RISKS-LIST: RISKS-FORUM Digest Tuesday 26 July 1988 Volume 7 : Issue 28
FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
Contents:
Pentagon testing (Mike Trout)
Re: "Man in the Loop" (Rodney Hoffman)
NOVA on risks of fighter technology (Dave Curry)
Re: Hacking central office switches (Laura Halliday)
Law student sues micro sysop under ECPA (John Gilmore)
Scanning instant-win lottery cards (Rich Kulawiec)
Wanted: Info on Ergonometrics (Emily S. Bryant for Michael Whitman)
The RISKS Forum is moderated. Contributions should be relevant, sound, in good
taste, objective, coherent, concise, and nonrepetitious. Diversity is welcome.
CONTRIBUTIONS to
[email protected], with relevant, substantive "Subject:" line
(otherwise they may be ignored). REQUESTS to
[email protected].
FOR VOL i ISSUE j / ftp kl.sri.com / login anonymous (ANY NONNULL PASSWORD) /
get stripe:<risks>risks-i.j ... (OR TRY cd stripe:<risks> / get risks-i.j ...
Volume summaries in (i, max j) = (1,46),(2,57),(3,92),(4,97),(5,85),(6,95).
----------------------------------------------------------------------
Date: 25 Jul 88 21:21:13 GMT
From:
[email protected] (Mike Trout)
Subject: Pentagon testing (an oxymoron) (Re: RISKS-7.24)
In article <
[email protected]>, Gary Chapman writes:
> Subject: Aegis testing data withheld from Congress
> Defense Week reports that an unclassified report of the General Accounting
> Office (GAO) reveals that the Navy withheld testing problems of the Aegis
> air defense system from the Congress. "Personnel and Aegis equipment were
> not subjected to targets or tactics that would be found in combat," ...
This is typical of Pentagon testing, and seems to be particularly prevalent in
the Aegis system. An interesting parallel concerns the testing for the Phalanx
close-in shipboard missile defense system, which of course is included as part
of the Aegis umbrella. The Navy's final results of the testing conducted for
Phalanx reported that the system had achieved greater than 80% "success." But
what was the definition of "success?" Pentagon watchdog groups did a little
digging with the Freedom of Information Act, and determined that "success" had
been interpreted as "destruction of the incoming missile." Well, that seemed
okay, so most investigations were dropped. But some whistle-blowers in the
Pentagon produced some disconcerting information. While it was true that
simulated incoming missiles had indeed been "hit" and "destroyed," it had been
determined that the debris and rocket fuel of the destroyed missile would
continue onward and hit the ship, causing tremendous impact and an inevitable
fire. It was estimated that this would be enough to destroy or knock out
nearly any vessel. But since the simulated missiles had been "destroyed," the
Navy proudly announced that Phalanx had passed the test. Empirical evidence
from the Falklands war makes the Phalanx testing look even less realistic.
Only one of the Exocets hitting Royal Navy ships exploded, yet the dud Exocets
still did hellish damage, including sinking two ships. It also appears that
the missile that hit the USS _Stark_ did not go off.
Another example uncovered by the Dina Rasor group: A mobility/breakdown test
was conducted for the new M-1 Abrams tank. The tank failed the test. The test
was run again, with identical results. The Aberdeen Proving Grounds was
instructed to just keep running the test until the tank passed. On the 161st
try, the tank passed the test. The testing information provided to Congress
included only that which pertained to the 161st test; the previous 160 tests
were not even mentioned.
Rasor has also uncovered suspicious changes in the testing for both ALCM and
GLCM (Air- and Ground- Launched Cruise Missiles). Recent stories of doctored
test results for the Rockwell B-1B are similar.
In any system in which hardware or software is to undergo a realistic test, it
is critical that ALL test results be released, unaltered. Any other course of
action changes the test from a realistic simulation to a public relations
gimmick. In the case of software written for a computer game, the results of
doctored testing may be comical. In the case of a military weapon, the results
may be disastrous.
Michael Trout (miket@brspyr1) =-=-=-=-=-=-= UUCP:brspyr1!miket
BRS Information Technologies, 1200 Rt. 7, Latham, N.Y. 12110 (518) 783-1161
------------------------------
Date: 26 Jul 88 07:38:52 PDT (Tuesday)
From: Rodney Hoffman <
[email protected]>
Subject: Re: "Man in the Loop"
I recently posted excerpts from Peter Zimmerman's article about AEGIS and Star
Wars and the "man in the loop". Just in case it wasn't clear, all but the lead
introductory sentence of that was from Peter Zimmerman, not directly from me.
