• Risks Digest 31.49

    From RISKS List Owner@21:1/5 to All on Wed Nov 27 22:11:55 2019
    RISKS-LIST: Risks-Forum Digest Wednesday 25 November 2019 Volume 31 : Issue 49

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/31.49>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    Train door safety interlock based on hanger not actual door position (BBC) Aircraft warning lights system open online (Security Affairs)
    Tainted Data Can Teach Algorithms the Wrong Lessons (WiReD
    Finds GPS tracker on his car, removes it, charged with theft (Ars Technica) DMVs profit by selling PII (Vice/Motherboard)
    Cheap kids smartwatch exposes the location of 5,000+ children
    (Catalin Cimpanu)
    More on AI-generated deepfakes (NYTimes)
    Hidden Cam Above Bluetooth Pump Skimmer (Krebs on Security)
    Tim Berners-Lee's plan includes framework to protect privacy,
    personal data (MarketWatch)
    Independent security researcher discovers information trove (Bloomberg) Investigation finds BC firm delivered micro-targeted political ads
    without ensuring consent (Kelly Bert Manning)
    A cautionary tale about IT out sourcing -- Landlord finds millions
    of confidential files left by defunct IT firm
    This girl hacked 11,000 dogs and cats smart feeders
    (Information Security Newspaper)
    Re: How dumb design wwii plane led macintosh (Amos Shapir)
    Re: A hypothesis on the immediate future of audio scams (Amos Shapir)
    Re: There's more to the Internet than the DNS, or Internet world despairs
    ... (John Levine)
    Re: What happens if your mind lives for ever on the Internet? (Martin Ward)
    Re: Officials Warn of "Juice Jacking" Scams at USB Charging Stations
    (Andrew Duane)
    Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Wed, 27 Nov 2019 16:37:41 -0000
    From: "paul cornish" <paul.a.cornish@googlemail.com>
    Subject: Train door safety interlock based on hanger not actual door position
    (BBC)

    From the BBC web site https://www.bbc.co.uk/news/uk-england-essex-50573800

    The actuator moved, the door hanger moved, the micro switch (on the door hanger) said the door was closed. But the bolts holding the door onto the hanger had gone so the door stayed open. 23 minutes at 83 mph before a passenger told the driver

    ------------------------------

    Date: Wed, 27 Nov 2019 07:03:39 +0000
    From: J Coe <spendday@gmail.com>
    Subject: Aircraft warning lights system open online (Security Affairs)

    Independent researcher Amitay Dan <https://twitter.com/popshark1> discovered that control panels for aircraft warning lights were exposed to the
    Internet, potentially allowing attackers to control them.

    https://securityaffairs.co/wordpress/94414/hacking/aircraft-warning-lights-hack.html

    ------------------------------

    Date: Wed, 27 Nov 2019 9:47:01 PST
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: Tainted Data Can Teach Algorithms the Wrong Lessons (WiReD

    This is joint work of Wenchao Li at Boston University and Susmit Jha at
    SRI and others, on inserting Trojans/backdoors to reinforcement learning
    policy. Their paper was recently covered by Wired:
    https://www.wired.com/story/tainted-data-teach-algorithms-wrong-lessons/
    and picked up by other outlets such as boingboing:
    https://boingboing.net/2019/11/25/backdooring-ai.html

    ------------------------------

    Date: Mon, 25 Nov 2019 18:46:19 -0500 (EST)
    From: danny burstein <dannyb@panix.com>
    Subject: Finds GPS tracker on his car, removes it, charged with theft
    (Ars Technica)

    Turns out it was the local constabulary who placed it on his car. Oh, they
    had a warrant.

    He found it, took it off, brought it into his house. It stopped working (unclear from the stories just why, i.e. did he smash it, remove battery,
    hit the "off" button, etc...)

    The cops got another warrant to search his home claiming they believed he
    had stolen (!!) the tracker and hid it in his house. So they entered and
    saw drug paraphernalia.

