RISKS Forum mailing list archives

Risks Digest 29.51


From: RISKS List Owner <risko () csl sri com>
Date: Fri, 6 May 2016 13:36:52 PDT

RISKS-LIST: Risks-Forum Digest  Friday 6 May 2016  Volume 29 : Issue 51

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/29.51.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Building Security Into Cyber-Physical Systems: NIST Researchers
  Suggest Approach for Trustworthy Modern Infrastructure (Evelyn Brown)
White House Worries about Bad AI Coding (Patrick Thibodeau)
Artificial Intelligence: Where's the Philosophical Scrutiny?
  (Vincent Conitzer)
Jennifer the Robot (McSweeneys via Mark Thorson)
Security Analysis of Emerging Smart Home Applications (U.Michigan)
Jim Reisert AD1C <jjreisert () alum mit edu>
Indian boy dies after shooting himself while taking a selfie
  (The Indian Express)
Medical errors still abound (WashPost)
Voter ID Laws May Have Actually Increased The Likelihood Of Voter Fraud
  by Hackers (FastCompany)
Dilbert on voting machines (Mark Thorson)
RF-emission-based device identification (Phys.Org)
Data exposure of AfD members leads to harassment, death threat
  (Thomas Koenig)
"Warrantless searches surge as online privacy dwindles" (Caroline Craig)
"Windows 10 updates are now ruining pro-gaming streams" (The Guardian)
Re: The last non-Internet Generation (Paul Russell)
Re: Update on the catless.ncl.ac.uk outage (Olivier MJ Crepin-Leblond,
  Chuck_Petras)
Superb for Risks Readers - The Blame Game - BBC Radio 4 (Lindsay Marshall)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Fri, 6 May 2016 12:05:35 -0400 (EDT)
From: "ACM TechNews" <technews-editor () acm org>
Subject: Building Security Into Cyber-Physical Systems: NIST Researchers
  Suggest Approach for Trustworthy Modern Infrastructure (Evelyn Brown)

Evelyn Brown, *NIST News*, 4 May 2016 via ACM TechNews, 6 May 2016

A new draft publication from the U.S. National Institute of Standards and
Technology (NIST) proposes incorporating proven security design principles
and concepts into cyber-physical systems at every step, from conception to
deployment.  NIST Special Publication 800-160, based on the international
ISO/IEC/IEEE Standard 15288 for Systems and Software Engineering, recommends
a comprehensive, ground-up approach to baking in security.  NIST fellow Ron
Ross says current procedures for organizations--purchasing commercial
components and then tacking on security measures--"do not go far enough in
reducing and managing complexity, developing sound security architectures,
and applying fundamental security design principles."  The draft publication
applies security precepts to all of the ISO/IEC/IEEE standard's listed
technical processes, as well as to crucial non-engineering processes
involving systems such as management and support services.  The recommended
strategy begins with mission or business owners "valuing" their assets and
then applies security design principles and systems engineering processes to
develop suitable security requirements, architecture, and design.  "The
systems security engineering considerations...give organizations the
capability to strengthen their systems against cyberattacks, limit the
damage from those attacks if they occur, and make their systems survivable,"
Ross says.  Consultant Robert Bigman predicts the recommendations "will
become the de facto standard for integrating 'trustability' [hopefully,
trustworthiness!!!] into the design, development, deployment, and operation
of systems used both within government and commercial critical
infrastructure industries."
http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-f04bx2e319x065379&;

  [It's about time.  The low bar for untrustworthy supposedly-secure systems
  has been pitiful.  PGN

------------------------------

Date: Fri, 6 May 2016 12:05:35 -0400 (EDT)
From: "ACM TechNews" <technews-editor () acm org>
Subject: White House Worries about Bad AI Coding (Patrick Thibodeau)

Patrick Thibodeau, *Computerworld*, 5 May 2016, via ACM TechNews, 6 May 2016

The White House released a report this week examining the problems
associated with poorly designed systems that increasingly are being used in
automated decision-making.  The report warns algorithms may have so much
power in day-to-day life that it may be important to develop ethical
frameworks for designing automated computer systems.  In addition, the
report says automated computer systems may need to be transparent for
testing and auditing.  Meanwhile, a second effort has been studying the
future of algorithms through a series of four workshops held across the
U.S. to examine artificial intelligence's (AI) impact on society.  "We're
increasingly relying on AI to advise decisions and operate physical and
virtual machinery--adding to the challenge of predicting and controlling how
complex technologies will behave," says the U.S. Federal Trade Commission's
Ed Felten.  The federal government will produce an AI report following
workshops in Seattle, to be followed by meetings in Washington, D.C.,
Pittsburgh, and New York City in July.  The most pressing concern is
algorithmic systems designed to inadvertently discriminate because of bad
design.  The report notes a system also could use a poorly designed matching
system or could inadvertently restrict the flow of information.

