Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit precedence: bulk Subject: Risks Digest 31.98 RISKS-LIST: Risks-Forum Digest Friday 12 June 2020 Volume 31 : Issue 98 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/31.98> The current issue can also be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: Election fiasco: Georgia on my mind (NYTimes via PGN) Babylon Health app error allowed UK users to watch videos of other patients' private doctor visits (CBC-CA) How his photo ended up breaking Android phones (BBC News) Unusual rodent engine problem has suddenly become 'super common' (Freep) Honda confirms its network has been hit by cyber-attack (ZDNet) New CrossTalk attack impacts Intel's mobile, desktop, and server CPUs (ZDNet) Australian beverage company hit by cyber-attack (SHM-AU) UPnP flaw exposes millions of network devices to attacks over the Internet (Ars Technica) IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help (WiReD) Apple publishes free resources to improve password security (ZDNet) Satellites Are Capturing the Protests, and Just About Everything Else on Earth (Bloomberg) Multiple US agencies have purchased this mysterious mobile eavesdropping device (TechRadar) Telecom security firm flags 'potentially huge' vulnerabilities in Internet infrastructure (Laurens Cerulus) FBI warns hackers are targeting mobile banking apps (The Hill) OpenAI's Text Generator Is Going Commercial (WiReD) Zoom disables accounts of former Tiananmen Square student leader (FT) Amazon bans police use of face recognition tech for one year (CNBC) Data from 15M phones shows some Americans are gathering at pre-pandemic levels (NBC News) The hidden detectors looking for guns and knives (BBC) Trump Order Confronts Big Tech Bias Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Fri, 12 Jun 2020 14:09:25 PDT From: "Peter G. Neumann" <neumann@csl.sri.com> Subject: Election fiasco: Georgia on my mind [PGN title, with apologies to Hoagy Carmichel] Nick Corasaniti and Stephanie Saul, In Georgia Election Havoc, a Costly Bet on Tech Led to Meltdown *The New York Times* front page and page A16, 12 Jun 2020 "As Georgia election officials prepared to roll out an over-$100M high-tech voting system last year, good-government groups, a federal judge and election security experts warned of its perils. The new system, they argued, was too convoluted, too expensive, too big -- and was still insecure." "The problem seems to have been a perfect storm (overused metaphor, but apt here) of new equipment, hasty training and a crush of tasks associated with both getting the mail ballots out the door and processed AND with running an in-person voting operation." (Charles Stewart III) "A lot of people saw this coming ... There are a lot more things that can go wrong." (Andrew Appel) "A Rube Goldberg contraption" (Marilyn Marks) * Power demands blew fuses in aging polling places. * Some equipment never could power up. * Inability to boot equipment [once powered up]. * PIN authorizations, physical cards. * Technicians who never explained the problems they fixed (on the fly). * In one location, only four poll workers instead of 12. * Inadequate training. * Dominion staff had to "replace only 20 components" among 30,000 machines considered a success story! * Dominion's Democracy 5.5 system used in this election had failed certification in Texas last year. * The computerized ballot-marking systems in other states were known to cause problems in other states, due to user error, poor training, infrastructure challenges, and "the occasional software issue". This is just one more fiasco in a year already marked by fiascos. November does not augur well. This election might remind RISKS readers of Murphy's Law. However, in this case "Anything that can go wrong will go wrong." might be recast as "Everything that can go wrong did go wrong." So, asks a long-time RISKS reader, "What's wrong with hand-marked paper ballots?" ------------------------------ Date: Tue, 9 Jun 2020 22:53:41 -0600 From: "Matthew Kruk" <mkrukg@gmail.com> Subject: Babylon Health app error allowed UK users to watch videos of other patients' private doctor visits (CBC-CA) https://www.cbc.ca/news/canada/calgary/babylon-health-app-1.5605570 ------------------------------ Date: Wed, 10 Jun 2020 14:34:21 -0400 From: Gabe Goldberg <gabe@gabegold.com> Subject: How his photo ended up breaking Android phones (BBC News) Gaurav Agrawal, a scientist and amateur photographer living in San Diego, couldn't believe it when he suddenly started seeing a photograph he took last summer popping up on the news. He took it at St Mary Lake in Glacier National Park, Montana, one "magical evening" in August 2019. He shared the snap on photo platform Flickr and thought no more about it. However, a glitch meant that when the image was set as wallpaper, it caused some Android phones to fail. The handsets would switch on and off repeatedly, requiring a factory reset which meant all data on them was wiped. https://www.bbc.com/news/technology-52978884 ------------------------------ Date: Tue, 9 Jun 2020 10:21:50 -1000 From: the keyboard of geoff goodfellow <geoff@iconia.com> Subject: Unusual rodent engine problem has