Anyone wishing a copy of his complete article may contact me.
I completely agree with Will Martin and Bill Murray when they each insisted on
adding to Zimmerman's piece a stronger statement about HUMAN fallibility.
In my initial posting, I thought I would let Zimmerman speak for himself. In
light of the responses, I probably should have appended my own reactions. In
particular, I believe many lessons implicit in Zimmerman's piece (and familiar
to all RISKS readers) are well-taken. Among them:
* The blind faith many people place in computer analysis is rarely
justified. (This of course includes the hype the promoters use to
sell systems to military buyers, to politicians, and to voters.)
* Congress's "man in the loop" mandate is an unthinking palliative,
not worth much, and it shouldn't lull people into thinking the problem
is fixed.
* To have a hope of being effective, "people in the loop" need additional
information and training and options.
* Life-critical computer systems need stringent testing by disinterested
parties (including operational testing whenever feasible).
* Many, perhaps most, real combat situations cannot be anticipated.
* The hazards at risk in Star Wars should rule out its development.
Rodney Hoffman
------------------------------
Date: Mon, 25 Jul 88 16:59:49 EST
From:
[email protected] (Dave Curry)
Subject: NOVA on risks of fighter technology
WTTW (Channel 11), the Chicago PBS station, showed a commercial last night
for a NOVA episode on the risks of fighter plane technology. The preview
blurb mentioned questions like is there too much data for the pilot to keep
track of, are G's too great, etc.
I would assume other PBS stations will have this episode at some point also
(I'm not a regular watcher of PBS or NOVA, so I don't know how they work).
WTTW is showing it on Tuesday 7/26/88 at (I believe) 9pm EDT.
--Dave Curry, Purdue University
------------------------------
Date: Mon, 25 Jul 88 14:30:38 PDT
From:
[email protected]
Subject: re: Hacking central office switches
John T. Powers Jr. writes (Risks 7.27):
> It would have been easy for them to make this kind of activity much harder
> than it evidently was. ...
When I worked for BCTel, we had an even simpler solution: remote access to
the console was over dedicated lines. Grossly unsophisticated, but effective.
laura halliday laura_halliday%
[email protected]
------------------------------
Date: Mon, 25 Jul 88 22:09:35 PDT
From:
[email protected] (John Gilmore)
Subject: Law student sues micro sysop under ECPA
This appeared in a recent FidoNews (comp.org.fidonet on Usenet).
The FidoNet is a few thousand IBM PC's all calling each other over
dialup lines; similar to Usenet; less flexible; evolving faster.
Copyright 1988 by the International FidoNet Association. All
rights reserved. Duplication and/or distribution permitted for
noncommercial purposes only. For use in other circumstances,
please contact IFNA at (314) 576-4067. IFNA may also be contacted
at PO Box 41143, St. Louis, MO 63141.
FidoNews 5-30 Page 3 25 Jul 1988
Jonathan D. Wallace, Esq.
1:107/801
SYSOP LIABILITY FOR DISCLOSING PRIVATE MESSAGES
In what appears to be the first case of its kind, an Indiana law
student and BBS user has sued a local sysop, Bob Predaina, in
federal court, claiming that he intentionally disclosed her
private electronic mail to others without her permission.
The lawsuit, which is in the early stages and has not reached
trial, relies upon the Electronic Communications Privacy Act of
1986 (the "ECPA"), which makes disclosure of private electronic
mail without consent either of the sender or the recipient a
federal crime.
The ECPA does not obligate sysops to offer private mail on their
systems. However, if a sysop promises private mail, that promise
must be kept and the contents of private messages may not be
disclosed without consent.
The ECPA provides limited exceptions to the general rule of no
disclosure. A sysop may voluntarily disclose to law enforcement
authorities the contents of a message pertaining to the
commission of a crime, if read inadvertently by him or if it is
read pursuant to the exercise of his duties as a sysop.
Until the courts clarify these rules, sysops who read private
mail on their systems and disclose it may be playing with fire.
Prior court cases involving telephone operators have established
some useful guidelines: an operator may disclose information she
overheard while checking the line at the user's request, but may
not disclose information overheard while eavesdropping out of
curiosity. Sysops, like phone operators, will not be considered
to have a blanket authorization to intercept and disclose private
messages.
Systems such as Fido 11w which routinely make all
private mail visible to the sysop are therefore problematic. BBS
programmers should consider making private mail truly private--
while allowing sysops to turn the private mail option off if they
do not want it.
In the meantime, sysops should reconsider whether it is
worth having private mail on their systems and should make clear
to users in no uncertain terms, through bulletins and messages,
the degree of privacy which can be expected, if any.
Note: a copy of the complaint filed in the Thompson v.
Predaina case is available on the LLM BBS, Fido 107/801
(212)766-3788) in file area 5 under the name "Indiana".
* * *
JONATHAN D. WALLACE, ESQ. is an attorney in New York
City specializing in computer law. With Rees Morrison, he is the
author of the Sysop's Legal Manual, published this year by LLM Press.
He can be reached at (212) 766-3785 (voice) or at the LLM BBS,
given above.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The same issue of FidoNews also contains a relevant ad:
SYSOP LEGAL MANUAL FOR SALE
SYSLAW, the Sysop's Legal Manual,
by Jonathan D. Wallace Esq. and Rees Morrison Esq.
This 130 page book, newly published by LLM Press, includes
chapters on the Electronic Communication Privacy Act, sysop
liability for illegal uploads such as pirated software and stolen
credit card codes, libel and state computer crime laws. The book
is $21.00 (includes postage and handling) from LLM Press, 150
Broadway Suite 610, New York, New York 10038. New York residents
include 8.25 percent sales tax.
[This item is included in RISKS because the book might just answer
questions that have been raised here repeatedly. This notice
represents no endorsement of the book, and is for your information
only. On one hand, much of the cited information is publically
available. On the other hand, its compilation and interpretation in
one place might be useful -- assuming the book is accurate. If this
redistribution in RISKS can in any way be deemed in violation of the
FidoNet banner above, then perhaps FidoNet itself was in violation of
its own noncommercial dictum. By the way, RISKS is unquestionably a
noncommercial effort, in case you hadn't noticed. PGN]
------------------------------
Date: Tue, 26 Jul 88 01:43:27 EST
From:
[email protected] (Rich Kulawiec)
Subject: Scanning instant-win lottery cards (Re: RISKS-7.27)
Fred Baube <
[email protected]> writes:
"Even if they make instant-win lottery cards immune to non-
destructive testing by X-ray, aren't there small CAT scanners
or NMR imagers out there that can determine the location of ink
molecules, providing the same winner/no-winner information ?"
CAT scanners also use X-rays to produce an image, so a card immune
to "peeping" by a conventional X-ray machine is very likely to be immune
to a CAT scanner as well. (All that is necessary for this is that the
inked area have the same absorption cross-section as the non-inked area.)
A similar comment applies to ultrasonic imaging techniques. NMR imaging
might reveal the hidden print, if the ink molecules are distinguishable
from those non-ink molecules around them. My (very casual) guess is
that using an area that's written in two shades of ink with slightly
differing formulations might defeat this approach; i.e. if both areas
consist of a substance with nearly the same chemical composition and
structure, they may be indistinguishable via NMR.
Rich Kulawiec
------------------------------
Date: 25 Jul 88 18:42:52 GMT
From:
[email protected] (Emily S. Bryant)
Subject: Wanted: Info on Ergonometrics
I am posting the following for a colleague; please send responses by mail to:
[email protected] or ...{decvax, ihnp4}!dartvax!michael.whitman
and NOT to me! Thanks. Emily Bryant.
WANTED: Information on how to set up a computer workstation's screen,
keyboard, and seating to minimize eyestrain and physical fatigue.
I am interested in any research results which pertain primarily to
eye- and backstrain, but am not looking for information on possible
effects of video display terminals on pregnant operators.
I am looking for recommendations on
1) Worker's height : chair in inches;
2) Distance from eyes to computer screen;
3) Angle from eye level to center of screen;
4) Height of keyboard above lap level;
Also,
5) Do higher screen resolution and refresh-rate reduce eyestrain?
6) Is it personal preference or documentable fact that black letters
on "white" background (Macintosh), green on black, amber on black, or
some other combination, are easier on daylong viewers' eyes?
8) What kind of ceiling fluorescent bulbs help reduce eyestrain?
9) What kind of chairs help minimize backstrain?
Finally, how about common sense suggestions in addition to these:
10) Workers should look away periodically from their screens and
focus on objects in the distance;
11) Use a screen font which is large enough to be read easily;
12) Use eyeglasses when computing for long hours, with a
prescription specifically for one's actual eye-to-screen distance.
I am researching a feature article for a publication at Dartmouth
College. Since I have been able to find no recent articles on this
except a NY Times 6/23/88 article, I hope suggestions for
information sources will be sent.
Michael Whitman
Dartmouth College
------------------------------
End of RISKS-FORUM Digest 7.28
************************