RISKS Forum mailing list archives
Risks Digest 29.51
From: RISKS List Owner <risko () csl sri com>
Date: Fri, 6 May 2016 13:36:52 PDT
RISKS-LIST: Risks-Forum Digest Friday 6 May 2016 Volume 29 : Issue 51 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/29.51.html> The current issue can be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: Building Security Into Cyber-Physical Systems: NIST Researchers Suggest Approach for Trustworthy Modern Infrastructure (Evelyn Brown) White House Worries about Bad AI Coding (Patrick Thibodeau) Artificial Intelligence: Where's the Philosophical Scrutiny? (Vincent Conitzer) Jennifer the Robot (McSweeneys via Mark Thorson) Security Analysis of Emerging Smart Home Applications (U.Michigan) Jim Reisert AD1C <jjreisert () alum mit edu> Indian boy dies after shooting himself while taking a selfie (The Indian Express) Medical errors still abound (WashPost) Voter ID Laws May Have Actually Increased The Likelihood Of Voter Fraud by Hackers (FastCompany) Dilbert on voting machines (Mark Thorson) RF-emission-based device identification (Phys.Org) Data exposure of AfD members leads to harassment, death threat (Thomas Koenig) "Warrantless searches surge as online privacy dwindles" (Caroline Craig) "Windows 10 updates are now ruining pro-gaming streams" (The Guardian) Re: The last non-Internet Generation (Paul Russell) Re: Update on the catless.ncl.ac.uk outage (Olivier MJ Crepin-Leblond, Chuck_Petras) Superb for Risks Readers - The Blame Game - BBC Radio 4 (Lindsay Marshall) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Fri, 6 May 2016 12:05:35 -0400 (EDT) From: "ACM TechNews" <technews-editor () acm org> Subject: Building Security Into Cyber-Physical Systems: NIST Researchers Suggest Approach for Trustworthy Modern Infrastructure (Evelyn Brown) Evelyn Brown, *NIST News*, 4 May 2016 via ACM TechNews, 6 May 2016 A new draft publication from the U.S. National Institute of Standards and Technology (NIST) proposes incorporating proven security design principles and concepts into cyber-physical systems at every step, from conception to deployment. NIST Special Publication 800-160, based on the international ISO/IEC/IEEE Standard 15288 for Systems and Software Engineering, recommends a comprehensive, ground-up approach to baking in security. NIST fellow Ron Ross says current procedures for organizations--purchasing commercial components and then tacking on security measures--"do not go far enough in reducing and managing complexity, developing sound security architectures, and applying fundamental security design principles." The draft publication applies security precepts to all of the ISO/IEC/IEEE standard's listed technical processes, as well as to crucial non-engineering processes involving systems such as management and support services. The recommended strategy begins with mission or business owners "valuing" their assets and then applies security design principles and systems engineering processes to develop suitable security requirements, architecture, and design. "The systems security engineering considerations...give organizations the capability to strengthen their systems against cyberattacks, limit the damage from those attacks if they occur, and make their systems survivable," Ross says. Consultant Robert Bigman predicts the recommendations "will become the de facto standard for integrating 'trustability' [hopefully, trustworthiness!!!] into the design, development, deployment, and operation of systems used both within government and commercial critical infrastructure industries." http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-f04bx2e319x065379& [It's about time. The low bar for untrustworthy supposedly-secure systems has been pitiful. PGN ------------------------------ Date: Fri, 6 May 2016 12:05:35 -0400 (EDT) From: "ACM TechNews" <technews-editor () acm org> Subject: White House Worries about Bad AI Coding (Patrick Thibodeau) Patrick Thibodeau, *Computerworld*, 5 May 2016, via ACM TechNews, 6 May 2016 The White House released a report this week examining the problems associated with poorly designed systems that increasingly are being used in automated decision-making. The report warns algorithms may have so much power in day-to-day life that it may be important to develop ethical frameworks for designing automated computer systems. In addition, the report says automated computer systems may need to be transparent for testing and auditing. Meanwhile, a second effort has been studying the future of algorithms through a series of four workshops held across the U.S. to examine artificial intelligence's (AI) impact on society. "We're increasingly relying on AI to advise decisions and operate physical and virtual machinery--adding to the challenge of predicting and controlling how complex technologies will behave," says the U.S. Federal