RISKS Forum mailing list archives
Risks Digest 30.12
From: RISKS List Owner <risko () csl sri com>
Date: Wed, 1 Feb 2017 17:00:56 PST
RISKS-LIST: Risks-Forum Digest Wednesday 1 February 2017 Volume 30 : Issue 12 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/30.12> The current issue can also be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: Network-enabled ICBMs for the USAF? (John Dallman) Quantum Computers Versus Hackers, Round One (WiReD via Werner U) Hackers Use New Tactic at Austrian Hotel: Locking the Doors (Dan Bilefsky) Hotels and electronics (Benoit Goas) Hackers hit DC CCTV's Jan. 12-15, 2017 (Clarence Williams via Henry Baker) Everything I Need to Know about Russia's Internet Interference I Learned Through College Pranks (Sean Havey) "FBI request for Twitter account data may have overstepped legal guidelines" (Dustin Volz) Severe vulnerability in Cisco's WebEx extension for Chrome leaves PCs open to easy attack (PC World) Voter fraud? (PGN) The future of fake news is real-time video manipulation (Nick Bilton) Intentionally or not, big brands help fund fake news (Star Tribune) alt-facts.net site (Arthur T.) Re: "The missile may have veered ... towards the US" (Chris Drewe) Re: United Airlines resumes flights after temporary ground order (Mark) Re: Nim Language Draws From Best of Python, Rust, Go, and Lisp (Wols, John Levine) Data Privacy Day: know the risks of Amazon Alexa and Google Home (Naked Security) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Sat, 28 Jan 2017 19:32 +0000 (GMT Standard Time) From: "John Dallman" <jgd () cix co uk> Subject: Network-enabled ICBMs for the USAF? "The fact that future nuclear weapons will be far more networked (though not necessarily to the open Internet) will create better safety and oversight, and allow for more coordinated operations. But more connectivity also introduces new potential vulnerabilities and dangers." https://www.theatlantic.com/amp/article/511904/ The idea that connectivity to the Internet wasn't rejected out of hand seems to indicate that the Air Force Scientific Advisory Board needs replacing very firmly. A blogger at the US Naval Institute certainly thinks so: <https://blog.usni.org/2017/01/04/there-are-bad-ideas-and-then-there-is-this-bad-idea> "Some support systems? Sure, but command, control, mission loading, arming, and launch must be contained in a robust, hardened, isolated & closed system. Simple, almost primitive, with multiple physical human interfaces required. To be even thinking of network access to the weapons systems themselves is the height of irresponsibility; even more irresponsible than a reliance on GPS or satellite systems as a point of failure between authorization, launch, and "servicing the target." Ahem." ICBMs as part of the IoT is, I'm pretty sure, the worst idea I've seen on the Internet since I started using it in 1992. ------------------------------ Date: Tue, 31 Jan 2017 09:36:54 +0100 From: Werner U <werneru () gmail com> Subject: Quantum Computers Versus Hackers, Round One (WiReD) (WiReD, 27 Jan 2017) [Peter, I'm feeling ambivalent about calling attention to this article, 'popular' in tone, but it does a decent enough job of explaining the basics... and while there is 'business hype' in the name-dropping and describing the possibilities, the author also is fair in pointing out the difficult and uncertain blessings of the technology... take a look-see and decide if and how you want to use it.] Quantum Computers Versus Hackers, Round One. Fight! https://www.wired.com/2017/01/quantum-computers-versus-hackers-round-one-fight/ Lily Hay Newman, *WiReD*, 27 Jan 2017 This week D-Wave, a leader in the nascent field of quantum computing, unveiled its latest machine, D-Wave 2000Q, as well as its first customer: a cybersecurity firm called Temporal Defense Systems. It's the first time quantum has been used to fight cybercrime, and if it works, it could reshape how security analysts protect their networks from harm. [...] D-Wave's customers for earlier models range from Lockheed Martin to Google to Los Alamos National Laboratory. Now TDS, a cybersecurity company that builds hardware and software security products, will be the first private security business to seek improved results through next-generation computing. [...] Quantum computing is far from a proven tool at this point, and it's just one of a handful of next-generation computing solution being applied to thorny cybersecurity issues. The more opportunities it has to transform the world, though, the better the chance that it eventually will. ------------------------------ Date: Mon, 30 Jan 2017 16:40:02 -1000 From: geoff goodfellow <geoff () iconia com> Subject: Hackers Use New Tactic at Austrian Hotel: Locking the Doors (Dan Bilefsky) Dan Bilefsky, *The New York Times*, 30 Jan 2017 https://www.nytimes.com/2017/01/30/world/europe/hotel-austria-bitcoin-ransom.html The ransom demand arrived one recent morning by email, after about a dozen guests were locked out of their rooms at the lakeside Alpine hotel in Austria. (The hotel was at maximum capacity.) The electronic key system at the picturesque Romantik Seehotel Jaegerwirt had been infiltrated, and the hotel was locked out of its own computer system, leaving guests stranded in the lobby, causing confusion and panic. ``Good morning!'' the email began, according to the hotel's managing director, Christoph Brandstaetter. It went on to demand a ransom of two Bitcoins, or about $1,800, and warned that the cost would double if the hotel