precedence: bulk
Subject: Risks Digest 29.15

RISKS-LIST: Risks-Forum Digest  Wednesday 9 December 2015  Volume 29 : Issue 15

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/29.15.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Reboot not a solution -- especially for commercial aviation (Mark Richards)
Working on Cheaper Sensors, Deeper Learnings (Gabe Goldberg)
How Electronic Health Records Are Harming Patients (CIO)
Hopeless failure of Dutch telecom providers & Phone House to protect
  personal data: How I could access 12+ million records (Kees Huyser)
Car calls 911 to report accident after Florida hit and run (ABC)
Fired Kemp worker says he is a scapegoat re: Massive Georgia data breach
  (AJC)
Trend Micro finds security bugs in over 6M devices (Help Net)
"New payment card malware hard to detect and remove" (Jeremy Kirk)
The attack that broke Tor, and how Tor plans to fix it (Kashmir Hill)
France looking at banning Tor, blocking public Wi-Fi (Sebastian Anthony)
Interesting hack to gain backstage access (BBC via Ken Olthoff)
"I gave my students iPads -- then wished I could take them back"
  (WashPost)
"Why Node.js waited for OpenSSL security update before patching"
  (Fahmida Y. Rashid)
I thought it was "https://" (Dan Jacobson)
Road to Robotic Parking Is Littered With Faulty Projects
  (UK National Crime Agency *via The New York Times*)
Your child is a CYBER-CRIMINAL! (UK National Crime Agency via
  Lauren Weinstein)
How not to report on the encryption 'debate' (CJR)
Terrorists Mock Bids to End Use of Social Media (NYTimes)
Re: Database Error Complicit In Turkish Airlines Landing Accident
   (Dan Jacobson)
"Post on Facebook - and get a tax bill." (Kate Palmer via Chris Drewe)
Re: Everyone is lying about the downed Russian jet? (David Damerell)
Re: reply@not.possible (Dimitri Maziuk)
Voter Privacy in the Age of Big Data (Ira Rubenstein)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Sat, 5 Dec 2015 10:40:24 -0500
From: Mark Richards <mark.richards@massmicro.com>
Subject: Reboot not a solution -- especially for commercial aviation

Terrestrial-bound computer users blindly accept a system reboot as a problem
solution.  In my experience this remains a constant in Windows (version 7
and below... I have no experience with 8 or above, thanks), and various
Apple OS's.  (My Linux boxes just keep on running).  This mindset has crept
into the maintenance practices of the commercial airlines.  For many years I
have read frequently the exploits of in-flight failures resolved by cycling
a circuit breaker; of a "maintenance engineer" doing much the same on the
ground to fix a "glitch".

I think a read of the NTSC's report on the crash of an Indonesia Air Asia
Airbus A320-200 which killed all aboard on 28 Dec, 2014, is worthy for its
potential to sober flight crews, maintenance and regulators:
     avherald.com/h?article=47f6abc7/0028&opt=0

               [Date corrected in archive copies.  PGN]

That CRM, basic recovery procedures, and a host of other
allegedly-well-trained responses went out the window, including the
continued lack of side stick conflict detection in Airbus designs, can, I
think, be implicated in this mess... but it all began with a hard failure
and a "reboot", taking us back to the old principle of the straw that breaks
the camel's back.

In flight, system restarts must remain the option of the crews.  The very
hint of restricting flight crew access to the hardware meets with a strong
objection.  However, we also see in this instance that the act of shutting
off a system completely was not met with an appropriate crew response.
Reversion to lower levels of flight dynamic protections simply return the
airplane to stick and rudder. One may rightly ask why this is so
problematic.  In the thinner upper levels, with tighter speed/stall margins,
are crews simply not familiar enough to manage these extremes?

Among the lessons: things that go bump in the night tend to leave bits
floating on the ocean.  Need a reboot?  There's a good reason why.  Let's
abandon the cheap and easy way out as it only puts off the inevitable
disaster.

