20-Sep-86 09:00:05-PDT,15789;000000000000
Mail-From: NEUMANN created at 20-Sep-86 08:58:08
Date: Sat 20 Sep 86 08:58:08-PDT
From: RISKS FORUM (Peter G. Neumann -- Coordinator) <
[email protected]>
Subject: RISKS-3.59
Sender:
[email protected]
To:
[email protected]
RISKS-LIST: RISKS-FORUM Digest, Saturday, 20 September 1986 Volume 3 : Issue 59
FORUM ON RISKS TO THE PUBLIC IN COMPUTER SYSTEMS
ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
Contents:
Computers and Wall Street (Robert Stroud)
Report from the Computerized Voting Symposium (Kurt Hyde)
Computers, TMI, Chernobyl, and professional licensing (Martin Harriman)
Failsafe software (Martin Ewing)
Software vs. Mechanical Interlocks (Andy Freeman)
How Not to Protect Communications (Geoff Goodfellow)
The RISKS Forum is moderated. Contributions should be relevant, sound, in good
taste, objective, coherent, concise, nonrepetitious. Diversity is welcome.
(Contributions to
[email protected], Requests to
[email protected])
(Back issues Vol i Issue j available in CSL.SRI.COM:<RISKS>RISKS-i.j.
Summary Contents in MAXj for each i; Vol 1: RISKS-1.46; Vol 2: RISKS-2.57.)
----------------------------------------------------------------------
From: Robert Stroud <robert%
[email protected]>
Date: Thu, 18 Sep 86 14:07:59 gmt
To:
[email protected]
Subject: Computers and Wall Street
I came across an article in Computing which gives more details about the
way in which computer systems are influencing the stock market. It suggests
that dealers are forced to rely on the "intuition" of their system, even
against their better judgement, for fear of being caught out. Personally
I find this trend very alarming, but perhaps the fluctuations on the stock
market are just "noise" with no lasting influence on the real economy.
Unfortunately, the "noise" can be heard around the world.
Robert Stroud,
Computing Laboratory,
University of Newcastle upon Tyne.
ARPA robert%
[email protected] (or ucl-cs.ARPA)
UUCP ...!ukc!cheviot!robert
----------------------------------------------------------------------------
Reproduced without permission from Sep 18th Computing, (c) Computing.
"Technology led Wall Street to drop prices" by Alex Garrett
The crash in prices which wiped a record amount off the value of shares
on Wall Street last week was largely the result of computerised dealing
systems failing to read the market.
Computer generated selling of shares was estimated to account for almost
50% of the transactions that caused a record volume of 240 million shares
to change hands last Friday. But it is believed that the effect of the
computers was to exaggerate the underlying movement in the market, so
that many shares were sold unnecessarily.
The problem has arisen as a number of factors conspired to make the US
stock markets subject to increasing fluctuations, which in turn has caused
stockbrokers to rely far more heavily upon the split-second advice of their
computer systems. In particular, many systems are triggered by a drop in
share price to instruct a dealer to sell, and he will often do so, even against
his better nature, for fear of being caught out.
... this kind of feature has yet to be adopted in the UK.
Ian Reid ... said that although shares will often recover their price within
a short time, some of the computer systems in the US do not have the intuition
to see this.
------------------------------
Date: Friday, 19 Sep 1986 11:37:13-PDT
From: hyde%
[email protected] (Jekyll's Revenge 264-7759 MKO1-2/E02)
To:
[email protected], self%
[email protected]
Subject: Report from the Computerized Voting Symposium
Belated Report from the Symposium on Security and Reliability of
Computers in the Electoral Process -- August 14th & 15th, 1986
The participants came from many backgrounds, computer people, writers,
attorneys, and even one Secretary of State. Some of the highlights
emphasized by one or more speakers were:
o Lever voting machines are still the fastest way to count
votes. The computerized vote counting machines are slower
than lever machines, but faster than paper ballots.
o Lever voting machines still appear to be the safest way to
count votes.
o The State of Illinois tested its computerized voting
equipment and found numerous instances of errors in vote
counting, primarily in undervotes, overvotes, and straight
party crossovers.