did not comply with the demand by the end of the day, 22 Jan. Mr. Brandstaetter said the email included details of a Bitcoin wallet, the account in which to deposit the money -- and ended with the words, ``Have a nice day!'' With the 111-year-old hotel brimming with eager skiers, hikers and vacationers, some having paid about $530 for a suite with a panoramic view and sauna, Mr. Brandstaetter said he decided to cave in. Guests had already complained that their electronic room keys were not working, and receptionists' efforts to create new ones had proved futile. Bashing down the doors was not an option. Security experts said the attack on the hotel appeared to be a novel example of an increasingly malicious and prevalent type of modern-day piracy. The weapon? A type of software known as ransomware... [Jim Reisert AD1C noted another article, Hotel ransomed by hackers as guests locked in rooms (Chris Summers) http://www.dailymail.co.uk/news/article-4163886/Alpine-hotel-brings-locks-cyber-hacking.html Benoit Goas noted https://www.theregister.co.uk/2017/01/30/austrian_hotel_ransomware_attack/ ] ------------------------------ Date: Tue, 31 Jan 2017 23:01:18 +0100 From: Benoit Goas <goasben () hawk iit edu> Subject: Hotels and electronics I recently was in a brand new hotel (around a week old), and their computer systems crashed the day I checked in, preventing them to know which room got cleaned or not. The room I was first given indeed wasn't made, but at least nobody else was in... Not sure if they could know that! They also had a big computer screen to display the next bus hours, which at one point later displayed only a pop-up screen with "your 7 day anti-virus trial version expired". Nothing really dangerous (as long as you don't need electronic keys to exit the rooms), but it can be more reliable to keep older technology! ------------------------------ Date: Sat, 28 Jan 2017 16:34:36 -0800 From: Henry Baker <hbaker1 () pipeline com> Subject: Hackers hit DC CCTV's Jan. 12-15, 2017 [I wonder if this hack is related to any of the other recent high-profile Internet-wide CCTV hacks.] Here's a non-sequitur: "the intrusion was confined to the police CCTV cameras that monitor public areas" "the safety of the public or protectees was never jeopardized" If this conclusion were really true, then a "security theater" camera would be just as effective as a real camera, and they needn't have bothered fixing the cameras ! Clarence Williams, *The Washington Post*, 27 Jan 2017 Hackers hit D.C. police closed-circuit camera network, city officials disclose https://www.washingtonpost.com/local/public-safety/hackers-hit-dc-police-closed-circuit-camera-network-city-officials-disclose/2017/01/27/d285a4a4-e4f5-11e6-ba11-63c4b4fb5a63_story.html Hackers infected 70 percent of storage devices that record data from D.C. police surveillance cameras eight days before President Trump's inauguration, forcing major citywide reinstallation efforts, according to the police and the city's technology office. City officials said ransomware left police cameras unable to record between Jan. 12 and Jan. 15. The cyberattack affected 123 of 187 network video recorders in a closed-circuit TV system for public spaces across the city, the officials said late Friday. Secret Service spokesman Brian Ebert said the safety of the public or protectees was never jeopardized. Archana Vemulapalli, the city's Chief Technology Officer, said the city paid no ransom and resolved the problem by taking the devices offline, removing all software and restarting the system at each site. An investigation into the source of the hack continues, said Vemulapalli, who said the intrusion was confined to the police CCTV cameras that monitor public areas and did not extend deeper into D.C. computer networks. [...] ------------------------------ Date: Sat, 28 Jan 2017 18:26:57 -0500 From: "dfarber" <dfarber () me com> Subject: Everything I Need to Know about Russia's Internet Interference I Learned Through College Pranks http://www.defenseone.com/ideas/2017/01/everything-i-need-know-about-russias-internet-interference-i-learned-through-college-pranks/134953/?oref=d-river Sean Havey It's not terribly difficult to inject fake news into conversation. One February, as a snowstorm headed for the Carolinas, a Raleigh television station debuted a Web form meant to allow local schools and businesses to send cancellations and snow delays straight to the live TV feed. Someone posted the URL to an unofficial university message board, and within minutes, mayhem erupted in the margins of the nightly news: <http://www.thewolfweb.com/message_topic.aspx?topic=180137&page=2> <https://www.youtube.com/watch?v=WcO3pyge-8w> But while our antics caused little damage aside from a few embarrassed faces in the newsroom, not everyone uses fake news for lulz. As recent events show, sinister actors use the same tricks to spread misinformation and deception -- with potentially disastrous consequences. ------------------------------ Date: Mon, 30 Jan 2017 09:25:39 -0800 From: Gene Wirchenko <genew () telus net> Subject: "FBI request for Twitter account data may have overstepped legal guidelines" (Dustin Volz) Dustin Volz, Reuters, 27 Jan 2017 http://www.businessinsider.com/r-fbi-request-for-twitter-account-data-may-have-overstepped-legal-guidelines-2017-1 selected text: WASHINGTON, Jan 27 (Reuters) - The FBI appeared to go beyond the scope of existing legal guidance in seeking certain kinds of Internet records from Twitter as recently as last