Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…
Terrestrial-bound computer users blindly accept a system reboot as a problem solution. In my experience this remains a constant in Windows (version 7 and below... I have no experience with 8 or above, thanks), and various Apple OS's. (My Linux boxes just keep on running). This mindset has crept into the maintenance practices of the commercial airlines. For many years I have read frequently the exploits of in-flight failures resolved by cycling a circuit breaker; of a "maintenance engineer" doing much the same on the ground to fix a "glitch". I think a read of the NTSC's report on the crash of an Indonesia Air Asia Airbus A320-200 which killed all aboard on 28 December, 2014, is worthy for its potential to sober flight crews, maintenance and regulators: avherald.com/h?article=47f6abc7/0028&opt=0 That CRM, basic recovery procedures, and a host of other allegedly-well-trained responses went out the window, including the continued lack of side stick conflict detection in Airbus designs, can, I think, be implicated in this mess... but it all began with a hard failure and a "reboot", taking us back to the old principle of the straw that breaks the camel's back. In flight, system restarts must remain the option of the crews. The very hint of restricting flight crew access to the hardware meets with a strong objection. However, we also see in this instance that the act of shutting off a system completely was not met with an appropriate crew response. Reversion to lower levels of flight dynamic protections simply return the airplane to stick and rudder. One may rightly ask why this is so problematic. In the thinner upper levels, with tighter speed/stall margins, are crews simply not familiar enough to manage these extremes? Among the lessons: things that go bump in the night tend to leave bits floating on the ocean. Need a reboot? There's a good reason why. Let's abandon the cheap and easy way out as it only puts off the inevitable disaster.
Automotive Intelligence - Consumer Technology Association It is crucial for an autonomous car to be able to understand and learn behaviors, weigh factors and make judgment calls, not simply to follow rules, asserts Jim Buczkowski, global director of electronic systems, research and innovation at Ford Motor Co. in Dearborn, MI. "I don't think you can program for every single individual situation but you can't have a situation where the machine comes back and says, 'I don't know what to do,'" he says. Further, autonomous vehicles must be engineered for "graceful failure" when technology can't function—for example, when one of the vehicle's sensors is blocked by dirt or inclement weather—meaning "you still have some capability for driver assistance, but you don't have full autonomy," he explains. "Those are things that are part of the strategy that folks are looking at and working on." http://www.cta.tech/i3/Features/2015/November-December/Automotive-Intelligence.aspx ...what could go wrong? Gabriel Goldberg, Computers and Publishing, Inc. gabe@gabegold.com 3401 Silver Maple Place, Falls Church, VA 22042 (703) 204-0433
CIO via NNSquad http://www.cio.com/article/3011576/ehr/why-electronic-health-records-arent-more-usable.html EHRs are designed to support billing more than patient care, experts say ... It shouldn't come as a surprise that most doctors are unhappy with their electronic health record (EHR) systems, which tend to be clunky, hard to use and may actually get in the way of truly excellent patient care ... Doctors' biggest complaint about the EHR is that it slows them down, especially in the documentation phase. "Compared to handwriting or dictating, EHRs take doctors nine times longer to enter the data," Anderson says. "Sure, you have more information in the EHR than in paper records, but it takes more time." ... Other alerts go off to prevent adverse drug interactions with other medications, allergies, or foods. Many of these are inapplicable to particular patients, and after a while, doctors may stop paying attention to them or turn them off. Three quarters of EHRs don't allow the customization of these alerts, according to Anderson.
