TIP: Click on subject to list as thread! ANSI
echo: 10th_amd
to: all
from: Roy J. Tellason
date: 2003-07-28 04:07:12
subject: from Risks Digest 22.82

* Forwarded (from: netmail) by Roy J. Tellason using timEd 1.10.y2k.



Date: Thu, 24 Jul 2003 09:28:33 -0700
From: "NewsScan" 
Subject: Serious flaws in electronic voting systems

Johns Hopkins University experts say that high-tech voting machine software
from Diebold Election Systems has flaws that would let voters cast extra
votes and allow poll workers to alter ballots secretly. Aviel D. Rubin,
technical director of the Information Security Institute at Johns Hopkins,
led a team that examined the Diebold software, which has about 33,000
voting machines operating in the United States. Adam Stubblefield, a
colleague of Rubin's, said that "practically anyone in the country --
from a teenager on up -- could produce these smart cards that could allow
someone to vote as many times as they like." Diebold has not seen the
Institute's report and would not comment on it in detail, but a company
spokesman said: "We're constantly improving it so the technology we
have 10 years from now will be better than what we have today. We're always
open to anything that can improve our systems." Peter G. Neumann, an
expert in computer security at SRI International, said the Diebold code was
"just the tip of the iceberg" of problems with electronic voting
systems.
  [*The New York Times, 24 Jul 2003; NewsScan Daily, 24 Jul 2003]
  http://partners.nytimes.com/2003/07/24/technology/24VOTE.html



Date: Thu, 24 Jul 2003 23:48:51 -0400
From: Mark Lutton 
Subject: Bypassing the safeguards

On 23 Jul 2003, New York City Councilman James E. Davis was shot to death by
political opponent Othneil Boaz Askew inside New York's City Hall.  Davis
had a concealed handgun of his own.

How did the two opponents get their weapons past the metal detectors?
According to the news report, the councilpersons (and apparently their guests)
routinely bypass the detectors.

You can have all the technology in the world against violence and terrorism
and it won't do you a damn bit of good if you let everybody and his enemy go
around it.



Date: Tue, 22 Jul 2003 09:27:32 -0700
From: "NewsScan" 
Subject: Biometrics technology: not yet ready for primetime

Gartner Research director Anthony Allen told guests at the launch of
European Biometrics Forum that while widespread use of biometrics was
likely by 2008, the technologies still had some kinks to be ironed out.
Biometrics, which includes technologies used for voice, face, iris and
fingerprint identification systems, is virtually useless without adequate
back security measures and databases, said Allen, and current systems have
several fallibilities that must be corrected. For instance, evidence shows
that wearing eyeglasses can fool an eyescanner, prosthetic makeup can
confuse face scanners, a sore throat can change a voice print and breathing
heavily on a fingerprint scanner can make prints unrecognizable. However,
newer generations of technology are beginning to rectify some of these
shortcomings; the latest fingerprint scanners now incorporate methods of
detecting body heat and blood flow and can scan below the surface later,
making it more difficult to deceive.  [*The Register*, 22 Jul 2003;
NewsScan Daily, 22 Jul 2003]
  http://www.theregister.co.uk/content/55/31865.html



Date: Tue, 22 Jul 2003 09:27:32 -0700
From: "NewsScan" 
Subject: Identity theft: a crime that pays?

The number of victims that have fallen prey to identity thieves is severely
underreported, according to a study by Gartner Research, which estimates
that 3.4% of U.S. consumers -- about 7 million adults -- have suffered ID
theft in the past year. Moreover, identity thieves generally get away with
it -- arrests are made in only one out of every 700 cases. "The odds
are really stacked against consumers," says Gartner VP Avivah Litan.
"Unfortunately, they are the only ones with a vested interest in
fixing the problem." Typically, victims of ID theft learn of the crime
a year or more later after it happens -- long after the trail has gone
cold. "It is different from payment fraud, where the thief takes a
credit card number and consumers are innocent until proven guilty. With
identity theft, it is the opposite: Consumers are thought to be guilty
until proven innocent," says Litan. "There is a serious
disconnect between the magnitude of identity theft that innocent consumers
experience and the [financial] industry's proper recognition of the crime.
Without external pressure from legislators and industry associations,
financial services providers may not have sufficient incentive to stem the
flow of identity crimes."  [CNet News.com 21 Jul 2003; NewsScan Daily,
22 Jul 2003] http://news.com.com/2100-1009_3-5050295.html



Date: Thu, 24 Jul 2003 09:27:00 -0500
From: Jim Bauman 
Subject: Presidential "doublespeak" ...

