RISKS Forum mailing list archives

Risks Digest 28.91


From: RISKS List Owner <risko () csl sri com>
Date: Fri, 21 Aug 2015 14:41:21 PDT

RISKS-LIST: Risks-Forum Digest  Friday 21 August 2015  Volume 28 : Issue 91

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/28.91.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Ashley Madison needs Smarter Cheating??? (PGN on Jennifer Weiner)
Dealing with the Devastation from the Ashley Madison Hack (Josh Barro
   and Justin Wolfers)
ATM security risk: nonfinalization (Alister Wm Macintyre)
Consumers are Cutting the Cord to Gain Choices and Pay Less (NYT)
UK orders Google to `forget' 9 news articles about RTBF (Consumerist)
Re: Could Hackers Take Down a City? (Peter Ladkin)
Re: gmail policy on BCCs, related to Mass. pot dispensary (Robert L. Wilson)
Re: Intel to customers: We listen to you... All The Time! (Baker, Slonim,
   Baker, Maziuk, Baker)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Fri, 21 Aug 2015 9:56:38 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: Ashley Madison needs Smarter Cheating??? (PGN on Jennifer Weiner)

The Ashley Madison Hack Shows We're Too Dumb to Cheat
Jennifer Weiner, *The New York Times* op-ed, 21 August 2015

  [We covet smart appliances, smart pebbles (in space), smart robots, but
  what about smart people?  Jennifer Weiner's wonderful NYT op-ed this
  morning is absolutely delightful.  In response to the surprisingly large
  number of government employees outed by the AshMadHack, Jennifer proposes
  a new category along the lines created by Fran Lebowitz, who once created
  useful categories for people she believed were committing crimes against
  the rest of us.

  Here is her suggested new category:]

    ``You are a government employee and you were too stupid to create a new
    email account when you registered on a website for cheaters.''

Here are some savory snippets from her op-ed piece:

  ``According to *The Washington Post*, the capital has the highest rate of
  membership for the site of any American city.  A number of those caught up
  in the hack work at the Department of Justice and - #irony - the National
  Security Agency.''

  ``Maybe it shouldn't come as a surprise that D.C. is full of cheaters, but
  why, oh why, did it have to be full of stupid cheaters, cheaters too lazy
  and incurious to go to Gmail.com before they cheated?  We're talking
  minimal effort here, people.  Five minutes, a couple of security questions,
  a password that isn't PASSWORD, and you're mywifehasnoidea () comcast net, or
  phil () wehaveanarrangement com, and France isn't laughing at us anymore.

  ``If you're going to cheat, cheat smart.''

[The ACM Risks Forum does not endorse the last line, but smirks a little at
the irony and satire of the op-ed.  It is just one more reminder that our
computer systems are inadequately trustworthy and that many users are
unjustly trusting.  PGN]

------------------------------

Date: Thu, 20 Aug 2015 22:05:48 -0700
From: Henry Baker <hbaker1 () pipeline com>
Subject: Dealing with the Devastation from the Ashley Madison Hack
  (Josh Barro and Justin Wolfers)

FYI -- So the Ashley Madison hack is the "Cyber Pearl Harbor" that
Adm. Michael Rogers has been incessantly warning us about?  What is our
Cyber Commander's plan for retaliating against this hack which will live in
infamy?  Perhaps Gen. Petraeus has a better retaliation strategy?

The economic devastation from the Ashley Madison hack will likely exceed
that from the Tianjin explosion.

  "5 million marriages at risk"

  "So we have around 800,000 extra divorces [as a result of the Ashley
  Madison hack]"

  "The Ashley Madison hack might mean that more kids grow up without married
  parents."

  "all the divorcing couples out there looking for studio apartments will
  drive up rents and make it harder for millennials to move out of their
  parents' basements ­ adding another aspect of economic drag."

  "The big costs here are real, it's just that most of them aren't measured
  in our economic statistics."

http://www.nytimes.com/2015/08/20/upshot/an-ashley-madison-recession-or-an-ashley-madison-stimulus.html

Wages of Sin: An Ashley Madison Recession?  Or an Ashley Madison Stimulus?
Josh Barro and Justin Wolfers, *The New York Times*, 20 Aug 2015

The revelation of who opened accounts on the Ashley Madison site for
adulterers got the attention of curiosity seekers and suspicious spouses.
Josh Barro and Justin Wolfers had a different impulse.  They wondered
whether a surge in marital trouble resulting from the Ashley Madison hack
could hurt the economy -- or even, surprisingly, make it grow faster.

  [The rest of this article is a delightful back-and-forth between Josh and
  Justin, omitted here.  PGN]

------------------------------

Date: Thu, 20 Aug 2015 20:49:56 -0500
From: Alister Wm Macintyre <macwheel99 () wowway com>
Subject: ATM security risk: nonfinalization

Companies are frequently making upgrades to their technology, not always for
the better.