------------------------------

Date: Fri, 4 Dec 2015 18:22:56 -0500
From: Gabe Goldberg <gabe@gabegold.com>
Subject: Working on Cheaper Sensors, Deeper Learnings

Automotive Intelligence - Consumer Technology Association

It is crucial for an autonomous car to be able to understand and learn
behaviors, weigh factors and make judgment calls, not simply to follow
rules, asserts Jim Buczkowski, global director of electronic systems,
research and innovation at Ford Motor Co. in Dearborn, MI. "I don't think
you can program for every single individual situation but you can't have a
situation where the machine comes back and says, 'I don't know what to do,'"
he says. Further, autonomous vehicles must be engineered for "graceful
failure" when technology can't function -- for example, when one of the
vehicle's sensors is blocked by dirt or inclement weather -- meaning "you
still have some capability for driver assistance, but you don't have full
autonomy," he explains. "Those are things that are part of the strategy that
folks are looking at and working on."

http://www.cta.tech/i3/Features/2015/November-December/Automotive-Intelligence.aspx

...what could go wrong?

Gabriel Goldberg, Computers and Publishing, Inc.       gabe@gabegold.com
3401 Silver Maple Place, Falls Church, VA 22042           (703) 204-0433

------------------------------

Date: Fri, 4 Dec 2015 08:22:55 -0800
From: Lauren Weinstein <lauren@vortex.com>
Subject: How Electronic Health Records Are Harming Patients

CIO via NNSquad
http://www.cio.com/article/3011576/ehr/why-electronic-health-records-arent-more-usable.html

  EHRs are designed to support billing more than patient care, experts say
  ... It shouldn't come as a surprise that most doctors are unhappy with
  their electronic health record (EHR) systems, which tend to be clunky,
  hard to use and may actually get in the way of truly excellent patient
  care ... Doctors' biggest complaint about the EHR is that it slows them
  down, especially in the documentation phase. "Compared to handwriting or
  dictating, EHRs take doctors nine times longer to enter the data,"
  Anderson says. "Sure, you have more information in the EHR than in paper
  records, but it takes more time." ... Other alerts go off to prevent
  adverse drug interactions with other medications, allergies, or foods.
  Many of these are inapplicable to particular patients, and after a while,
  doctors may stop paying attention to them or turn them off. Three quarters
  of EHRs don't allow the customization of these alerts, according to
  Anderson.

------------------------------

Date: Tue, 8 Dec 2015 14:31:54 +0100
From: Kees Huyser <kees.huyser@nikhef.nl>
Subject: Hopeless failure of Dutch telecom providers & Phone House to
  protect personal data: How I could access 12+ million records

A (long) story of exposed passwords and lax security.

"The sales guy started renewing my Vodafone subscription and therefor needed
to log in at a dealer portal from Vodafone. He didn't remember the login
password, and, here it comes, on the screen he opened an Excel file which
contained *all* their passwords.

Is this happening for real? I had just told him minutes ago I'm an
experienced professional hacker, and we had both laughed about the
password-taped-on-monitor leak.

Curiously and intensively I looked on the screen to get a picture of the
treasure trove that was in front of me. Passwords to view and modify
customer data of KPN, Vodafone, Telfort, T-Mobile, UPC, Tele2 and other
companies were right in front of me.

http://sijmen.ruwhof.net/weblog/608-personal-data-of-dutch-telecom-providers-extremely-poorly-protected-how-i-could-access-12-million-records

Kees Huyser

------------------------------

Date: Tue, 8 Dec 2015 08:31:58 -0700
From: Jim Reisert AD1C <jjreisert@alum.mit.edu>
Subject: Car calls 911 to report accident after Florida hit and run (ABC)

ABC 7, Chicago, 4 Dec 2015, Port St. Lucie, FL

A hit-and-run mystery was solved and a woman arrested in Florida after an
unusual call to 911.  It wasn't the driver who picked up the phone, but
instead it was the car itself that called for help.

Port St. Lucie police say a car safety feature helped them to track down
57-year-old Cathy Bernstein, who they say hit a truck and then [p]lowed
through a van on Prima Vista Boulevard.

