RISKS Forum mailing list archives

Risks Digest 28.87


From: RISKS List Owner <risko () csl sri com>
Date: Mon, 17 Aug 2015 11:10:49 PDT

RISKS-LIST: Risks-Forum Digest  Monday 17 August 2015  Volume 28 : Issue 87

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/28.87.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Technical Problem Suspends Flights Along East Coast (NYTimes)
Failing light rail safety system (Gerrit Muller)
Re: Space Ship Two crash investigation results (Rogier Wolff)
Backdoors Won't Solve Comey's Going Dark Problem (Bruce Schneier)
NSA - AT&T relationship (PGN)
Re: AT&T Helped N.S.A. Spy on an Array of Internet Traffic (John Gilmore)
gmail policy on BCCs, related to Mass. pot dispensary (George Sigut)
Frontier's e-mail password reset system is a guy named "Shawn" (Ars)
Chico and Groucho Marx on the security of passwords (Lauren Weinstein)
Wikipedia Hates Women: 4 Dark Sides of The Site We All Use (Cracked)
Doubt Starts Chipping Away at the Market's Mind-Set (NYTimes)
Data-Crunching Is Coming to Help Your Boss Manage Your Time (NYTimes)
Where Clicks Reign, Audience Is King (NYTimes)
Inside Amazon: Wrestling Big Ideas in a Bruising Workplace (NYTimes)
Get Windows 10 (Anthony Thorn)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Mon, 17 Aug 2015 08:08:33 -0400
From: Monty Solomon <monty () roscom com>
Subject: Technical Problem Suspends Flights Along East Coast

http://www.nytimes.com/2015/08/16/business/technical-problem-suspends-flights-along-east-coast.html

FAA: Software Update May Be Responsible for Malfunction
http://www.nytimes.com/aponline/2015/08/16/us/politics/ap-us-flight-control-delays.html

Air Traffic Control Problem Delays Hundreds of U.S. Flights
http://www.nytimes.com/2015/08/17/business/air-traffic-control-problem-delays-hundreds-of-us-flights.html

------------------------------

Date: Sat, 15 Aug 2015 20:21:50 +0200
From: Gerrit Muller <gerrit.muller () gmail com>
Subject: Failing light rail safety system

The light rail system in Nieuwegein should block crossing traffic with a red
traffic light. However, a photo shows the tram passing, while the traffic
light for bicycles is green.
http://www.ad.nl/ad/nl/1039/Utrecht/article/detail/4121869/2015/08/15/Beveiliging-sneltram-valt-niet-te-vertrouwen.dhtml

Here's a brief summary of the Dutch content:

Last 5 years 18 accidents happened with the light rail system, some of them
fatal.

The representative of Regiotram, the operator of the system, acknowledges
that there is somewhere an error. The will search in the tram computers and
traffic control system. And they will talk with the tram drivers.

The trams communicate wireless with the traffic control system. The problem
can be in the communication or in the traffic control systems, states the
Regiotram representative.

A representative of Nieuwegein states that the "passing time" may be set
too sharp. That time is set sharp to prevent that people start crossing
while the traffic lights are still red. This will be one of the topics of
research.

------------------------------

Date: Fri, 14 Aug 2015 21:33:53 +0200
From: Rogier Wolff <wolff () bitwizard nl>
Subject: Re: Space Ship Two crash investigation results (Macintyre, R-28.83)

Apparently the NTSB has said something to the effect of:
The point being that there was a event with catastrophic effect
(technical term) subject to a single point of failure, namely the
human error involved in unlocking too early.

I have enormous respect for the NTSB with their hard work in getting to the
bottom of various incidents and accidents. But here things are seriously
wrong!

In anything flying there are a million (ok that's exaggerated) buttons that
effectively say `self-destruct'. This must especially be true for the
prototypes. The test pilots are tasked with understanding what they are
doing, exploring the limits and setting rules for the future "normal"
pilots.

When the test pilots report: "we've established that the plane will shake
uncomfortably if you deploy the landing gear at an airspeed above XXX
knots." the manufacturer will put something to the effect of "do not deploy
the landing gear above YYY knots." in the manual where YYY is on the order
of 0.8 XXX (or whatever safety margin they deem appropriate).

The lower landing gear button does not get disabled above that speed. In an
emergency the pilots may still decide: "We're going to die if we don't slow
down. Let's try the landing gear.", even if they are going way too fast for
normal landing gear deployment.