NOTE: An undervote is voting for fewer candidates than the
maximum allowed for an office. An overvote is voting for
more candidates than allowed for an office. A straight party
crossover is casting a vote to be applied to all members of a
party and then switching one or more votes to candidates from
another party.
o A group of Computer Science students at Notre Dame (South
Bend, IN) tested a punch card voting system with a group of
test ballots. By altering only the control cards they were
able to manage the vote totals to predictable incorrect
totals.
Some of the recommendations made by one or more speakers were:
o Five percent of all votes cast should be recounted by
different method than the original count.
o Security standards for computerized voting are needed
immediately. The expanding use of computerized vote counting
equipment may preclude an effective implementation of such a
standard.
o Punch card ballots should be redesigned to make the punch
card into a ballot that is readable by the voter as well as
by the computer.
o Internal procedures of computerized voting equipment must be
open to the public in order to let the public be in control
and to assure public confidence in the electoral process.
o Computerized voting equipment must have the capability of
allowing the voter to monitor the ballots cast by the
computer to be sure it has voted as instructed.
o There should be public domain vote counting software in order
that companies not have to keep their programs for
proprietary ownership reasons.
NOTE: Does anyone know of a Computer Science student looking
for a project? I'm willing to share my notes.
Is there anyone with the resources to build prototypes that
have security features, such as voter-readable punch cards or
a computer-generated, recountable ballot?
Bill Gardner, New Hampshire's Secretary of State, informed us that New
York City is planning to purchase new voting equipment. This is
likely to become a de facto standard for New York State and, possibly,
for whole the nation. Risks Forum people who'd like to contact the
New York City Task Force should contact:
David Moscovitz
New York City Elections Project
2 Lafayette Street, 6th Floor
New York, NY 10007
(212) 566-2952
The results of my informal poll on trusting a computerized voting
system:
Trust Not Trust Undecided
(1) Internal Procedures secret 2/40 38/40 0
Results not monitored by voter
(2) Internal Procedures Revealed 6/40 34/40 0
Results not monitored by voter
(3) Internal Procedures secret 10/40 28/40 2/40
Results can be monitored by voter
(4) Internal Procedures Revealed 24/40 11/40 5/40
Results can be monitored by voter
------------------------------
Date: Wed, 17 Sep 86 09:42 PDT
From: Martin Harriman <MARTIN%SRUCAD%
[email protected]>
To:
[email protected]
Subject: Computers, TMI, Chernobyl, and professional licensing
The NRC does require testing and certification of the software used in the
design of nuclear power plants: this includes the software used for seismic
simulations, fueling studies, and simulations of coolant behavior (which
can get quite complex in BWR designs).
The reactors themselves are designed to be stable, so they do not require
a complex control system for safe operation (unlike military aircraft with
negative aerodynamic stability). Incidentally, the feedback mechanisms
used to produce stability in US reactor designs are missing from graphite
moderated, water damped designs like Chernobyl; this lack of stability
contributed to the initial explosion at Chernobyl.
Professional licensing is state-regulated; I'm not aware of any states with
a professional engineer exam for software engineers. I don't believe that
professional licensing is all that useful; I'm more interested in quality
assurance for safety-related software (and hardware) than in ensuring that
some fraction of the people developing the software passed an examination.
It would be fairly amusing if PE registration became popular with software
engineers, since it would mean they would all need to learn a fair chunk
of civil engineering (the Engineer In Training exam requires it).
--Martin Harriman <martin%
[email protected]>
------------------------------
Date: Thu, 18 Sep 86 09:57:27 PDT
From: mse%
[email protected] (Martin Ewing)
Subject: Failsafe software
To: arms-d%
[email protected],
risks%
[email protected]
How can we even dream of SDI or fly-by-wire aircraft when I just received
12 nearly identical copies of the last ARMS-D mailing, at 33 KB a crack?
Seriously, this is an example of failsafe: if some transmission error
occurs before a message transmission is complete, send it again, and again,
and again... And no one is even shooting at the net, as far as I know.
