RISKS Forum mailing list archives
Risks Digest 29.57
From: RISKS List Owner <risko () csl sri com>
Date: Sat, 18 Jun 2016 18:28:41 PDT
RISKS-LIST: Risks-Forum Digest Saturday 18 June 2016 Volume 29 : Issue 57 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/29.57.html> The current issue can also be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: FBI Needs Better Hackers to Solve Encryption Standoff (Joshua Eaton) "Surveillance reform measure blocked in the wake of Orlando killings" (John Ribeiro) London Mayoral count resorted to spreadsheets (Martyn Thomas) Intel x86s hide another CPU that can take over your machine -- you can't audit it (BoingBoing) Physical Key Extraction Attacks on PCs (CACM) Lawyers who yanked "Happy Birthday" into public domain now sue over "This Land" (Ars Technica) The Air Force Had a Totally Accidental Computer Disaster (Gizmodo) "Home invasion? Three fears about Google Home" (Fahmida Y. Rashid) Best Korea's Social Network hacked after using worst ID and password possible (Rocket News) The average cost of a data breach is now $4 million (Help Net Security) "Companies pay out billions to fake-CEO email scams" (Michael Kan) 'Spam King' Sanford Wallace gets 2.5 years in prison for 27M Facebook scam messages (BoingBoing) Cormac Herley, "Unfalsifiability of security claims" (Bruce Schneier) Henry Baker <hbaker1 () pipeline com> Privacy not possible with increasing financial surveillance (Sarah Jeong) Re: Tesla Model X autonomously crashes into building, owner claims (Gary Hinson) Re: Russian penetration attack on DNC: NOT! (Ars Technica) Re: Lancaster UK power outage (Martin Ward) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Fri, 17 Jun 2016 12:54:47 -0400 (EDT) From: "ACM TechNews" <technews-editor () acm org> Subject: FBI Needs Better Hackers to Solve Encryption Standoff (Joshua Eaton) Joshua Eaton, *The Christian Science Monitor*, 16 Jun 2016 With U.S. technology companies refusing to allow anyone, including the federal government, access to suspected criminals' encrypted communications conducted on their devices, a leading cybersecurity expert is proposing another method for authorities to obtain the information they need without undermining the security of the millions of other consumers who also use those products. Worcester Polytechnic Institute professor Susan Landau suggests law enforcement boost the hiring of government hackers and foster in-house experts to legally hack such devices when they have a warrant. The strategy entails exploiting existing software bugs instead of having tech companies install "backdoors" in their products. Landau says the U.S. Federal Bureau of Investigation (FBI) can bypass encryption by investing in court-sanctioned lawful hacking capabilities such as installing remote surveillance programs on computers and phones and hiring more agents with computer science backgrounds. The unacceptable alternative would compromise consumer security and give criminal hackers, among others, another exploitation option, according to Landau. She also says the FBI's paltry lawful hacking budget and resources may be one reason why the bureau wants companies to install backdoors. http://orange.hosting.lsoft.com/trk/click?ref=3Dznwrbbrs9_6-f2f6x2e54ax065639& ------------------------------ Date: Sat, 18 Jun 2016 05:21:25 -0700 From: Gene Wirchenko <genew () telus net> Subject: "Surveillance reform measure blocked in the wake of Orlando killings" (John Ribeiro) John Ribeiro, InfoWorld, 17 Jun 2016 The U.S. House of Representatives voted down a proposed anti-surveillance amendment that would prevent warrantless searches by law enforcement on Americans http://www.infoworld.com/article/3085175/government/surveillance-reform-measure-blocked-in-the-wake-of-orlando-killings.html selected text: "With Orlando fresh in everyone's mind, members of Congress appear to be voting based on fear rather than on reason," wrote Kevin Bankston, director of New America's Open Technology Institute. He added that there is no reason to think that mandating backdoors into American companies' encrypted products or allowing warrantless searches of Americans' private data would have prevented the tragedy, a view widely held by many privacy advocates. ------------------------------ Date: Sat, 18 Jun 2016 14:26:48 +0100 From: Martyn Thomas <martyn () thomas-associates co uk> Subject: London Mayoral count resorted to spreadsheets The result of last month's London Mayoral election on 5 May was delayed by several hours after staff had to manually query a bug-stricken database. http://www.bbc.co.uk/news/technology-36558446 ------------------------------ Date: Sat, 18 Jun 2016 