• Risks Digest 31.28 (2/2)

    From RISKS List Owner@21:1/5 to All on Fri Jun 7 19:08:11 2019
    [continued from previous message]

    Media Relations: (202) 418-0500 / ASL: (844) 432-2275 / TTY: (888)
    835-5322 / Twitter: @FCC / www.fcc.gov

    This is an unofficial announcement of Commission action. Release of the
    full text of a Commission order constitutes official action. See MCI v.
    FCC, 515 F.2d 385 (D.C. Cir. 1974).

    ------------------------------

    Date: Fri, 7 Jun 2019 00:15:44 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Privacy Fears Split German Government on Use of Alexa Data as
    Evidence (Fortune)

    Smart home devices such as Amazon's Echo and virtual assistants such as
    Alexa or Apple's Siri can provide a lot of information about a person --
    when they're at home, what they're interested in and potentially even what they're saying. So it's no surprise that criminal investigators are
    interested in their potential.

    In Germany, the issue is setting up a clash between the interior ministry -- the country's equivalent to the U.S. Department of Homeland Security -- and
    the justice ministry, which keeps an eye on the constitutionality of what
    other departments are up to.

    The federal interior ministry is preparing to back a proposal from the state
    of Schleswig-Holstein to make evidence from smart devices and virtual assistants admissible in court, the RND news organization reported
    Wednesday. The idea is to make the information available to investigators of serious crimes and terrorist threats.

    “Our view is that digital traces have become increasingly important. We are talking about traces that come from connected devices such as smart fridges
    but also voice-controlled devices such as smart speakers,” a spokesman for the interior ministry told the Financial Times.

    Unconstitutional?

    However, the justice ministry does not appear to be on board. Gerd Billen,
    the ministry's state secretary, said “law enforcement must be up-to-date,
    but there are limits set by the protection of the most personal spaces, and
    the freedom of accused people not to incriminate themselves. These limits
    must not be circumvented by any technology.”

    http://fortune.com/2019/06/06/germany-alexa-court-evidence/

    ------------------------------

    Date: Fri, 7 Jun 2019 00:12:18 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Apple's 'Find My' Feature Uses Some Very Clever Cryptography (WiReD)

    When Apple executive Craig Federighi described a new location-tracking
    feature for Apple devices at the company's Worldwide Developer Conference keynote on Monday, it sounded -- to the sufficiently paranoid, at least—like -- both a physical security innovation and a potential privacy disaster. But while security experts immediately wondered whether Find My would also offer
    a new opportunity to track unwitting users, Apple says it built the feature
    on a unique encryption system carefully designed to prevent exactly that
    sort of tracking -- even by Apple itself.

    In upcoming versions of iOS and macOS, the new Find My feature will
    broadcast Bluetooth signals from Apple devices even when they're offline, allowing nearby Apple devices to relay their location to the cloud. That
    should help you locate your stolen laptop even when it's sleeping in a
    thief's bag. And it turns out that Apple's elaborate encryption scheme is
    also designed not only to prevent interlopers from identifying or tracking
    an iDevice from its Bluetooth signal, but also to keep Apple itself from learning device locations, even as it allows you to pinpoint yours.

    https://www.wired.com/story/apple-find-my-cryptography-bluetooth/

    ------------------------------

    Date: Fri, 7 Jun 2019 00:14:08 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: 'Sign In With Apple' Protects You in Ways Google and Facebook Don't
    (WiReD)

    At Apple's Worldwide Developers Conference on Monday, the company debuted a slew of products and services, including a new Mac Pro that's part raw computing power, part cheese grater. But one new feature, mentioned in
    passing, could have an outsized impact on user security and privacy for
    years to come. Apple now has its own single-sign-on scheme -- and it's a
    major reimagining of how such a mechanism can work.

    You've seen single-sign-on before, even if you don't use it. It's the technology that lets you use your Google or Facebook login to access other third-party services, instead of needing to set a unique username and
    password for each one. They centralize a group of accounts around a more
    secure login that you're more likely to actively monitor and maintain,
    rather than a one-off account that you set with a weak password, save a
    credit card into, and then never think about again.

    Sign In with Apple looks similar enough to those alternatives at a glance, giving the option to use your Apple ID as a unified login wherever
    developers integrate it. But as part of its broader, years-long privacy
    push, Apple has added some extra protections that distinguish its version.

    https://www.wired.com/story/sign-in-with-apple-sso-google-facebook/

    ------------------------------

    Date: Tue, 4 Jun 2019 16:56:17 PDT
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: NSA warns Microsoft Windows users to update systems to protect
    against cyber-vulnerability (The Hill)

    https://thehill.com/policy/cybersecurity/446963-nsa-warns-microsoft-windows-users-to-update-systems-to-protect-against

    ------------------------------

    Date: Tue, 4 Jun 2019 17:35:42 -0700
    From: Rob Slade <rmslade@shaw.ca>
    Subject: US visas now need five years of your social media ...

    Well, I don't think it's any secret that I am of the opinion that social
    media isn't exactly important. https://community.isc2.org/t5/Welcome/The-quot-Community-quot/m-p/10594

    Which makes the US decision to require "five years" of social media account information when applying for a visa all the more bizarre. https://nakedsecurity.sophos.com/2019/06/04/us-visa-applicants-required-to-hand-over-social-media-info/

    First: sorry, "five years"? What five years? Five years of postings?
    (Given it's an online form, that's unlikely.) Accounts I've started in the past five years? (Does that mean my Twitter account is exempt because it's older than that?) Accounts I've used in the past five years? (Does that
    mean that my Facebook account, which I haven't posted to in the past five years, is exempt?) Or do you want the Facebook account because I've had to
    use it occasionally because people who posted what they thought was a public message couldn't figure out Facebook's byzantine aggregation of rights and permissions?

    What's considered social media? The Facebook I don't use? The Twitter I
    do? The extra Twitter account that I only use for posting notices for our local chapter? The extra, extra Twitter account that I use (professionally) for noting and researching spam, malware, and other unsavoury Twitter
    accounts? The Whatsapp account that I created in order to test Whatsapp,
    and now use, infrequently, to send update notices to Gloria because that
    phone account has limited text messages?

    Should I include the Instagram that's in my name, but which Gloria uses
    because she likes to keep up with the kids, but she didn't want to create
    her own account, and I only look at when she tells me about something worthwhile?

    How about the Flickr account which I created more than five years ago, and
    last posted anything on more than five years ago, but which I send
    publishers to when they demand a photo to put next to something they are
    going to publish?

    Or should I create a number of new, sanitized social media accounts for applying for visas when I go the the States? (Don't tell me that all kinds
    of people aren't going to be doing this ...) OK, so far they aren't
    demanding passwords, so it's only public postings that they can look at,
    but, after all, this is supposed to be "social" media ...

    Do I get to tell whoever is processing my visa application that anything referring to "Friday" is not to be taken seriously? (Come to think of it,
    that wouldn't do any good anyway, since anyone in a civil service job is
    bound to have had their sense of humour surgically removed, and wouldn't get any of the infosec jokes anyway ...)

    Is the ISC2 "community" a social media site?

    Are the Amish forbidden from applying for visas?

    Is this the thin edge of the wedge for "Total Information Awareness" again?

    Do you really think terrorists are going to post their plans on the same
    social media accounts that they are going to give the government? (Yeah,
    yeah, but the really dumb ones can be caught in other ways, like adding a question to the form that says, "Are you planning on carrying out any
    terrorist attacks while in the United States?") Do you think that DHS has people or AI skilled enough to identify fake accounts given on the forms and use forensic linguistics to link those to actual accounts really used by the applicant? (Honestly? You think that's likely?)

    Oh, and everything I've said here is private, right?

    ------------------------------

    Date: Wed, 5 Jun 2019 00:37:20 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: What He Learned Trying To Secure Congressional Campaigns
    (Idle Words)

    Author writes:

    You know how it happens. You try to secure one Congressional campaign, and
    then another, and pretty soon you can't stop. You'll fly across the country just to brief a Green Party candidate in a district the Republicans carried
    by 60 points. You want more, more, always looking for that next fix.

    This is the situation I found myself in from late 2017 to 2018, when I was
    part of an effort that delivered a basic, hour-long campaign security
    training to 41 Democratic Congressional campaigns. It was exciting! I
    traveled the country like Johnny Yubikey, distributing little blue security tokens from a sack. The campaigns ranged from beyond-long-shot candidates running from their den, all the way up to some nationally prominent
    figures. I took a selfie with Bernie! I wrote an opinion piece in the Washington Post!

    https://idlewords.com/2019/05/what_i_learned_trying_to_secure_congressional_campaigns.htm

    ------------------------------

    Date: Mon, 3 Jun 2019 16:07:18 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Trump urges customers to drop AT&T to punish CNN over its coverage
    of him (WashPost)

    Trump urges customers to drop AT&T to punish CNN over its coverage of him

    The president has been vocal in his opposition to a AT&T-Time Warner merger, which critics contend is motivated by his ire toward CNN.

    https://www.washingtonpost.com/business/2019/06/03/trump-urges-customers-drop-att-punish-cnn-over-its-coverage-him/

    ------------------------------

    Date: Wed, 5 Jun 2019 17:53:17 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: How Limbic Capitalism Preys on Our Addicted Brains (Quillette)

    https://quillette.com/2019/05/31/how-limbic-capitalism-preys-on-our-addicted-brains/

    Limbic capitalism, a neologism, "refers to a technologically advanced but socially regressive business system in which global industries, often with
    the help of complicit governments and criminal organizations, encourage excessive consumption and addiction. They do so by targeting the limbic
    system, the part of the brain responsible for feeling and for quick
    reaction, as distinct from dispassionate thinking."

    Limbic capitalism monetizes and exploits the brain's reservoir of dopamine
    to build dependence. Mobile apps prey upon unsuspecting or vulnerable populations by over-stimulating dopamine dependency.

    I wonder if governments will eventually begin to rank and regulate mobile
    apps dopamine delivery on minute-by-minute basis, or per app event, and use this information to build another MSA? A mobile app "rationing" system (or
    tax) might materialize to forcibly curtail dopamine addiction.

    A cold-turkey solution might be most effective to cut addition. With
    antitrust drums beating louder in Congress, the call to regulate screen time might be on the horizon.

    https://www.washingtonpost.com/news/powerpost/paloma/the-technology-202/2019/06/04/the-technology-202-apple-may-not-be-able-to-escape-political-peril-in-washington-anymore

    https://www.washingtonpost.com/news/powerpost/paloma/the-technology-202/2019/06/03/the-technology-202-silicon-valley-braces-for-potential-antitrust-battle-with-washington/

    Risk: Regulatory capture by dopamine addicted politicians dilutes
    legislative efforts to reign in limbic capitalism.

    ------------------------------

    Date: Thu, 6 Jun 2019 23:33:01 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: This ID Scanner Company is Collecting Sensitive Data on Millions of
    Bar-goers (Medium)

    https://onezero.medium.com/id-at-the-door-meet-the-security-company-building-an-international-database-of-banned-bar-patrons-7c6d4b236fc3

    ------------------------------

    Date: Wed, 5 Jun 2019 12:17:17 -0700
    From: "Peter G. Neumann" <peter.neumann@sri.com>
    Subject: VR Systems remotely accessed Durham county computer before 2016
    election (Kim Zetter)

    https://twitter.com/KimZetter/status/1136329187340374017

    ------------------------------

    Date: Thu, 6 Jun 2019 16:00:37 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Election Rules Are an Obstacle to Cybersecurity of Presidential
    Campaigns (NYTimes)

    One year out from the 2020 elections, presidential candidates face legal roadblocks to acquiring the tools and assistance necessary to defend against the cyberattacks and disinformation campaigns that plagued the 2016 presidential campaign.

    Federal laws prohibit corporations from offering free or discounted cybersecurity services to federal candidates. The same law also blocks political parties from offering candidates cybersecurity assistance because
    it is considered an “in-kind donation.”

    The issue took on added urgency this week after lawyers for the Federal Election Commission advised the commission to block a request by a Silicon Valley company, Area 1 Security, which sought to provide services to 2020 presidential candidates at a discount. The commission is expected to decide
    on Area 1's request at a public meeting on Thursday.

    Cybersecurity and election experts say time is running out for campaigns to develop tough protections.

    https://www.nytimes.com/2019/06/06/technology/ftc-rules-cyberattacks.html

    What He Learned Trying To Secure Congressional Campaigns (Idle Words)

    https://idlewords.com/2019/05/what_i_learned_trying_to_secure_congressional_campaigns.htm

    ------------------------------

    Date: Mon, 3 Jun 2019 11:33:05 PDT
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: More on Mueller and Interference (Time)

    http://time.com/5597514/robert-mueller-statement/

    "I will close by reiterating the central allegation of our indictments --
    that there were multiple, systematic efforts to interfere in our election.

    2. Intrusions Targeting the Administration of U.S. Elections

    In addition to targeting individuals involved in the Clinton Campaign, GRU
    officers also targeted individuals and entities involved in the
    administration of the elections. Victims included U.S. state and local
    entities, such as state boards of elections (SBOEs), secretaries of state,
    and county governments, as well as individuals who worked for those
    entities. The GRU also targeted private technology firms responsible for
    manufacturing and administering election-related software and hardware,
    such as voter registration software and electronic polling stations.

    ------------------------------

    Date: Wed, 5 Jun 2019 12:10:41 -0700
    From: Rob Slade <rmslade@shaw.ca>
    Subject: Phishing calls

    I was awakened by a phone call this morning. Obviously recorded, probably computer generated.

    Telling me that there were spurious charges on my Visa card.

    Right off there were indications that this was a fraud. First off, it
    didn't identify the issuing bank, and identified the card by saying the
    number started with 45. (*All* Visa cards start with 45 ...) Also, while
    the message was recorded or generated, there was no change in tone when the message got to identifying the charges. Recorded calls using something out
    of a database usually have a slight change in tone at that point. (I
    figured it was a bit of a gamble telling me that I had a charge from Amazon
    for $300 and one from Google Play for $1,000, since I might deal with those entities, but I suppose the risk is small.)

    I was supposed to stay on the line for a security agent, but I didn't feel
    like playing games with them. I assume someone would have been trying to
    get info that they could then use to actually perpetrate a fraud on my card.

    A bit later I went to the bank. They obviously knew about the calls and the
    script. (And confirmed that there were no charges or flags on our card.)

    ------------------------------

    Date: Sat, 1 Jun 2019 17:04:51 -0700
    From: Lauren Weinstein <lauren@vortex.com>
    Subject: Boeing Built Deadly Assumptions Into 737 Max, Blind to a Late
    Design Change (NYTimes)

    https://www.nytimes.com/2019/06/01/business/boeing-737-max-crash.html

    ------------------------------

    Date: Sat, 1 Jun 2019 10:36:03 +0200
    From: Peter Bernard Ladkin <ladkin@causalis.com>
    Subject: Re: 737 MAX AoA Indications (Karish, RISKS-31.27)

    Chuck Karish opines in RISKS-31.27 that Boeing's statement, that angle-of-attack (AoA) indicator and the "AOA Disagree" alert are not
    necessary for the safe operation of the Boeing 737 MAX, "misrepresents the situation". Karish opines "the AOA Disagree alert is a vital indication to
    the pilots that MCAS is malfunctioning and that corrective action is
    needed."

    One can ask the operators themselves, the pilots. When the Boeing statement
    was released, I asked some senior pilots for major airlines, with whom I
    have been corresponding for some decades, what they thought. There are two components to the Boeing statement, which it is useful to separate:

    1). AoA indication is not necessary for the safe operation of the Boeing 737 MAX.

    2). The "AOA Disagree" alert on the Primary Flight Display (PFD) is not necessary for the safe operation of the Boeing 737 MAX.

    Concerning 1), the pilots who responded generally agree that AoA indication
    is not necessary, and does not help much if at all, when flying commercial transport aircraft.

    JT 610 and ET-302 are not the first accidents concerning which the question
    of AoA indication in commercial transports has arisen. In their final report
    on the 2009 accident to AF 447, an Air France A330 lost over the South
    Atlantic during a flight from Brazil to France, the BEA recommended "that
    EASA and the FAA evaluate the relevance of requiring the presence of an
    angle of attack indicator directly accessible to pilots on board aeroplanes". (See Section 4.2.2 of the Final Report at https://www.bea.aero/docspa/2009/f-cp090601.en/pdf/f-cp090601.en.pdf)

    AoA indication on commercial transports has been debated for far longer than this. For example, there was an article about it nearly twenty years ago in Boeing Aero magazine #12, March 2000: http://www.boeing.com/commercial/aeromagazine/aero_12/attack.html

    Given the decades of such engineering and operational debate about it
    amongst all stakeholders, it would have surprised me had Boeing said
    something misleading about 1).

    Concerning 2), a senior pilot, qualified on the Boeing 737 (all varieties)
    and undergoing the required recurrent training, pointed out that having an
    "AoA disagree" indication does not change flight crew response to the aerodynamic situation at all. The Boeing 737 MAX checklist for an "AoA disagree" indication warns that AS and altitude information might disagree
    or be unreliable. That's it (I am told). That information is already present
    on the PFDs, in rather more prominent form than the "AoA disagree"
    alert. And the stick shaker might also activate, as it did during the
    accidents to JT-610 and ET-302. The stick shaker is a very tactile warning
    of being in an approach-to-stall regime and that crew should pay immediate attention to AS. He concluded that an "AoA disagree" alert indeed counts as supplementary information, and not as necessary information. That directly contradicts Karish's opinion that it is "vital".

    Boeing's statement seems completely consistent with their, and other
    experts', long-standing engineering and operational judgment about AoA indications and alerting on commercial transport aircraft. One may disagree with those engineering and operational judgments. But the trope of
    "regulatory capture", suggested by Karish, doesn't enter into it at all.

    ------------------------------

    Date: Sat, 1 Jun 2019 03:38:32 -0700
    From: Chuck Karish <chuck.karish@gmail.com>
    Subject: Re: 737 MAX AoA Indications (Karish, RISKS-31.28)

    In his response to my post in RISKS.31-27, Prof. Ladkin does not address the clause that gives that post its meaning: "Once the MCAS takes control of the airplane away from the pilots". Boeing built the MCAS because they
    anticipated that pilots would not be able to safely operate the 737 MAX airplane manually in certain flight conditions. While an experienced pilot might not need a working AOA indicator to fly the airplane, the MCAS does
    need it. Installation of the MCAS made the AOA indicators safety critical.

    ------------------------------

    Date: Sat, 1 Jun 2019 18:20:06 +0200
    From: Peter Bernard Ladkin <ladkin@causalis.com>
    Subject: Re: 737 MAX AoA Indications (Karish, RISKS-31.28)

    That assertion is incorrect. Both crews were theoretically able to control their aircraft until comparatively late in the development of each
    upset. Indeed, this is illustrated by the flight of PK-LQP immediately preceding JT 610, where the selfsame phenomenon manifested and the crew completed the flight safely.

    I add the caveat "until comparatively late" because there is some question whether, during the development of the upset situation in both flights, the aircraft entered a regime in which they could not be manually retrimmed
    because of aerodynamic forces inhibiting pilot movement of the trim
    wheel. That is not a fault in itself - such regimes are "a fact of [aerodynamic] life", according to a distinguished aerodynamicist
    colleague. However, there is continued discussion as to how and why the
    crews could have got into that regime, if indeed they did.

    These accidents were not deterministic. It is not as if, when MCAS cut in because of the sensor malfunction, the crew became powerless and the flights were doomed. There has been extensive discussion in pilot forums as to what went on, why it went on, and how and why the respective crews might have reacted differently. And presumably there is considerable discussion of this matter within the accident investigations themselves.

    Boeing built the MCAS because they anticipated that pilots would not be
    able to safely operate the 737 MAX airplane manually in certain flight conditions.

    That is not so. See https://abnormaldistribution.org/index.php/2019/04/30/ieee-spectrum-on-possible-software-involvement-in-two-recent-airliner-crashes/
    for the reason I was given as to why the MCAS function was added to the STS.

    While an experienced pilot might not need a working AOA indicator to fly
    the airplane, the MCAS does need it.

    The MCAS function needs a working AoA sensor.

    Installation of the MCAS made the AOA
    indicators safety critical.

    No, not cockpit indications such as AoA display or "AOA Disagree" alert.

    The correct operation of the AoA sensor itself is "safety-critical" in
    informal terms. Formally, the AoA sensor is, on the Boeing 737 MAX, a non-redundant causal component of a subsystem with a malfunction severity of "hazardous". (Whether the classification as "hazardous" was/is appropriate
    is another question arising from the accidents.)

    ------------------------------

    Date: Sat, 1 Jun 2019 14:08:06 -0700
    From: Chuck Karish <chuck.karish@gmail.com>
    Subject: Re: 737 MAX: Boeing dodges responsibility, with help from the FAA
    (Ladkin, RISKS-31.28)

    In my submission to RISKS-31.27 I was a bit too critical of Boeing's May 5 press release. The MCAS doesn't depend on the "angle of attack indicator"
    for safety, it depends directly on the angle of attack sensor. In the
    context of the then-current uproar the press release was misdirection
    rather than mischaracterization.

    ------------------------------

    Date: Sun, 2 Jun 2019 12:25:09 -0600
    From: jared gottlieb <jared@netspace.net.au>
    Subject: Re: GM Gives All Its Vehicles a New Soul (RISKS-31.27)

    Are over-the-air (OTA) updates new functionality? Link to Consumer's Reports article from April 2018 is https://www.consumerreports.org/automotive-technology/automakers-embrace-over-the-air-updates-can-we-trust-digital-car-repair/
    with a brief mention of security. Link to GM Canada, at least a year old, is https://www.onstar.com/ca/en/software_terms/ is informative.

    One question reading the T&C is whether the vehicle pulls the updates or the more risky push from a central server. Doesn't negate the risk of buggy new software (as compared to buggy old software) nor the annoyance of unwanted features updates.

    ------------------------------

    Date: Mon, 14 Jan 2019 11:11:11 -0800
    From: RISKS-request@csl.sri.com
    Subject: Abridged info on RISKS (comp.risks)

    The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
    comp.risks, the feed for which is donated by panix.com as of June 2011.
    SUBSCRIPTIONS: The mailman Web interface can be used directly to
    subscribe and unsubscribe:
    http://mls.csl.sri.com/mailman/listinfo/risks

    SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
    includes the string `notsp'. Otherwise your message may not be read.
    *** This attention-string has never changed, but might if spammers use it.
    SPAM challenge-responses will not be honored. Instead, use an alternative
    address from which you never send mail where the address becomes public!
    The complete INFO file (submissions, default disclaimers, archive sites,
    copyright policy, etc.) is online.
    <http://www.CSL.sri.com/risksinfo.html>
    *** Contributors are assumed to have read the full info file for guidelines!

    OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
    searchable html archive at newcastle:
    http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
    Also, ftp://ftp.sri.com/risks for the current volume
    or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
    If none of those work for you, the most recent issue is always at
    http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-31.00
    Lindsay has also added to the Newcastle catless site a palmtop version
    of the most recent RISKS issue and a WAP version that works for many but
    not all telephones: http://catless.ncl.ac.uk/w/r
    ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
    *** NOTE: If a cited URL fails, we do not try to update them. Try
    browsing on the keywords in the subject line or cited article leads.
    Apologies for what Office365 and SafeLinks may have done to URLs.
    Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

    ------------------------------

    End of RISKS-FORUM Digest 31.28
    ************************

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)