Martin Ewing
------------------------------
Date: Thu 18 Sep 86 10:16:01-PDT
From: Andy Freeman <
[email protected]>
Subject: Software vs. Mechanical Interlocks
To:
[email protected]
One current advantage of mechanical interlocks is that they can (usually) be
bypassed or modified in the field. If I went on a special toss-bombing
mission, I'd be much happier hearing "the mechanical upside-down
bomb-release interlock has been removed" than "we just patched out that
section of the code and burned a new prom".
-andy
------------------------------
Date: 20 Sep 1986 06:52-PDT
Subject: How Not to Protect Communications
From: the tty of Geoffrey S. Goodfellow <Geoff @ csl.sri.com>
To:
[email protected]
Cc:
[email protected]
[The New York Times, September 13, 1986]
BALTIMORE - The Senate should avoid repeating the mistake made by the
House when it unanimously passed the Electronic Communications Privacy
Act. Purportedly a benign updating of the 1968 Federal wiretap law
designed to guarantee privacy in the electronic age, the bill actually
promotes the cellular telephone industry at the expense of the public
good.
True enough, obsolete language in the existing wiretap law fails to
address digital, video, and other new forms of communications. The
proposed law would fix that. But it would also declare certain
communications legally private regardless of the electronic medium
employed to transport them. The mere act of receiving radio signals,
except for certain enumerated services like commercial broadcasts, would
become a federal crime.
To disregard the medium is to ignore the essence of the privacy issue.
Some media, such as wire, are inherently private. That is, they are
hard to get at except by physical intrusion into a residence or up a
telephone pole. Others media, notably radio signals, are inherently
accessible to the public. Commercial radio and television broadcasts,
cellular car telephone transmissions and other "two-way" radio
communications enter our homes and pass through our bodies. Cellular
phone calls, in fact, can be received by most TV sets in America on UHF
channels 80 through 83.
If radio is public by the laws of physics, how can a law of Congress
say that cellular communications and other forms of radio are private?
The unhappy answer is that the proposed law appears to be a product of
technological ignorance or wishful thinking. A similar edict applied to
print media would declare newspapers, or portions of them, to be as
private as first class mail. The result is plainly absurd and contrary
to decades of reasonable legislative and judicial precedent.
In contrast, present Federal statute prescribes a sensible policy for
oral communications, protecting only those "uttered by a person
exhibiting an expectation that such communication is not subject to
interception under circumstances justifying such expectation." To
illustrate, a quiet chat in one's parlor would likely be protected.
Substitute for the parlor a crowded restaurant or the stage of a packed
auditorium, the expectation of privacy is no longer justified. The law
would not grant it.
Congress should apply this same logic to electronic communications.
The broadcasting of an unencrypted radio telephone call, or anything
else, is an inherently public act, whether so intended or not. Thus it
violates the "justifiable expectation" doctrine, and warrants no Federal
privacy protection.
Protection or no, people will not be stopped from receiving radio
signals. Even Representative Robert W. Kastenmeier, Democrat of
Wisconsin, who championed the bill in the House, confesses that its
radio provisions are essentially unenforceable. They will have no
deterrent effect, and they will not increase the privacy of cellular
phone calls or other broadcasts. Worse, the act would lull the public
into a false presumption of privacy.
On further examination, it appears that the legislation is really more
a sham than an honest, if puerile, attempt by Congress to deal with new
technology. Its sponsors say they aim to protect all electronic
communications equally. Yet the bill sets out at least four categories
of phone calls, with varying penalties for interception. Cellular radio
calls are guarded by threat of prison, but there is no interdiction
whatsoever against eavesdropping on "cordless" telephones of the sort
carried around the apartment backyard.
So Congress is about to give the cellular telephone industry ammunition
for advertising and bamboozling, promising privacy that does not
actually exist. Cellular service companies thereby hope to avoid losing
revenue from customers who might use the service less if they understood
its vulnerability.
If Congress were serious about privacy in the communications age, it
would scrap the Electronic Communications Privacy Act and begin anew.
Legislators and the public must first grasp the true properties of new
technologies. Are those properties inadequate or unsavory? If so,
relief will only come from research and more technology not wishful
legislation.
------------
Robert Jesse is a technology consultant. [known to us all as rnj@brl]
------------------------------
End of RISKS-FORUM Digest
************************
-------