09:58:13 -0400 From: "David Farber" <dfarber () me com> Subject: Intel x86s hide another CPU that can take over your machine -- you can't audit it [Boing Boing. More on this latter . Not what is suggested djf] http://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks. I've made it my mission to open up this system and make free, open replacements, before it's too late. The Intel Management Engine (ME) is a subsystem composed of a special 32-bit ARC microprocessor that's physically located inside the chipset. It is an extra general purpose computer running a firmware blob that is sold as a management system for big enterprise deployments. ... [Werner U. notes SlashDot item that refers to BoingBoing. ------------------------------ Date: Thu, 16 Jun 2016 12:41:43 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: Physical Key Extraction Attacks on PCs http://cacm.acm.org/magazines/2016/6/202646-physical-key-extraction-attacks-on-pcs/fulltext Our research thus focuses on two main questions: Can physical side-channel attacks be used to nonintrusively extract secret keys from PCs, despite their complexity and operating speed? And what is the cost of such attacks in time, equipment, expertise, and physical access? Results. We have identified multiple side channels for mounting physical key-extraction attacks on PCs, applicable in various scenarios and offering various trade-offs among attack range, speed, and equipment cost. The following sections explore our findings, as published in several recent articles. ------------------------------ Date: Sat, 18 Jun 2016 08:17:36 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: Lawyers who yanked "Happy Birthday" into public domain now sue over "This Land" (Ars Technica) [This song is made for you and me!] [NNSquad] http://arstechnica.com/tech-policy/2016/06/lawyers-who-yanked-happy-birthday-into-public-domain-now-sue-over-this-land/ The lawyers who successfully got "Happy Birthday" put into the public domain and then sued two months ago over "We Shall Overcome" have a new target: Woody Guthrie's "This Land." Randall Newman and his colleagues have filed a proposed class-action lawsuit against The Richmond Organization (TRO) and Ludlow Music, the two entities that also claim to own the copyright for "We Shall Overcome." ... According to the "This Land" suit, the melody of the song is actually a Baptist hymn from the late 19th or early 20th century, often referred to as "Fire Song." ------------------------------ Date: Tue, 14 Jun 2016 14:41:17 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: The Air Force Had a Totally Accidental Computer Disaster (Gizmodo) via NNSquad http://gizmodo.com/the-air-force-had-a-totally-accidental-computer-disaste-1781973697?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+gizmodo%2Ffull+%28Gizmodo%29 Last Month, Lockheed Martin, the government contractor which operates the servers that store sensitive information about internal Air Force investigations, came to realize that all of the data on said servers was missing. The apparent reason was a run-of-the-mill system crash--but what caused that actual crash is still unclear. Now, the United Stated Air Force is reportedly missing all of its investigation records dating all the way back to 2004. Whoops! Investigation records lost back to 2004. And no clear sense of what backups may or may not exist. This is the same government that wants access to our secure communications. Yeah. [The Air Force and the FBI are *not quite* the same.] ------------------------------ Date: Wed, 15 Jun 2016 09:37:57 -0700 From: Gene Wirchenko <genew () telus net> Subject: "Home invasion? Three fears about Google Home" (Fahmida Y. Rashid) This article covers risks and concerns about Google Home. Fahmida Y. Rashid, InfoWorld, 15 Jun 2016 Always-listening devices accelerate our transformation into a constantly surveilled society. That's a problem not only for us but for our kids, too http://www.infoworld.com/article/3079846/security/home-invasion-3-fears-about-google-home.html ------------------------------ Date: Wed, 15 Jun 2016 12:41:41 -0700 From: Gene Wirchenko <genew () telus net> Subject: Best Korea's Social Network hacked after using worst ID and password possible (Rocket News) "Best Korea's Social Network" hacked after using worst ID and password possible http://en.rocketnews24.com/2016/06/16/best-koreas-social-network-hacked-after-using-worst-id-and-password-possible/ ------------------------------ Date: Thu, 16 Jun 2016 15:26:07 -0600 From: Jim Reisert AD1C <jjreisert () alum mit edu> Subject: The average cost of a data breach is now $4 million (Help Net Security) Help Net