

RISKS Forum mailing list archives
From: RISKS List Owner <risko () csl sri com>
Date: Fri, 18 Apr 2025 15:59:41 PDT
RISKS-LIST: Risks-Forum Digest Friday 18 April 2025 Volume 34 : Issue 61 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/34.61> The current issue can also be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: Way-Backlogged... Taking a few at a time Gov IT whistleblower threatened at home (ArsTechnica) Starliner crew post-return interview; Important Lessons (ArsTechica) DOGE Plans to Rebuild SSA Code Base in Months, Risking Benefits and System Collapse (WiReD) The DOGE Axe Comes for Libraries and Museums (WiReD) DOGE reportedly using Google Docs in violation of vetting and chains of custody (Lauren Weinstein) Another Masterful Gambit: DOGE Moves From Secure, Reliable Tape Archives to Hackable Digital Records (404Media) Ireland probes Musk's X for feeding Europeans' data to its AI model Grok (Politico) Silicon Valley crosswalk buttons apparently hacked to imitate Musk, Zuckerberg voices (Palo Alto Online) Hacked pedestrian crossings play fake messages from Musk and Zuckerberg (BBC) Em-dashes considered a sign of AI-written text -- not joking, but hilarious (Lauren Weinstein) A little nerd humor from Sunday's Demonstration. (Boston, via P M Wexelblat) NATO acquires AI military system from Palantir (FT) AI models still struggle to debug software, Microsoft study shows (TechCrunch) Tariffs and AI (NY Times via Jim Geissman) TLS certs to expire at 47 days by 2029 (Cliff Kilby) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Thu, 17 Apr 2025 12:07:47 PDT From: Peter Neumann <neumann () csl sri com> Subject: Gov IT whistleblower threatened at home (ArsTechnica) https://arstechnica.com/tech-policy/2025/04/government-it-whistleblower-calls-out-doge-says-he-was-threatened-at-home/ The person logging in from Russia apparently had the correct credentials for a DOGE account, according to Berulis. "Whoever was attempting to log in was using one of the newly created accounts that were used in the other DOGE-related activities, and it appeared they had the correct username and password due to the authentication flow only stopping them due to our no-out-of-country logins policy activating," he wrote. "There were more than 20 such attempts, and what is particularly concerning is that many of these login attempts occurred within 15 minutes of the accounts being created by DOGE engineers." An assistant chief information officer (ACIO) was given instructions that IT employees "were not to adhere to SOP [standard operating procedure] with the DOGE account creation in regards to creating records," Berulis wrote. "He specifically was told that there were to be no logs or records made of the accounts created for DOGE employees." DOGE officials were to be given "the highest level of access and unrestricted access to internal systems," specifically "tenant owner" accounts in Microsoft Azure that come "with essentially unrestricted permission to read, copy, and alter data," Berulis wrote. These "permissions are above even my CIO's access level to our systems" and "well above what level of access is required to pull metrics, efficiency reports, and any other details that would be needed to assess utilization or usage of systems in our agency." Berulis described several more suspicious events that followed DOGE's arrival. There was a new container that he described as "basically an opaque, virtual node that has the ability to build and run programs or scripts without revealing its activities to the rest of the network." There was also a token that "was configured to expire quickly after creation and use, making it harder to gain insight into what it was used for during its lifetime." On March 6, various users "reported login issues to the service desk and, upon inspection, I found some conditional access policies were updated recently," he wrote. This was odd because "policies that had been in place for over a year were suddenly found to have been changed with no corresponding documentation or approvals," he wrote. "Upon my discovery of these changes, I asked the security personnel and information assurance team about it, but they had no knowledge of any planned changes or approvals." On March 7, Berulis says he "started tracking what appeared to be sensitive data leaving the secured location." About 10GB of data was exfiltrated, but it was "unclear which files were copied and removed," he wrote. On that same day, Berulis says he reported his concerns about sensitive data being exfiltrated to CIO Prem Aburvasmy. On March 10, Berulis found that controls in Microsoft Purview to prevent insecure or unauthorized access from mobile devices had been disabled, he wrote. "In addition, outside of expected baselines and with no corresponding approvals or records I could find I noted the following: an interface exposed to the public Internet, a few internal alerting and monitoring systems in the off state, and multi-factor authentication changed," he wrote. The team observed more odd activity in the ensuing weeks, Berulis wrote. Data was sent to "an unknown external endpoint," but the network team was unable to obtain connection logs or determine what data was removed, he wrote. There were also "spikes in billing in Mission Systems related to storage input/output" associated with projects that could no longer be found in the NLRB system, indicating that "resources may have been deleted or short-lived," he wrote. "Accordingly, we launched a formal review and I provided all evidence of what we deemed to be a serious, ongoing security breach or potentially illegal removal of personally identifiable information," he wrote. But on April 3 or 4, the assistant CIO "and I were informed that instructions had come down to drop the US-CERT reporting and investigation and we were directed not to move forward or create an official report," Berulis wrote. ------------------------------ Date: Thu, 17 Apr 2025 12:07:47 PDT From: Peter Neumann <neumann () csl sri com> Subject: Starliner crew post-return interview; Important Lessons (ArsTechica) An ArsTechnica article based on an interview with Astronauts Butch Willmore and Suni Williams describes the partial timeline of thruster problems experienced on the maiden crewed Starliner flight. Some good lessons about "mission rules" and what to do when things do not go as planned. https://arstechnica.com/space/2025/04/the-harrowing-story-of-what-flying-starliner-was-like-when-its-thrusters-failed/ ------------------------------ Date: Mon, 31 Mar 2025 01:44:04 -0400 From: Gabe Goldberg <gabe () gabegold com> Subject: DOGE Plans to Rebuild SSA Code Base in Months, Risking Benefits and System Collapse (WiReD) Social Security systems contain tens of millions of lines of code written in COBOL, an archaic programming language. Safely rewriting that code would take years -— DOGE wants it done in months. ... In order to migrate all COBOL code into a more modern language within a few months, DOGE would likely need to employ some form of generative artificial intelligence to help translate the millions of lines of code, sources tell WIRED. “DOGE thinks if they can say they got rid of all the COBOL in months, then their way is the right way, and we all just suck for not breaking sh*t,” says the SSA technologist. DOGE would also need to develop tests to ensure the nesw system’s outputs match the previous one. It would be difficult to resolve all of the possible edge cases over the course of several years, let alone months, “This is an environment that is held together with bail wire and duct tape,” the former senior SSA technologist working in the office of the chief information officer tells WIRED. “The leaders need to understand that they’re dealing with a house of cards or Jenga. If they start pulling pieces out, which they’ve already stated they're doing, things can break.” https://www.wired.com/story/doge-rebuild-social-security-administration-cobol-benefits/ ------------------------------ Date: Wed, 2 Apr 2025 15:42:11 -0400 From: Gabe Goldberg <gabe () gabegold com> Subject: The DOGE Axe Comes for Libraries and Museums (WiReD) The Institute of Museum and Library Services has long received bipartisan support. But after years of trying, President Donald Trump has delivered it a crushing blow. https://www.wired.com/story/institute-museum-library-services-layoffs ------------------------------ Date: Tue, 8 Apr 2025 07:55:16 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: DOGE reportedly using Google Docs in violation of vetting and chains of custody ------------------------------ Date: Tue, 8 Apr 2025 13:00:38 -0700 From: "Jim" <jgeissman () socal rr com> Subject: Another Masterful Gambit: DOGE Moves From Secure, Reliable Tape Archives to Hackable Digital Records https://www.404media.co/doge-gsa-magnetic-tape-archives-digital-storage/ ------------------------------ Date: Fri, 11 Apr 2025 10:22:03 -0700 From: Steve Bacher <sebmb1 () verizon net> Subject: Ireland probes Musk's X for feeding Europeans' data to its AI model Grok (Politico) The investigation threatens to stoke further tensions between the EU and U.S. over tech rules. Ireland's privacy regulator launched an investigation on Friday into how social media platform X has used Europeans' personal data to train its artificial intelligence model Grok. The move to target the platform owned by Elon Musk, tech billionaire and right-hand man to United States President Donald Trump, is likely to stoke further tensions between the EU and U.S. over Europe's tech rules and regulations. The probe by Ireland's Data Protection Commission (DPC) looks into how personal data "in publicly-accessible posts" on X were processed to train Grok, the regulator said in a statement on Friday. Musk's AI startup xAI has been developing a group of AI models under the name Grok, which are used to power things like the AI chatbot available on the X platform. Grok's gobbling of EU data was already the subject of scrutiny from the Irish regulator last year, when X — after a battle in the Irish courts -— agreed to suspend the use of EU citizens' data to train its AI models. The Irish regulator said on Friday that its new investigation will examine whether X has been complying with the EU's General Data Protection Regulation (GDPR), including whether data was processed lawfully and according to transparency rules. X did not immediately respond to a request for comment. https://www.politico.eu/article/irish-dpc-launches-investigation-into-xs-use-of-eu-data-to-train-ai/ ------------------------------ Date: Sun, 13 Apr 2025 16:07:14 -0400 From: Gabe Goldberg <gabe () gabegold com> Subject: Silicon Valley crosswalk buttons apparently hacked to imitate Musk, Zuckerberg voices (Palo Alto Online) Crosswalk buttons along the mid-Peninsula appear to have been hacked, so that when pressed, voices professing to be Mark Zuckerberg or Elon Musk begin speaking. Videos taken at locations in Redwood City, Menlo Park and Palo Alto show various messages that begin to play when crosswalk buttons are hit. The voices appear to imitate how Zuckerberg and Musk sound.In one video, taken on Saturday morning at the corner of Arguello Street, Broadway and Marshall Street in Redwood City, a voice claiming to be Zuckerberg says that “it’s normal to feel uncomfortable or even violated as we forcefully insert AI into every facet of your conscious experience. And I just want to assure you, you don’t need to worry because there's absolutely nothing you can do to stop it.” In another video, taken in downtown Palo Alto early on Saturday morning, a voice claiming to be Musk says that he would “like to personally welcome you to Palo Alto.” vhttps://www.paloaltoonline.com/technology/2025/04/12/silicon-valley-crosswalk-buttons-apparently-hacked-to-imitate-musk-zuckerberg-voices/ ------------------------------ Date: Tue, 15 Apr 2025 21:37:34 -0600 From: Matthew Kruk <mkrukg () gmail com> Subject: Hacked pedestrian crossings play fake messages from Musk and Zuckerberg (BBC) https://www.bbc.com/news/articles/ckgejgd0d3ro Pedestrian crossings in several areas of northern California have been hacked with fake greetings mocking the tech billionaires Elon Musk and Mark Zuckerberg. Officials in Silicon Valley are investigating and have disabled the audio feature on the crossings which usually plays instructions to "walk" or "wait". The surprise message were noticed over the weekend in Palo Alto, Redwood City and Menlo Park -- which is home to Zuckerberg's sprawling Meta campus. One Musk impersonation offered to buy passing pedestrians a Tesla Cybertruck if they agreed to be his friend. Another from a false Zuckerberg said "real ones call me The Zuck". [Jan Wolitzky noted an article in the LA Times. A lot of media editors seem to need a little levity. PGN] ------------------------------ Date: Tue, 15 Apr 2025 08:11:41 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: Em-dashes considered a sign of AI-written text -- not joking, but hilarious I have -- basically since the start of my writing -- extensively used "--", probably more than I should, but it's a habit and narrative style punctuation I prefer. I never actually use em dashes myself, though some platforms will automatically convert "--" to an em dash by default. I mainly edit in ASCII editors, and of course em-dash isn't even supported there. I also prefer "--" since I know for sure how it will be displayed to the reader, while there is still less assurance with em-dashes. If em-dashes are now considered a sign of AI-written text due to their use by ChatGPT, etc., that's fairly hilarious. -L ------------------------------ Date: Mon, 7 Apr 2025 12:54:08 -0400 From: P M Wexelblat <wex () mac com> Subject: A little nerd humor from Sunday's Demonstration. (Boston, of course) [PGN's representation of the snapshot: An eating place display: BREAKFAST and LUNCH A hand-made banner: HANDS OFF: WORKING COBOL CODE ] ------------------------------ Date: Mon, 14 Apr 2025 19:06:34 -0700 From: geoff goodfellow <geoff () iconia com> Subject: NATO acquires AI military system from Palantir (FT) NATO has acquired an artificial intelligence-powered military system from Palantir, the US software company chaired by Donald Trump-backer Peter Thiel and with strong Pentagon connections. The alliance's choice comes amid rising anxiety among European members over a potential US withdrawal after Trump threatened to stop protecting the continent if capitals did not drastically increase defence spending. Nato is also racing to keep up with the development of rivals' AI military capabilities such as China. Palantir's Maven Smart System (MSS NATO) uses generative AI, machine learning and large language models to provide Ccommanders with a secure, common operational capability and will be used to support ongoing NATO operations, the alliance said on Monday. Such battle-space management systems allow 20-50 soldiers to do the work sifting through battlefield data that teams of hundreds or even thousands did in recent conflicts such as Afghanistan and Iraq. ``It's able to take the place of entire teams doing these rather dull tasks,'' said Noah Sylvia, analyst at Royal United Services Institute, a London-based think-tank. France has developed Artemis, which Sylvia said was a domestic alternative, but not a competitor to Palantir's Maven system, so as not to be reliant on the US. [...] https://on.ft.com/4j2G9fU ------------------------------ Date: Sat, 12 Apr 2025 08:01:24 -0700 From: Steve Bacher <sebmb1 () verizon net> Subject: AI models still struggle to debug software, Microsoft study shows (TechCrunch) AI models from OpenAI, Anthropic, and other top AI labs are increasingly being used to assist with programming tasks. Google CEO Sundar Pichai said in October that 25% of new code at the company is generated by AI, and Meta CEO Mark Zuckerberg has expressed ambitions to widely deploy AI coding models within the social media giant. Yet even some of the best models today struggle to resolve software bugs that wouldn't trip up experienced devs. A new study from Microsoft Research, Microsoft’s R&D division, reveals that models, including Anthropic’s Claude 3.7 Sonnet and OpenAI’s o3-mini, fail to debug many issues in a software development benchmark called SWE-bench Lite. The results are a sobering reminder that, despite bold pronouncements from companies like OpenAI, AI is still no match for human experts in domains such as coding. The study's co-authors tested nine different