------------------------------

Date: Fri, 6 May 2016 12:05:35 -0400 (EDT)
From: "ACM TechNews" <technews-editor () acm org>
Subject: Artificial Intelligence: Where's the Philosophical Scrutiny?
  (Vincent Conitzer)

Vincent Conitzer, *Prospect Magazine*, 4 May 2016

ACM TechNews, 6 May 2016
Read TechNews Online at: http://technews.acm.org

There is little emphasis on the philosophical ramifications of artificial
intelligence (AI) research and development at AI conferences and other
scientific forums, with most researchers preferring to focus on technical
achievement, writes Duke University professor Vincent Conitzer.  He says
this tendency can be partly traced to AI scientists' push to have their work
respected by peers.  Bringing attention to philosophical issues in AI are
experts such as Nick Bostrom, director of Oxford University's Future of
Humanity Institute.  He is concerned with an "intelligence explosion" in
which humans build machines that exceed human intelligence, which in turn
build something that is even more intelligent, leading to ever-escalating
generations of smarter systems.  Another factor creating a disconnect
between mainstream AI researchers and those worried about the future has
been inaccurate predictions of how progress in the field would unfold, even
in the short term.  Issues about AI are being raised outside of the
discipline, with the American Association for the Advancement of Science
calling for 10 percent of the AI research budget to be channeled into
examining its societal effects.  Conitzer says it is in the AI community's
interest to get involved in this debate, lest the discussion be less
informed.  Currently absent is a way to engage with the more opaque
long-term philosophical issues, but AI's ability to make ethical decisions
is one subject in which immediate momentum appears possible.
http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-f04bx2e315x065379&;

------------------------------

Date: Tue, 3 May 2016 18:38:27 -0700
From: Mark Thorson <eee () sonic net>
Subject: Jennifer the Robot (McSweeneys)

A risk of overexposure to a voice-based user interface.

http://www.mcsweeneys.net/articles/william-toms-versus-jennifer-the-robot

------------------------------

Date: Tue, 3 May 2016 12:19:49 -0600
From: Jim Reisert AD1C <jjreisert () alum mit edu>
Subject: Security Analysis of Emerging Smart Home Applications
 (University of Michigan)

Summary and FAQ

We performed the first in-depth empirical security analysis of a popular
emerging smart home programming platform---Samsung SmartThings. We evaluated
the platform's security design, and coupled that with an analysis of 499
SmartThings apps (also called SmartApps) and 132 device handlers using
static code analysis tools that we built.

What are your key findings?

Our key findings are twofold. First, although SmartThings implements a
privilege separation model, we found that SmartApps can be overprivileged.
That is, SmartApps can gain access to more operations on devices than their
functionality requires. Second, the SmartThings event subsystem, which
devices use to communicate asynchronously with SmartApps via events, does
not sufficiently protect events that carry sensitive information such as
lock pincodes.

Why SmartThings?

Recently, several competing smart home programming frameworks that support
third party app development have emerged. These frameworks provide tangible
benefits to users, but can also expose users to significant security risks.
We analyzed Samsung-owned SmartThings because it has the largest number of
apps among currently available smart home platforms, and supports a broad
range of devices including motion sensors, fire alarms, and door locks.

Can you explain overprivilege, and what you found specifically for SmartThings?

Overprivilege is a security design flaw wherein an app gains access to more
operations on protected resources than it requires to complete its claimed
functionality. For instance, a battery manager app only needs access to read
battery levels of devices. However, if this app can also issue operations to
control the on/off status of those devices, that would be overprivilege. We
found two forms of overprivilege for SmartThings. First, coarse-grained
capabilities lead to over 55% of existing SmartApps to be overprivileged.
Second, coarse SmartApp-SmartDevice binding leads to SmartApps gaining
access to operations they did not explicitly ask for. Our analysis reveals
that 42% of existing SmartApps are overprivileged in this way.

How can attackers exploit these design flaws?