Bernstein allegedly fled the scene, but her car's emergency assistance
feature didn't just make a record of the crash, it automatically contacted
911.

http://abc7chicago.com/technology/car-auto-dails-911-to-report-accident-after-driver-allegedly-commits-hit-and-run/1109554/

------------------------------

Date: Thu, 3 Dec 2015 19:36:37 -0800
From: Lauren Weinstein <lauren@vortex.com>
Subject: Fired Kemp worker says he is a scapegoat re: Massive Georgia data
  breach (AJC)

AJC via NNSquad
http://www.ajc.com/news/news/state-regional-govt-politics/exclusive-fired-kemp-worker-says-he-is-a-scapegoat/npbBC/

  The employee fired after being blamed for a massive data breach at the
  Georgia Secretary of State's Office said Wednesday he has been made a
  scapegoat by the agency.  In an exclusive interview with The Atlanta
  Journal-Constitution, longtime state programmer Gary Cooley said he did
  not have the security access to add millions of Social Security numbers
  and birth dates to a public data file -- something Secretary of State
  Brian Kemp accused him of doing.  And while he acknowledged a role in the
  gaffe, he also outlined a more complicated series of missteps and
  miscommunication both within the office and with PCC Technology Group, an
  outside vendor tasked with managing voter data for the state.

------------------------------

Date: Tue, 8 Dec 2015 07:55:16 -0600
From: "Alister Wm Macintyre \(Wow\)" <macwheel99@wowway.com
Subject: Trend Micro finds security bugs in over 6M devices (Help Net)

An estimated 6.1 million smart phones, routers, and smart TVs still use old
versions of software with security bugs for which fixes were available in
2012.

This is because many ap developers are using obsolete versions of Universal
Plug & Play (UPnP) SDK library (libupnp).

See chart in Help Net article, & Trend Micro blog, listing 20  popular apps
in this condition.

http://www.net-security.org/secworld.php?id=19196
http://blog.trendmicro.com/trendlabs-security-intelligence/high-profile-mobile-apps-at-risk-due-to-three-year-old-vulnerability/#

  [Incidentally OWASP has published top 10 security flaws found in modern apps.
    https://www.owasp.org/index.php/Top_10_2013-Top_10]

------------------------------

Date: Tue, 08 Dec 2015 15:05:35 -0800
From: Gene Wirchenko <genew@telus.net>
Subject: "New payment card malware hard to detect and remove"

Jeremy Kirk, InfoWorld, 7 Dec 2015
FireEye finds that Nemesis, which comes from a suspected Russian group,
is a bootkit
http://www.infoworld.com/article/3012125/malware/new-payment-card-malware-hard-to-detect-and-remove.html

------------------------------

Date: Mon, 07 Dec 2015 08:41:23 -0800
From: Henry Baker <hbaker1@pipeline.com>
Subject: The attack that broke Tor, and how Tor plans to fix it
  (Kashmir Hill)

Kashmir Hill, Fusion, 30 Nov 2015
http://fusion.net/story/238742/tor-carnegie-mellon-attack/

Law enforcement has been complaining for years about the Web "going dark,"
saying that encryption and privacy tools are frustrating their ability to
track criminals online.  But massive FBI operations over the last year that
have busted 'hidden sites' used for the sale of drugs, hacking tools, and
child pornography suggest the digital criminal world has gotten lighter,
with law enforcement bragging that criminals can't "hide in the shadows of
the Dark Web anymore."  While mysterious about its tactics, law enforcement
indicated that it had found a way to circumvent the tool on which these
sites relied, a software called Tor.  But criminals are not the only ones
who rely on it.

  [Henry also suggests other sites as well.  PGN]
https://www.fbi.gov/newyork/press-releases/2014/dozens-of-online-dark-markets-seized-pursuant-to-forfeiture-complaint-filed-in-manhattan-federal-court-in-conjunction-with-the-arrest-of-the-operator-of-silk-road-2.0
https://www.torproject.org/projects/torbrowser.html.en
http://motherboard.vice.com/read/the-operators
https://gitweb.torproject.org/doctor.git

------------------------------

Date: Mon, 07 Dec 2015 08:48:14 -0800
From: Henry Baker <hbaker1@pipeline.com>
Subject: France looking at banning Tor, blocking public Wi-Fi
  (Sebastian Anthony)