On SS2, the test pilots should be aware of, among many, many other things
that unlocking the boom above mach 1.4 will cause a Rapid Unscheduled
Disassembly.

 R.E.Wolff () BitWizard nl ** http://www.BitWizard.nl/ ** +31-15-2600998
 Delftechpark 26 2628 XH  Delft, The Netherlands. KVK: 27239233

------------------------------

Date: Sat, 15 Aug 2015 01:23:48 -0500
From: Bruce Schneier <schneier () schneier com>
Subject: Backdoors Won't Solve Comey's Going Dark Problem

For back issues, or to subscribe, visit
<https://www.schneier.com/crypto-gram.html>.

You can read this issue on the web at
<https://www.schneier.com/crypto-gram/archives/2015/0815.html>.

        Bruce Schneier, CRYPTO-GRAM, August 15, 2015
      Backdoors Won't Solve Comey's Going Dark Problem

At the Aspen Security Forum two weeks ago, James Comey (and others)
explicitly talked about the "going dark" problem, describing the specific
scenario they are concerned about. Maybe others have heard the scenario
before, but it was a first for me. It centers around ISIL operatives abroad
and ISIL-inspired terrorists here in the US. The FBI knows who the Americans
are, can get a court order to carry out surveillance on their
communications, but cannot eavesdrop on the conversations, because they are
encrypted. They can get the metadata, so they know who is talking to who,
but they can't find out what's being said.

  "ISIL's M.O. is to broadcast on Twitter, get people to follow them, then
  move them to Twitter Direct Messaging" to evaluate if they are a
  legitimate recruit, he said. "Then they'll move them to an encrypted
  mobile-messaging app so they go dark to us." [...]

  The FBI can get court-approved access to Twitter exchanges, but not to
  encrypted communication, Comey said. Even when the FBI demonstrates
  probable cause and gets a judicial order to intercept that communication,
  it cannot break the encryption for technological reasons, according to
  Comey.

If this is what Comey and the FBI are actually concerned about, they're
getting bad advice -- because their proposed solution won't solve the
problem. Comey wants communications companies to give them the capability to
eavesdrop on conversations without the conversants' knowledge or consent;
that's the "backdoor" we're all talking about. But the problem isn't that
most encrypted communications platforms are securely encrypted, or even that
some are -- the problem is that there exists at least one securely encrypted
communications platform on the planet that ISIL can use.

Imagine that Comey got what he wanted. Imagine that iMessage and Facebook
and Skype and everything else US-made had his backdoor. The ISIL operative
would tell his potential recruit to use something else, something secure and
non-US-made. Maybe an encryption program from Finland, or Switzerland, or
Brazil. Maybe Mujahedeen Secrets. Maybe anything. (Sure, some of these will
have flaws, and they'll be identifiable by their metadata, but the FBI
already has the metadata, and the better software will rise to the top.) As
long as there is *something* that the ISIL operative can move them to, some
software that the American can download and install on their phone or
computer, or hardware that they can buy from abroad, the FBI still won't be
able to eavesdrop.

And by pushing these ISIL operatives to non-US platforms, they lose access
to the metadata they otherwise have.

Convincing US companies to install backdoors isn't enough; in order to solve
this going dark problem, the FBI has to ensure that an American can only use
backdoored software. And the only way to do that is to prohibit the use of
non-backdoored software, which is the sort of thing that the UK's David
Cameron said he wanted for his country in January:

  But the question is are we going to allow a means of communications which
  it simply isn't possible to read. My answer to that question is: no, we
  must not.

And that, of course, is impossible. Jonathan Zittrain explained why. And
Cory Doctorow outlined what trying would entail:

  For David Cameron's proposal to work, he will need to stop Britons from
  installing software that comes from software creators who are out of his
  jurisdiction. The very best in secure communications are already free/open
  source projects, maintained by thousands of independent programmers around
  the world. They are widely available, and thanks to things like
  cryptographic signing, it is possible to download these packages from any
  server in the world (not just big ones like Github) and verify, with a
  very high degree of confidence, that the software you've downloaded hasn't
  been tampered with. [...]

  This, then, is what David Cameron is proposing:

* All Britons' communications must be easy for criminals, voyeurs and
  foreign spies to intercept.