We exploited framework design flaws to construct four proof-of-concept
attacks that: (1) secretly planted door lock codes; (2) stole existing door
lock codes; (3) disabled vacation mode of the home; and (4) induced a fake
fire alarm. Details on how these attacks work are in our research paper
linked below.

https://iotsecurity.eecs.umich.edu

------------------------------

Date: Tue, 3 May 2016 12:23:08 -0600
From: Jim Reisert AD1C <jjreisert () alum mit edu>
Subject: Indian boy dies after shooting himself while taking a selfie
  (The Indian Express)

PTI, New Delhi, 1 May 2016

A 15-year-old boy who accidentally shot himself with his father's revolver
while taking a selfie died in Ludhiana on Sunday.  With bullet stuck in his
head, critically injured Ramandeep Singh was shifted to a hospital in
Ludhiana where he succumbed to his injuries.

The incident occurred Friday night night when Ramandeep was trying to take a
selfie on his mobile phone with the licensed .32 bore revolver while
pointing the weapon to his head, Pathankot Deputy Superintendent of Police
(City) Manoj Kumar said.

http://indianexpress.com/article/india/india-news-india/pathankot-boy-gun-selfie-injured-2777970/

------------------------------

Date: Tue, 3 May 2016 23:39:19 +0000
From: dkross () vzw blackberry net
Subject: Medical errors still abound (WashPost)

https://www.washingtonpost.com/news/to-your-health/wp/2016/05/03/researchers-medical-errors-now-third-leading-cause-of-death-in-united-states/

------------------------------

Date: Wed, 4 May 2016 9:44:00 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: Voter ID Laws May Have Actually Increased The Likelihood Of Voter
  Fraud by Hackers (FastCompany)

http://www.fastcompany.com/3059524/voter-id-laws-may-have-actually-increased-the-likelihood-of-voter-fraud-by-hackers

------------------------------

Date: Tue, 3 May 2016 18:43:22 -0700
From: Mark Thorson <eee () sonic net>
Subject: Dilbert on voting machines

http://dilbert.com/strip/2016-05-01

------------------------------

Date: Thu, 5 May 2016 9:44:47 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: RF-emission-based device identification (Phys.Org)

Radio frequency emission are considered incidental system noise in virtually
all laptops, smartphones and other electronic devices, but scientists at
Disney Research have found a way to use these spurious electromagnetic (EM)
signals to uniquely identify even seemingly identical devices.

Read more at:
http://phys.org/news/2016-05-fingerprint-noise-differentiate-identical-electronic.html#jCp

------------------------------

Date: Thu, 5 May 2016 16:04:08 +0200
From: Thomas Koenig <tkoenig () netcologne de>
Subject: Data exposure of AfD members leads to harassment, death threat

A radical left web site recently posted personal data, including home and
e-mail addresses, of people attending two party conferences of the
Alternative für Deutschland, a German political party situated to the right
of the current German government.

The names include those of current AfD members, AfD ex-members and others
attending the conferences as guests.

Several hundreds of affected people have filed criminal charges.

So far, exposure of the data has led to harassment of several AfD members
and at least one murder threat.  Ironically, the person who went public with
the death threat is not even an AfD member.

http://www.newday.mk/data-leakage-participants-list-afd-party-congress-on-the-net-showed-up/

http://www.swr.de/landesschau-aktuell/bw/tuebingen/hass-mail-nach-afd-parteitag-tuebinger-student-erhaelt-todesdrohung/-/id=1602/did=17377092/nid=1602/2lk1u6/

------------------------------

Date: Fri, 06 May 2016 10:14:59 -0700
From: Gene Wirchenko <genew () telus net>
Subject: "Warrantless searches surge as online privacy dwindles"
  (Caroline Craig)

Caroline Craig, InfoWorld, 6 May 2016
Not only are warrantless searches exploding in number, the boundaries
of warrants themselves are expanding
http://www.infoworld.com/article/3066712/privacy/warrantless-searches-surge-as-online-privacy-dwindles.html

------------------------------

Date: Fri, 06 May 2016 10:09:10 -0700
From: Gene Wirchenko <genew () telus net>
Subject: "Windows 10 updates are now ruining pro-gaming streams"
  (The Guardian)

https://www.theguardian.com/technology/2016/may/04/windows-10-updates-ruining-pro-gaming-streams
Forcing a gaming PC to update mid-game during a livestream to up to 130,000
followers isn't best advert for the software

------------------------------

Date: Fri, 6 May 2016 13:08:27 -0400
From: Paul Russell <prussell () nd edu>
Subject: Re: The last non-Internet Generation (RISKS-29.50)

In a posting dated 3 May 2016, Paul Robinson describes a world in which
broadband Internet access is nearly ubiquitous. Apparently, Mr. Robinson
spends all his time in large metropolitan areas. There are vast swaths of
rural America where dial-up is still the only option for Internet access.
Ah, but you have a smartphone which can be used as an Internet hotspot.
Good luck finding a data connection in rural America. The cellular service
providers have no incentive to spend money to upgrade towers to support data
service because there are so few smartphone users in these areas. And there
are so few smartphone users because there is no data service.

