• [Radio World] Is Your Station Prepared for the Next Cyberattack? (1/2)

    From Radio World via rec.radio.info Admi@21:1/5 to All on Sat Apr 30 07:52:37 2022
    XPost: alt.radio.broadcasting

    Radio World

    ///////////////////////////////////////////
    Is Your Station Prepared for the Next Cyberattack?

    Posted: 30 Apr 2022 02:00 AM PDT https://www.radioworld.com/tech-and-gear/radio-it-management/is-your-station-prepared-for-the-next-cyberattack


    Cybersecurity, unlike other projects around the station, is never finished.
    It requires ongoing diligence to be ready for threats that are constantly changing. 

    Wayne M. Pecena, CPBE, 8-VSB, ATSC3, AMD, DRB, CBNE, is associate director
    of educational broadcast services at Texas A&M University’s KAMU FM/TV. 

    “Last year I would have said denial-of-service attacks were the greatest threat, but today it would be ransomware,” he said. That was in mid-2021.
    It can change, and change again.

    Pecena is author of a paper submitted to the NAB Show Broadcast Engineering
    and IT Conference, titled “Can I Really Protect My Broadcast Plant from a Cybersecurity Attack?” It introduces the principles of cybersecurity, discusses how to protect the broadcast infrastructure and offers some
    action tasks. 

    This article summarizes that paper.

    In the Beginning

    Over the past two decades, Wayne Pecena wrote, the broadcast plant has
    migrated from an analog point-to-point infrastructure to an IT-based system that offers greater flexibility, more features and lower cost. Along the
    way, it turned into an Information Technology (IT) infrastructure, based
    upon the Internet Protocol (IP) for interconnection. 

    In many ways, it is like any other network, but the broadcast plant also contains servers that capture, process and playout content, as well as a
    cadre of host devices that provide the specialized services required in the broadcast workflow. 

    All those advantages come with a price. The same openness that makes it so flexible also enables hackers to easily get in and cause havoc. Those
    threats are numerous and widespread.

    From a high-level view, they can be categorized into malware or network focused threats. 

    Malware threats focus upon the host operating system and applications they execute. Common industry sub-categories of malware include ransomware,
    viruses, worms and trojans, and spyware.

    Network-focused threats target the network infrastructure components and exploit the IP protocol(s). They can include Address Resolution Protocol
    (ARP) spoofing, rogue service advertisements, Denial of Service (DoS)
    attacks, Distributed Denial of Service (DDoS) attacks and “Man in the Middle” attacks.

    While the most dangerous threat is always a moving target, today it seems
    to be DDoS and ransomware. These many attacks can also come from several sources, including nation states, terrorist groups, organized crime, hacktivists, hackers and disgruntled individuals.

    The sheer number and diversity in the type of threat sources make it
    essential to have an action plan and follow it. In order to get there, one
    must first understand a few cybersecurity principals followed by a
    structured approach to implementing prevention measures. 

    Pecena noted that the question is sometimes asked, “Can you make a
    broadcast plant 100 percent bulletproof in terms of cybersecurity?” He says absolutely — just remove all equipment that has an Ethernet connector and
    go back to analog gear. 

    Other than that drastic step, nothing is perfect, although a
    well-thought-out plan goes a long way towards mitigating the threat.

    Principles of Cybersecurity

    Fortunately for us, most of the groundwork for this topic has already been
    laid out by the National Institute of Standards and Technology (NIST).
    Their Cybersecurity Framework provides structured guidelines and steps to implement and maintain ongoing cybersecurity programs in any organization.

    Five categories describe the high-level functional areas of a cybersecurity program, identify, protect, detect, respond and recovery. Additional granularity is provided by subcategories, each with its own set of
    reference documents. 

    The first function, identify, begins with a complete inventory of IT
    assets, including hardware, software, networks and data. From the inventory produced, the assets are in turn prioritized based on an organizations
    business needs. For broadcasters, any assets involved in the reliable
    delivery of program content should get top priority. Less priority is
    assigned to the lower impact threats. A numerical rating scale is often
    used to describe the overall cybersecurity health of an organization’s IT systems. Areas found deficient can then be used to prioritize resources to remedy or bring into compliance in situations where regulatory requirements
    or organizational policy exists. 