A (long) story of exposed passwords and lax security. "The sales guy started renewing my Vodafone subscription and therefor needed to log in at a dealer portal from Vodafone. He didn't remember the login password, and, here it comes, on the screen he opened an Excel file which contained *all* their passwords. Is this happening for real? I had just told him minutes ago I'm an experienced professional hacker, and we had both laughed about the password-taped-on-monitor leak. Curiously and intensively I looked on the screen to get a picture of the treasure trove that was in front of me. Passwords to view and modify customer data of KPN, Vodafone, Telfort, T-Mobile, UPC, Tele2 and other companies were right in front of me. http://sijmen.ruwhof.net/weblog/608-personal-data-of-dutch-telecom-providers-extremely-poorly-protected-how-i-could-access-12-million-records Kees Huyser
ABC 7, Chicago, 4 Dec 2015, Port St. Lucie, FL A hit-and-run mystery was solved and a woman arrested in Florida after an unusual call to 911. It wasn't the driver who picked up the phone, but instead it was the car itself that called for help. Port St. Lucie police say a car safety feature helped them to track down 57-year-old Cathy Bernstein, who they say hit a truck and then [p]lowed through a van on Prima Vista Boulevard. Bernstein allegedly fled the scene, but her car's emergency assistance feature didn't just make a record of the crash, it automatically contacted 911. http://abc7chicago.com/technology/car-auto-dails-911-to-report-accident-after-driver-allegedly-commits-hit-and-run/1109554/
AJC via NNSquad http://www.ajc.com/news/news/state-regional-govt-politics/exclusive-fired-kemp-worker-says-he-is-a-scapegoat/npbBC/ The employee fired after being blamed for a massive data breach at the Georgia Secretary of State's Office said Wednesday he has been made a scapegoat by the agency. In an exclusive interview with The Atlanta Journal-Constitution, longtime state programmer Gary Cooley said he did not have the security access to add millions of Social Security numbers and birth dates to a public data file—something Secretary of State Brian Kemp accused him of doing. And while he acknowledged a role in the gaffe, he also outlined a more complicated series of missteps and miscommunication both within the office and with PCC Technology Group, an outside vendor tasked with managing voter data for the state.
An estimated 6.1 million smart phones, routers, and smart TVs still use old versions of software with security bugs for which fixes were available in 2012. This is because many ap developers are using obsolete versions of Universal Plug & Play (UPnP) SDK library (libupnp). See chart in Help Net article, & Trend Micro blog, listing 20 popular apps in this condition. http://www.net-security.org/secworld.php?id196 http://blog.trendmicro.com/trendlabs-security-intelligence/high-profile-mobile-apps-at-risk-due-to-three-year-old-vulnerability/# [Incidentally OWASP has published top 10 security flaws found in modern apps. https://www.owasp.org/index.php/Top_10_2013-Top_10]
Jeremy Kirk, InfoWorld, 7 Dec 2015 FireEye finds that Nemesis, which comes from a suspected Russian group, is a bootkit http://www.infoworld.com/article/3012125/malware/new-payment-card-malware-hard-to-detect-and-remove.html
Kashmir Hill, Fusion, 30 Nov 2015 http://fusion.net/story/238742/tor-carnegie-mellon-attack/ Law enforcement has been complaining for years about the Web "going dark," saying that encryption and privacy tools are frustrating their ability to track criminals online. But massive FBI operations over the last year that have busted 'hidden sites' used for the sale of drugs, hacking tools, and child pornography suggest the digital criminal world has gotten lighter, with law enforcement bragging that criminals can't "hide in the shadows of the Dark Web anymore." While mysterious about its tactics, law enforcement indicated that it had found a way to circumvent the tool on which these sites relied, a software called Tor. But criminals are not the only ones who rely on it. [Henry also suggests other sites as well. PGN] https://www.fbi.gov/newyork/press-releases/2014/dozens-of-online-dark-markets-seized-pursuant-to-forfeiture-complaint-filed-in-manhattan-federal-court-in-conjunction-with-the-arrest-of-the-operator-of-silk-road-2.0 https://www.torproject.org/projects/torbrowser.html.en http://motherboard.vice.com/read/the-operators https://gitweb.torproject.org/doctor.git
FYI—'So will they shorten it to égalité, fraternité?' Sebastian Anthony (UK)—7 Dec 2015 Leaked docs from Ministry of Interior show worryingly illiberal trend for France. http://arstechnica.com/tech-policy/2015/12/france-looking-at-banning-tor-blocking-public-wi-fi/ According to leaked documents from the Ministry of Interior the French government is considering two new pieces of legislation: a ban on free and shared Wi-Fi connections during a state of emergency, and measures to block Tor being used inside France. http://www.lemonde.fr/attaques-a-paris/article/2015/12/05/la-liste-musclee-des-envies-des-policiers_4825245_4809495.html
Ken Olthoff saw something (on the BBC web site, IIRC) about a guy who went to a concert and got backstage by on the spur of the moment editing the band's Wikipedia web page to include his name as a step-brother to one of the band members. He showed it to the guard at the door to the backstage area ("See? Here's my ID, here's what it says on the Wikipedia web page about the band - I'm his step-brother!"). Luckily, the guy and the band got along well when he met them in the green room, and they deemed him "a legend" for his hack.