Trade Commission's Ed Felten. The federal government will produce an AI report following workshops in Seattle, to be followed by meetings in Washington, D.C., Pittsburgh, and New York City in July. The most pressing concern is algorithmic systems designed to inadvertently discriminate because of bad design. The report notes a system also could use a poorly designed matching system or could inadvertently restrict the flow of information. ------------------------------ Date: Fri, 6 May 2016 12:05:35 -0400 (EDT) From: "ACM TechNews" <technews-editor () acm org> Subject: Artificial Intelligence: Where's the Philosophical Scrutiny? (Vincent Conitzer) Vincent Conitzer, *Prospect Magazine*, 4 May 2016 ACM TechNews, 6 May 2016 Read TechNews Online at: http://technews.acm.org There is little emphasis on the philosophical ramifications of artificial intelligence (AI) research and development at AI conferences and other scientific forums, with most researchers preferring to focus on technical achievement, writes Duke University professor Vincent Conitzer. He says this tendency can be partly traced to AI scientists' push to have their work respected by peers. Bringing attention to philosophical issues in AI are experts such as Nick Bostrom, director of Oxford University's Future of Humanity Institute. He is concerned with an "intelligence explosion" in which humans build machines that exceed human intelligence, which in turn build something that is even more intelligent, leading to ever-escalating generations of smarter systems. Another factor creating a disconnect between mainstream AI researchers and those worried about the future has been inaccurate predictions of how progress in the field would unfold, even in the short term. Issues about AI are being raised outside of the discipline, with the American Association for the Advancement of Science calling for 10 percent of the AI research budget to be channeled into examining its societal effects. Conitzer says it is in the AI community's interest to get involved in this debate, lest the discussion be less informed. Currently absent is a way to engage with the more opaque long-term philosophical issues, but AI's ability to make ethical decisions is one subject in which immediate momentum appears possible. http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-f04bx2e315x065379& ------------------------------ Date: Tue, 3 May 2016 18:38:27 -0700 From: Mark Thorson <eee () sonic net> Subject: Jennifer the Robot (McSweeneys) A risk of overexposure to a voice-based user interface. http://www.mcsweeneys.net/articles/william-toms-versus-jennifer-the-robot ------------------------------ Date: Tue, 3 May 2016 12:19:49 -0600 From: Jim Reisert AD1C <jjreisert () alum mit edu> Subject: Security Analysis of Emerging Smart Home Applications (University of Michigan) Summary and FAQ We performed the first in-depth empirical security analysis of a popular emerging smart home programming platform---Samsung SmartThings. We evaluated the platform's security design, and coupled that with an analysis of 499 SmartThings apps (also called SmartApps) and 132 device handlers using static code analysis tools that we built. What are your key findings? Our key findings are twofold. First, although SmartThings implements a privilege separation model, we found that SmartApps can be overprivileged. That is, SmartApps can gain access to more operations on devices than their functionality requires. Second, the SmartThings event subsystem, which devices use to communicate asynchronously with SmartApps via events, does not sufficiently protect events that carry sensitive information such as lock pincodes. Why SmartThings? Recently, several competing smart home programming frameworks that support third party app development have emerged. These frameworks provide tangible benefits to users, but can also expose users to significant security risks. We analyzed Samsung-owned SmartThings because it has the largest number of apps among currently available smart home platforms, and supports a broad range of devices including motion sensors, fire alarms, and door locks. Can you explain overprivilege, and what you found specifically for SmartThings? Overprivilege is a security design flaw wherein an app gains access to more operations on protected resources than it requires to complete its claimed functionality. For instance, a battery manager app only needs access to read battery levels of devices. However, if this app can also issue operations to control the on/off status of those devices, that would be overprivilege. We found two forms of overprivilege for SmartThings. First, coarse-grained capabilities lead to over 55% of existing SmartApps to be overprivileged. Second, coarse SmartApp-SmartDevice binding leads to SmartApps gaining access to operations they did not explicitly ask for. Our analysis reveals that 42% of existing SmartApps are overprivileged in this way. How can attackers exploit these design flaws? We exploited framework design flaws to construct four proof-of-concept attacks that: (1) secretly planted door lock codes; (2) stole existing door lock codes; (3) disabled vacation mode of the home; and (4) induced a fake fire alarm. Details on how these attacks work are in our research paper linked below. https://iotsecurity.eecs.umich.edu ------------------------------ Date: Tue, 3 May 2016 12:23:08 -0600 From: Jim Reisert AD1C <jjreisert () alum mit edu> Subject: Indian boy dies after shooting himself while taking a selfie (The Indian Express) PTI, New Delhi, 1 May 2016 A 15-year-old boy who accidentally shot himself with his father's revolver while taking a selfie died in Ludhiana on Sunday. With bullet stuck in his head, critically injured Ramandeep Singh was shifted to a hospital in Ludhiana where he succumbed to his injuries. The incident occurred Friday night night when Ramandeep was trying to take a selfie on his mobile phone with the licensed .32 bore revolver while pointing the weapon to his head, Pathankot Deputy Superintendent of Police (City) Manoj Kumar said. http://indianexpress.com/article/india/india-news-india/pathankot-boy-gun-selfie-injured-2777970/ ------------------------------ Date: Tue, 3 May 2016 23:39:19 +0000 From: dkross () vzw blackberry net Subject: Medical errors still abound (WashPost) https://www.washingtonpost.com/news/to-your-health/wp/2016/05/03/researchers-medical-errors-now-third-leading-cause-of-death-in-united-states/ ------------------------------ Date: Wed, 4 May 2016 9:44:00 PDT From: "Peter G. Neumann" <neumann () csl sri com> Subject: Voter ID Laws May Have Actually Increased The Likelihood Of Voter Fraud by Hackers (FastCompany) http://www.fastcompany.com/3059524/voter-id-laws-may-have-actually-increased-the-likelihood-of-voter-fraud-by-hackers ------------------------------ Date: Tue, 3 May 2016 18:43:22 -0700 From: Mark Thorson <eee () sonic net> Subject: Dilbert on voting machines http://dilbert.com/strip/2016-05-01 ------------------------------ Date: Thu, 5 May 2016 9:44:47 PDT From: "Peter G. Neumann" <neumann () csl sri com> Subject: RF-emission-based device identification (Phys.Org) Radio frequency emission are considered incidental system noise in virtually all laptops, smartphones and other electronic devices, but scientists at Disney Research have found a way to use these spurious electromagnetic (EM) signals to uniquely identify even seemingly identical devices. Read more at: http://phys.org/news/2016-05-fingerprint-noise-differentiate-identical-electronic.html#jCp ------------------------------ Date: Thu, 5 May 2016 16:04:08 +0200 From: Thomas Koenig <tkoenig () netcologne de> Subject: Data exposure of AfD members leads to harassment, death threat A radical left web site recently posted personal data, including home and e-mail addresses, of people attending two party conferences of the Alternative für Deutschland, a German political party situated to the right of the current German government. The names include those of current AfD members, AfD ex-members and others attending the conferences as guests. Several hundreds of affected people have filed criminal charges. So far, exposure of the data has led to harassment of several AfD members and at least one murder threat. Ironically, the person who went public with the death threat is not even an AfD member. http://www.newday.mk/data-leakage-participants-list-afd-party-congress-on-the-net-showed-up/ http://www.swr.de/landesschau-aktuell/bw/tuebingen/hass-mail-nach-afd-parteitag-tuebinger-student-erhaelt-todesdrohung/-/id=1602/did=17377092/nid=1602/2lk1u6/ ------------------------------ Date: Fri, 06 May 2016 10:14:59 -0700 From: Gene Wirchenko <genew () telus net> Subject: "Warrantless searches surge as online privacy dwindles" (Caroline Craig) Caroline Craig, InfoWorld, 6 May 2016 Not only are warrantless searches exploding in number, the boundaries of warrants themselves are expanding http://www.infoworld.com/article/3066712/privacy/warrantless-searches-surge-as-online-privacy-dwindles.html ------------------------------ Date: Fri, 06 May 2016 10:09:10 -0700 From: Gene Wirchenko <genew () telus net> Subject: "Windows 10 updates are now ruining pro-gaming streams" (The Guardian) https://www.theguardian.com/technology/2016/may/04/windows-10-updates-ruining-pro-gaming-streams Forcing a gaming PC to update mid-game during a livestream to up to 130,000 followers isn't best advert for the software ------------------------------ Date: Fri, 6 May 2016 13:08:27 -0400 From: Paul Russell <prussell () nd edu> Subject: Re: The last non-Internet Generation (RISKS-29.50) In a posting dated 3 May 2016, Paul Robinson describes a world in which broadband Internet access is