* Any firms within reach of the UK government must be banned from producing
  secure software.

* All major code repositories, such as Github and Sourceforge, must be
  blocked.

* Search engines must not answer queries about web-pages that carry secure
  software.

* Virtually all academic security work in the UK must cease -- security
  research must only take place in proprietary research environments where
  there is no onus to publish one's findings, such as industry R&D and the
  security services.

* All packets in and out of the country, and within the country, must be
  subject to Chinese-style deep-packet inspection and any packets that
  appear to originate from secure software must be dropped.

* Existing walled gardens (like IOs and games consoles) must be ordered to
  ban their users from installing secure software.

* Anyone visiting the country from abroad must have their smartphones held
  at the border until they leave.

* Proprietary operating system vendors (Microsoft and Apple) must be ordered
  to redesign their operating systems as walled gardens that only allow
  users to run software from an app store, which will not sell or give
  secure software to Britons.

* Free/open source operating systems -- that power the energy, banking,
  ecommerce, and infrastructure sectors -- must be banned outright.

As extreme as it reads, without all of that, the ISIL operative would be
able to communicate securely with his potential American recruit. And all of
this is not going to happen.

Last week, former NSA director Mike McConnell, former DHS secretary Michael
Chertoff, and former deputy defense secretary William Lynn published a
Washington Post op-ed opposing backdoors in encryption software. They wrote:

  Today, with almost everyone carrying a networked device on his or her
  person, ubiquitous encryption provides essential security. If law
  enforcement and intelligence organizations face a future without assured
  access to encrypted communications, they will develop technologies and
  techniques to meet their legitimate mission goals.

I believe this is true. Already one is being talked about in the academic
literature: lawful hacking.

Perhaps the FBI's reluctance to accept this is based on their belief that
all encryption software comes from the US, and therefore is under their
influence. Back in the 1990s, during the first Crypto Wars, the US
government had a similar belief. To convince them otherwise, George
Washington University surveyed the cryptography market in 1999 and found
that there were over 500 companies in 70 countries manufacturing or
distributing non-US cryptography products. Maybe we need a similar study
today.

This essay previously appeared on Lawfare.
http://www.lawfareblog.com/back-doors-wont-solve-comeys-going-dark-problem

Aspen Security Forum:
http://www.aspeninstitute.org/events/2015/07/22/aspen-security-forum-2015

Comey's remarks at the forum:
https://www.youtube.com/watch?v=7RyVXLKO0DM
http://www.aspentimes.com/news/17381873-113/fbi-director-reveals-hidden-threat-of-isis-at

Mujahedeen Secrets:
https://en.wikipedia.org/wiki/Mujahedeen_Secrets

Identifying encryption programs from the metadata:
https://www.schneier.com/blog/archives/2015/07/more_about_the_.html

What Cameron wants:
http://www.theguardian.com/uk-news/2015/jan/12/uk-spy-agencies-need-more-powers-says-cameron-paris-attacks

Zittrain's rebuttal:
https://medium.com/message/dear-prime-minister-cameron-20th-century-solutions-wont-help-21st-century-surveillance-ff2d7a3d300c

Doctorow's explanation:
http://boingboing.net/2015/01/13/what-david-cameron-just-propos.html

Washington Post op-ed:
https://www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-encryption/2015/07/28/3d145952-324e-11e5-8353-1215475949f4_story.html

Lawful hacking:
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1209&context=njtip

The First Crypto Wars:
http://www.newamerica.org/oti/doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/

George Washington University survey from 1999:
http://cryptome.org/cpi-survey.htm

------------------------------

Date: Sat, 15 Aug 2015 14:15:02 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: NSA - AT&T relationship

Newly disclosed N.S.A. documents show that the agency gained access to
billions of emails through a `highly collaborative' relationship with AT&T.
http://www.nytimes.com/2015/08/16/us/politics/att-helped-nsa-spy-on-an-array-of-internet-traffic.html
https://www.eff.org/deeplinks/2015/08/eff-claims-government-spying-atts-help-further-confirmed-new-york-times-article

------------------------------

Date: Aug 15, 2015 3:30 PM
From: "John Gilmore" <gnu () toad com>
Subject: Re: AT&T Helped N.S.A. Spy on an Array of Internet Traffic

  [via Dave Farber]

There's a better version of the article on the World Wide Web here:
https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help

The story was co-written with ProPublica, which runs an ordinary Web site.
The URL that you provided, Dave (based at nytimes.com), refuses to provide
the article to users who will not accept cookies, and has other limits to
try to force people to "log in" to their proprietary platform before they
can read this or any other story.