year, legal experts said, citing two warrantless surveillance orders the social media company published on Friday. Twitter said its disclosures were the first time the company had been allowed to publicly reveal the secretive orders, which were delivered with gag orders when they were issued in 2015 and 2016. In doing so, the orders bolster the belief among privacy advocates that the FBI has routinely used NSLs to seek Internet records beyond the limitations set down in a 2008 Justice Department legal memo, which concluded such orders should be constrained to phone billing records. The FBI did not immediately respond to a request for comment. An FBI inspector general report from 2014 indicated that it disagreed with the memo's guidance. ------------------------------ Date: Sat, 28 Jan 2017 11:28:07 -0500 From: Monty Solomon <monty () roscom com> Subject: Severe vulnerability in Cisco's WebEx extension for Chrome leaves PCs open to easy attack http://www.pcworld.com/article/3160836/software/severe-vulnerability-in-ciscos-webex-extension-for-chrome-leaves-pcs-open-to-easy-attack.html ------------------------------ Date: Sat, 28 Jan 2017 16:32:30 PST From: "Peter G. Neumann" <neumann () csl sri com> Subject: Voter fraud? Several highly visible Republicans (including Tiffany Trump, Steve Bannon, Steven Mnuchin) are registered in more than one state. That's not illegal, although Bannon apparently never lived in the house in Florida at which he was registered. That's illegal. (R 30 12) http://www.usnews.com/news/national-news/articles/2017-01-25/tiffany-trump-steve-bannon-steve-mnuchin-registered-to-vote-in-multiple-states [Additional names seem to be cropping up as well.] ------------------------------ Date: Tue, 31 Jan 2017 21:15:12 -0800 From: Lauren Weinstein <lauren () vortex com> Subject: The future of fake news is real-time video manipulation (Nick Bilton) Nick Bilton, BoingBoing via NNSquad http://boingboing.net/2017/01/31/the-future-of-fake-news-is-rea.html Nick Bilton reports on the next round of fake news tools that allow users to manipulate audio and video to change what's being said, a sort of real-time Photoshop for moving images and audio. Want to make it look like a celebrity used a taboo word, or misquote a politician? No problem. ------------------------------ Date: Sat, 28 Jan 2017 08:53:12 -0800 From: Lauren Weinstein <lauren () vortex com> Subject: Intentionally or not, big brands help fund fake news AP via NNSquad http://m.startribune.com/intentionally-or-not-big-brands-help-fund-fake-news/412040223/?section=nation Wittingly or not, major global corporations are helping fund sites that traffic in fake news by advertising on them. Take, for instance, a story that falsely claimed former President Barack Obama had banned Christmas cards to overseas military personnel. Despite debunking by The Associated Press and other fact-checking outlets, that article lives on at "Fox News The FB Page," which has no connection to the news channel although its bears a replica of its logo. And until recently, the story was often flanked by ads from big brands such as the insurer Geico, the business-news outlet Financial Times, and the beauty-products maker Revlon. This situation isn't remotely an isolated case, although major companies generally say they have no intention of bankrolling purveyors of fake news with their ad dollars. Because many of their ads are placed on websites by computer algorithms, it's not always easy for these companies to steer them away from sites they find objectionable. ------------------------------ Date: Sat, 28 Jan 2017 14:13:16 -0500 From: "Arthur T." <Risks201701.10.atsjbt () xoxy net> Subject: alt-facts.net site (RISKS-30.11) That, in turn, links to a Google Groups Form, which requires active scripting and cookies. Given that Risks readers know the Risks of active scripting (and the privacy implications of anything hosted by Google), I'm surprised he thought it worthwhile to announce this here. Or is it just a test to see how many of us will browse unsafely just to submit a fake news site? [Intriguingly, Lindsay Marshall's newcastle site that houses the official searchable RISKS archive barfed on this item, blocking it perhaps because the website was brand new. PGN] ------------------------------ Date: Sun, 29 Jan 2017 19:26:12 +0000 From: Chris Drewe <e767pmk () yahoo co uk> Subject: Re: "The missile may have veered ... towards the US" (RISKS-30.05) 1. This story rumbled on over several days last week. As I understand it, the missile was unarmed and officially the test was to check the submarine's launch capability rather than the missile itself. The main news interest was who knew what and when, fueled by conflicting reports from UK and US commentators and governments, UK Prime Minister Theresa May evasively not answering questions about it in a TV interview, "we don't comment on security matters", etc. Presumably 'UK Unintentionally Launches Missile Attack On US' makes a better headline than 'Problem Found During Routine Test Firing'... :o) http://www.telegraph.co.uk/news/2017/01/23/theresa-may-briefed-trident-missile-test-allegedly-misfired2/ 2. Maybe I'm missing something, but I find the recent posts in RISKS on "fake news", "alternative news", "real news", and so forth rather ridiculous -- can news reports be definitively graded as 'true' or not!??! The Royal Society has this on their web site, which seems right to me:
The Royal Society's motto 'Nullius in verba' is taken to mean 'take nobody's word for it'.
https://royalsociety.org/about-us/ Tediously long article at http://www.telegraph.co.uk/news/2017/01/23/theresa-may-briefed-trident-missile-test-allegedly-misfired2/ ------------------------------ Date: Sun, 29 Jan 2017 10:15:26 -0800 From: Mark <gumpfs () gmail com> Subject: Re: United Airlines resumes flights after temporary ground order (RISKS-30.11) The link to ACARS went down, resulting in an inability for the company to send weight and balance information or communicate with aircraft via datalink. I don't know what specific part of the system failed. ------------------------------ Date: Sat, 28 Jan 2017 17:01:26 +0000 From: Wols Lists <antlists () youngman org uk> Subject: Re: Nim Language Draws From Best of Python, Rust, Go, and Lisp (Shapir, RISKS-30.11)
While ease of development may be in the eye of the developer, I certainly wouldn't commend for readability a language in which a blank in the wrong place might completely change the meaning of a routine!
This is an old chestnut. How many people remember PL/1? That was intended to be the ultimate programming language, iirc, and I found it a nice language, but it had a similar reputation. A misplaced parenthesis ran a serious risk of still leaving you with a valid program, but one that did something completely different from what you intended. Caused by the massive overloading of the meaning of said character. ------------------------------ Date: 28 Jan 2017 20:25:00 -0000 From: "John Levine" <johnl () iecc com> Subject: Re: Nim Language Draws From Best of Python, Rust, Go, and Lisp (RISKS-30.10,11) I spent decades programming in languages like C and perl that marked grouping with { braces } and now mostly use python which uses indentation. While it took a little while to get used to it, now I find the python way works at least as well. Compilers remember the open levels of indentation so they can diagnose spacing typos where you return to an indentation level that was never opened, something C and perl can't do since all braces look the same. It also avoids a whole category of hard to find bugs in C programs where the indentation suggests one thing but the braces say something else. I think the moral here is that just because something is unfamiliar doesn't mean it's worse. I'm reminded of a famous article Don Norman wrote in 1981 about how awful the UNIX shell language (which at that time was the user interface) was. One of the UNIX guys pointed out that commands he complained weren't "natural" were because they weren't like the PDP-10 he was used to. ------------------------------ Date: Sat, 28 Jan 2017 11:25:36 -0500 From: Monty Solomon <monty () roscom com> Subject: Data Privacy Day: know the risks of Amazon Alexa and Google Home (Naked Security) https://nakedsecurity.sophos.com/2017/01/27/data-privacy-day-know-the-risks-of-amazon-alexa-and-google-home/ ------------------------------ Date: Tue, 10 Jan 2017 11:11:11 -0800 From: RISKS-request () csl sri com Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks => SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line that includes the string `notsp'. Otherwise your message may not be read. *** This attention-string has never changed, but might if spammers use it. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you never send mail where the address becomes public! => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> *** Contributors are assumed to have read the full info file for guidelines! => OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's searchable html archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue. Also, ftp://ftp.sri.com/risks for the current volume or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume If none of those work for you, the most recent issue is always at http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-30.00 Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001) <http://the.wiretapped.net/security/info/textfiles/risks-digest/> *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 30.12 ************************
Current thread:
- Risks Digest 30.12 RISKS List Owner (Feb 01)