suddenly become 'super common' (Freep) There was once a little mouse that caused a big problem. The critter crawled up in the wheel well of a parked car, made his way over the brakes and up into the engine. Most rodents would stop there, it's a nice nesting spot. But this fella had other plans. He kept going until he was inside the dashboard and couldn't get out. There, he died (I didn't say it would be a happy story). The rancid and revolting odor compelled the car owner to bring it to Avis Ford in Southfield, where service technicians made the unsavory discovery. "Usually you find a wiring harness for the engine or the fuel injection system that is all chewed up," said Avis Ford's Service Manager Larry Sirgany. "We'll find a car that's been sitting for a couple weeks and it will have a big nasty nest in there too." Over the years, Sirgany has found plenty of flora and fauna in car engines. There are grass and twig nests and dead -- sometimes alive -- vermin and lots of chewed wires. The resulting damage is costly to fix. But this spring, amid the stay home order during the coronavirus pandemic, the rodent ruination to engines has been exceptionally high in some places. "I've seen a solid dozen to 15 cars with damage in the last six weeks," Sirgany said. "Typically, I would have two per month this time of year." *Hundreds in repairs* [...] https://www.freep.com/story/money/cars/2020/06/09/rats-rodents-nest-parked-cars-coronavirus/3156961001/ ------------------------------ Date: Wed, 10 Jun 2020 03:01:48 +0900 From: Dave Farber <farber@gmail.com> Subject: Honda confirms its network has been hit by cyber-attack (ZDNet) https://www.zdnet.com/article/honda-confirms-its-network-has-been-hit-by-cyber-attack/ ------------------------------ From: Monty Solomon <monty@roscom.com> Date: Tue, 9 Jun 2020 20:19:15 -0400 Subject: New CrossTalk attack impacts Intel's mobile, desktop, and server CPUs (ZDNet) Academics detail a new vulnerability named CrossTalk that can be used to leak data across Intel CPU cores. https://www.zdnet.com/article/new-crosstalk-attack-impacts-intels-mobile-desktop-and-server-cpus/ ------------------------------ Date: Tue, 9 Jun 2020 22:06:35 +0000 From: John Colville <John.Colville@uts.edu.au> Subject: Australian beverage company hit by cyber-attack (SHM-AU) http://www.smh.com.au/technology/drinks-giant-lion-hit-by-cyber-attack-as-hackers-target-corporate-australia-20200609-p550pu.html ------------------------------ Date: Fri, 12 Jun 2020 07:40:11 -0400 From: Monty Solomon <monty@roscom.com> Subject: UPnP flaw exposes millions of network devices to attacks over the Internet (Ars Technica) Unsafe for more than a decade, universal plug and play strikes again. https://arstechnica.com/information-technology/2020/06/upnp-flaw-exposes-millions-of-network-devices-to-attacks-over-the-internet/ ------------------------------ Date: Tue, 9 Jun 2020 20:08:12 -0400 From: Gabe Goldberg <gabe@gabegold.com> Subject: IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help (WiReD) Just like with foods that display health information the package, researchers are exploring a tool that details how connected devices manage data. The Internet-of-things security crisis has been building for more than a decade, with unprotected, unpatchable gadgets fueling botnets, getting attacked for nation state surveillance, and just generally being a weak link for networks. Given that IoT security seems unlikely to magically improve anytime soon, researchers and regulators are rallying behind a new approach to managing IoT risk. Think of it as nutrition labels for embedded devices. https://www.wired.com/story/iot-security-privacy-labels/ ------------------------------ Date: Tue, 9 Jun 2020 20:19:02 -0400 From: Monty Solomon <monty@roscom.com> Subject: Apple publishes free resources to improve password security (ZDNet) The new tools are meant to help the developers of password managers and Apple hopes the tools will reduce the instances where users chose their own password rather than rely on the password manager. https://www.zdnet.com/article/apple-publishes-free-resources-to-improve-password-security/ ------------------------------ Date: Wed, 10 Jun 2020 09:43:53 -1000 From: geoff goodfellow <geoff@iconia.com> Subject: Satellites Are Capturing the Protests, and Just About Everything Else on Earth (Bloomberg) *This year has brought immense change, much of it immortalized in high-resolution images from space.