My Bank's ATM used to be one transaction per instance of stick in plastic &
PIN#.  Now, at end of transaction it asks if we want another transaction,
click on the YES or NO.  Many customers have apparently not noticed this
feature, because about the time when I arrive at the ATM, it is showing the
final screen, from the prior customer.  I always select No, but I wonder if
some other customers are not as honest as me.  The ATM security camera
footage may figure it out, but the prior customer could be inconvenienced
until then.

A person does not need to even be a customer of the ATM network, to make a
killing.  Many drive through ATM screens can be seen from a distance, and
the normal start screen is pretty obviously distinct from the more
transactions one.

I plan to suggest they need some kind of sensor to detect that a prior
customer has left the station, so that it can assume a No, before next
customer arrives.

  [A nasty example of this risk mode involved election fraud cases in
  Kentucky (R 25 76, correction in R 26 77) where the "change vote" ability
  was misrepresented, and voters who did not properly finalize their votes
  (which required more than clicking on the "vote" icon that merely meant
  "review") allowed voting officials to change the intended votes.  PGN]

------------------------------

Date: Fri, 21 Aug 2015 10:28:26 -0400
From: Monty Solomon <monty () roscom com>
Subject: Consumers are Cutting the Cord to Gain Choices and Pay Less (NYT)

http://www.nytimes.com/2015/08/21/opinion/consumers-are-cutting-the-cord-to-gain-choices-and-pay-less.html

Congress and the FCC can help consumers have more broadband options as they
choose online services over cable TV.

------------------------------

Date: Fri, 21 Aug 2015 17:05:30 -0400
From: "David Farber" <farber () gmail com>
Subject: UK orders Google to `forget' 9 news articles about RTBF
  (Consumerist)

Orwell's MinTruth would love this *Consumerist* item.  Dave [PGN-ed]

http://consumerist.com/2015/08/21/u-k-orders-google-to-forget-9-news-articles-about-the-right-to-be-forgotten/

Although Europeans in 28 countries have the option to ask Google to remove
Internet search results about themselves under certain conditions, Google is
pushing back against a new Right To Be Forgotten request one that seeks to
remove nine news articles about the right to be forgotten itself from its
Internet search results.

The United Kingdom's Information Commissioner's Office has ordered Google to
scrub the articles in question from the Internet, because they mention a man
who previously made a successful RTBF request.

See, the RTBF rule in the European Union says Google and other search
engines have to remove links to outdated or inaccurate information about a
person if they request they do so. That keeps defamatory statements, arrest
records for minor crimes and other information a person might like to keep
hidden in their present from coming back to haunt them whenever their name
is searched on the Internet.

Though Google complied and took down links related to a man's conviction for
a minor crime committed 10 years ago, ICO says news articles since then
about Google doing so have mentioned the man's name and details about that
conviction.

Google declined the request, ICO says, arguing that the articles concern one
of its decisions to delist a search result and that they were an essential
part of a recent news story relating to a matter of significant public
importance.

But ICO deputy commissioner David Smith wrote in a statement that the same
RTBF rules apply here, just as they did when Google agreed to take down the
other web results for the man.  ``Google was right, in its original
decision, to accept that search results relating to the complainant's
historic conviction were no longer relevant and were having a negative
impact on privacy.  It is wrong of them to now refuse to remove newer links
that reveal the same details and have the same negative impact.''

Are those RTBF stories about individual requests in the public interest?
Yes, ICO says, but they shouldn't show up on a Google search for that
person's name, as that completely defeats the purpose of having the other
mentions removed in the first place.

Commissioner Smith: ``Let's be clear, we understand that links being removed
as a result of this court ruling is something that newspapers want to write
about. And we understand that people need to be able to find these stories
through search engines like Google. But that does not need them to be
revealed when searching on the original complainant's name.''

In July, a complaint filed here in the U.S. with the Federal Trade
Commission by advocacy group Consumer Watchdog argues not just that Google
should be honoring RTBF requests stateside, but that the company's refusal
to do so is a violation of federal law.

------------------------------

Date: Fri, 21 Aug 2015 09:35:12 +0200
From: Peter Bernard Ladkin <ladkin () rvs uni-bielefeld de>
Subject: Re: Could Hackers Take Down a City? (Macintyre, RISKS-28.90)

Some pipeline explosions have been due to mistakes in the control rooms of
the pipeline companies.  Can they be hacked to cause such an accident on
purpose?

The answer seems to be that it has happened, according to Thomas Reed, a
former USAF secretary and former member of the USG NSC. See

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/1455559/CIA-plot-led-to-huge-blast-in-Siberian-gas-pipeline.html

Peter Bernard Ladkin, University of Bielefeld and Causalis Limited
www.rvs.uni-bielefeld.de www.causalis.com

------------------------------

Date: Fri, 21 Aug 2015 14:51:06 -0500
From: "Robert L. Wilson" <wilson () math wisc edu>
Subject: Re: gmail policy on BCCs, related to Mass. pot dispensary (Levine)

I would not be surprised if many comp.risks readers, like myself, stay away
from things like Google groups on general principles! It has been an issue
for me: there is someone involved with a hobby I enjoy (amateur radio) who
wants to be able to send a set of us email using exactly that mechanism. I
explained what I thought about almost all such social media and their risks
and she has been willing to send me email separately.  But I think this is
another problem with that proposed solution that is worse than the time it
takes to set up a group.

