Human-Nets-Request@RED.RUTGERS.EDU (Charles McGrew, The Moderator) (01/07/86)
HUMAN-NETS Digest Tuesday, 7 Jan 1986 Volume 9 : Issue 1 Today's Topics: Queries - Failure probabilities & Braille Printer (2 msgs), Computers and People - "Mind rape" by Computer Mail & The "Hacker" Game & Aliens Among Us ---------------------------------------------------------------------- Return-path: <wmartin@BRL.ARPA> Date: Thu, 19 Dec 85 14:58:42 EST From: Will Martin <wmartin@BRL.ARPA> To: Soft-Eng@mit-xx.ARPA, Risks@sri-csl.ARPA Cc: walsh@almsa-1.ARPA Subject: Failure probabilities in decision chains One of our Directors has asked me to inquire about a reputed Bell labs study from 7 or so years ago, which he heard about at a conference. This study was on "failure probabilities"; one of the statements or conclusions he recalls was that if you have a string of five sequential decisions, one after the other, each based upon the preceeding, the reliability of the result is at the 59% level. I don't really have much other than this to go on, so, if this comment rings a bell with you, and you know the study (or studies) that this sort of conclusion came out of, I would greatly appreciate it if you could mail me a reference. If you know of work being done in this area by other organizations or particular researchers, any comments or rumors or hearsay or pointers to published work or theses would be welcomed. If any documents related to this area of research exist on-line and are not proprietary, please feel free to mail me copies of anything you think might be relevant. The context of this is to provide some sorts of standards of comparison or generally-acceptable figures to use when evaluating the quality of a very complex and involved large software system. Please e-mail responses to one of the addresses below. Thank you. Will Martin US Army Materiel Command Automated Logistics Mgmt Systems Activity UUCP/USENET: seismo!brl-bmd!wmartin or ARPA/MILNET: wmartin@almsa-1.ARPA ------------------------------ Return-path: <DAUL@OFFICE-1.ARPA> Date: 22 Dec 85 02:13 PST From: William Daul / McDonnell-Douglas / APD-ASD From: <WBD.TYM@OFFICE-1.ARPA> Subject: Braille Printer? BRAILE To: irdis%vpi.csnet@CSNET-RELAY.ARPA Does anyone know of a printer that can take a file and print it in Braille? Thanks, --Bi// ------------------------------ Return-path: <@MC.LCS.MIT.EDU,@OFFICE-1.ARPA:WRS@Office-2.Arpa.ARPA> From: William R. Soley <WRS@Office-2.Arpa> Date: Wed, 1 Jan 86 15:10:57 PST Subject: need braile printer A friend and I operate a ham radio repeater system (N6IGF/R) and were recently approached by a blind person who would like to join the club. We need somebody who can print a copy of the documentation in braile from a text file. The manual is about 30 pages on a standard printer. Please send replies directly to me, I'm not on the list. Thanks for any suggestions or volunteers...Bill ------------------------------ Return-path: <@MC.LCS.MIT.EDU:Hoffman.es@Xerox.ARPA> Date: 27 Dec 85 18:31:40 PST (Friday) From: Hoffman.es@Xerox.ARPA Subject: "Mind rape" by computer mail In the October 1985 issue of 'Ms.' magazine, there's a lengthy article entitled "The Strange Case of the Electronic Lover" by Lindsy Van Gelder. It's tells how a prominent New York psychiatrist in his early fifties maintained an on-line identity over CompuServe for more than two years as a disabled, late-twenties, female neuropsychologist, developing intimate friendships with scores of electronic correspondents. "She" had a detailed contrived life history, announced her marriage during the course of the fraud, sent gifts to people, and was heavily into (bisexual) compusex. As you might imagine, many of "her" victims felt enormously betrayed, likening the experience to "mind rape". The article has quite a bit to say about the nature of electronic correspondence in general. --Rodney Hoffman ------------------------------ Return-path: <decwrl!glacier!oliveb!felix!birtch!ken@ucbvax> Date: Mon, 23 Dec 85 14:45:37 pst From: decwrl!glacier!oliveb!felix!birtch!ken@ucbvax (Ken B) Subject: Re: HUMAN-NETS Digest V8 #38 (the game hacker) Moderator: This is in regards to the game 'HACKER' ---------------------------------------- The game HACKER does not come even close to simulating how to 'break-in' to a system. The first screen asks you to login, then says the password has been changed. THERE IS _NO_WAY_ THIS GAME WILL _EVER_ TEACH PEOPLE HOW TO BREAK INTO A COMPUTER SYSTEM! Any thing you type will 'get you in.' I helped write the IBM/PC version of the game, and the initial game screen is the only relation to a system that exsists. The game is more of a maze/exploration game more than anything else. The packaging and blubs (in regards to 'hacking') are to get you to buy the game. Nothing else! Disclaimer: The above is _only_my_opinion_ of the game hacker, and does not (probably) represent the views of my employer, fellow employees, or Activision. [Activision is not my employer] regards, Ken Brown uucp: ...