* As protesters gathered in Washington over the weekend, their march across the city was documented by photography satellites flying overhead. One particular image stood out and made its way to various television newscasts. It showed the the bright yellow *Black Lives Matter* mural that had been painted on two blocks of asphalt near the White House. It was visual proof that the protests and their message had, in a sense, made their way to space. The company that took the photo, Planet Labs Inc., has hundreds of satellites floating around Earth, enough that it can snap at least one photo of every spot on the planet every day, according to the startup. Such imagery used to be rare, expensive and controlled by governments. Now, Planet has built what amounts to a real-time accounting system of the earth that just about anyone can access by paying a fee. Over the next couple months, Planet is embarking on a project that will dramatically increase the number of photos it takes and improve the quality of the images by 25% in terms of resolution. To do that, the company is lowering the orbits of some of its larger, high-resolution satellites and launching a half-dozen more devices. As a result, Planet will go from photographing locations twice a day to as many as 12 times a day in some places. Customers will also be able to aim the satellites where they want using an automated system developed by Planet. ``The schedule is shipped to the satellite, and it knows the plan it needs to follow,'' said Jim Thomason, the vice president of products at Planet. Advancements like this in satellite imaging would have seemed unbelievable to the folks who started working on such research in earnest in the 1960s. Back then, the U.S. had a top-secret operation that entailed putting satellites into orbit, snapping pictures and then ejecting canisters of film from the satellites that tumbled back to Earth to be caught midair by a plane. Analysts would then develop the film and pore over the images looking for Soviet missile sites and other military operations. This Rube Goldbergian process didn't always work well, but it did ultimately result in the U.S. learning that the Russian missile program was not as advanced as officials had feared. [...] https://www.bloomberg.com/news/articles/2020-06-09/black-lives-matter-dc-street-art-captured-by-satellite-in-orbit https://www.msn.com/en-us/news/technology/satellites-are-capturing-the-protests-and-just-about-everything-else-on-earth/ar-BB15eV19 ------------------------------ Date: Wed, 10 Jun 2020 09:44:50 -1000 From: geoff goodfellow <geoff@iconia.com> Subject: Multiple US agencies have purchased this mysterious mobile eavesdropping device (TechRadar) Multiple US federal agencies have obtained a mysterious new eavesdropping device thought to be designed to monitor 4G-enabled mobile phones. Very little is known about the *Crossbow* device, other than it iterates on the Stingray ISMI-catchers manufactured by Harris, used to trace location data and listen in on phone calls. <https://www.techradar.com/news/governments-will-use-location-data-to-map-spread-of-coronavirus> While devices of this kind are used by law enforcement and intelligence across the globe, the air of mystery around the kit and a lack of transparency over the way in which it is being deployed has given rise to concern it could be used to infringe upon civil liberties. - This WhatsApp feature will land your phone number in Google search results <https://www.techradar.com/news/using-this-whatsapp-feature-will-land-your-phone-number-in-google-search-results> - Google Incognito mode is not as private as you might like to think <https://www.techradar.com/news/google-incognito-mode-is-not-as-private-as-you-might-like-to-think> - Contact tracing apps from Apple and Google 'will not collect location data' <https://www.techradar.com/uk/news/contact-tracing-apps-from-apple-and-google-will-not-collect-location-data> Procurement documents show the US Marshals placed an order with Harris for Crossbow devices worth $1.7 million, while the US Army and Navy made similar purchases worth circa $380,000. *Mobile surveillance* ISMI-catchers, or international mobile subscriber identity-catchers, are able to mimic the qualities of a cellphone tower and, by this mechanism, record the SIM card identity, eavesdrop on calls, access text messages and capture location data. [...] https://global.techradar.com/en-za/news/multiple-us-agencies-have-purchased-this-mysterious-mobile-eavesdropping-device ------------------------------ Date: Wed, 10 Jun 2020 14:41:00 PDT From: "Peter G. Neumann" <neumann@csl.sri.com> Subject: Telecom security firm flags 'potentially huge' vulnerabilities in Internet infrastructure (Laurens Cerulus) Laurens Cerulus, Politico BRUSSELS -- A key protocol for Internet traffic is riddled with vulnerabilities that pose risks to telecom operators, including the potential to bring down websites and allow fraudsters to set up fake traffic, a telecom security firm said Wednesday. The protocol ``contains a number of vulnerabilities threatening both mobile operators and their clients. As a result, attackers can interfere with network equipment and leave an entire city without communications, impersonate users to access various resources, and use network services at the expense of the operator or subscribers,'' Positive Technologies said in a new report. <https://www.politico.eu/wp-content/uploads/2020/06/POLITICO-Positive-Technologies-report-Threat-vector-GTP-June-2020.pdf> The widespread GTP protocol is used across the board by telecom companies and Internet service providers to manage Internet traffic. It is also used in core parts of Internet networks, meaning the vulnerabilities are likely to persist in coming years as operators build new 5G infrastructure that still relies on 4G core networks. ``It's not like vulnerabilities in software. In the case of GTP, it is a kind of architectural