I continue to be amazed at how people who are opposed to mass surveillance
of the public's communication, continue to use and share URLs that only work
if every reader accepts mass surveillance of their reading habits.  If the
New York Times knows who is reading their articles, and from where and when,
then NSA does too (and the provided URL was "http", not even "https").  The
Times does NOT honor the "Do Not Track" header.  For shame, NY Times; stop
riding on your newsprint reputation to enshrine an unprecedented online
reader-tracking system.  And Dave should not be pushing their
news-reader-surveillance scheme on his readers.

------------------------------

Date: Sun, 16 Aug 2015 10:04:46 -0400
From: George Sigut <george.sigut () gmail com>
Subject: gmail policy on BCCs, related to Mass. pot dispensary (RISKS-28.86)

If the dispensary had sent the email from a gmail account and used BCC, the
mail probably wouldn't get out at all.

Since roughly 21 July 2015 Gmail classifies as spam most (or all?)  of the
email sent to more than 5-10(?) BCCs. As a result the sender gets an
error-message email for EACH of the BCC addresses. As there is no real way
to complain, the issue is still not solved.

Google offers as a solution to create a Google Group, which is for various
reasons not a real alternative for most of the customers.

Risks? Various groups and individuals (including clubs, churches, schools,
self-employed people and a book author) are left without a way to distribute
information, mostly after years of using Gmail for that purpose.

In our case a speaker canceled his presentation in our club and we were
unable to advice our 200 members. That was a nuisance, but not
life-threatening. Do I have to spell out the possibilities of more serious
complications?

The real risk is relying on a free service offered by a company perceived as
a serious business, but run in an amateurish way.

For the problem discussion see
https://productforums.google.com/forum/#!topic/gmail/uH2hN6S5OyM;context-place=topicsearchin/gmail/category$3A%28report-an-issue%29|sort:relevance

I hope the link works for you. In the forum there are more shorter
complaints on the same theme, which - probably due to lack of proper
monitoring - are not connected to the main line which now includes 168
items.

------------------------------

Date: Sat, 15 Aug 2015 09:28:51 -0700
From: Lauren Weinstein <lauren () vortex com>
Subject: Frontier's e-mail password reset system is a guy named "Shawn"

http://arstechnica.com/security/2015/08/isps-e-mail-password-reset-system-is-a-guy-named-shawn/

  Silverman pointed out how ridiculous this system is but accepted Shawn's
  offer and received the password. Before ending the chat, Shawn tried to
  sell Silverman antivirus software, computer tech support, or "identity
  protection." Silverman declined. The Frontier system then e-mailed
  Silverman a full transcript of the chat, including the password in plain
  text.  The only information Frontier obscured was his account number.

[Nope, this story is NOT from "The Onion" ...]

------------------------------

Date: Fri, 14 Aug 2015 18:54:06 -0700
From: Lauren Weinstein <lauren () vortex com>
Subject: Chico and Groucho Marx on the security of passwords

Pretty much the current state of password-based security on the Internet
today, as illustrated by Chico and Groucho Marx in "Horse Feathers"
(1932):

https://www.youtube.com/watch?v=ySqec8WrEQQ

------------------------------

Date: Sat, 15 Aug 2015 08:21:31 -0700
From: PRIVACY Forum mailing list <privacy () vortex com>
Subject: Wikipedia Hates Women: 4 Dark Sides of The Site We All Use (Cracked)

http://www.cracked.com/personal-experiences-1738-wikipedias-war-women-4-weird-realities-inside.html

  Despite being such an influential site, Wikipedia has fewer than 10
  percent female editors. That leads to some strange problems. For example:
  The entries on porn stars and Pokemon are both more extensively detailed
  than the entries on prominent women. This page on American novelists is
  divided into "Female American Novelists" (for the women-folk) and
  "American Novelists" (for the men). They once removed all the female movie
  directors from their list of horror directors.

Wikipedia is basically edited by anonymous 13-year-old boys living in their
parents' basements, using names like "ballbusterman" and "vomitboy." It's
not a real, attributed encyclopedia, it's an anonymous gang bang where
the opinions of idiots are valued, and authority and experience are ignored.
It's OK if you want to look up movie information or a chart of disk space
conversion parameters. Beyond that it has largely become a disgrace where
drive-by page vandalism is the order of the day.