*WashPost* via NNSquad https://www.washingtonpost.com/opinions/i-gave-my-students-ipads--then-wished-i-could-take-them-back/2015/12/02/a1bc8272-818f-11e5-a7ca-6ab6ec20f839_story.html A study released in September by the Organization for Economic Cooperation and Development looked at school tech initiatives in more than three dozen countries (although not the United States) and found that while students who use computers moderately show modest gains over those who rarely do, heavy technology use has a negative impact. "Students who use computers very frequently at school do a lot worse in most learning outcomes, even after accounting for social background and student demographics," the report concluded.
Fahmida Y. Rashid, InfoWorld Tech Watch, 4 Dec 2015 Node.js Foundation fixed two critical vulnerabilities in its open source server-side JavaScript platform and addressed the newly patched OpenSSL http://www.infoworld.com/article/3012157/security/why-nodejs-waited-for-openssl-security-update-before-patching.html selected text: The fact that Node.js Foundation chose to delay its patches to incorporate OpenSSL fixes highlights the reality of open source code. There are so many dependencies between various projects that maintainers have to track bugs in related libraries along with vulnerabilities in their own code. Modern software development typically consists of only 10 percent original code and 90 percent from third-party libraries, said Christopher Frohoff, a security researcher with SourceClear. It's the developer's responsibility to make sure the applications don't link to vulnerable libraries. Even though Node.js 0.10.x (Maintenance) was not impacted by the above-mentioned vulnerabilities, users should still upgrade to the new Maintenance version because it depends on OpenSSL v.1.0.1. Many developers don't even know all the components being used in their applications, making it difficult to tell when a vulnerability in a project actually impacts their code. They may be aware of the libraries they're calling, but not what additional libraries those libraries are including, and the nesting can be several layers deep. And some of those buried libraries may never show up in the program's dependency tree. === End of Quotes == Now that I have covered that risk, let me add another one. I recently installed some software whose licencing agreement stated that I was responsible for any violations with libraries used by the product. If the programmers of a package have difficulty keeping track of the dependencies, imagine how much tougher end users have it. (Please do not bother stating that such terms would not hold up in court, because 1) they just might, and 2) even being threatened with court action can get expensive.) [GW]
https://pptform.state.gov/include/FAQ.htm#faq8 : "Is this website secure? Our website is very secure. We use 128-bit SSL encryption to secure all traffic to and from the web server. This is the industry standard for ensuring a high level of security when transmitting sensitive information over the Internet. The website also receives its SSL certificate from VeriSign, the industry leader in providing SSL certificates. The lock icon at the bottom of the screen and the "https:\\" address are other indications that the site is secure." I thought it was "https://". [LaTeX influence? PGN]
Having watched "A LEGO Brickumentary" http://www.imdb.com/title/tt3214286/ (last two-thirds much more interesting than beginning), maybe they should have prototyped an automatic Lego garage parking tiny Lego cars before going full-scale. It sounds like some of these robogarages were built by the people who've created car-crushing machines. Combining those functions would be efficient -- push one button, park the car. Push the other, crush it into a cube. Software and hardware mishaps, including some that have smashed or trapped cars, have occurred at robotic garages around the country, but dozens of them are proposed or underway. http://www.nytimes.com/2015/11/28/us/road-to-robotic-parking-islittered-with-faulty-projects.html?smprod=nytcore-ipad&smid=nytcore-ipad-share
UK National Crime Agency via NNSquad The UK has just published their warning signs that your child may be a CYBER-CRIMINAL! Among their top concerns: * Are they interested in coding? Do they have independent learning material on computing? * Do they use the full data allowance on the home broadband? The horrors! The horrors! http://www.nationalcrimeagency.gov.uk/crime-threats/cyber-crime/cyber-crime-preventing-young-people-from-getting-involved
CJR via NNSquad http://www.cjr.org/first_person/misinformation_and_misconceptions_how_not_to_report_on_the_encryption_debate.php?page=all RARELY HAS A PUBLIC DEBATE been ignited so fast as the one about whether to ban online encryption after the tragic Paris attacks two and a half weeks ago. And rarely has the coverage of such a debate been so lacking in facts—especially considering that encryption is a tool reporters increasingly need to do their jobs.