    The second function, protect, utilizes the previously compiled IT asset inventory to create a policy or approach of what to protect and how to
    protect an asset. It is addressed in terms of physical asset protection as
    well as establishing access control for users and applications. The concept
    of least privilege required is utilized. 

    Thirdly, the detect function is focused upon IT asset monitoring, knowing
    what is normal and what is not, and sounding an alarm when an anomaly
    occurs. Necessary monitoring devices are identified in this step.

    Fourth, the response function is a plan for when a breach occurs. This may
    be anything from a physical event such as a break in to a malware incident.
    A recovery plan should be developed in advance to ensure a return to normal
    as quickly as possible. This is a better alternative than developing a plan after an event occurs. The post-analysis aspect of any event occurrence is
    an important step in continuous improvement. 

    Finally, recover entails implementing the above-mentioned plan. Following
    the outlined steps should restore compromised assets and a return to normal operations. 

    A deeper dive into the protect function is available through the principal
    of Defense in Depth (DiD). Developed by the National Security Agency, its
    goal is creating multi-layered coordinated security mechanisms to provide redundant levels of protection. 

    Pecena says examples of DiD mechanisms found in IT infrastructures include physical access barriers, segmented (layered) network architecture,
    ethernet port security and packet filtering through an Access Control List (ACL).
    Cybersecurity advantages of a segmented network include the ability to
    minimize the attack surface and controlling access to hosts.

    To further clarify the access portion of the protect function, the
    Principle of Least Privilege (PoLP) is applied. Through the use of access controls, the system grants the minimal resources required for a user or an application to the perform the desired system function. An example would be allowing on authorized users to access specific systems or an application
    to have file modification permissions.

    The CIA triad is another classic model of IT security. It utilizes three objectives to be achieved within any IT system ranging from the network to
    the server storage systems to the applications. They are Confidentiality, Integrity and Availability.

    Confidentiality entails preventing information from reaching undesired
    hands or unauthorized users. Access by users and applications is restricted
    or limited to a “need-to-access.” Other implementation techniques include encryption, authentication and off-line data storage. 

    Integrity seeks to prevent data being changed as it moves through a
    network, is processed through an IT workflow or archived in a data storage system. Implementation mechanisms include file access controls, checksums
    and encryption. An important aspect of the Integrity objective is to have detection mechanism(s) to know if data has been if tampered with or altered.

    Availability seeks to insure that IT resources are available to legitimate users or applications and not available to those who are not authorized. Implementation techniques include network infrastructure redundancy, server redundancy and attack detection systems. 

    Despite the CIA acronym, Pecena reminds us that this security model has
    nothing to do with the U.S. Central Intelligence Agency. To avoid
    confusion, the order is sometimes changed to AIC.

    The CIA triad is also used as a roadmap for those seeking to do harm to IT systems and broadcast plant operations. In these instances, Confidentiality becomes a target to be breached to obtain valuable information through techniques such as social-engineering or spyware. Integrity may be
    compromised through Man in the Middle attacks, malware and data record manipulation. Availability becomes the primary objective of a ransomware infection or a Denial of Service (DoS/DDoS) attack. 

    Protecting Broadcast Infrastructure

    At a high level, the overview of an organization’s IT infrastructure can be divided into three areas, each with unique cybersecurity needs. These are
    the network, hosts device and applications. 

    The Open Systems Interconnection (OSI) model developed in the early 1980s
    is the classic model that describes how host devices communicate with each other over a network. This model provides an excellent structure in which
    to implement cybersecurity precautions. The first four layers of the model
    are referred to as the data-flow layers and are associated with the network functions.

    Layer 1 or the physical layer of the OSI model is associated with the
    physical type of network deployed. Options are Ethernet-based and include
    wired through twisted-pair copper cabling, fiber optic cabling, wireless or
    a combination of all three in many networks. 

    From a security standpoint, the physical layer can also be applied to
    physical security of the network infrastructure equipment. Implementation strategies can include locked wiring closets, equipment cabinets and rack cabinets, and/or a dedicated “IT” room with controlled access. 

    The physical layer can also be applied to the network architecture or
    design of the network. Traditional network design was based on a “flat” network approach where all host devices have the same access and are
    addressed to the same network or subnet. 