Security, 16 Jun 2016 The average data breach cost has grown to $4 million, representing a 29 percent increase since 2013, according to the Ponemon Institute. Cybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014. As these threats become more complex, the cost to companies continues to rise. In fact, the study found that companies lose $158 per compromised record. Breaches in highly regulated industries like healthcare were even more costly, reaching $355 per record â a full $100 more than in 2013. https://www.helpnetsecurity.com/2016/06/16/data-breach-cost-4-million/ ------------------------------ Date: Fri, 17 Jun 2016 10:20:52 -0700 From: Gene Wirchenko <genew () telus net> Subject: "Companies pay out billions to fake-CEO email scams" (Michael Kan) Michael Kan, InfoWorld, 16 Jun 2016 In the U.S. alone, victims have lost $960 million to the schemes over the past three years, according to new data from the FBI http://www.infoworld.com/article/3084886/cyber-crime/companies-pay-out-billions-to-fake-ceo-email-scams.html opening text: Email scammers, often pretending to be CEOs, have duped businesses into giving away at least $3.1 billion, according to new data from the FBI. ------------------------------ Date: Thu, 16 Jun 2016 16:03:30 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: 'Spam King' Sanford Wallace gets 2.5 years in prison for 27M Facebook scam messages http://boingboing.net/2016/06/16/spam-king-sanford-wallace.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+boingboing%2FiBag+%28Boing+Boing%29 A hacker who called himself 'Spam King' and sent 27 million unsolicited Facebook messages for a variety of scams has been sentenced to 30 months in jail. Sanford Wallace, 47 was also ordered to pay more than $310,000 in fines. The hacker also known as "Spamford" is reported to have compromised over 500,000 Facebook accounts from November 2008 to March 2009, and messaged victims links to external sites that harvested their log-ins and Facebook friend lists. Then, Wallace spammed the Facebook users with links to other websites ... allace's spamming career didn't begin with Facebook messages, but stretches all the way back to the '90s, when he sent junk fax messages. He faced civil suits from both Myspace and Facebook in 2007 and 2009, respectively, and racked up nearly $1 billion in fines from the two companies that he was unable to pay. This recent sentence, is the first time Wallace has been convicted of a crime, with the Spam King pleading guilty to one count of "fraud and related activity in connection with electronic mail." His two-and-a-half year jail sentence is just short of the three year maximum he was facing. ------------------------------ Date: Wed, 15 Jun 2016 00:30:27 -0500 From: Bruce Schneier <schneier () schneier com> Subject: Cormac Herley, "Unfalsifiability of security claims": CRYPTO-GRAM June 15, 2016 by Bruce Schneier CTO, Resilient, an IBM Company schneier () schneier com https://www.schneier.com A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. For back issues, or to subscribe, visit <https://www.schneier.com/crypto-gram.html>. You can read this issue on the web at <https://www.schneier.com/crypto-gram/archives/2016/0615.html>. These same essays and news items appear in the "Schneier on Security" blog at <http://www.schneier.com/blog>, along with a lively and intelligent comment section. An RSS feed is available. Interesting research paper: Cormac Herley, "Unfalsifiability of security claims": There is an inherent asymmetry in computer security: things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: while the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures. This is both true and not true. Mostly, it's true. It's true in cryptography, where we can never say that an algorithm is secure. We can either show how it's insecure, or say something like: all of these smart people have spent lots of hours trying to break it, and they can't -- but we don't know what a smarter person who spends even more hours analyzing it will come up with. It's true in things like airport security, where we can easily point out insecurities but are unable to similarly demonstrate that some measures are unnecessary. And this does lead to a ratcheting up on security, in the absence of constraints like budget or processing speed. It's easier to demand that everyone take off their shoes for special screening, or that we add another four rounds to the cipher, than to argue the reverse. But it's not entirely true. It's difficult, but we can analyze the cost-effectiveness of different security measures. We can compare them with each other. We can make estimations and decisions