By the way, "Cracked" has some seriously insightful stories these days.

------------------------------

Date: Sun, 16 Aug 2015 17:40:38 -0400
From: Monty Solomon <monty () roscom com>
Subject: Doubt Starts Chipping Away at the Market's Mind-Set (NYTimes)

In this aging bull market, investors are showing signs of a sea change in their attitudes.
http://www.nytimes.com/2015/08/16/business/doubt-starts-chipping-away-at-the-markets-mind-set.html

------------------------------

Date: Mon, 17 Aug 2015 07:35:33 -0400
From: Monty Solomon <monty () roscom com>
Subject: Data-Crunching Is Coming to Help Your Boss Manage Your Time
  (NYTimes)

http://www.nytimes.com/2015/08/18/technology/data-crunching-is-coming-to-help-your-boss-manage-your-time.html

Employers of all types are using a wide range of technological tools to
monitor workers' efforts and motivate them.

------------------------------

Date: Mon, 17 Aug 2015 07:42:12 -0400
From: Monty Solomon <monty () roscom com>
Subject: Where Clicks Reign, Audience Is King

As more readers move toward online social networks, and as publishers
desperately seek scale to bring in revenue, many have deplored a race toward
repetitive journalism.
http://www.nytimes.com/2015/08/17/business/where-clicks-reign-audience-is-king.html

------------------------------

Date: Sun, 16 Aug 2015 01:11:15 -0400
From: Monty Solomon <monty () roscom com>
Subject: Inside Amazon: Wrestling Big Ideas in a Bruising Workplace

The company is conducting an experiment in how far it can push white-collar
workers to get them to achieve its ever-expanding ambitions.
http://www.nytimes.com/2015/08/16/technology/inside-amazon-wrestling-big-ideas-in-a-bruising-workplace.html

------------------------------

Date: Sun, 16 Aug 2015 11:13:20 +0200
From: Anthony Thorn <anthony.thorn () atss ch>
Subject: Get Windows 10

Lots of us are irritated by the "Get Windows 10" popup which regularly
appears on our desktops.

Many of us do not want to install Windows 10 - at least not until the pros
and cons (risks?) become clearer.

To remove the irritation we uninstall KB 3035583,
  https://support.microsoft.com/en-us/kb/3035583

AND disable automatic Windows update installation -- at least for recommended
updates.

-The risk of potentially unpatched systems to Windows users is clear.

-The damage to Microsoft caused by annoying millions of users is mitigated
 by their market dominance.

If it is free you (the user) are not the customer!
(you knew this already...)

------------------------------

Date: Mon, 17 Nov 2014 11:11:11 -0800
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks)

 The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
 comp.risks, the feed for which is donated by panix.com as of June 2011.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.  The mailman Web interface can
 be used directly to subscribe and unsubscribe:
   http://mls.csl.sri.com/mailman/listinfo/risks
 Alternatively, to subscribe or unsubscribe via e-mail to mailman
 your FROM: address, send a message to
   risks-request () csl sri com
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit that process by sending directly to either
   risks-subscribe () csl sri com or risks-unsubscribe () csl sri com
 depending on which action is to be taken.

 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 *** Contributors are assumed to have read the full info file for guidelines.

=> .UK users may contact <Lindsay.Marshall () newcastle ac uk>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line.
 *** NOTE: Including the string `notsp' at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.
=> ARCHIVES: ftp://ftp.sri.com/risks for current volume
     or ftp://ftp.sri.com/VL/risks for previous VoLume
 http://www.risks.org takes you to Lindsay Marshall's searchable archive at
 newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
   Lindsay has also added to the Newcastle catless site a palmtop version
   of the most recent RISKS issue and a WAP version that works for many but
   not all telephones: http://catless.ncl.ac.uk/w/r
 <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    <http://www.csl.sri.com/illustrative.html> for browsing,
    <http://www.csl.sri.com/illustrative.pdf> or .ps for printing
  is no longer maintained up-to-date except for recent election problems.
 *** NOTE: If a cited URL fails, we do not try to update them.  Try
  browsing on the keywords in the subject line or cited article leads.
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 28.87
************************


Current thread: