but not exclusive interest will be
presentations that address combinations of dependability attributes, e.g.,
safety and security, through studies of either a theoretical or an
applied nature.

Garmisch-Partenkirchen lies at the foot of Germany's highest mountain, the
Zugspitze. The Olympic town is a winter sports capital and favored destination
for excursions and trips in Upper Bavaria.

Submitting a Paper: Six copies (in English) of original work, neither
submitted nor accepted for publication elsewhere, should be submitted by
September 3, 1996, to the Program co-Chair:

       Prof. William H. Sanders
       University of Illinois          Tel:    217 333 0345
       CRHC - Coordinated Science Lab  Fax:    217 244 3359
       1308 West Main Street           E-mail: [email protected]
       Urbana, Illinois 61801 USA

Papers should be limited to 6000 words, full-page figures being counted as
300 words. Each paper should include a short abstract and a list of
keywords indicating subject classification. Papers will be refereed, and
the final choice will be made by the Program Committee. Notification of
acceptance will be sent by December 1, 1996, and camera-ready copy will be
due on January 3, 1997.

           *              Important Dates:                 *
           *                                               *
           *   Submission deadline:      3 September 1996  *
           *   Acceptance notification:  1 December 1996   *
           *   Camera-ready copy due:    3 January 1997    *


General Chair
       Mario Dal Cin
       University of Erlangen, Germany

Program co-Chairs
       Cathy Meadows
       Naval Research Laboratory, USA

       William  H. Sanders
       University of Illinois at Urbana-Champaign, USA

Organization Chair
       W. Hohl
       University of Erlangen, Germany

Program Committee
       Jacob A. Abraham, U. of Texas at Austin, USA
       Algirdas A. Avizienis, UCLA, USA
       Pietro Carlo Cacciabue, EU Joint Research Ctr., Italy
       Alain Costes, LAAS-CNRS, France
       Flaviu Cristian, UCSD, USA
       Joanne Bechta Dugan, U. of Virgnia, USA
       Klaus Echtle, U. of Essen, Germany
       Bernhard Eschermann, ABB, Switzerland
       W. Kent Fuchs, U. of Illinois, USA
       Virgil D. Gligor, U. of Maryland, USA
       Li Gong, SRI International, USA
       Dick Hamlet, Portland State U., USA
       Erik Hollnagel, OECD Halden Reactor Proj., Norway
       Ravi Iyer, U. of Illinois, USA
       Karama Kanoun, LAAS-CNRS, France
       Carl E. Landwehr, Naval Res. Lab., USA
       Jean-Claude Laprie, LAAS-CNRS, France
       Bev Littlewood, City U. London, Great Britain
       Teresa Lunt, DARPA, USA
       Henrique Madeira, U. of Coimbra, Portugal
       John McLean, Naval Res. Lab., USA
       John F. Meyer, U. of Michigan, USA
       Michele Morganti, ITALTEL, Italy
       Brian Randell, U. of Newcastle, Great Britain
       John Rushby, SRI International, USA
       Rick Schlichting, U. of Arizona, USA
       Ernst Schmitter, Siemens AG, Germany
       Yoshi Tohma, Tokyo Denki U., Japan
       Kishor S. Trivedi, Duke U. USA
       Y.C. Bob Yeh, Boeing, USA

Ex Officio
       Hermann Kopetz, TU Vienna, Austria
       IFIP WG 10.4 Chair

------------------------------

Date: 8 February 1996 (LAST-MODIFIED)
From: [email protected]
Subject: ABRIDGED info on RISKS (comp.risks)

The RISKS Forum is a moderated digest.  Its USENET equivalent is comp.risks.
SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) on
your system, if possible and convenient for you.  BITNET folks may use a
LISTSERV (e.g., LISTSERV@UGA): SUBSCRIBE RISKS or UNSUBSCRIBE RISKS.  [...]
DIRECT REQUESTS to <[email protected]> (majordomo) with one-line,
  SUBSCRIBE (or UNSUBSCRIBE) [with net address if different from FROM:]
  INFO     [for further information]

CONTRIBUTIONS: to [email protected], with appropriate,  substantive Subject:
line, otherwise they may be ignored.  Must be relevant, sound, in good taste,
objective, cogent, coherent, concise, nonrepetitious, and without caveats
on distribution.  Diversity is welcome, but not personal attacks.  [...]
ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
By submitting an item that is accepted for publication in RISKS, the author
grants permission for unlimited noncommercial public distribution and
redistribution in electronic and print form.  Relevant contributions may
appear in the RISKS section of regular issues of ACM SIGSOFT Software
Engineering Notes or SIGSAC Review.

RISKS can also be read on the web at URL http://catless.ncl.ac.uk/Risks

RISKS ARCHIVES: "ftp ftp.sri.com<CR>login anonymous<CR>[YourNetAddress]<CR>
cd risks<CR> or cwd risks<CR>, depending on your particular FTP.  [...]
[Back issues are in the subdirectory corresponding to the volume number.]
  Individual issues can be accessed using a URL of the form
    http://catless.ncl.ac.uk/Risks/VL.IS.html      [i.e., VoLume, ISsue]
    ftp://ftp.sri.com/risks

------------------------------

End of RISKS-FORUM Digest 17.70
************************