deficiency. It's harder to eliminate,'' said Dmitry Kurbatov, chief technology officer at Positive Technologies. The firm performed security tests on dozens of networks in 2018-2019 and found ``every network tested was vulnerable'' to exploits through the protocol. The vulnerabilities can be used to target servers with denial-of-service attacks, allow hackers to set up so-called man-in-the-middle attacks that trick people into thinking they are visiting legitimate websites, and even allow operators to send fraudulent traffic to other operators, Kurbatov said. ------------------------------ Date: Thu, 11 Jun 2020 09:57:09 -1000 From: geoff goodfellow <geoff@iconia.com> Subject: FBI warns hackers are targeting mobile banking apps (The Hill) The FBI on Wednesday warned that malicious cyber actors were targeting mobile banking apps in an attempt to steal money as more Americans have moved to online banking during the coronavirus pandemic. In a public service announcement, the FBI noted it expects to see hackers exploit mobile banking platforms, which have seen a 50 percent surge in use since the beginning of the pandemic. <https://www.ic3.gov/media/2020/200610.aspx> ``With city, state, and local governments urging or mandating social distancing, Americans have become more willing to use mobile banking as an alternative to physically visiting branch locations. The FBI expects cyber actors to attempt to exploit new mobile banking customers using a variety of techniques, including app-based banking trojans and fake banking apps.'' The FBI specifically pointed to threat of banking trojans, which involve a malicious virus hiding on a user's mobile device until a legitimate banking app is downloaded. Once the real app is on the device, the banking trojan then overlays the app, tricking the user into clicking on it and inputting their banking login credentials. Fake banking apps were also cited as a threat, with users in danger of being tricked into downloading malicious apps that also steal sensitive banking information. In order to combat these threats, the FBI recommended that Americans only download banking apps from official app stores or from banking websites and that banking app users enable two-factor authentication on their accounts and use strong passwords. [...] https://thehill.com/policy/cybersecurity/502148-fbi-warns-hackers-are-targeting-mobile-banking-apps ------------------------------ Date: Thu, 11 Jun 2020 19:41:13 -0400 From: Gabe Goldberg <gabe@gabegold.com> Subject: OpenAI's Text Generator Is Going Commercial (WiReD) The research institute was created to steer AI away from harmful uses. Now it's competing with tech giants to sell a cloud-computing service to businesses. Last spring, artificial intelligence research institute OpenAI said it had made software so good at generating text—including fake news articles -- that it was too dangerous to release. That line in the sand was soon erased when two recent master's grads recreated the software and OpenAI released the original, saying awareness of the risks had grown and it hadn't seen evidence of misuse. Now the lab is back with a more powerful text generator and a new pitch: Pay us to put it to work in your business. Thursday, OpenAI launched a cloud service that a handful of companies are already using to improve search or provide feedback on answers to math problems. It's a test of a new way of programming AI and the lab's unusual business model. https://www.wired.com/story/openai-text-generator-going-commercial/ ------------------------------ Date: Thu, 11 Jun 2020 09:58:10 -1000 From: geoff goodfellow <geoff@iconia.com> Subject: Zoom disables accounts of former Tiananmen Square student leader *Chinese dissidents in US targeted after announcing plans for video call commemorating 1989 massacre* Zoom disabled the accounts of a group of Chinese dissidents in the US after they used its video conference service to commemorate the Tiananmen Square massacre. Zoom's role in shutting down the meeting, which was hosted and organised by activists in the US but included participants dialing in from China, will increase fears about the platform's security and how it will respond to government censorship requests. Zoom's video chat service has exploded in popularity since lockdowns were introduced across the globe to slow the spread of Covid-19. The company, which is listed on Nasdaq, has a large operation in China: almost a third of its workers are based in the country and much of its research and development takes place there. It also has servers in China. The annual Tiananmen Square commemoration was hosted on Zoom by a group of Chinese activists in the US, including Wang Dan, one of the most prominent leaders of the pro-democracy student movement that was crushed by the Chinese army in Beijing on June 4 1989. Mr Wang's team shared screenshots with the *Financial Times* of his Zoom call being canceled twice and two of his team's paid Zoom accounts being disabled. The cancellations started just as the meetings were due to begin on the morning of June 4 in Washington, where Mr Wang is based. He added that as of Thursday, the accounts remained disabled. [...] https://www.ft.com/content/f24bc9c6-ed95-4b31-a011-9e3fcd9cf006 [Lauren Weinstein noted this: Zoom closes account of U.S.-based Chinese activist after Tiananmen event (Axios): Zoom is effectively an arm of the Chinese communist government. You should not be using it, there are many alternatives. -L https://www.axios.com/zoom-closes-chinese-user-account-tiananmen-square-f218fed1-69af-4bdd-aac4-7eaf67f34084.html PGN] ------------------------------ Date: Wed, 10 Jun 2020 14:48:44 -0700 From: Lauren Weinstein <lauren@vortex.com> Subject: Amazon bans police use of face recognition tech for one year (CNBC) https://www.cnbc.com/2020/06/10/amazon-bans-police-use-of-facial-recognition-technology-for-one-year.html ------------------------------ Date: Thu, 11 Jun 2020 22:04:53 -0400 From: Monty Solomon <monty@roscom.com> Subject: Data from 15M phones shows some Americans are gathering at pre-pandemic levels (NBC News) Cellphone location data shows where people are leaving home and coming near other people. https://www.nbcnews.com/news/us-news/analysis-data-15m-phones-shows-some-americans-are-gathering-pre-n1229636 ------------------------------ Date: Fri, 12 Jun 2020 11:53:42 +0800 From: Richard Stein <rmstein@ieee.org> Subject: The hidden detectors looking for guns and knives (BBC) https://www.bbc.com/news/business-52734768 Security screens are inconvenient; they slow consumer foot traffic to benefit public safety. Enter real-time AI to assess the shape and density of concealed objects in high-foot traffic areas (transportation terminals, entertainment venues, office doorways). Potted plants frequently conceal metal and temperature detectors. Some detectors apply passive (non-ionizing) radiation to resolve features. Add facial recognition to auto-profile using Clearview AI to resolve (erroneously or not, given unknown false{positive, negative}) a name, address, social media linkage, etc. Significant, possibly panoptic, auto-profile ingress/egress go/no-go processing can promote complacency among security personnel, and raise alarm fatigue risk. Reducing human security footprint (aka business operational expense) is apparently a key motive fueling the business. Surveillance-enabling technologies seek to displace Barney beagle and other manual inspection deterrents. Over-reliance on deployed technology, without demonstrable public safety benefits (as measured by false positive/negative outcome, etc. versus human inspection) may prove catastrophic. ------------------------------ Date: Wed, 10 Jun 2020 14:55:24 -0700 From: Lauren Weinstein <lauren@vortex.com> Subject: Trump Order Confronts Big Tech Bias (Whitehouse) <https://www.whitehouse.gov/presidential-actions/executive-order-preventing-online-censorship/>* President Trump finally issued an *Executive Order targeting viewpoint discrimination by Big Tech social media companies. The Order grows out of Trump's summit on this thorny issue last July. Topping the list of targets are Facebook, Twitter, Instagram, YouTube and Google, but there are many other possibilities. This form of discrimination is very much uncharted legal territory. The chosen central concept for Big Tech wrongdoing is censorship, as the EO is titled *Executive Order on Preventing Online Censorship*. This choice in itself is a strategic legal decision. The Order is basically a hunting license for federal agencies. There are two distinct parts. The first is basically laying out a number of legal arguments. If you are not familiar with the legal issues this may seem like empty rhetoric, but it is actually the opposite. The lawyers who wrote this order are preparing to stand before a judge. In fact the Order begins by focusing on the present law, which protects Big Tech from liability when they publish someone else's content. Here is the opening paragraph on that legal issue. Note that it is presented as a Federal policy. [...] https://papundits.wordpress.com/2020/06/11/trump-order-confronts-big-tech-bias/ ------------------------------ Date: Mon, 1 Jun 2020 11:11:11 -0800 From: RISKS-request@csl.sri.com Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks => SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that includes the string `notsp'. Otherwise your message may not be read. *** This attention-string has never changed, but might if spammers use it. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you never send mail where the address becomes public! => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> *** Contributors are assumed to have read the full info file for guidelines! => OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's searchable html archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue. Also, ftp://ftp.sri.com/risks for the current volume or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume If none of those work for you, the most recent issue is always at http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-31.00 ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001) *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. Apologies for what Office365 and SafeLinks may have done to URLs. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 31.98 ************************