NNSquad http://www.nytimes.com/2015/12/08/technology/terrorists-mock-bids-to-end-use-of-social-media.html?partner=rss&emc=rss In some cases, Internet companies have been criticized for not taking down websites that belong to the Islamic State, only to have it discovered later that the sites were critical of it. Matthew Prince, chief executive of CloudFlare, a San Francisco company, said that in one case Internet activists criticized his company for keeping several Islamic State websites online when, in fact, the sites in question were pro-Kurdish. "It's particularly risky to take a bunch of tech companies that are not certified policy experts and insert them into Middle East politics," Mr. Prince said. Pulling all terror-related content is not always preferred by law enforcement. In several cases, tech executives say, they have been asked to keep terror-related content online so that law enforcement agents can monitor terrorist networks or because the content was created by law enforcement agents to lure terrorists into divulging information. The issue is thornier for companies like Facebook, in which the bulk of posts are meant to be private. "Do you want Facebook looking at over 1.5 billion people's posts?" said Zeynep Tufekci, an assistant professor in technology policy at the University of North Carolina at Chapel Hill. "And if so, then for what?"
> some very important missing digits in the degrees, minutes and seconds > marking the latitude and longitude of the runway end. Maybe build an airfield at 0,0 (Gulf of Guinea) just in case?
There was an item in the *Telegraph* this week about various organisations finding out about customers and taxpayers by postings on social media web sites: http://www.telegraph.co.uk/finance/personalfinance/insurance/12019256/Post-on-Facebook-and-get-a-tax-bill.html In summary: > Banks, insurers and Government bodies are trawling the Internet for any > information we give away on our social media accounts to price products > and catch anyone who cheats the system. The City regulator has set its > sights on whether insurance companies in particular are using Facebook and > Twitter to unfairly increase premiums, for example. Although there may be advantages: > The City watchdog said it might not be "all bad news" for customers > because they could be placed into a lower-risk category due to their > online presence, and pay cheaper premiums. "A person with more than 200 > LinkedIn connections, for example, is statistically less risky" In my case I don't use social networking/media sites, my only on-line presence being on this esteemed forum, and who knows what anybody would make of my ramblings... :o) However, personally I'd be concerned about the legal status of posts; if I set up a fake persona as a millionaire playboy and was then investigated by the tax authorities and had to confess that I wasn't actually a millionaire, could I be in trouble for not having money that I was supposedly avoiding paying tax on..?
http://motherboard.vice.com/read/belgian-physicists-calculate-that-everyone-is-lying-about-the-downed-russian-jet I am not a physicist (or a pilot), but from photos I have seen it seems clear the jet is relatively intact immediately after the missile hit. It doesn't seem implausible that the control surfaces are working well enough that it could indeed make a sharp turn at that point while the pilot decides if ejection is necessary (or, indeed, jumps out of his skin while holding the joystick). So is everyone lying? I'm not sure we can infer it from an analysis based on the premise that as soon as the missile hits the aircraft becomes entirely inert.
Dan, That sounds as if you haven't seen https://www.domainsbyproxy.com/default.aspx yet. Read and weep.
Ira Rubinstein, New York University (NYU) - Information Law Institute (April 26, 2014), Wisconsin Law Review, Forthcoming http://papers.ssrn.com/sol3/papers.cfm?abstract_id$47956 Abstract: In the past several election cycles, presidential campaigns and other well-funded races for major political offices have become data-driven operations. Presidential campaign organizations and the two main parties (and their data consultants) assemble and maintain extraordinarily detailed political dossiers on every American voter. These databases contain hundreds of millions of individual records, each of which has hundreds to thousands of data points. Because this data is computerized, candidates benefit from cheap and nearly unlimited storage, very fast processing, and the ability to engage in data mining of interesting voter patterns. [...]
Please report problems with the web pages to the maintainer