    The current network design approach recommends a layered or segmented
    approach to the network architecture. Advantages of a segmented network
    design include performance enhancements and increased security.
    Cybersecurity advantages focus on the ability to minimize the attack
    surface and controlling access to hosts. In practice, the segmented network architecture approach groups hosts in functional layers based upon security priority. 

    The segmented network adheres to the cybersecurity principal of Defense in Depth, and is a fundamental recommendation in adopting the NIST
    Cybersecurity framework. If a breach should occur in the outermost network, another barrier is presented as well as limiting the reach of attack to
    those hosts only the compromised network. 

    In the case of a ransomware event, the spread of the malware is limited or contained to that individual network rather than the entire network within
    the organization. In practice the Virtual Local Area Network (VLAN) becomes
    the primary tool for implementing a segmented network architecture. The
    VLAN approach allows a single physical network to support multiple
    sub-networks or subnets. Each subnet is an isolated individual network with
    its own addressing assignments. At this point, there is no communications
    or interoperability between subnets. 

    If required, subnet interoperability will be added in a controlled manner
    by use of Layer 3 routing and Access Control List (ACL) techniques.
    The NIST Cybersecurity Framework provides structured guidelines and steps
    to implement and maintain ongoing cybersecurity programs in any
    organization.

    Upon first glance, the network illustrated would require numerous network devices to implement. In reality, this network could be built with two
    network devices. A firewall appliance handles the border protection, DMZ provisioning and VPN access. The remaining Ethernet switching and IP
    routing can be provided by a single “Layer 3 switch” with adequate port capacity. With 48-port switches being commonplace, small network needs can
    be met in a single device. 

    If additional capacity is needed, expansion can be accommodated by
    additional standalone Ethernet switches or use of a chassis-based switch platform with the appropriate quantity of switch port interface card(s) installed. It is important to note that a Layer 3 switch is a marketing
    term associated with a single network device that performs traditional
    Ethernet switching and IP routing on a port-by-port basis. 

    Going beyond the physical layer, Layer 2 or the data-link layer provides an opportunity for another layer of protection. With a VLAN-based segmented network implemented, the use of a managed Ethernet switch is implied. The managed Ethernet switch allows the custom configuration of VLANs, as well
    as providing several cybersecurity features. 

    A fundamental cybersecurity feature is Ethernet switch port security. This provides the ability to limit or restrict what host device can be attached
    to a switch port. A fundamental role of the Ethernet switch is to learn a
    host device Media Access Control (MAC) address. The MAC address is the
    physical address of an Ethernet-based host device and is “burned-in” the device firmware. The learned MAC address is captured from an incoming frame
    and stored along with the switch port number in the switch internal MAC
    address table or Content Addressable Memory (CAM) table. 

    If a foreign device should be attached to a switch port, the switch automatically responds upon detection of a foreign MAC address. A typical switch response would be to shut down or disable the port involved, drop
    the received Ethernet frame and send a notification that a violation has occurred. 

    In essence, Ethernet port security provides another barrier if physical tampering occurs and a foreign device is connected to the network switch
    port. A best-practice approach allows a single host to be connected to a
    switch port by limiting to a single MAC address per switch port. This
    limiting step can also help to minimize the impact of a DoS attack by preventing the Ethernet switch CAM table overflow. A switch will re-boot if
    a CAM table overflow should occur. 

    The managed Ethernet switch can provide additional security features such
    as Dynamic Host Control Protocol (DHCP) snooping which can detect and
    prevent a rogue DHCP server from being attached to the network. This could occur during a Man in the Middle cybersecurity event or simply as an
    accident when improperly connecting a WAP to a switch. A practical example
    is the connection of the WAP WAN port to a network cable rather than the
    LAN port, thus adding the WAP DHCP or rogue functionality to the network.
    DHCP snooping essentially acts as a DHCP firewall. 

    After Layer 2, also known as the data-link layer, Layer 3 or the network
    layer brings another level of protection to the network infrastructure. The network layer is associated with virtual addressing (IP address),
    inter-network routing and packet filtering. 

    Additional cybersecurity protection can be implemented through IP Security (IPsec) encryption. Interoperability between the segmented networks must be added when necessary. Layer 3 routing must be enabled to provide the
    desired inter-subnet communications. Routing is only added when required.
    If implanted, it is controlled via packet filtering through an Access
    Control List (ACL). 