    Hillarity is ongoing

    https://arstechnica.com/tech-policy/2019/11/man-charged-with-theft-for-removing-police-gps-tracker-from-his-car/

    ------------------------------

    Date: Mon, 25 Nov 2019 13:30:26 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: DMVs profit by selling PII (Vice/Motherboard)

    *A document obtained by Motherboard shows how DMVs sell people's names, addresses, and other personal information to generate revenue*

    The California Department of Motor Vehicles is generating revenue of $50,000,000 a year through selling drivers' personal information, to a DMV document obtained by Motherboard.

    DMVs across the country are selling data that drivers are required to
    provide to the organization in order to obtain a license. This information includes names, physical addresses, and car registration information. California's sales come from a state which generally scrutinizes
    privacy to a higher degree <https://techcrunch.com/2019/10/12/californias-privacy-act-what-you-need-to-know-now/> than the rest of the country.

    In a public record acts request, Motherboard asked the California DMV for
    the total dollar amounts paid by commercial requesters of data for the past
    six years. The responsive document shows the total revenue in financial year 2013/14 as $41,562,735, before steadily climbing to $52,048,236 in the financial year 2017/18.

    The document doesn't name the commercial requesters, but some specific companies appeared frequently in Motherboard's earlier investigation <https://www.vice.com/en_us/article/43kxzq/dmvs-selling-data-private-investigators-making-millions-of-dollars>
    that looked at DMVs across the country. They included data broker LexisNexis and consumer credit reporting agency Experian. Motherboard also found DMVs
    sold information to private investigators, including those who are hired to find out if a spouse is cheating. It is unclear if the California DMV has recently sold data to these sorts of entities...

    https://www.vice.com/en_us/article/evjekz/the-california-dmv-is-making-dollar50m-a-year-selling-drivers-personal-information

    ------------------------------

    Date: Mon, 25 Nov 2019 11:57:17 -0800
    From: Gene Wirchenko <gene@shaw.ca>
    Subject: Cheap kids smartwatch exposes the location of 5,000+ children
    (Catalin Cimpanu)

    Catalin Cimpanu for Zero Day | 25 Nov 2019
    Insecure web backend and mobile app let attackers access any kids' details
    and parent account. https://www.zdnet.com/article/cheap-kids-smartwatch-exposes-the-location-of-5000-children/

    A cheap $35 kids' smartwatch made in China was caught exposing the personal details and location information for more than 5,000 children and their parents.

    The concept is not new, as there are plenty of similar products on the
    market, varying in prices from $30 to $200-$300. However, Morgenstern
    suggests that SMA created one of the most insecure products on the market.

    For starters, Morgenstern says anyone can query the smartwatch's backend via
    a publicly accessible web API. This is the same backend where the mobile app also connects to retrieve the data it shows on parents' phones.

    Morgenstern says there's an authentication token in place that's supposedly there to prevent unauthorized access, but attackers can supply any token
    they like, as the server never verifies its validity.

    Morgenstern says that using this technique, his team was able to identify
    more than 5,000 M2 smartwatch wearers and more than 10,000 parent accounts.

    [And it gets worse.]

    ------------------------------

    Date: Sun, 24 Nov 2019 22:08:02 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: More on AI-generated deepfakes (NYTimes)

    Researchers are creating tools to find AI-generated fake videos before
    they become impossible to detect. Some experts fear it is a losing battle.

    https://www.nytimes.com/2019/11/24/technology/tech-companies-deepfakes.html

    ------------------------------

    Date: Mon, 25 Nov 2019 13:13:05 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: Hidden Cam Above Bluetooth Pump Skimmer (Krebs on Security)

    Tiny hidden spy cameras are a common sight at ATMs that have been tampered
    with by crooks who specialize in retrofitting the machines with card
    skimmers. But until this past week I'd never heard of hidden cameras being
    used at gas pumps in tandem with Bluetooth-based card skimming devices.

    Apparently, I'm not alone.

    ``I believe this is the first time I've seen a camera on a gas pump with a Bluetooth card skimmer,'' said *Detective Matt Jogodka *of the Las Vegas
    Police Department, referring to the compromised fuel pump pictured below...

    https://krebsonsecurity.com/2019/11/hidden-cam-above-bluetooth-pump-skimmer/

    ------------------------------

    Date: Mon, 25 Nov 2019 13:14:05 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: Tim Berners-Lee's plan includes framework to protect privacy,
    personal data (MarketWatch)

    World Wide Web inventor Tim Berners-Lee released an ambitious rule book for online governance -- a bill of rights and obligations for the Internet -- designed to counteract the growing prevalence of such anti-democratic
    poisons as misinformation, mass surveillance and censorship.

    The product of a year's work by the World Wide Web Foundation where
    Berners-Lee is a founding director, the *Contract for the Web* <https://contractfortheweb.org/>seeks commitments from governments and
    industry to make and keep knowledge freely available -- a digital policy
    agenda true to the design vision of the 30-year-old web.

    The contract is non-binding, however. And funders and partners in the
    endeavor include Alphabet's Google and Facebook, whose data-collecting business models and sensation-rewarding algorithms have been blamed for exacerbating online toxicity.

    ``We haven't had a fairly complex, fairly complete plan of action for the
    web going forward,'' Berners-Lee said in an interview. ``This is the first time we've had a rule book in which responsibility is being shared.''

    https://www.marketwatch.com/story/web-inventor-unveils-ambitious-rule-book-for-internet-responsibility-2019-11-24

    ------------------------------

    Date: Mon, 25 Nov 2019 13:35:28 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: Independent security researcher discovers information trove
    (Bloomberg)

    Server shut down after FBI contacted about unsecured data

    A database aggregating 1.2 billion users' personal information, including social media accounts, email addresses and phone numbers, was discovered unprotected on a server last month. So far, it's not clear how it g ot
    there.

    Most of the data was collected by a company called People Data Labs, said
    Vinny Troia, chief executive officer of Night Lion Security, which is based
    in St. Louis. People Data Labs provides work emails and social media account details for what the company claims is a billion and a half people. That
    data is scraped from various sources and sold as a way to contact ``70%+ decision makers in the US, UK and Canada,'' according to the company's
    website.

    The unprotected data didn't reside on a People Data Labs'
    server, but was on a Google Cloud server, Troia said. Google didn't
    respond to a request for comment about who was renting the server.

    Sean Thorne, People Data Labs' co-founder and chief executive officer, said some, but not all, of the data came from his company and suspects it was
    being aggregated by another firm merging various data points...

    https://www.newsmax.com/finance/streettalk/billion-data-unprotected-google/2019/11/22/id/942975/

    https://www.bloomberg.com/news/articles/2019-11-22/a-billion-people-s-data-left-unprotected-on-google-cloud-server

    ------------------------------

    Date: Tue, 26 Nov 2019 22:51:43 -0500 (EST)
    From: Kelly Bert Manning <bo774@freenet.carleton.ca>
    Subject: Investigation finds BC firm delivered micro-targeted political ads
    without ensuring consent

    A joint investigation by the Canadian Federal Privacy Commission and BC
    Office of the Information and Privacy Commissioner has issued a Press
    Release regarding their investigation of Cambridge Analytica associate Aggregate IQ.

    "Joint investigation finds failings in political consultancy's consent practices for uses and disclosures of personal information and in its
    security safeguard practices.

    VANCOUVER, British Columbia, November 26, 2019"

    https://priv.gc.ca/en/opc-news/news-and-announcements/2019/nr-c_191126/ https://www.oipc.bc.ca/news-releases/2364

    ------------------------------

    Date: Tue, 26 Nov 2019 22:57:09 -0500 (EST)
    From: Kelly Bert Manning <bo774@freenet.carleton.ca>
    Subject: A cautionary tale about IT out sourcing -- Landlord finds millions
    of confidential files left by defunct IT firm

    "When one of Gregg Patterson's commercial tenants packed up and moved out in the middle of the night, leaving behind hard drives, computer servers and bankers boxes full of documents, he could have just dumped it all at the
    curb."

    https://www.cbc.ca/news/canada/ottawa/fly-by-night-it-company-leaves-10-million-digital-files-cautionary-tale-1.5365619

    ------------------------------

    Date: Wed, 27 Nov 2019 11:42:06 -0700
    From: Jim Reisert AD1C <jjreisert@alum.mit.edu>
    Subject: This girl hacked 11,000 dogs and cats smart feeders
    (Information Security Newspaper)

    https://www.securitynewspaper.com/2019/10/25/this-girl-hacked-11000-dogs-and-cats-smart-feeders-would-she-dare-to-harm-your-pets/

    25 Oct 2019

    Cybersecurity incidents can affect many aspects of our lives, including
    issues related to our pets. A few months ago, Xiaomi, in collaboration
    with the company Furrytail, launched a crowd funding project consisting of
    an Internet-connected pet feeder controlled through an app, which was sold
    on Youpin, Xiaomi's official store.

    Anna Prosvetova, a well-known Russian hacker, claims to have hacked
    thousands of Furrytail Pet Smart Feeder devices, accessing any data
    related to its use. The hacker states that it is even possible to
    manipulate the operation of the device remotely.

    According to cybersecurity experts, this device is basically an
    Internet-connected food depot capable of feeding pets when their master is
    away from home, setting schedules to deliver a previously determined food
    load. The project had a more than acceptable response in the fundraising
    process, so it was launched almost immediately and released earlier this
    year.

    ------------------------------

    Date: Tue, 26 Nov 2019 18:20:16 +0200
    From: Amos Shapir <amos083@gmail.com>
    Subject: Re: How dumb design wwii plane led macintosh (RISKS-31.48)

    The application described would create a very stable cruise, no user might wander off the beaten path or stumble -- which would make it the most boring travel experience ever...

    The most exciting experiences often occur when we stumble upon something unexpected; such an application would essentially eliminate such moments!

    ------------------------------

    Date: Tue, 26 Nov 2019 18:25:35 +0200
    From: Amos Shapir <amos083@gmail.com>
    Subject: Re: A hypothesis on the immediate future of audio scams (RISKS-31.48)

    This scam is nothing new; in fact, it's as old as recording devices.

    For example this movie: https://letterboxd.com/film/the-great-telephone-robbery/ was made in 1972 following a real event in which criminals used low-tech means to connect to
    a bank's phone line and impersonate the manager.

    ------------------------------

    Date: 26 Nov 2019 17:40:08 -0500
    From: "John Levine" <johnl@iecc.com>
    Subject: Re: There's more to the Internet than the DNS, or Internet world
    despairs

    https://www.theregister.co.uk/2019/11/20/org_registry_sale_shambles/?page=1

    This is a classic Register article. Many of the purported facts are correct but the conspiracy theory they hint at is not. The arguments are entirely about the purported effects of implausibly large price increases on .org registrants, most of whom are in North America and other developed
    countries. It has a bunch of questions at the end for Ethos, the buyer, and says "We will update this story if and when they respond." Ethos did, at https://www.keypointsabout.org/ and at http://www.circleid.com/posts/20191125_showing_our_ethos_with_org/ The
    Register hasn't updated the story, but that's classic, too.

    Moreover, there are on the order of 4 billion Internet users, of whom
    perhaps 0.1% are .org domain registrants. Most of that other 99.9% does not live in developed countries. The point of selling the registry is to have a more stable income to support the Internet Society's programs that benefit
    that 99.9% as well as the 0.1%. The risk here is to assume that the
    technical concerns of your friends and people who look like you are the ones that matter.

    Claimer: I'm a member of the ISOC board, we reviewed the various proposals
    to buy PIR in detail, and we voted unanimously for the one we accepted.

    ------------------------------

    Date: Wed, 27 Nov 2019 10:18:17 +0000
    From: Martin Ward <martin@gkc.org.uk>
    Subject: Re: What happens if your mind lives for ever on the Internet?

    In the 1940's, Turing wrote about his famous Test, and predicted that within
    20 years we would have machines as intelligent as humans.

    In the 1960's, when AI research was just beginning, researchers predicted
    that within the next 20 years we would have machines as intelligent as
    humans. I remember reading some of these predictions in the 1970's and wondering...

    In the 1980's, I read Douglas Hofstadter's brilliant book "Godel, Escher,
    Bach" in which he predicted that within the next 20 years we would have machines as intelligent as humans. At that point, I made my own prediction: "In 20 years time people will *still* be predicting that in 20 years time we would have machines as intelligent as humans!"

    In 1999 Ray Kurzweil published "The Age of Spiritual Machines" and Hans
    Moravec published "Robot", which proposed that perhaps even as early as 2020
    to 2030 we will create silicon evolutionary spaces that will develop higher-level intelligence.

    Bill Gates said "Twenty years from now, predicts Ray Kurzweil, $1,000
    computers will match the power of the human brain."

    It seems that *my* prediction was fulfilled! :-)

    Some tentative conclusions:

    (1) Twenty years is just about as far ahead as anyone can imagine.

    (2) "Moore's Law", observed in 1965 that computer power doubles every two years. This "law" continued to hold for many decades, yet despite these
    huge technological gains since Turing's paper in the 1940's, human
    intelligence is still just as far away as it ever was. It is as if despite building bigger and bigger ladders, we are getting no closer to Andromeda galaxy!

    (3) This suggests that in reality, human intelligence is *infinitely* far removed from machine intelligence: in other words, that there really is some *qualitative* difference between man and machine, and not just a
    quantitative gap which can be bridged with a few more transistors and a
    better programming language. You simply cannot get to Andromeda by climbing
    a ladder. If this is the case, then, a fortiori, you cannot duplicate a
    human mind within a machine.

    (4) In this context, the arguments about a "Technological Singularity" begin
    to look more like a "reductio ad absurdum" proof that machine intelligence
    will *never* surpass human intelligence. (Since the superintelligent
    machine will be able to design a still more intelligent machine, and so on
    ad infinitum. Quod est absurdum).

    ------------------------------

    Date: Wed, 27 Nov 2019 12:20:01 -0500
    From: Andrew Duane <e91.waggin@gmail.com>
    Subject: Re: Officials Warn of "Juice Jacking" Scams at USB Charging
    Stations (RISKS-31.48)

    "... In a scam called "juice jacking," criminals load malware onto charging stations or cables they leave plugged in at the stations, infecting the
    phones and other electronic devices of unsuspecting users..."

    This is exactly why I have always labeled and carried power-only micro-USB cables that don't even have data wires inside them. They used to be widely available for my old micro-USB phones and tablets, but I have not seen them
    for my new and (not even remotely) improved USB-C cables or my wife's Apple Lightning cables.

    My workaround for the new phones is to carry a wireless charging pad. Even though they are far less convenient, I assume malware can't be transmitted
    over Qi-charging. Should that last sentence end with the word "yet"?

    ------------------------------

    Date: Mon, 14 Jan 2019 11:11:11 -0800
    From: RISKS-request@csl.sri.com
    Subject: Abridged info on RISKS (comp.risks)

    The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
    comp.risks, the feed for which is donated by panix.com as of June 2011.
    SUBSCRIPTIONS: The mailman Web interface can be used directly to
    subscribe and unsubscribe:
    http://mls.csl.sri.com/mailman/listinfo/risks

    SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
    includes the string `notsp'. Otherwise your message may not be read.
    *** This attention-string has never changed, but might if spammers use it.
    SPAM challenge-responses will not be honored. Instead, use an alternative
    address from which you never send mail where the address becomes public!
    The complete INFO file (submissions, default disclaimers, archive sites,
    copyright policy, etc.) is online.
    <http://www.CSL.sri.com/risksinfo.html>
    *** Contributors are assumed to have read the full info file for guidelines!

    OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
    searchable html archive at newcastle:
    http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
    Also, ftp://ftp.sri.com/risks for the current volume
    or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
    If none of those work for you, the most recent issue is always at
    http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-31.00
    Lindsay has also added to the Newcastle catless site a palmtop version
    of the most recent RISKS issue and a WAP version that works for many but
    not all telephones: http://catless.ncl.ac.uk/w/r
    ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
    *** NOTE: If a cited URL fails, we do not try to update them. Try
    browsing on the keywords in the subject line or cited article leads.
    Apologies for what Office365 and SafeLinks may have done to URLs.
    Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

    ------------------------------

    End of RISKS-FORUM Digest 31.49
    ************************

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)