The RISKS Digest
Volume 33 Issue 27

Friday, 10th June 2022

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…

Contents

AI Translates Math Problems into Code to Make Them Easier to Solve
Alex Wilkins
Making Blockchain Stop Wasting Energy by Getting It to Manage Energy
John Timmer
Hole in the ISS made by a meteorite the size of a grain of sand
geoff goodfellow
Tesla Employees' Cars Will Now Drive Them To Work Against Their Will
Babylon Bee
Meta Facing 8 Lawsuits That Allege Its Addictive Algorithms Harm Young Users
CNET
How Safe Are Systems Like Tesla's Autopilot. No One Knows.
NYTimes
Fraud and Identity Theft Trial to Test American Anti-Hacking Law
NYTimes
SSNDOB Marketplace Seized And Dismantled In International Operation
DOJ
The next step in a long march: Expanding mobile voting in WashDC
WashPost
Canada's favorite coffee chain was covertly data mining the sh*t out of people who just wanted cheap coffee, and they got outed by the government
twitter item via geoff goodfellow
Superworms Eat—and --Survive on Polystyrene
Scientific American
Re: WashDC stop-sign camera brought in $1.3 million in tickets in 2 years
Steve Bacher
The Evolution of Money: Cryptocurrency Regulation
WashPost
The History of Information Security the Computer Age
Andrew J Stewart reviewed by Sven Dietrich
Info on RISKS (comp.risks)

AI Translates Math Problems into Code to Make Them Easier to Solve (Alex Wilkins)

ACM TechNews <technews-editor@acm.org>
Wed, 8 Jun 2022 12:59:51 -0400 (EDT)
Alex Wilkins, New Scientist, 6 June 2021, via ACM TechNews 8 Jun 2022

Google's Yuhuai Wu and colleagues used the Codex neural network of
artificial intelligence (AI) research company OpenAI to translate
mathematical problems from plain English into formal code. Codex correctly
translated 25% of 12,500 secondary-school math competition problems into a
format compatible with a formal proof-solver program called Isabelle. Wu
said the system's inability to understand certain mathematical concepts was
responsible for many of the unsuccessful translations. The team then tested
the process by applying Codex to problems pre-formalized by humans. The
network produced its own formal versions, and the researchers used the
MiniF2F AI to solve both versions; the auto-formalized versions raised
MiniF2F's success rate from 29% to 35%, suggesting Codex's formalization was
superior to that of humans.

https://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-2ec22x23445dx070666&

  [Perhaps this is a case in which formal methods might be used to prove --
  or disprove—that nondeterministic AI generates code that is both
  deterministic and correct (or not)!  PGN]


Making Blockchain Stop Wasting Energy by Getting It to Manage Energy (John Timmer)

ACM TechNews <technews-editor@acm.org>
Wed, 8 Jun 2022 12:59:51 -0400 (EDT)
John Timmer, *Ars Technica*, 5 Jun 2022, via ACM TechNews 8 Jun 2022

A group of researchers from China's Shanghai Jiao Tong and Tsinghua
universities identified an optimization calculation that could make
blockchain systems more energy-efficient. The researchers concentrated on
the energy supply other blockchains consume, noting optimization is needed
in instances like matching supply with demand, and formulating the most
economic mix of generating sources. They also proposed small sub-grids could
self-manage through proof-of-solution (PoSo)-based optimizations, and used
energy systems at the U.K.'s University of Manchester and the city of
Suzhou, China, to test the concept. In both cases, the system quickly
produced optimal solutions for resource distribution, which competed with
centralized management. Although the system still demands multiple computers
to execute calculations and verification, the researchers contend the PoSo
blockchain solution is tougher to manipulate.

https://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-2ec22x234456x070666&


Hole in the ISS made by a meteorite the size of a grain of sand

geoff goodfellow <geoff@iconia.com>
Thu, 9 Jun 2022 20:06:14 -0700
https://twitter.com/WorldAndScience/status/1534688766455173121

 [This one is ominous.  It ruins the meaning of the expression "Take this
 with a grain of salt.  PGN


Tesla Employees' Cars Will Now Drive Them To Work Against Their Will

geoff goodfellow <geoff@iconia.com>
Wed, 8 Jun 2022 15:20:49 -0700
  [However, please read this one with a grain of salt on its tale.  PGN]

STARBASE, TX—After some employee outcry against Elon Musk's announcement
that remote workers must return to the office, Musk was reported to have
sent a follow-up memo. Sources forwarded the internal email detailing a
software update that will override employee Teslas and deliver its driver to
the office for working hours.

At midnight on June 8, your vehicle will automatically install a mandatory
software update. Expect bug fixes, stability improvements, and your vehicle
driving you to your workspace to begin your 8-14 hour work day, the email
reportedly stated.

Tesla executive Jared Fields took to Twitter around 11am on Tuesday from the
produce section of his local Whole Foods to share his response:

  This is ridiculous—the power has gone to his head. I'm just as
  productive working from home as I am working in the office!  Other Tesla
  employees were reported to have been shocked at the notice, as was the
  case with Shelby Burkhead, an HR manager who explained over brunch with
  her boyfriend during work hours that she needed an additional "Employee
  Mental Health Day" this week to recover from the news.

At publishing time, Elon sent a follow-up internal email explaining measures
that would be taken to make the transition back to office life easier on his
employees. The new and improved office space will now have rotating "Home
Sounds" audio playing overhead—crying babies, landscaping equipment, fire
truck sirens, and the soft lull of a neighborhood chihuahua in heat.

https://babylonbee.com/news/tesla-employees-cars-will-now-drive-them-to-wor=
k-against-their-will


Meta Facing 8 Lawsuits That Allege Its Addictive Algorithms Harm Young Users (CNET)

David Farber <farber@keio.jp>
Thu, 9 Jun 2022 10:34:21 +0900
Meta, the parent company of Facebook and Instagram, is facing a slew of
lawsuits alleging the company hasn't done enough to prevent psychological
harm to its young users and is exploiting them for profit.

The lawsuits filed this week allege that the social media sites deliberately
design and use addictive psychological tactics to hook young and vulnerable
users, despite "extensive insider knowledge" that their products are causing
serious damage to young people's mental health.

https://www.cnet.com/news/social-media/meta-facing-8-lawsuits-that-allege-its-addictive-algorithms-harm-young-users/


How Safe Are Systems Like Tesla's Autopilot. No One Knows. (NYTimes)

Jan Wolitzky <jan.wolitzky@gmail.com>
Wed, 8 Jun 2022 07:22:56 -0400
Automakers and technology companies say they are making driving safer, but
verifying these claims is difficult.

https://www.nytimes.com/2022/06/08/technology/tesla-autopilot-safety-data.html


Fraud and Identity Theft Trial to Test American Anti-Hacking Law (NYTimes)

Jan Wolitzky <jan.wolitzky@gmail.com>
Wed, 8 Jun 2022 07:25:11 -0400
A woman is accused of downloading data of more than 100 million Capital One
customers. Her lawyers argue a conviction would criminalize legitimate
research practices.

https://www.nytimes.com/2022/06/08/technology/capital-one-hacker-trial.html


SSNDOB Marketplace Seized And Dismantled In International Operation (DOJ)

Jim Reisert AD1C <jjreisert@alum.mit.edu>
Wed, 8 Jun 2022 10:51:46 -0600
Department of Justice, U.S. Attorney's Office, Middle District of Florida
Tuesday, June 7, 2022

Tampa, Florida—United States Attorney Roger B. Handberg, along with
Special Agent in Charge Darrell Waldon for the IRS—Criminal Investigation
Washington D.C. Field Office, and Special Agent in Charge David Walker for
the FBI—Tampa Division, today announced the seizure of the SSNDOB
Marketplace, a series of websites that operated for years and were used to
sell personal information, including the names, dates of birth, and Social
Security numbers belonging to individuals in the United States. The SSNDOB
Marketplace has listed the personal information for approximately 24 million
individuals in the United States, generating more than $19 million USD in
sales revenue.

https://www.justice.gov/usao-mdfl/pr/ssndob-marketplace-series-websites-listed-more-20-million-social-security-numbers-sale


The next step in a long march: Expanding mobile voting in WashDC (WashPost)

Gabe Goldberg <gabe@gabegold.com>
Wed, 8 Jun 2022 00:28:27 -0400
Martin Luther King III is a global human rights activist and chairman of the
Drum Major Institute.

Everything my father, the Rev. Martin Luther King Jr., fought for is under
attack. By some counts, things have gotten worse since my daughter was born
than they were when Dad was alive. Rights that Americans hold dear are under
assault across the country. Reproductive rights, the ability to be our full
selves and the very pillars of our democracy are growing weaker every single
day.

It's no accident that the erosion of our civil liberties has coincided with
the rolling back of voting rights in states across the country.  When my
father marched for equality decades ago, he understood that voting rights
were a necessary part of the struggle for freedom and equality. Those on the
other side know it, too, which is why they've systematically made it harder
for Americans to vote. Eligibility requirements, polling locations and open
hours at the polls have all been manipulated to keep too many Americans from
being able to vote. In my home state of Georgia, they've even made it a
crime to give water to people standing in line to vote.

Our democracy is in crisis. That's why we mobilized this year to press for
new federal voting rights legislation to ensure that the right to vote is
not merely an aspiration but a reality, and to guarantee that every eligible
voter, regardless of race, ethnicity or location, can access and cast a
ballot knowing that it counts. But we don’t need to wait on Congress to take
action. There are efforts across the country to expand access to the ballot,
including in our nation's capital.

The D.C. Council is considering legislation to make voting easier and more
accessible by adding a mobile voting option for all voters. This bill would
tear down barriers to access and make it dramatically easier for everyone to
participate fully in our democratic process by allowing voting from
smartphones, tablets or computers.

https://www.washingtonpost.com/opinions/2022/06/03/next-step-long-march-expanding-mobile-voting-dc/

  [Well, RISKS readers should know this violates the Einstein Principle.
  This is TOO SIMPLE, because all of the computer systems and networks
  involved can be hacked externally or manipulated by untrustworthy
  insiders, or perhaps both at the same time—concurrent rigging and
  counterrigging.  That's another intesting twist on which side can
  counterrig the other side's riggings, and then do its own rigging.  I
  don't think you can Wriggle out of that one, but I regret that I have to
  keep bringing it up.  PGN]


Canada's favorite coffee chain was covertly data mining the sh*t out of people who just wanted cheap coffee, and they got outed

geoff goodfellow <geoff@iconia.com>
Tue, 7 Jun 2022 13:26:59 -0700
https://twitter.com/internetofshit/status/1533517593637662720


Superworms Eat—and --Survive on Polystyrene (Scientific American)

Richard Stein <rmstein@ieee.org>
Fri, 10 Jun 2022 10:37:29 +0800
[Not computer risks-related, but a notable story on plastic recycling.]

https://www.scientificamerican.com/article/superworms-eat-and-survive-on-polystyrene/

These worms consume polystrene with microbiomes tuned for purpose.  That's
great news for those with a need to breakdown and dispose of a normally
non-recycled modern packaging material.

What to do with the worms after their buffet? Feed them to farmed fish?

An unenviable destiny awaits these beneficial lifeforms.


Re: WashDC stop-sign camera brought in $1.3 million in tickets in 2 years (RISKS-33:25)

Steve Bacher <sebmb1@verizon.net>
Thu, 9 Jun 2022 13:03:11 -0700
I realize that this item is not RISKS material, but I couldn't help reacting
as the story appeared within a day after my RISKS comment showed up in the
digest. It illustrates so remarkably the point I was making.

https://www.latimes.com/california/story/2022-06-08/cancer-groups-raise-alarm-about-losing-funds-to-track-california-cases

  Cancer researchers fear that**shrinking**funding for a program that tracks
  cancer cases across California could threaten its future. [...]  The
  program has relied in part on state tax revenue from cigarette sales under
  Proposition 99, a 1988 ballot measure that boosted taxes by 25 cents per
  pack. As that revenue has fallen, the cancer registry program is expected
  to see a budget decrease of $1.6 million, driven largely by the decline in
  tobacco sales, according to figures provided by the California Department
  of Finance.


The Evolution of Money: Cryptocurrency Regulation (WashPost)

Gabe Goldberg <gabe@gabegold.com>
Wed, 8 Jun 2022 17:35:47 -0400
With Rostin Behnam, Dante Disparte, Sens. Kirsten Gillibrand (D-N.Y.),
Cynthia Lummis (R-Wyo.) & Tomicah Tillemann

https://www.washingtonpost.com/washington-post-live/2022/06/08/evolution-money-cryptocurrency-regulation/

This was MUCH more interesting than I expected—and longer, too. About 90
minutes, with Grayscale commercial blather in the middle.

Random notes I took:

Suggestion FDIC insure accounts.

19,000 coins exist.

Web 3 is wonderful.

SEC/CFTC disagree on who should regulate what.

I learned about this: https://www.investopedia.com/terms/h/howey-test.asp

KYC and AML were used without being defined (bad practice in
presentations/interviews); I knew KYC but looked up AML and then remembered.

U.S. sent big bucks to Ukraine via cryptocurrency.

Sen. Lummis is BIG Bitcoin fan, called it "solid value store"; she's a
HODLER.

Surprise, crypto correlates with stock market—but might decouple someday.

Grayscale calls crypto "investable asset class".

Crypto needs new regulation.

Crypto has intrinsic value.

There's now a "Cambrian explosion" of coins—and that's wonderful.

Not represented was the viewpoint that there's nothing there there.
  [hear hear!  PGN]


The History of Information Security the Computer Age (Andrew J, Stewart, reviewed by Sven Dietrich)

"Cipher Editor" <cipher-editor@ieee-security.org>
Fri, 10 Jun 2022 11:51:37 -0600
Cipher Newsletter: IEEE CIPHER, Issue 167, June 9, 2022

                 Book Review By Sven Dietrich
                         8 June 2022

"A Vulnerable System: The History of Information Security in the Computer Age"
by Andrew J. Stewart

Cornell University Press 2022, ISBN 978-1-5017-589-42 303 pages

Haven't you always wondered about the backstories and the anecdotes in the
history of information security? What were the early motivations of computer
security? How did all those concepts come about?

If that is what you are wondering about, you are in luck: Andrew J. Stewart
acts as a historian and digs into the history of information security in
this new book. While other writers have provided insights into the history
of cryptography, in this work we learn about the Orange Book, the early
attacks on computer systems, and how it all evolved to current times.

Andrew J. Stewart's book "A Vulnerable System: The History of Information
Security Age" takes a stab at shining light into the far and dark corners of
computer security. It mentions some names of early-day computer security
researchers that I had the honor of meeting in the Claremont Tower Suite
("606") at the Security and Privacy conference in the late 1990s. It
includes stories about the creation of the Internet as well.

The book is divided into several chapters and contains an extensive
bibliography from popular science sources and research articles in
supplement to the many contextual and chapter-related notes at the end of
the book. The introduction mentioning the "Three Stigmata" is followed by a
chapter on 'A "New Dimension" for the Security of Information', 'The
Promise, Success, and Failure of the Early Researchers', 'The Creation of
the Internet and the Web, and a Dark Portent', 'The Dot-Com Boom and the
Genesis of a Lucrative Feedback Loop', 'Software Security and the "Hamster
Wheel of Pain", 'Usable Security, Economics, and Psychology', 'Vulnerability
Disclosure, Bounties, and Markets', 'Data Breaches, Nation-State Hacking,
and Epistemic Closure', and 'The Wicked Nature of Information Security'.

The author writes in an easily accessible style, allowing the reader to gain
a good overview of computer security at various stages of development, from
the mid-20th-century events to the late 2010s, and to delve deeper either by
following the notes at the back of the book (there are over 70 pages of
them!), or even by reading the relevant research articles that are
referenced in the select (and somewhat short) bibliography. Most topics are
covered this way and this lends a curious reader to complement their
scientific knowledge with amusing or eye-opening anecdotes.

Some topics, such as vulnerability disclosure, are approached in a
controversial manner, but then again those topics are controversial in real
life. Also there are surprising shortcomings: while the book takes note of
cyberattacks, including general and nation-state ones, there is no mention
of distributed denial-of-service (DDoS) attacks for example, even though he
mentions the Morris worm attack from 1988.

I enjoyed reading this book: some of the anecdotes brought back fond (or not
so fond, depending on how you look at computer security events) memories for
me, spanning the last three decades or so. Perhaps it will intrigue you as
well.

Please report problems with the web pages to the maintainer

x
Top