nearly ubiquitous. Apparently, Mr. Robinson spends all his time in large metropolitan areas. There are vast swaths of rural America where dial-up is still the only option for Internet access. Ah, but you have a smartphone which can be used as an Internet hotspot. Good luck finding a data connection in rural America. The cellular service providers have no incentive to spend money to upgrade towers to support data service because there are so few smartphone users in these areas. And there are so few smartphone users because there is no data service. Paul Russell, Lakeville, Indiana USA ------------------------------ Date: Wed, 4 May 2016 16:09:43 +0200 From: Olivier MJ Crepin-Leblond <ocl () gih com> Subject: Re: Update on the catless.ncl.ac.uk outage [Lindsay Marshall <Lindsay.Marshall () newcastle ac uk> reports: I am seeing signs of life from catless! So resuscitation is in progress. No web yet and not visible to the outside world, but I'm getting error messages. LM [As of Thursday 5 May, we have moved all of the catless-based RISKS subscribers to the SRI distribution system. CATLESS subscribers should be receiving this issue directly from SRI.COM. Some of you will be very grateful when CATLESS once again becomes CATalogued as browsable. PGN] Dear Lindsay, Thanks for the notice. Wow - that's a page turned, closing the NCL redistribution of RISKS! I hope that Peter will propose a vote of thanks by acclamation on behalf of all UK based RISKS readers! I remember when you set this list up... and transatlantic bandwidth was scarce. How the Internet has changed! It's another world now. Thanks so much and warmest regards, [Yes, ABSOLUTELY! We are deeply indebted to Lindsay Marshall for his steadfast help in maintaining the official searchable RISKS repository. PGN] ------------------------------ Date: Tue, 3 May 2016 14:18:56 -0700 From: Chuck_Petras () selinc com Subject: Re: Update on the catless.ncl.ac.uk outage This is good to know. I was assuming that the repository went offline because of the "Man accidentally 'deletes his entire company' with one line of bad code" story from the Independent that was making the rounds about that time. Schweitzer Engineering Laboratories, Pullman, WA 99163 http://www.selinc.com ------------------------------ Date: Wed, 4 May 2016 09:25:16 +0000 From: Lindsay Marshall <Lindsay.Marshall () newcastle ac uk> Subject: Superb for Risks Readers - The Blame Game - BBC Radio 4 This was sent to me by Chris Cartledge:
Every Risks reader sh/could read this: http://www.bbc.co.uk/programmes/b078z5m8 Kind Regards and Best Wishes Chris Cartledge
------------------------------ Date: Fri, 6 May 2016 11:11:11 -0800 From: RISKS-request () csl sri com Subject: Abridged info on RISKS (comp.risks) [SEE TEMPORARY STATUS of CATLESS] The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks Alternatively, to subscribe or unsubscribe via e-mail to mailman your FROM: address, send a message to risks-request () csl sri com containing only the one-word text subscribe or unsubscribe. You may also specify a different receiving address: subscribe address= ... . You may short-circuit that process by sending directly to either risks-subscribe () csl sri com or risks-unsubscribe () csl sri com depending on which action is to be taken. Subscription and unsubscription requests require that you reply to a confirmation message sent to the subscribing mail address. Instructions are included in the confirmation message. Each issue of RISKS that you receive contains information on how to post, unsubscribe, etc. => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> *** Contributors are assumed to have read the full info file for guidelines. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you NEVER send mail! => SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line. *** NOTE: Including the string `notsp' at the beginning or end of the subject *** line will be very helpful in separating real contributions from spam. *** This attention-string may change, so watch this space now and then. => OFFICIAL ARCHIVES: ftp://ftp.sri.com/risks for current volume or ftp://ftp.sri.com/VL/risks for previous VoLume NEW NOTE: Existing RISKS subscribers previously served by the catless redistribution service have now been moved to the main SRI distribution, The catless server has been restored, but is not yet back online. Usually http://www.risks.org takes you to Lindsay Marshall's searchable archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html --> VoLume, ISsue. Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001 and not necessarily precisely the same as catless and sri.com/risks/): <http://the.wiretapped.net/security/info/textfiles/risks-digest/> *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 29.51 ************************
Current thread:
- Risks Digest 29.51 RISKS List Owner (May 06)