The risk here is that what is purported to be a way to enhance
communication could actually be a way to do the opposite (Hmmm ... Navigate
nine Web pages
instead of sending an e-mail from your mail client to
president{at}whitehouse.gov ... Gee, which would you choose?).  Is it a
muddled signal from the White House that they want the American public's
feedback and yet they don't?

Also, it's a handy way for the White House to sort its e-mail---those in
favor of their position and those who are not.  Would then, the President
or his people bother to read and consider the e-mails not favoring the
White House's policy on a certain national/foreign affair?  Would they pay
more attention to those that favor their position?

Would they have an "accurate" number of e-mails in favor of their
policies, but a nebulous one in regards to the e-mails that don't?

White House puts up obstacle course for e-mails Critics cite burden of
additional steps By John Markoff, *The New York Times*, 18 Jul 2003
http://www.chicagotribune.com/technology/chi-0307180184jul18,1,7186833.story

Do you want to send an e-mail message to the White House?  Good luck. In
the past, to tell President Bush -- or at least those assigned to read his
mail -- what was on your mind it was only necessary to sit down at a
personal computer connected to the Internet and dash off an e-mail note to
president{at}whitehouse.gov.

But this week, Tom Matzzie, an online organizer with the AFL-CIO,
discovered that communicating with the White House has become a bit more
daunting. When he sent an e-mail protest against a Bush administration
policy, the message was bounced back with an automated reply that
instructed him to send the message in a new way.

Under a system deployed on the White House Web site for the first time last
week, those who want to send a message to President Bush must navigate as
many as nine Web pages and fill out a detailed form that starts by asking
whether the message sender supports or differs with White House policy.

The White House says the new system, at http://whitehouse.gov/webmail, is
an effort to be more responsive to the public and offer the administration
"real-time" access to citizen comments.  [...]

--

Date: Fri, 25 Jul 2003 23:04:16 -0400
From: Monty Solomon 
Subject: Owner of stolen 'sex.com' can sue VeriSign

Elinor Mills Abreu, Reuters, 25 Jul 2003

The owner of "sex.com," once considered one of the Internet's
hottest addresses, can seek payment from the company that improperly
transferred the domain to a "con man" who later fled to Mexico
when ordered to pay $65 million, a court ruled on Friday.  The Ninth
Circuit Court of Appeals in San Francisco ruled that
"computer-geek-turned-entrepreneur" Gary Kremen can hold VeriSign
Inc.'s Network Solutions unit liable for handing the sex.com Web address
over to a "con man."  The decision has widespread implications
for companies that register domains, which until now have not been held
responsible when Web sites are switched from their rightful owners, a
lawyer
for the plaintiff said.  ...
  http://finance.lycos.com/home/news/story.asp?story=35007290

--

Date: Sun, 20 Jul 2003 17:30:40 -0600
From: "J. Lasser" 
Subject: Another risk of decency filters

You could lose a customer.

I've moved out to Colorado and was pursuing broadband through my phone
company. After they verified that my line was DSL-capable, they gave me a
call and asked what ISP I'd like to use. Helpfully, they suggested that MSN
had the best pricing deal with them.

After I agreed that this would be fine, they asked what user ID I would
like. I said 'jonlasser' would be ideal. The system rejected that and
several other variations due, the support technician decided, to the
three-letter word buried in my last name. She asked if I'd like to pick
another user ID.

I said no, and asked about other service providers I could use with their
service. It turns out that there's an option for those of us who already
have mail/web from elsewhere and just need the broadband, which is really
what I wanted in the first place. But for that decency filter, however, MSN
would have had another customer.

Jon Lasser jon{at}lasser.org 410-659-5333



--- 
* Origin: TANSTAAFL BBS 717-838-8539 (1:270/615)
SEEN-BY: 633/267 270
@PATH: 270/615 150/220 379/1 10/345 106/1 2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.