{!glacier!oliveb,!trwrb!scgvaxd} !felix!birtch!ken ------------------------------ Return-path: <crash!victoro@sdcsvax.ucsd.edu> From: crash!victoro%sdcsvax@sdcsvax.ucsd.edu Date: Mon, 6 Jan 86 14:22:21 PST To: sdcsvax!risks@sri-csl.arpa Subject: A Bit of 'News' Cc: sdcsvax!info-nets%mit-oz@mit-mc.arpa, Cc: Cc: sdcsvax!MsgGroup@brl.arpa, sdcsvax!security@red.rutgers.edu [Munch, Munch - Now it comes suger free!] The following text is printed in its entirity and covers many areas of interest to the readers of these digest. Please excuse the possible multiple copies of this text as I give total permission to resend this to any group that may have an interest in the subjects herein. (Including net.jokes) ==================== Exchange Students Spying? Trade Expert Warns They Could Crack DoD Computers -California Computer News -January 1986, Volume IV, No 1 By Lona White - CCN Contributing Writer LOS ANGELES - Approximately 11,000 Communist Chinese foregin exchange students enrolled in the most technically- orientated U.S. universities may possibly have cracked the top- secret Defense Department computers. According to Dr. Miles Costick, Washington, D.C.-based private trade expert, many of these alleged "students" hold high-level degrees and have acquired considerable practical experence in advanced science. "Obviously the majority are students and experts and to a lesser degree graduate and post-graduate students," he said. They are studying at such heavyweight institutions as Los Alamos, the Massachusetts Institute of Technology (MIT), Cal Tech, Stanford, Lawrence Livermore and the University of California, Berkley. At the California Institute of Technology, they are studying composite materials, which are compounds for making heat resistant nuclear missile nose cones. At MIT they are involved in physics, propulsion and navigation studies, but computer technology, especially hybrid technology, appears to be the primary goal. These hybrids are the product of digital and analog computers and are most suitable for military intelligence operations. They are also interested in microelectronics, production technology for advanced microchips, nuclear weapons technology, advanced fiber optics, astronomics, areonautics, and advanced telecommunications systems, including satellites and satellite ground stations. "The Chinese students have free access to everything," said Costick, "even at our nuclear weapons defense facilities where lasers and particle beam weapons research is conducted for the President's Strategic Defense Initative (SDI). Our own people are required to have top security clearance in these areas," he said. At Los Alamos or California's Lawrence Livermore they have access to terminals where much of the U.S. military intelligence research work is done. "For a good mathematician it takes less then 15 minutes to break into the codes," Costick said. "Our entire data bank is extremely vulnerable," he continued. "A very skillful person with access to the terminals which lead into the data bank could conceivably penetrate CIA's data bank." In addition, they are working in the areas where the Defense Departments' electronic mail network terminals are located, the ARPA network (Advanced Research Projects Agency). Costick suspects they have broken into that network and have been "spying for two or three years." The ARPA system, connects to the entire military complex, including the daily electronic mail sent to the secretary of defense. It describes the latest developments in military research and the extent of our research in the newest weapons and intelligence systems. This open-arms policy exists for the sake of good Chinese- Americans relations. By contrast, however, the under-400 American students studying in the People's Republic of China are denied any activities that remotely approach the freedom allowed visiting Chinese here. They are restricted to one particular area or to the university and can be arrested or expelled if they are found driving in forbidden areas. The secret police even prevent them from mingling with Chinese students at the schools. The Chinese, however, are not the only communists interested in gaining access to our universities' computers. A Defense Department report revealed scores of American universities, including six in California, which are prime targets for the Russian KGB and Eastern bloc nations. USC, UCLA, Stanford, Cal Tech, and the Universities of California at San Diego and Berkley are listed as among the top American educational institutions possessing technology desires by the Soviets to enhance their industrial and military power. In addition, four supercomputer centers at Princeton, Cornell, and the the Universities of Illinois and California at San Diego are available to members of the academic community involved in highly technical research. ===== I do hope I haven't triggered anyones strange editing program... And I hope that this send is of interest to those interested in the media coverage of your little world..... Victor O'Rear-- {ihnp4, cbosgd, sdcsvax, noscvax}!crash!victoro San Diego, California or bix!victoro ------------------------------ End of HUMAN-NETS Digest ************************