    The ACL controls access to a subnet or network by performing basic packet filtering. It will permit or deny an IP packet from entering a Layer 3
    device ingress interface or leaving an egress interface. The admit or deny decision is based upon a pre-defined rule that utilizes the IP layer 3
    header information such as source IP address, destination IP address or protocol. 

    The IP address can be a single address, a logical block of IP addresses
    such as a subnet, as defined by the IP address subnet mask. With the
    additional information provided by Layer 4 or the transport layer, the
    decision can include port information. The transport port number is often associated with a specific service or application communication. Logical operator statements can be used in a ACL to allow logical combination of
    Later 3 and 4 header information to reach the permit or deny decision.
    Creating the ACL can be complex and time-consuming. Once in place though,
    it is very effective, and acts as a stateless firewall. 

    In addition to an ACL, a conventional Layer 3 firewall can be implemented between internal subnets. An important difference between an ACL and a conventional firewall is the stateful operation of the firewall. The
    firewall will in general deny incoming packets from an outside network
    unless an internal network host originated the conversation with the
    outside host. The firewall remembers the conversation through an internal
    table dynamically created for each conversation created. In practice the firewall will incorporate both stateless permit or deny rules such as found
    in an ACL, and dynamic rules that are created based upon stateful
    conversations where allowed. 

    A practical example could be an automation system in a subnet requesting
    the daily programming log from a traffic system located in another subnet.
    The ACL would allow only the two hosts to communicate via the FTP. 

    IP by design is not secure. To secure a network, encryption or IP Security (IPsec) must be added. IPsec is a Layer 3 encryption technique that
    provided secure communications between host devices. Encryption can be implemented at several levels of the OSI model, with Layer 3 or IPsec
    forming the foundation encryption. 
    The Open Systems Interconnection (OSI) model is a classic representation of
    how host devices communicate with each other over a network.

    It should be noted that Layer 2 encryption is possible and often utilized
    by the government and military applications. Layer 2 encryption is
    accomplished by dedicated proprietary hardware “green” boxes, and not typically found in the commercial market industries primarily due to cost. 

    Encryption should be used anytime a public network such as the internet is utilized for communications with another network such as remote access via
    a VPN. Encryption can also be used in internal networks such as a IP-based Studio-Transmitter-Link (STL) path. This is yet another method to prevent unauthorized access or disruption of information transported and/or a Man
    in the Middle attack to disrupt normal programming. 

    Encryption is also available at Layer 4 as Transport Layer Security (TLS)
    and at Layer 7 as application security such as Secure Sockets Layer. SSL is based upon creating an authenticated and encrypted communications link
    between hosts such as a user client exchange with an application server. 

    Protecting the host device is often complex due to the diversity and sheer number of potential devices in use. An IP host device can take on numerous forms and functions. Traditionally, a host has been a server or desktop computer. Today, the variety of possible devices is vast. 

    Regardless of the type, they share common characteristics and capabilities
    as defined by the Internet Engineering Task Force (IETF) Request for
    Comments (RFC)’s. IETF RFC 1122 provides the details of those capabilities.

    IP hosts should be hardened to reduce or minimize the potential attack
    surface of the device. Necessary steps may include changing default device login information, removing any unused applications and services, deleting guest or legacy user accounts and maintaining a proactive up to date patch
    or update routine.

    Most computer-based devices found in the broadcast plant will be derived
    from Microsoft Windows or Linux operating systems. Both platforms have potential vulnerabilities but can be made secure. Linux systems may offer
    more flexibility due to the open-source design. Windows is more of a closed system with limited flexibility. 

    The growing popularity of Internet of Things (IoT) devices often create
    unique cybersecurity challenges. An IoT host device can be one of a variety
    of devices found in a modem broadcast facility. Common devices include
    security cameras, digital signage, thermostats, card access systems and
    even a light bulb. From a practical standpoint, these devices must be
    secured externally as they often lack basic security features due to
    limited or minimal operating system and cost. 

    Due to limited resources (processor and memory), it is impossible to change defaults configurations or add cybersecurity protections such as antivirus
    and malware. Common practice is to place essential devices on their own
    subnet and utilize external packet filtering via an ACL and/or firewall to secure and control access. 

    Application cybersecurity protection is focused on authentication and encryption of the interaction between user and application. Authentication ensures the proper user or application has the proper access, blocking all others. Application security can be cumbersome, especially where multiple applications are involved. 

    An authentication system is referred to as a “single sign on” system, and can be utilized to minimize the administrative tasks associated with application security. A benefit is allowing the user access without the
    need to manage multiple login information. 

    It is common for the system to provide federated identity techniques to
    secure application access and identification of the user or by another application. Two-factor authentication of users is often utilized as an
    added level of protection beyond simple login information exchange. In some cases, three-factor techniques can be applied to add a further protection barrier. 

    After much planning, time and labor, everything is in place, and your
    network is secure. Now what? 

    Some would sit back and see how it works, but a more proactive approach
    would be to test it yourself, as Pecena explains. “Anyone operating a broadcast network should do penetration testing on a routine basis. I view
    the pen test as the ‘proof of performance’ of a broadcast IT system.”

    Conclusions

    The industry is well invested in the vast array of “IP-enabled” devices. However, it is well to question whether every host device needs to be on
    the network or have public network access. If so, then take the precautions
    to minimize the attack surface and a potential cybersecurity event. 

    An important consideration not addressed in Pecena’s paper is network monitoring. Best practices in network management is monitoring to ensure network operation in a proactive manner. Unusual network traffic patterns
    or unexplained increased in the use of resources can indicate that a cybersecurity incident is occurring. Knowing what is normal and alerting
    when it is not is an essential requirement of network and cybersecurity management. 

    All of the above is for naught if users are not educated in cybersecurity
    and social engineering. As cybersecurity techniques have improved, the use
    of phishing has increased. It only takes one careless user opening an
    e-mail attachment from an unknown source to bring your well-engineered
    system down. Training users in cybersecurity needs to be another ongoing process.

    Finally, Pecena notes that the cyberattacks that we hear about are only the
    tip of the iceberg. “It makes headlines in the trade publications when a large broadcast group is attacked, but the mom-and-pop, middle-market and college broadcasters are also vulnerable. “These folks are regularly hit by cyberattacks which are financially devastating,” says Pecena, “but these are the stories you never hear about.”
    Pacena’s Top 15

    Taking adequate cybersecurity precautions can be summarized in these action steps:

    Accept there is no single solution!
    Implement multiple protections via Defense in Depth (DiD)
    Change default logins
    Use strong passwords (paraphrases)
    Separate admin and user accounts on hosts (WIN)
    Segment your network (VLAN) — reduce attack surface — create multi-layer security zones
    Limit access (users and applications) — apply “least privilege”
    Use packet filtering — control host access (ACL and/or firewall) deny by default
    Disable unused services — close ports not required
    Use secure access (SSH not telnet) and VPN for off-site access (2-factor authentication)
    Monitor your network — know what is normal
    Use “intelligent” host backup solutions — test backup restoration
    Keep systems patched
    Utilize signature-based deep-packet inspection antivirus/malware keep
    updated (often daily)
    Dont overlook social engineering — engage and educate users — phishing is alive and effective


    The post Is Your Station Prepared for the Next Cyberattack? appeared first
    on Radio World.


    ///////////////////////////////////////////
    NAB Sees Benefits of Directional FM Modeling

    Posted: 30 Apr 2022 02:00 AM PDT https://www.radioworld.com/news-and-business/business-and-law/nab-sees-benefits-of-directional-fm-modeling


    The National Association of Broadcasters appreciates that the Federal Communications Commission wants to allow the use of computer modeling technology to verify performance of FM directional antennas. However, NAB recommends that the commission keep in place a number of “guardrails” in the rules. 

    Meanwhile, antenna manufacturer Electronics Research Inc. says it still has serious concerns about the proposal and worries about possible inaccuracies
    in computer modeling.

    This article is a summary and update of our reporting on this issue to date.

    FM radio is the only remaining broadcast service in the United States that requires physical measurements, thereby preventing manufacturers and broadcasters from relying on computer modeling to verify directional
    antenna problems.

    Currently, applications proposing the use of directional FM antenna systems must include a tabulation of the antenna pattern through measurements
    performed on a test range of full scale or scaled model setup, commonly
    4.1:1 or 4.5:1, according to the FCC. 

    The FCC adopted a Notice for Proposed Rulemaking in November based on a
    joint petition from antenna manufacturers Dielectric, Jampro Antennas,
    Radio Frequency Systems and Shively Labs and broadcaster Educational Media Foundation. 

    “We believe that giving license applicants the option of submitting
    computer models could provide meaningful relief to many FM broadcasters
    without jeopardizing technical standards or service to the public,” the commission wrote in its notice.

    The proposal would relax the requirement for directional FM antennas
    operated by full-service and low-power FM stations in the United States.
    The FCC says there are about 900 directional FM stations licensed in the nation.

    The most common reason to use a directional antenna by a commercial
    full-power FM is to allow it to “short-space” to another FM station while maintaining contour protection to that station. 

    The NAB in general supports the NPRM. It told the FCC that “computational simulation of FM directional antennas is already mature and produce
    computer modeling can produce comparable accuracy to physical
    measurements,” but still cautioned that “electronic modeling software is complex, can be subject to manipulation and limited by the accuracy and completeness of the input data.”

    NAB continued: “Computer models can provide meaningful relief to FM broadcasters without substantially jeopardizing technical standards or
    service to the public. This approach should also lead to lower costs for antenna manufacturers and their broadcaster customers and allow for greater flexibility in transmitter site selection by FM broadcasters as tower space become increasingly precious.”

    However, the association provided a list of requirements it would like to
    see maintained or newly, including a statement of the qualifications to the people responsible for the computer modeling and expansion of the rules to include specification of the mechanical and electrical properties of the antenna used in the model.

    It also said the FCC should not require “in situ” measurements beyond ensuring the proper installation of the antenna and accept results from any appropriate electromagnetic modeling software. And because absolute
    accuracy is not achievable, the commission should not try to attain
    prediction accuracies that do not materially affect the interference environment. 

    In addition, it asks for limits of 15 dB max/min in the azimuth plane and
    of 2 dB/10-degree rate of change in the azimuth plane (see sidebar).

    To demonstrate the accuracy of computational modeling, Dielectric, one of
    the original petitioners, submitted to the FCC a set of 53 comparisons of predicted directional antenna patterns derived from computational modeling overlaid with drone measurements of actual television antenna patterns.
    They were taken from its recent TV repack projects.

    Shively Labs reiterated its support of the proposal and said the FCC should adopt a period of discovery and study to determine the best methods and most acceptable way forward while maintaining or improving the accuracy of directional antenna pattern studies.

    ERI’s concerns

    The majority of filed comments were supportive of the rule updates. But as we’ve reported, one antenna maker still had pause when considering the proposed changes. 

    Electronic Research Inc. said its experience has shown that computer models offer a good starting point. “Still, the final design of directional and nondirectional FM and television antennas should be completed and verified
    with measured azimuth patterns on either an antenna test range or in an anechoic chamber,” ERI wrote. 

    It told worries that the proposed changes would allow computer studies to confirm compliance with no verification that the performance of the
    computer simulation is accurate and correct. 

    In addition, the company notes that the FM broadcast band has a history of changes and additions to the types of services authorized, the power levels
    at which they have been allowed to operate, and the criteria used to site
    new facilities through modifications to the table of FM allotments. 

    “The result has been an ever-increasing number of authorized facilities and
    a continuing impairment of fringe coverage,” it said. 

    The ERI filing included details and testing to support its position that
    the changes would be detrimental to the public and the FM broadcast
    service, with its history of station growth and increasing congestion.

    Comments from Hatfield & Dawson Consulting Engineers, which has extensive experience using electromagnetic modeling software, were supportive of the
    FCC proposal but asked for clarification of several sections of the NPRM.

    “The text of the Notice of Proposed Rulemaking provides a clear description of the method of determining antenna pattern information by use of a test
    range or of an anechoic chamber,” it wrote.

    “Some confusion may, however, result from the lack of a careful distinction between such test range or anechoic chamber measurements and measurements
    made in the far-field from operating antennas. This confusion may arise
    from the comparisons in the NPRM with the field measurement versus moment method procedure for proof of performance of AM directional antennas.”

    The FCC in 2008 approved the use of the “method of moments” computer modeling technique to allow AM stations to conduct proofs of performance of directional AM antenna patterns without the use of actual field strength measurements.

    Broadcast engineers familiar with computer modeling say the MoM approach
    has provided considerable savings in time and money for antenna
    manufacturers and AM broadcasters.

    You can view filed comments about this issue here — just type “21-422” in the “Specify Proceeding” field.


    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)