------------------------------

Date: Thu, 20 Aug 2015 15:50:33 -0700
From: Henry Baker <hbaker1 () pipeline com>
Subject: Re: Intel to customers: We listen to you... All The Time! (Slonim)

  [I can't tell whether this reply is tongue-in-cheek or not, so I'll answer
  it seriously.]

Yes, it's true that the SW -- e.g., Win10 -- (presumably) controls this HW
audio spying feature.

However, Intel's audio spying capability provides an additional *attack
surface* for hackers/govts/spouses/competitors to exploit.

There appears to be no way to disable this "feature" permanently, so one is
forevermore at risk of being bugged by his/her own cellphone/computer due to
"misconfiguration" and/or hacking.

Now it's entirely possible that there are many other electronic components
already in a computer/cellphone that can be used as microphones -- in
particular, the motion sensors have already been hacked to do exactly that.
But an audio capability with enough fidelity to enable speech understanding
is also good enough to cause an enormous amount of privacy trouble.

------------------------------

Date: Fri, 21 Aug 2015 05:32:18 +0300
From: Edwin Slonim <eslonim () minols com>
Subject: Re: Intel to customers: We listen to you... All The Time! (Baker)

There is no microphone in the Intel processor.  No new attack surface.  Just
an improvement in wake up from sleep.

Previously, waking up the processor or putting it back to sleep took many
tens of milliseconds, so if it was woken up every time a voice sound was
heard it would not get back to sleep before the next phoneme.

It's not even audio specific.  You are critical of an application someone at
MS dreamed up.

------------------------------

Date: Thu, 20 Aug 2015 21:20:18 -0700
From: Henry Baker <hbaker1 () pipeline com>
Subject: Re: Intel to customers: We listen to you... All The Time! (Slonim)

You'll have to excuse me, but I consider the ability of a "sleeping"
computer to recognize & interpret speech as a new attack surface -- right up
there with various TV settop boxes constantly listening to their customers'
bedrooms.

If it's all the same to Intel, I'd like to let my sleeping computers lie.

You have just confirmed that Intel's "feature" is even creepier than the
article indicated.  Intel apparently has a "tin ear" when it comes to their
customers' privacy.

------------------------------

Date: Fri, 21 Aug 2015 09:20:10 -0500
Subject: Re: Intel to customers: We listen to you... All The Time!
From: Dimitri Maziuk <dmaziuk () bmrb wisc edu>

On a serious note, I can think of several problems with putting a microphone
on a CPU, but in terms of privacy and security implications: it would be no
different from a smartphone. We already have those.

------------------------------

Date: Fri, 21 Aug 2015 06:54:02 -0700
From: Henry Baker <hbaker1 () pipeline com>
Subject: Re: Intel to customers: We listen to you... All The Time! (Maziuk)

The joke Dimitri refers to is good enough to spell out (!) in full:

https://www.springer.com/cda/content/document/cda_downloaddocument/9781893115729-c1.pdf

"A great example appeared in a 1999 issue of Computing [6].  A
representative of a company with a voice recognition product prepared to
demonstrate their product and asked the crowd gathered to see the
demonstration to be quiet.  Someone in the back of the room shouted,
``Format C Colon Return!''  Someone else shouted, ``Yes, Return!''  The
software worked perfectly, reformatting the primary disk on the
demonstration unit, requiring that the machine finish its format and have
all of its software and data reinstalled."

------------------------------

Date: Mon, 17 Nov 2014 11:11:11 -0800
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks)

 The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
 comp.risks, the feed for which is donated by panix.com as of June 2011.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.  The mailman Web interface can
 be used directly to subscribe and unsubscribe:
   http://mls.csl.sri.com/mailman/listinfo/risks
 Alternatively, to subscribe or unsubscribe via e-mail to mailman
 your FROM: address, send a message to
   risks-request () csl sri com
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit that process by sending directly to either
   risks-subscribe () csl sri com or risks-unsubscribe () csl sri com
 depending on which action is to be taken.

 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 *** Contributors are assumed to have read the full info file for guidelines.

=> .UK users may contact <Lindsay.Marshall () newcastle ac uk>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line.
 *** NOTE: Including the string `notsp' at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.
=> ARCHIVES: ftp://ftp.sri.com/risks for current volume
     or ftp://ftp.sri.com/VL/risks for previous VoLume
 http://www.risks.org takes you to Lindsay Marshall's searchable archive at
 newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
   Lindsay has also added to the Newcastle catless site a palmtop version
   of the most recent RISKS issue and a WAP version that works for many but
   not all telephones: http://catless.ncl.ac.uk/w/r
 <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    <http://www.csl.sri.com/illustrative.html> for browsing,
    <http://www.csl.sri.com/illustrative.pdf> or .ps for printing
  is no longer maintained up-to-date except for recent election problems.
 *** NOTE: If a cited URL fails, we do not try to update them.  Try
  browsing on the keywords in the subject line or cited article leads.
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 28.91
************************


Current thread: