• Risks Digest 31.98

    From RISKS List Owner@21:1/5 to All on Fri Jun 12 19:34:02 2020
    RISKS-LIST: Risks-Forum Digest Friday 12 June 2020 Volume 31 : Issue 98

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/31.98>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    Election fiasco: Georgia on my mind (NYTimes via PGN)
    Babylon Health app error allowed UK users to watch videos of other
    patients' private doctor visits (CBC-CA)
    How his photo ended up breaking Android phones (BBC News)
    Unusual rodent engine problem has suddenly become 'super common' (Freep)
    Honda confirms its network has been hit by cyber-attack (ZDNet)
    New CrossTalk attack impacts Intel's mobile, desktop, and server CPUs
    (ZDNet)
    Australian beverage company hit by cyber-attack (SHM-AU)
    UPnP flaw exposes millions of network devices to attacks over the Internet
    (Ars Technica)
    IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help (WiReD)
    Apple publishes free resources to improve password security (ZDNet)
    Satellites Are Capturing the Protests, and Just About Everything Else on
    Earth (Bloomberg)
    Multiple US agencies have purchased this mysterious mobile eavesdropping
    device (TechRadar)
    Telecom security firm flags 'potentially huge' vulnerabilities in Internet
    infrastructure (Laurens Cerulus)
    FBI warns hackers are targeting mobile banking apps (The Hill)
    OpenAI's Text Generator Is Going Commercial (WiReD)
    Zoom disables accounts of former Tiananmen Square student leader (FT)
    Amazon bans police use of face recognition tech for one year (CNBC)
    Data from 15M phones shows some Americans are gathering at pre-pandemic
    levels (NBC News)
    The hidden detectors looking for guns and knives (BBC)
    Trump Order Confronts Big Tech Bias
    Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Fri, 12 Jun 2020 14:09:25 PDT
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: Election fiasco: Georgia on my mind

    [PGN title, with apologies to Hoagy Carmichel]

    Nick Corasaniti and Stephanie Saul,
    In Georgia Election Havoc, a Costly Bet on Tech Led to Meltdown
    *The New York Times* front page and page A16, 12 Jun 2020

    "As Georgia election officials prepared to roll out an over-$100M high-tech voting system last year, good-government groups, a federal judge and
    election security experts warned of its perils. The new system, they
    argued, was too convoluted, too expensive, too big -- and was still
    insecure."

    "The problem seems to have been a perfect storm (overused metaphor, but
    apt here) of new equipment, hasty training and a crush of tasks
    associated with both getting the mail ballots out the door and
    processed AND with running an in-person voting operation."
    (Charles Stewart III)
    "A lot of people saw this coming ... There are a lot more things that can
    go wrong." (Andrew Appel)
    "A Rube Goldberg contraption" (Marilyn Marks)

    * Power demands blew fuses in aging polling places.
    * Some equipment never could power up.
    * Inability to boot equipment [once powered up].
    * PIN authorizations, physical cards.
    * Technicians who never explained the problems they fixed (on the fly).
    * In one location, only four poll workers instead of 12.
    * Inadequate training.
    * Dominion staff had to "replace only 20 components" among 30,000 machines
    considered a success story!
    * Dominion's Democracy 5.5 system used in this election had failed
    certification in Texas last year.
    * The computerized ballot-marking systems in other states were known
    to cause problems in other states, due to user error, poor training,
    infrastructure challenges, and "the occasional software issue".

    This is just one more fiasco in a year already marked by fiascos.
    November does not augur well.

    This election might remind RISKS readers of Murphy's Law. However,
    in this case
    "Anything that can go wrong will go wrong."
    might be recast as
    "Everything that can go wrong did go wrong."

    So, asks a long-time RISKS reader,
    "What's wrong with hand-marked paper ballots?"

    ------------------------------

    Date: Tue, 9 Jun 2020 22:53:41 -0600
    From: "Matthew Kruk" <mkrukg@gmail.com>
    Subject: Babylon Health app error allowed UK users to watch videos of
    other patients' private doctor visits (CBC-CA)

    https://www.cbc.ca/news/canada/calgary/babylon-health-app-1.5605570

    ------------------------------

    Date: Wed, 10 Jun 2020 14:34:21 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: How his photo ended up breaking Android phones (BBC News)

    Gaurav Agrawal, a scientist and amateur photographer living in San Diego, couldn't believe it when he suddenly started seeing a photograph he took
    last summer popping up on the news. He took it at St Mary Lake in Glacier National Park, Montana, one "magical evening" in August 2019. He shared the snap on photo platform Flickr and thought no more about it.

    However, a glitch meant that when the image was set as wallpaper, it caused some Android phones to fail. The handsets would switch on and off
    repeatedly, requiring a factory reset which meant all data on them was
    wiped.

    https://www.bbc.com/news/technology-52978884

    ------------------------------

    Date: Tue, 9 Jun 2020 10:21:50 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: Unusual rodent engine problem has suddenly become 'super common'
    (Freep)

    There was once a little mouse that caused a big problem.

    The critter crawled up in the wheel well of a parked car, made his way over
    the brakes and up into the engine. Most rodents would stop there, it's a
    nice nesting spot. But this fella had other plans.

    He kept going until he was inside the dashboard and couldn't get out.
    There, he died (I didn't say it would be a happy story). The rancid and revolting odor compelled the car owner to bring it to Avis Ford in
    Southfield, where service technicians made the unsavory discovery.

    "Usually you find a wiring harness for the engine or the fuel injection
    system that is all chewed up," said Avis Ford's Service Manager Larry
    Sirgany. "We'll find a car that's been sitting for a couple weeks and it
    will have a big nasty nest in there too."

    Over the years, Sirgany has found plenty of flora and fauna in car engines. There are grass and twig nests and dead -- sometimes alive -- vermin and
    lots of chewed wires. The resulting damage is costly to fix.

    But this spring, amid the stay home order during the coronavirus pandemic,
    the rodent ruination to engines has been exceptionally high in some places.

    "I've seen a solid dozen to 15 cars with damage in the last six weeks,"
    Sirgany said. "Typically, I would have two per month this time of year."

    *Hundreds in repairs* [...]

    https://www.freep.com/story/money/cars/2020/06/09/rats-rodents-nest-parked-cars-coronavirus/3156961001/

    ------------------------------

    Date: Wed, 10 Jun 2020 03:01:48 +0900
    From: Dave Farber <farber@gmail.com>
    Subject: Honda confirms its network has been hit by cyber-attack (ZDNet)

    https://www.zdnet.com/article/honda-confirms-its-network-has-been-hit-by-cyber-attack/

    ------------------------------

    From: Monty Solomon <monty@roscom.com>
    Date: Tue, 9 Jun 2020 20:19:15 -0400
    Subject: New CrossTalk attack impacts Intel's mobile, desktop, and server CPUs
    (ZDNet)

    Academics detail a new vulnerability named CrossTalk that can be used to leak data across Intel CPU cores.

    https://www.zdnet.com/article/new-crosstalk-attack-impacts-intels-mobile-desktop-and-server-cpus/

    ------------------------------

    Date: Tue, 9 Jun 2020 22:06:35 +0000
    From: John Colville <John.Colville@uts.edu.au>
    Subject: Australian beverage company hit by cyber-attack (SHM-AU)

    http://www.smh.com.au/technology/drinks-giant-lion-hit-by-cyber-attack-as-hackers-target-corporate-australia-20200609-p550pu.html

    ------------------------------

    Date: Fri, 12 Jun 2020 07:40:11 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: UPnP flaw exposes millions of network devices to attacks over the
    Internet (Ars Technica)

    Unsafe for more than a decade, universal plug and play strikes again.

    https://arstechnica.com/information-technology/2020/06/upnp-flaw-exposes-millions-of-network-devices-to-attacks-over-the-internet/

    ------------------------------

    Date: Tue, 9 Jun 2020 20:08:12 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help (WiReD)

    Just like with foods that display health information the package,
    researchers are exploring a tool that details how connected devices manage data.

    The Internet-of-things security crisis has been building for more than a decade, with unprotected, unpatchable gadgets fueling botnets, getting
    attacked for nation state surveillance, and just generally being a weak link for networks. Given that IoT security seems unlikely to magically improve anytime soon, researchers and regulators are rallying behind a new approach
    to managing IoT risk. Think of it as nutrition labels for embedded devices.

    https://www.wired.com/story/iot-security-privacy-labels/

    ------------------------------

    Date: Tue, 9 Jun 2020 20:19:02 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Apple publishes free resources to improve password security (ZDNet)

    The new tools are meant to help the developers of password managers and
    Apple hopes the tools will reduce the instances where users chose their own password rather than rely on the password manager.

    https://www.zdnet.com/article/apple-publishes-free-resources-to-improve-password-security/

    ------------------------------

    Date: Wed, 10 Jun 2020 09:43:53 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Satellites Are Capturing the Protests, and Just About Everything
    Else on Earth (Bloomberg)

    *This year has brought immense change, much of it immortalized in high-resolution images from space.*

    As protesters gathered in Washington over the weekend, their march across
    the city was documented by photography satellites flying overhead. One particular image stood out and made its way to various television
    newscasts. It showed the the bright yellow *Black Lives Matter* mural that
    had been painted on two blocks of asphalt near the White House. It was
    visual proof that the protests and their message had, in a sense, made their way to space.

    The company that took the photo, Planet Labs Inc., has hundreds of
    satellites floating around Earth, enough that it can snap at least one photo
    of every spot on the planet every day, according to the startup. Such
    imagery used to be rare, expensive and controlled by governments. Now,
    Planet has built what amounts to a real-time accounting system of the earth that just about anyone can access by paying a fee.

    Over the next couple months, Planet is embarking on a project that will dramatically increase the number of photos it takes and improve the quality
    of the images by 25% in terms of resolution. To do that, the company is lowering the orbits of some of its larger, high-resolution satellites and launching a half-dozen more devices. As a result, Planet will go from photographing locations twice a day to as many as 12 times a day in some places.

    Customers will also be able to aim the satellites where they want using an automated system developed by Planet. ``The schedule is shipped to the satellite, and it knows the plan it needs to follow,'' said Jim Thomason,
    the vice president of products at Planet.

    Advancements like this in satellite imaging would have seemed unbelievable
    to the folks who started working on such research in earnest in the 1960s.
    Back then, the U.S. had a top-secret operation that entailed putting
    satellites into orbit, snapping pictures and then ejecting canisters of film from the satellites that tumbled back to Earth to be caught midair by a
    plane. Analysts would then develop the film and pore over the images looking for Soviet missile sites and other military operations. This Rube
    Goldbergian process didn't always work well, but it did ultimately result in the U.S. learning that the Russian missile program was not as advanced as officials had feared. [...]

    https://www.bloomberg.com/news/articles/2020-06-09/black-lives-matter-dc-street-art-captured-by-satellite-in-orbit
    https://www.msn.com/en-us/news/technology/satellites-are-capturing-the-protests-and-just-about-everything-else-on-earth/ar-BB15eV19

    ------------------------------

    Date: Wed, 10 Jun 2020 09:44:50 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Multiple US agencies have purchased this mysterious mobile
    eavesdropping device (TechRadar)

    Multiple US federal agencies have obtained a mysterious new eavesdropping device thought to be designed to monitor 4G-enabled mobile phones.

    Very little is known about the *Crossbow* device, other than it iterates on
    the Stingray ISMI-catchers manufactured by Harris, used to trace location
    data and listen in on phone calls. <https://www.techradar.com/news/governments-will-use-location-data-to-map-spread-of-coronavirus>

    While devices of this kind are used by law enforcement and intelligence
    across the globe, the air of mystery around the kit and a lack of
    transparency over the way in which it is being deployed has given rise to concern it could be used to infringe upon civil liberties.

    - This WhatsApp feature will land your phone number in Google search
    results <https://www.techradar.com/news/using-this-whatsapp-feature-will-land-your-phone-number-in-google-search-results>
    - Google Incognito mode is not as private as you might like to think <https://www.techradar.com/news/google-incognito-mode-is-not-as-private-as-you-might-like-to-think>
    - Contact tracing apps from Apple and Google 'will not collect location
    data' <https://www.techradar.com/uk/news/contact-tracing-apps-from-apple-and-google-will-not-collect-location-data>

    Procurement documents show the US Marshals placed an order with Harris for Crossbow devices worth $1.7 million, while the US Army and Navy made
    similar purchases worth circa $380,000.

    *Mobile surveillance*

    ISMI-catchers, or international mobile subscriber identity-catchers, are
    able to mimic the qualities of a cellphone tower and, by this mechanism,
    record the SIM card identity, eavesdrop on calls, access text messages and capture location data. [...]

    https://global.techradar.com/en-za/news/multiple-us-agencies-have-purchased-this-mysterious-mobile-eavesdropping-device

    ------------------------------

    Date: Wed, 10 Jun 2020 14:41:00 PDT
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: Telecom security firm flags 'potentially huge' vulnerabilities in
    Internet infrastructure (Laurens Cerulus)

    Laurens Cerulus, Politico

    BRUSSELS -- A key protocol for Internet traffic is riddled with
    vulnerabilities that pose risks to telecom operators, including the
    potential to bring down websites and allow fraudsters to set up fake
    traffic, a telecom security firm said Wednesday.

    The protocol ``contains a number of vulnerabilities threatening both mobile operators and their clients. As a result, attackers can interfere with
    network equipment and leave an entire city without communications,
    impersonate users to access various resources, and use network services at
    the expense of the operator or subscribers,'' Positive Technologies said in
    a new report. <https://www.politico.eu/wp-content/uploads/2020/06/POLITICO-Positive-Technologies-report-Threat-vector-GTP-June-2020.pdf>

    The widespread GTP protocol is used across the board by telecom companies
    and Internet service providers to manage Internet traffic. It is also used
    in core parts of Internet networks, meaning the vulnerabilities are likely
    to persist in coming years as operators build new 5G infrastructure that
    still relies on 4G core networks.

    ``It's not like vulnerabilities in software. In the case of GTP, it is a
    kind of architectural deficiency. It's harder to eliminate,'' said Dmitry Kurbatov, chief technology officer at Positive Technologies. The firm
    performed security tests on dozens of networks in 2018-2019 and found
    ``every network tested was vulnerable'' to exploits through the protocol.

    The vulnerabilities can be used to target servers with denial-of-service attacks, allow hackers to set up so-called man-in-the-middle attacks that
    trick people into thinking they are visiting legitimate websites, and even allow operators to send fraudulent traffic to other operators, Kurbatov
    said.

    ------------------------------

    Date: Thu, 11 Jun 2020 09:57:09 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: FBI warns hackers are targeting mobile banking apps (The Hill)

    The FBI on Wednesday warned that malicious cyber actors were targeting
    mobile banking apps in an attempt to steal money as more Americans have
    moved to online banking during the coronavirus pandemic.

    In a public service announcement, the FBI noted it expects to see hackers exploit mobile banking platforms, which have seen a 50 percent surge in use since the beginning of the pandemic. <https://www.ic3.gov/media/2020/200610.aspx>

    ``With city, state, and local governments urging or mandating social distancing, Americans have become more willing to use mobile banking as an alternative to physically visiting branch locations. The FBI expects cyber actors to attempt to exploit new mobile banking customers using a variety of techniques, including app-based banking trojans and fake banking apps.''

    The FBI specifically pointed to threat of banking trojans, which involve a malicious virus hiding on a user's mobile device until a legitimate banking
    app is downloaded. Once the real app is on the device, the banking trojan
    then overlays the app, tricking the user into clicking on it and inputting their banking login credentials.

    Fake banking apps were also cited as a threat, with users in danger of
    being tricked into downloading malicious apps that also steal sensitive
    banking information.

    In order to combat these threats, the FBI recommended that Americans only download banking apps from official app stores or from banking websites and that banking app users enable two-factor authentication on their accounts
    and use strong passwords. [...] https://thehill.com/policy/cybersecurity/502148-fbi-warns-hackers-are-targeting-mobile-banking-apps

    ------------------------------

    Date: Thu, 11 Jun 2020 19:41:13 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: OpenAI's Text Generator Is Going Commercial (WiReD)

    The research institute was created to steer AI away from harmful uses. Now it's competing with tech giants to sell a cloud-computing service to businesses.

    Last spring, artificial intelligence research institute OpenAI said it had
    made software so good at generating text—including fake news articles --
    that it was too dangerous to release. That line in the sand was soon erased when two recent master's grads recreated the software and OpenAI released
    the original, saying awareness of the risks had grown and it hadn't seen evidence of misuse.

    Now the lab is back with a more powerful text generator and a new pitch: Pay
    us to put it to work in your business. Thursday, OpenAI launched a cloud service that a handful of companies are already using to improve search or provide feedback on answers to math problems. It's a test of a new way of programming AI and the lab's unusual business model.

    https://www.wired.com/story/openai-text-generator-going-commercial/

    ------------------------------

    Date: Thu, 11 Jun 2020 09:58:10 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Zoom disables accounts of former Tiananmen Square student leader

    *Chinese dissidents in US targeted after announcing plans for video call commemorating 1989 massacre*

    Zoom disabled the accounts of a group of Chinese dissidents in the US after they used its video conference service to commemorate the Tiananmen Square massacre.

    Zoom's role in shutting down the meeting, which was hosted and organised by activists in the US but included participants dialing in from China, will increase fears about the platform's security and how it will respond to government censorship requests.

    Zoom's video chat service has exploded in popularity since lockdowns were introduced across the globe to slow the spread of Covid-19. The company,
    which is listed on Nasdaq, has a large operation in China: almost a third
    of its workers are based in the country and much of its research and development takes place there. It also has servers in China.

    The annual Tiananmen Square commemoration was hosted on Zoom by a group of Chinese activists in the US, including Wang Dan, one of the most prominent leaders of the pro-democracy student movement that was crushed by the
    Chinese army in Beijing on June 4 1989.

    Mr Wang's team shared screenshots with the *Financial Times* of his Zoom
    call being canceled twice and two of his team's paid Zoom accounts being disabled. The cancellations started just as the meetings were due to begin
    on the morning of June 4 in Washington, where Mr Wang is based. He added
    that as of Thursday, the accounts remained disabled. [...]

    https://www.ft.com/content/f24bc9c6-ed95-4b31-a011-9e3fcd9cf006

    [Lauren Weinstein noted this:
    Zoom closes account of U.S.-based Chinese activist after Tiananmen event
    (Axios): Zoom is effectively an arm of the Chinese communist government.
    You should not be using it, there are many alternatives. -L https://www.axios.com/zoom-closes-chinese-user-account-tiananmen-square-f218fed1-69af-4bdd-aac4-7eaf67f34084.html
    PGN]

    ------------------------------

    Date: Wed, 10 Jun 2020 14:48:44 -0700
    From: Lauren Weinstein <lauren@vortex.com>
    Subject: Amazon bans police use of face recognition tech for one year (CNBC)

    https://www.cnbc.com/2020/06/10/amazon-bans-police-use-of-facial-recognition-technology-for-one-year.html

    ------------------------------

    Date: Thu, 11 Jun 2020 22:04:53 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Data from 15M phones shows some Americans are gathering at
    pre-pandemic levels (NBC News)

    Cellphone location data shows where people are leaving home and coming near other people.

    https://www.nbcnews.com/news/us-news/analysis-data-15m-phones-shows-some-americans-are-gathering-pre-n1229636

    ------------------------------

    Date: Fri, 12 Jun 2020 11:53:42 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: The hidden detectors looking for guns and knives (BBC)

    https://www.bbc.com/news/business-52734768

    Security screens are inconvenient; they slow consumer foot traffic to
    benefit public safety.

    Enter real-time AI to assess the shape and density of concealed objects in high-foot traffic areas (transportation terminals, entertainment venues,
    office doorways). Potted plants frequently conceal metal and temperature detectors. Some detectors apply passive (non-ionizing) radiation to resolve features.

    Add facial recognition to auto-profile using Clearview AI to resolve (erroneously or not, given unknown false{positive, negative}) a name,
    address, social media linkage, etc.

    Significant, possibly panoptic, auto-profile ingress/egress go/no-go
    processing can promote complacency among security personnel, and raise alarm fatigue risk. Reducing human security footprint (aka business operational expense) is apparently a key motive fueling the business.

    Surveillance-enabling technologies seek to displace Barney beagle and other manual inspection deterrents. Over-reliance on deployed technology, without demonstrable public safety benefits (as measured by false positive/negative outcome, etc. versus human inspection) may prove catastrophic.

    ------------------------------

    Date: Wed, 10 Jun 2020 14:55:24 -0700
    From: Lauren Weinstein <lauren@vortex.com>
    Subject: Trump Order Confronts Big Tech Bias (Whitehouse)

    <https://www.whitehouse.gov/presidential-actions/executive-order-preventing-online-censorship/>*

    President Trump finally issued an *Executive Order targeting viewpoint discrimination by Big Tech social media companies. The Order grows out of Trump's summit on this thorny issue last July. Topping the list of targets
    are Facebook, Twitter, Instagram, YouTube and Google, but there are many
    other possibilities.

    This form of discrimination is very much uncharted legal territory. The
    chosen central concept for Big Tech wrongdoing is censorship, as the EO is titled *Executive Order on Preventing Online Censorship*. This choice in
    itself is a strategic legal decision.

    The Order is basically a hunting license for federal agencies. There are
    two distinct parts. The first is basically laying out a number of legal arguments. If you are not familiar with the legal issues this may seem like empty rhetoric, but it is actually the opposite. The lawyers who wrote this order are preparing to stand before a judge.

    In fact the Order begins by focusing on the present law, which protects Big Tech from liability when they publish someone else's content. Here is the opening paragraph on that legal issue. Note that it is presented as a
    Federal policy. [...]

    https://papundits.wordpress.com/2020/06/11/trump-order-confronts-big-tech-bias/

    ------------------------------

    Date: Mon, 1 Jun 2020 11:11:11 -0800
    From: RISKS-request@csl.sri.com
    Subject: Abridged info on RISKS (comp.risks)

    The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
    comp.risks, the feed for which is donated by panix.com as of June 2011.
    SUBSCRIPTIONS: The mailman Web interface can be used directly to
    subscribe and unsubscribe:
    http://mls.csl.sri.com/mailman/listinfo/risks

    SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
    includes the string `notsp'. Otherwise your message may not be read.
    *** This attention-string has never changed, but might if spammers use it.
    SPAM challenge-responses will not be honored. Instead, use an alternative
    address from which you never send mail where the address becomes public!
    The complete INFO file (submissions, default disclaimers, archive sites,
    copyright policy, etc.) is online.
    <http://www.CSL.sri.com/risksinfo.html>
    *** Contributors are assumed to have read the full info file for guidelines!

    OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
    searchable html archive at newcastle:
    http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
    Also, ftp://ftp.sri.com/risks for the current volume
    or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
    If none of those work for you, the most recent issue is always at
    http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-31.00
    ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
    *** NOTE: If a cited URL fails, we do not try to update them. Try
    browsing on the keywords in the subject line or cited article leads.
    Apologies for what Office365 and SafeLinks may have done to URLs.
    Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

    ------------------------------

    End of RISKS-FORUM Digest 31.98
    ************************

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)