and optimizations. It's just not easy, and often it's more of an art than a science. But all is not lost. Still, a very good paper and one worth reading. Blog entry URL: https://www.schneier.com/blog/archives/2016/05/the_unfalsifiab.html Unfalsifiability of security claims: http://research.microsoft.com/pubs/256133/unfalsifiabilityOfSecurityClaims.pdf ------------------------------ Date: Fri, 17 Jun 2016 07:17:25 -0700 From: Henry Baker <hbaker1 () pipeline com> Subject: Privacy not possible with increasing financial surveillance In a series of four articles in *The Atlantic*, Sarah Jeong argues conclusively that the systems of financial surveillance originally intended for determining credit-worthiness of corporations and rich individuals have been extended -- thanks to the cost-effectiveness of IT & Internet technology -- to even the poorest of the poor. Furthermore, this surveillance exercise has been converted into a form of coercive social control on legal activities which have been politicized. The use of financial controls to punish Wikileaks today can also be used to punish those seeking and providing abortions tomorrow. While Sarah does not mention "civil asset forfeiture" (CAF) in this particular series, it is easy to see that CAF is the obvious next step in closing the surveillance/control loop. "See Something, Say Something" inevitably becomes "See Something, Take Something". Some libertarians have advocated the use of Bitcoin-type protocols to avoid this financial surveillance. Sarah argues that -- far from saving us from surveillance, a cashless society (advocated by state-nanny Cass Sunstein) will allow essentially complete surveillance and control. - - - The "War on Drugs" was the excuse for much of this financial surveillance & control system; the "War on Terror" is now the excuse for extending it for total surveillance and total control. Within a few years, the President won't require a drone strike to disable a domestic dissident; that "Red Button" on her desk will disable the dissident's ability to financially function in society, and instantly strip all financial assets -- without any presumption of innocence. "Look ma, no due process!" Bottom line: allowing the government a pass on the ubiquitous surveillance of financial transactions is akin to providing the govt a "metadata loophole" aka "third party doctrine"; fine-grained financial data provides all of the metadata information, so this becomes a distinction without a difference. http://www.theatlantic.com/technology/archive/2016/04/mass-surveillance-was-invented-by-credit-bureaus/479226/ Also by Sarah Jeong: Credit Bureaus Were the NSA of the 19th Century http://www.theatlantic.com/technology/archive/2016/04/credit-reporting-spying/480510/ You Can't Escape Data Surveillance In America http://www.theatlantic.com/technology/archive/2016/04/rental-company-control/478365/ How Technology Helps Creditors Control Debtors http://www.theatlantic.com/technology/archive/2016/04/cashless-society/477411/ How a Cashless Society Could Embolden Big Brother Sarah Jeong Apr 8, 2016 Technology ------------------------------ Date: Fri, 17 Jun 2016 12:23:41 +1200 From: "Gary Hinson" <Gary () isect com> Subject: Re: Tesla Model X autonomously crashes into building, owner claims With ever-advancing auto-automation, surely it is not beyond the wit of Man to ensure that such vehicles are thoroughly instrumented and the data are retained in black boxes, if not systematically uploaded for further analysis? A moment's idle and ill-informed conjecture suggests the possibilities of: identifying failure modes; diagnosing driver and vehicle errors; spotting opportunities for safer, more fuel-efficient driving; forensic evidence concerning incidents; compliance with road laws; indications of drivers' failing eyesight/health/impairment/incompetence . Aren't there suitable standards in this area already? If not, why not? Isn't anyone driving them? It's such an obvious avenue, a clear route ahead. [Standards? We are probably still in the period where each company is trying to roll its own, although there is supposedly some standardization on interfaces. However, think about the composition problem of having different components from different vendors (including the ubiquitous entertainment system that is a culprit in airliners) supposedly seamlessly integrated, and the communication problem among vehicles when we get to the automated highway (!), and the need for monitoring and oversight to ensure everything is working properly, or remediating when it is not, ... PGN] Dr Gary Hinson PhD MBA CISSP, CEO of IsecT Ltd., New Zealand http://www.isect.com/ Passionate about information risk and security awareness, standards and metrics <http://www.noticebored.com/> www.NoticeBored.com <http://www.iso27001security.com/> www.ISO27001security.com <http://www.securitymetametrics.com/> www.SecurityMetametrics.com ------------------------------ Date: Wed, 15 Jun 2016 22:42:03 PDT From: "Peter G. Neumann" <neumann () csl sri com> Subject: Re: Russian penetration attack on DNC: NOT! (RISKS-29.56) Ars Technica reports that "Guccifer 2.0" claims responsibility for the attack on the DNC, Clinton, and Trump sites. Guccifer includes the purloined data as "proof". http://arstechnica.com/security/2016/06/lone-wolf-claims-responsibility-for-dnc-hack-dumps-purported-trump-smear-file/#p3 https://guccifer2.wordpress.com/2016/06/15/dnc/ ------------------------------ Date: Thu, 16 Jun 2016 11:47:05 +0100 From: Martin Ward <martin () gkc org uk> Subject: Re: Lancaster UK power outage (RISKS-29.56) The immediate cause of the power loss was flooding of the main subsystem next to the River Lune, which reached a peak flow of 1,742 cubic meters of water per second. The connection between rainfall level of 150 to 200mm and a record peak water flow in the river may seem obvious and inevitable: but in fact is exacerbated by successive Governments' handling of the upland areas: (1) A study in mid-Wales suggests that rainwaterâs infiltration rate into the soil is 67 times higher under trees than under sheep pasture. Yet farmers are subsidised for keeping sheep and rewarded for removing "unwanted vegetation" (i.e. trees) from land which is not being farmed. (2) Rivers that have been dredged and canalised to protect farmland rush the water instead into the nearest town. (3) In June 2014 the environment department proposed to deregulate dredging, allowing landowners to strip the structure and wildlife habitat out of ditches and rivers. There could be no better formula for disaster downstream. Once water is in the rivers, it has to go somewhere. If you donât hold it back in the fields, it will tumble into peopleâs homes instead. (4) Internal drainage boards -- which are public bodies but tend to be mostly controlled by landowners -- often prioritise the protection of farmland above the safety of towns and cities downstream. (5) The Government was instrumental in destroying the proposed European soil framework directive, which would have reduced flooding by preventing the erosion and compaction of the soil. http://www.theguardian.com/commentisfree/2015/dec/07/hide-evidence-storm-desmond-floods-paris-talks http://www.theguardian.com/commentisfree/2015/dec/29/deluge-farmers-flood-grouse-moor-drain-land Dr Martin Ward STRL Principal Lecturer & Reader in Software Engineering martin () gkc org uk http://www.cse.dmu.ac.uk/~mward/ ------------------------------ Date: Tue, 10 May 2016 11:11:11 -0800 From: RISKS-request () csl sri com Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks Alternatively, to subscribe or unsubscribe via e-mail to mailman your FROM: address, send a message to risks-request () csl sri com containing only the one-word text subscribe or unsubscribe. You may also specify a different receiving address: subscribe address= ... . You may short-circuit that process by sending directly to either risks-subscribe () csl sri com or risks-unsubscribe () csl sri com depending on which action is to be taken. Subscription and unsubscription requests require that you reply to a confirmation message sent to the subscribing mail address. Instructions are included in the confirmation message. Each issue of RISKS that you receive contains information on how to post, unsubscribe, etc. => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> *** Contributors are assumed to have read the full info file for guidelines. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you NEVER send mail! => SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line. *** NOTE: Including the string `notsp' at the beginning or end of the subject *** line will be very helpful in separating real contributions from spam. *** This attention-string may change, so watch this space now and then. => OFFICIAL ARCHIVES: ftp://ftp.sri.com/risks for current volume or ftp://ftp.sri.com/VL/risks for previous VoLume http://www.risks.org takes you to Lindsay Marshall's searchable archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html --> VoLume, ISsue. Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001) <http://the.wiretapped.net/security/info/textfiles/risks-digest/> *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 29.57 ************************
Current thread:
- Risks Digest 29.57 RISKS List Owner (Jun 18)