models as the backbone for a “single prompt-based agent” that had access to a number of debugging tools, including a Python debugger. They tasked this agent with solving a curated set of 300 software debugging tasks from SWE-bench Lite. According to the co-authors, even when equipped with stronger and more recent models, their agent rarely completed more than half of the debugging tasks successfully. Claude 3.7 Sonnet had the highest average success rate (48.4%), followed by OpenAI’s o1 (30.2%), and o3-mini (22.1%). [...] https://techcrunch.com/2025/04/10/ai-models-still-struggle-to-debug-software-microsoft-study-shows/ ------------------------------ Date: Sat, 5 Apr 2025 08:06:40 -0700 From: "Jim" <jgeissman () socal rr com> Subject: Tariffs and AI NYTimes chat, Ezra Klein and Paul Krugman, 5 Apr 2025 [Klein:] One of the things flying around social media has been that if you went and you asked the various leading artificial intelligence programs, ChatGPT and Gemini and Claude: What's a pretty simple way to calculate tariffs on all other countries? -- it will offer you basically the calculation [Trump administration] used [when calculating other countries' tariffs]. [Krugman:] This is part of the problem with what we're calling AI, with large language models. They pick up what's out there without necessarily being able to discriminate what is sensible and what is not. There's certainly no paper I would imagine in any economics journal saying: Do this. Maybe some people out there are saying something like this. But it really is not something you would recommend, if you know anything about how trade works -- which ChatGPT does not. So it really is weird that it would come up with this. ------------------------------ Date: Tue, 15 Apr 2025 01:33:17 +0000 From: Cliff Kilby <cliffjkilby () gmail com> Subject: TLS certs to expire at 47 days by 2029 Newer piece https://www.theregister.com/2025/04/14/ssl_tls_certificates Slightly older piece https://www.theregister.com/2024/10/15/apples_security_cert_lifespan/ "And while it's generally agreed that shorter lifespans improve Internet security overall -- longer certificate terms mean criminals have more time to exploit compromised website certificates -- the burden of managing these expired certs will fall squarely on the shoulders of website and systems administrators." No. 47 days is security theatre. It will remove certificate invalidation as a control mechanism. There will be little point in maintaining the certificate revocation list (CRL) as the attitude will be "well, it will just expire anyway". It's hard to fake a successful response from a revocation check that indicates the certificate has not been invalidated, but what happens when the attacker gains control of the clock? Sure, it's difficult to grab the clock from the browser, but, browsers aren't the only place that certificate validity is checked. The other ones are slightly more critical. For example, driver signing. Actual security would be limiting SAN to within the same second level domain, instead of the current process which allows someone to cut a cert with a dozen seemingly unrelated domains attached. Or, having issuers automatically add expired certs to the CRL. Or expanding support for Name Constraints. Or, changing Certification Authority Authorization (CAA) policy to default deny for domains that have no CAA records at all where the current policy is default allow. Or, actually removing TLS<1.3. Or, rejecting certificates that were issued with less than 128 bit entropy (i.e. <3072-bit RSA). I think the most direct evidence this is all made up is this quote from Tim Callan, chief compliance officer at Sectigo and vice-chair of the CA/B Forum. "This pivotal and positive advancement for our industry underscores the importance of agility and proactive risk management in today's threat landscape while preparing for the risks of the quantum era." TLS1.2+ with AES-256 is quantum resistant. And it's already available. And it's built in to all of these browsers. ------------------------------ Date: Sat, 28 Oct 2023 11:11:11 -0800 From: RISKS-request () csl sri com Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks => SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line that includes the string `notsp'. Otherwise your message may not be read. *** This attention-string has never changed, but might if spammers use it. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you never send mail where the address becomes public! => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) has moved to the ftp.sri.com site: <risksinfo.html>. *** Contributors are assumed to have read the full info file for guidelines! => OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's delightfully searchable html archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue. Also, ftp://ftp.sri.com/risks for the current volume/previous directories or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume If none of those work for you, the most recent issue is always at http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-34.00 ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001) *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. Apologies for what Office365 and SafeLinks may have done to URLs. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 34.61 ************************
Current thread:
- Risks Digest 34.61 RISKS List Owner (Apr 18)
Related Articles
Stay Informed
Get the best articles every day for FREE. Cancel anytime.