Paul Russell, Lakeville, Indiana USA

------------------------------

Date: Wed, 4 May 2016 16:09:43 +0200
From: Olivier MJ Crepin-Leblond <ocl () gih com>
Subject: Re: Update on the catless.ncl.ac.uk outage

  [Lindsay Marshall <Lindsay.Marshall () newcastle ac uk> reports:
  I am seeing signs of life from catless! So resuscitation is in
  progress. No web yet and not visible to the outside world, but I'm
  getting error messages.  LM

    [As of Thursday 5 May, we have moved all of the catless-based RISKS
    subscribers to the SRI distribution system.  CATLESS subscribers should
    be receiving this issue directly from SRI.COM.  Some of you will be very
    grateful when CATLESS once again becomes CATalogued as browsable.  PGN]

Dear Lindsay,

Thanks for the notice. Wow - that's a page turned, closing the NCL
redistribution of RISKS!

I hope that Peter will propose a vote of thanks by acclamation on behalf
of all UK based RISKS readers! I remember when you set this list up...
and transatlantic bandwidth was scarce. How the Internet has changed!
It's another world now.
Thanks so much and warmest regards,

  [Yes, ABSOLUTELY!  We are deeply indebted to Lindsay Marshall for his
  steadfast help in maintaining the official searchable RISKS repository.
  PGN]

------------------------------

Date: Tue, 3 May 2016 14:18:56 -0700
From: Chuck_Petras () selinc com
Subject: Re: Update on the catless.ncl.ac.uk outage

This is good to know.

I was assuming that the repository went offline because of the "Man
accidentally 'deletes his entire company' with one line of bad code" story
from the Independent that was making the rounds about that time.

Schweitzer Engineering Laboratories, Pullman, WA  99163 http://www.selinc.com

------------------------------

Date: Wed, 4 May 2016 09:25:16 +0000
From: Lindsay Marshall <Lindsay.Marshall () newcastle ac uk>
Subject: Superb for Risks Readers - The Blame Game - BBC Radio 4

This was sent to me by Chris Cartledge:

Every Risks reader sh/could read this:
http://www.bbc.co.uk/programmes/b078z5m8
Kind Regards and Best Wishes
Chris Cartledge

------------------------------

Date: Fri, 6 May 2016 11:11:11 -0800
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks) [SEE TEMPORARY STATUS of CATLESS]

 The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
 comp.risks, the feed for which is donated by panix.com as of June 2011.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.  The mailman Web interface can
 be used directly to subscribe and unsubscribe:
   http://mls.csl.sri.com/mailman/listinfo/risks
 Alternatively, to subscribe or unsubscribe via e-mail to mailman
 your FROM: address, send a message to
   risks-request () csl sri com
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit that process by sending directly to either
   risks-subscribe () csl sri com or risks-unsubscribe () csl sri com
 depending on which action is to be taken.

 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 *** Contributors are assumed to have read the full info file for guidelines.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line.
 *** NOTE: Including the string `notsp' at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.

=> OFFICIAL ARCHIVES: ftp://ftp.sri.com/risks for current volume
     or ftp://ftp.sri.com/VL/risks for previous VoLume
NEW NOTE: Existing RISKS subscribers previously served by the catless
  redistribution service have now been moved to the main SRI distribution,
  The catless server has been restored, but is not yet back online.  Usually
    http://www.risks.org takes you to Lindsay Marshall's searchable archive at
  newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html --> VoLume, ISsue.
  Lindsay has also added to the Newcastle catless site a palmtop version
  of the most recent RISKS issue and a WAP version that works for many but
  not all telephones: http://catless.ncl.ac.uk/w/r
ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001
  and not necessarily precisely the same as catless and sri.com/risks/):
  <http://the.wiretapped.net/security/info/textfiles/risks-digest/>
*** NOTE: If a cited URL fails, we do not try to update them.  Try
  browsing on the keywords in the subject line or cited article leads.
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 29.51
************************


Current thread: