• Risks Digest 33.53 (1/2)

    From RISKS List Owner@21:1/5 to All on Wed Nov 23 04:47:31 2022
    RISKS-LIST: Risks-Forum Digest Wednesday 22 November 2022 Volume 33 : Issue 53

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/33.53>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    Russian software disguised as American finds its way into U.S. Army, CDC
    apps (Jan Wolitzky)
    How North Korea became a mastermind of crypto cybercrime (Ars Technica)
    U.S. NSA recommends 'memory safe' languages (Media Defense)
    Re: Rust (dmitri maziuk)
    Cyber Vulnerability in Networks Used by Spacecraft, Aircraft, Energy
    Generation Systems (U.Michigan)
    Reducing Redundancy to Accelerate Complicated Computations (TJNAF) Vulnerabilities of electric vehicle charging infrastructure (techxplore.com) Cybercriminals Are Selling Access to Chinese Surveillance Cameras
    (Threatpost)
    Code grey: Inside a 'catastrophic' IT failure at the Queensway Carleton
    Hospital (CBC)
    Open-Source Software Has Never Been More Important (TechRadar)
    Autonomous Vehicles Join the List of U.S. National Security Threats (WiReD) Hotel barfs on two people with the same name (gcluley via Wendy M. Grossman) DeepMind says its new AI coding engine is as good as an average human
    programmer (The Verge)
    Time Has Run Out for the Leap Second (NYTimes)
    Timer on GE ovens automagically reprogrammed to gobble rather than ding
    (Business Wire)
    Akamai finds 13 million malicious newly observed domains a month (SC Media) Inside the turmoil at Sobeys-owned stores after ransomware attack (CBC)
    $10.7 Million Payment To Virginia In Google Privacy Settlement (VA Patch)
    Short Videos on Ethics in AI and Software Development (Gene Spafford) Electronic Health Record Legal Settlements (JAMA Health Forum)
    Is This the End Game for Cryptocurrency? (Paul Krugman via PGN et al.)
    Tuvalu Turns to Metaverse as Rising Seas Threaten Existence (Lucy Craymer) Smart Home Hubs Leave Users Vulnerable to Hackers (Leigh Beeson)
    Twitter update (Lauren Weinstein PGN-simmerized)
    In Memoriam: Drew Dean (Peter G. Neumann)
    In Memoriam: Frederick P. Brooks Jr. (Steve Bellovin)
    Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Mon, 14 Nov 2022 10:37:05 -0500
    From: Jan Wolitzky <jan.wolitzky@gmail.com>
    Subject: Russian software disguised as American finds its way into
    U.S. Army, CDC apps

    Thousands of smartphone applications in Apple and Google's online stores contain computer code developed by a technology company, Pushwoosh, that presents itself as based in the United States, but is actually Russian,
    Reuters has found.

    The Centers for Disease Control and Prevention (CDC), the United States'
    main agency for fighting major health threats, said it had been deceived
    into believing Pushwoosh was based in the U.S. capital. After learning about its Russian roots from Reuters, it removed Pushwoosh software from seven public-facing apps, citing security concerns.

    The U.S. Army said it had removed an app containing Pushwoosh code in March.

    [Monty Solomon noted another version:
    Russian Code Found in Thousands of American Apps, Including the CDC's (Gizmodo)
    https://gizmodo.com/russian-pushwoosh-code-american-apps-cdc-army-1849779521
    PGN]

    ------------------------------

    Date: Mon, 14 Nov 2022 23:57:34 -0500
    From: Monty Solomon <monty@roscom.com>
    Subject: How North Korea became a mastermind of crypto cybercrime
    (Ars Technica)

    Cryptocurrency theft has become one of the regimeâs main sources of
    regvenue. Created by a Vietnamese gaming studio, Axie Infinity offers
    players the chance to breed, trade, and fight Pokémon-like cartoon monsters
    to earn cryptocurrency. But earlier this year, the network of blockchains
    that underpin the game's virtual world was raided by a North Korean hacking syndicate, which made off with roughly $620 million in the ether cryptocurrency.

    The crypto heist, one of the largest of its kind in history, was confirmed
    by the FBI, which vowed to continue to expose and combat [North Korea's] use
    of illicit activities -- including cybercrime and cryptocurrency theft -- to generate revenue for the regime.

    The successful crypto heists illustrate North Korea’s growing sophistication as a malign cyber actor. Western security agencies and cyber security
    companies treat it as one of the world's four principal nation-state-based cyberthreats, alongside China, Russia, and Iran.

    According to a UN panel of experts monitoring the implementation of international sanctions, money raised by North Korea's criminal cyber-operations are helping to fund the country's illicit ballistic missile and nuclear programs. Anne Neuberger, US deputy national security adviser
    for cybersecurity, said in July that North Korea ``uses cyber to gain, we estimate, up to a third of their funds for their missile program.''

    Crypto analysis firm Chainalysis estimates that North Korea stole
    approximately $1 billion in the first nine months of 2022 from decentralized crypto exchanges alone. ...

    https://arstechnica.com/information-technology/2022/11/how-north-korea-became-a-mastermind-of-crypto-cyber-crime/

    ------------------------------

    Date: Mon, 14 Nov 2022 19:35:38 +0000
    From: Henry Baker <hbaker1@pipeline.com>
    Subject: U.S. NSA recommends 'memory safe' languages (Media Defense)

    The U.S. NSA finally came out this week to strongly endorse `memory-safe' languages for most software programming, specifically mentioning C#, Go,
    Java, Ruby, Rust, and Swift as examples.

    Apparently orphaned DoD language *Ada* was conspicuously left out of

    NSA's list, even though versions of Ada that target JVM can utilize Java
    JVM's GC. https://en.wikipedia.org/wiki/Ada_(programming_language)

    Ubiquitous web language *Javascript* was also conspicuous by its absence,
    even though Javascript has a sophisticated GC. https://javascript.info/garbage-collection

    Also curiously, NSA left out any mention of Arm's *CHERI*
    (Capability Hardware Enhanced RISC Instructions) architecture
    which should address NSA's performance concerns:

    ``Memory safety can be costly in performance ... There is also considerable
    performance overhead associated with checking the bounds on every array
    access that could potentially be outside of the array.''
    https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/

    CHERI, can you come out tonight (Come come, come out tonight)
    You, ooh better ask your NSA (CHERI baby)
    Tell her everything is *all right*.

    (Apologies to Frankie Valli &amp; Bob Gaudio)

    With Arm's new 'Morello' processor, can I finally replace my *Raspberry Pi* with a *CHERI Pi*??

    [Now I know what startup sound will play when CHERI Pi boots... :-) ]

    While waiting, use CHERI as a QEMU virtual machine? https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/cheri-llvm.html

    https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF

    ``Memory issues in software comprise a large portion of the exploitable vulnerabilities in existence. NSA advises organizations to consider making a strategic shift from programming languages that provide little or no
    inherent memory protection, suchas C/C++, to a memory safe language when possible. [Examples noted above, with html trademarks omitted here. PGN] Memory-safe languages provide differing degrees of memory usage protections,
    so available code hardening defenses, such as compiler options, tool
    analysis, and operating system configurations, should be used for their protections as well. By using memory-safe languages and available code hardening defenses, many memory vulnerabilities can be prevented, mitigated,
    or made very difficult for cyber-actors to exploit.''

    ------------------------------

    Date: Sun, 13 Nov 2022 20:28:23 -0600
    From: dmitri maziuk <dmitri.maziuk@gmail.com>
    Subject: Re: Rust (RISKS-33.52)

    Memory is the resource every computer program uses, but it's not the
    only resource.

    Nobody (that I know of) managed to pull off proper object destruction in a garbage-collected language. Thus, if a program written in a
    *garbage-collected* language uses those *other* resources, there is no guarantee as to when it might release them. The best they can do is
    *sometime between when the object goes out of scope, and when the program terminates*. And that's just not good enough for many applications including systems programming.

    That's what Rust has that automatic memory management doesn't: *when a
    variable goes out of scope, its destructor is run, or it's dropped*.

    ------------------------------

    Date: Wed, 16 Nov 2022 11:46:50 -0500 (EST)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: Cyber Vulnerability in Networks Used by Spacecraft, Aircraft,
    Energy Generation Systems (U.Michigan)

    Zachary Champion, University of Michigan News, 15 Nov 2022
    via ACM TechNews, 16 Nov 2022

    Researchers at the University of Michigan and the U.S. National Aeronautics
    and Space Administration (NASA) discovered a cyberattack that exploits
    networks used by aircraft, spacecraft, energy generation systems, and industrial control systems. The PCspooF exploit targets the time-triggered ethernet (TTE) system, which lowers costs in high-risk settings by allowing mission-critical and less-critical devices to operate on the same network hardware. PCspoof mimics switches in TTE networks to send out malicious synchronization messages masked by electromagnetic interference. The
    disruption gradually causes time-sensitive messages to be dropped or
    delayed, with potentially disastrous effects. The researchers said the
    exploit can be prevented by replacing copper Ethernet cables with
    fiber-optic cables, or by deploying optical isolators between switches and untrusted devices.

    [Richard Marlon Stein noted another version, both seemingly derivative:]

    https://techxplore.com/news/2022-11-cyber-vulnerability-networks-spacecraft-aircraft.html

    A major vulnerability in a networking technology widely used in critical infrastructures such as spacecraft, aircraft, energy generation systems and industrial control systems was exposed by researchers at the University of Michigan and NASA.

    It goes after a network protocol and hardware system called time-triggered ethernet, or TTE, which greatly reduces costs in high-risk settings by
    allowing mission-critical devices (like flight controls and life support systems) and less important devices (like passenger WiFi or data collection)
    to coexist on the same network hardware. This blend of devices on a single network arose as part of a push by many industries to reduce network costs
    and boost efficiency.

    ------------------------------

    Date: Wed, 16 Nov 2022 11:46:50 -0500 (EST)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: Reducing Redundancy to Accelerate Complicated Computations
    (TJNAF)

    Thomas Jefferson National Accelerator Facility (15 Nov 2022),
    via ACM TechNews, 16 Nov 2022

    Scientists at the U.S. Department of Energy's Thomas Jefferson National Accelerator Facility and the College of William & Mary have developed a tool
    to optimize supercomputing time. Their MemHC framework structures the memory
    of a graphics processing unit (GPU) to accelerate the calculation of
    many-body correlation functions. The researchers created three memory management methods that reduce redundant memory operations and expedite calculation of tensor contractions 10-fold. They coded MemHC to enable
    memories to persist on the GPU in a manner more appropriate for
    calculations, reducing the GPU's input and output tasks to concentrate on communication between the GPU and its host central processing unit.

    [This may be an issue of bad journalism. Hardware accelerators *with*
    built-in redunancy might make more sense than jiggering software to run on
    inappropriate hardware. Furthermore, getting rid of security of the input
    and output is another way to increase performance, but it is totally
    counter to trustworthiness. Be very careful about what and where you are
    optimizing. PGN]

    ------------------------------

    Date: Wed, 16 Nov 2022 08:37:49 +0000
    From: Richard Marlon Stein <rmstein@protonmail.com>
    Subject: Vulnerabilities of electric vehicle charging infrastructure
    (techxplore.com)

    https://techxplore.com/news/2022-11-vulnerabilities-electric-vehicle-infrastructure.html

    Can the grid be affected by electric vehicle charging equipment?
    Absolutely. Would that be a challenging attack to pull off? Yes. It is
    within the realm of what bad guys could and would do in the next 10 to 15 years. That's why we need to get ahead of curve in solving these issues.'

    The team looked at a few entry points, including vehicle-to-charger connections, wireless communications, electric vehicle operator interfaces, cloud services and charger maintenance ports. They looked at conventional AC chargers, DC fast chargers and extreme fast chargers.

    I imagine the old pay-at-the-pump skimmer is likely too. For EVs:
    pay-at-the-electron dispenser skim.

    ------------------------------

    Date: Fri, 18 Nov 2022 15:18:14 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Cybercriminals Are Selling Access to Chinese Surveillance Cameras
    (Threatpost)

    Tens of thousands of cameras have failed to patch a critical,
    11-month-old CVE, leaving thousands of organizations exposed.
    New research indicates that over 80,000 Hikvision surveillance cameras
    in the world today are vulnerable to an 11 month-old command injection flaw.

    Hikvision -- short for Hangzhou Hikvision Digital Technology -- is a Chinese state-owned manufacturer of video surveillance equipment. Their customers
    span over 100 countries (including the United States, despite the FCC
    labeling Hikvision *an unacceptable risk to U.S. national security*. Last Fall, a command injection flaw in Hikvision cameras was revealed to the
    world as CVE-2021-36260. The exploit was given a critical rating of 10
    rating by NIST. [...]

    [This message and several others from Gabe came in badly garbled by smart
    characters that cause chunks of text to totally disappear -- even with Dan
    Jacobson's perl-based script. I've used what I could without going back
    to the source. If you want the rest, you should do exactly that. PGN]

    https://threatpost.com/cybercriminals-are-selling-access-to-chinese-surveillance-cameras/180478/

    ------------------------------

    Date: Mon, 21 Nov 2022 06:48:14 -0700
    From: "Matthew Kruk" <mkrukg@gmail.com>
    Subject: Code grey: Inside a 'catastrophic' IT failure at the Queensway
    Carleton Hospital (CBC)

    https://www.cbc.ca/news/canada/ottawa/queensway-carleton-hospital-doctors-network-outage-1.6656370

    Emergency room doctors, nurses and other health-care professionals who
    worked through the night during a major, hospital-wide computer and phone outage in Ottawa were "sticking their necks out" in an "exceptionally
    unsafe" environment, according to documents obtained by CBC News.

    Inaccessible medical records, inoperable equipment, defective backup phones
    and pagers, and poor communication from administrators plagued the Queensway Carleton Hospital (QCH) for nearly 20 hours in early September when a "code grey" was declared, internal records obtained through a Freedom of
    Information request show.

    Code grey refers to infrastructure failure. QCH called one shortly after
    noon on 9 Sept 2022, which lasted till 9:38 a.m. the following day.

    ------------------------------

    Date: Fri, 18 Nov 2022 12:15:30 -0500 (EST)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: Open-Source Software Has Never Been More Important (TechRadar)

    Craig Hale, *TechRadar*, 13 Nov 2022, via ACM TechNews, 18 Nov 2022

    GitHub's Octoverse 2022 report on the state of open-source software found
    that 90% of Fortune 100 companies use open-source software (OSS) in some capacity. There have been 413 million OSS contributions to GitHub from the platform's 94 million users this year alone, the company noted. The report found that commercially backed OSS projects are increasing, and that around
    a third of Fortune 100 companies now have an open-source program office to coordinate their OSS strategies. However, as the Synopsis Open-Source
    Security and Risk Analysis Report for 2022 found, despite a steady 3% year-on-year decrease in vulnerabilities, more than 80% of the codebases analyzed were still found with at least one vulnerability, with 88% of the codebases investigated showing no signs of update in the past two years.

    ------------------------------

    Date: Mon, 21 Nov 2022 18:37:52 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Autonomous Vehicles Join the List of US National Security Threats
    (WiReD)

    Pfluger highlights in his letter that China could use autonomous and
    connected vehicles as a pathway to incorporate their systems and technology into our country's infrastructure. As Homeland Security secretary Alejandro Mayorkas told a House committee last week, there are perils of having communications infrastructure in the hands of nation-states that don't
    protect freedoms and rights as we do. FBI director Christopher Wray warned
    that China has stolen more data from the United States than all other
    nations combined, through increasingly sophisticated large-scale cyber-espionage operations against a range of industries, organizations, and dissidents in the United States.

    https://www.wired.com/story/autonomous-vehicles-china-us-national-security

    ------------------------------

    Date: Fri, 18 Nov 2022 18:38:45 +0000
    From: "Wendy M. Grossman" <wendyg@pelicancrossing.net>
    Subject: Hotel barfs on two people with the same name (gcluley)

    A hotel computer could not cope with two men named Brian Cox checking in
    on the same day:

    https://twitter.com/gcluley/status/1593656867665768448

    ------------------------------

    Date: Mon, 14 Nov 2022 14:07:20 +0000
    From: Martin Ward <martin@gkc.org.uk>
    Subject: DeepMind says its new AI coding engine is as good as an average
    human programmer (The Verge)

    https://www.theverge.com/2022/2/2/22914085/alphacode-ai-coding-program-automatic-deepmind-codeforce

    If an AI is as good as an average human programmer, then the average human programmer is no better than an AI which doesn't actually understand
    anything about what it is doing.

    For some time now I have suspected that the average human programmer just fiddles with the code until it seems to work and calls it "done", without having any real understanding of exactly what the program is supposed to do
    or how the implementation actually works. This is my rather cynical take on "test-driven development, or TDD.

    The above research appears to provide scientific confirmation of my view. If
    an AI can perform as well as an average programmer, then given that the AI
    has no understanding of the program or its implementation and is just
    fiddling with the code until it appears to work (i.e., until it passes the provided set of acceptance tests), then it seems that the average human programmer also has no understanding and is also just fiddling with the code until it appears to work.

    According to the Wikipedia page on TDD, step 3 is "Write the simplest code
    that passes the new test". A suitable candidate for this is code which scans the test data file for the provided input parameters and returns the
    required output (as given in the test file). Step 3 says explicitly ``Inelegant or hard code is acceptable, as long as it passes the test.''
    So, this hard coding should be acceptable. The suggested implementation also follows the principles of *keep it simple, stupid* (KISS) and *You aren't
    gonna need it.* (YAGNI) It has the further advantage of passing any
    additional tests that may be added to the test harness in the future.

    [Unfortunately, it massively violates the Einstein Principle that
    everything should be made as simple as possible, BUT NO SIMPLER.
    I think most RISKS readers by now understand that it is the NO SIMPLER
    that is the killer here for trustworthy systems. PGN]

    ------------------------------

    Date: Sat, 19 Nov 2022 22:52:14 -0700
    From: "Matthew Kruk" <mkrukg@gmail.com>
    Subject: Time Has Run Out for the Leap Second (NYTimes)

    https://www.nytimes.com/2022/11/14/science/time-leap-second.html

    Roughly every four years, an extra day gets tacked onto the end of February,
    a time-keeping convention known as the leap year. The practice of adjusting
    the calendar with an extra day was established by Julius Caesar more than
    2,000 years ago and modified in the 16th century by Pope Gregory XIII, bequeathing us the Julian and Gregorian calendars.

    That extra day is a way of aligning the calendar year of 365 days with how
    long it actually takes Earth to make a trip around the sun, which is nearly one-quarter of a day longer. The added day ensures that the seasons stay
    put rather than shifting around the year as the mismatch lengthens.

    Humanity struggles to impose order on the small end of the time scale, too. Lately the second is running into trouble. Traditionally the unit was
    defined in astronomical terms, as one-86,400th of the mean solar day (the
    time it takes Earth to rotate once on its axis). In 1967 the world’s metrologists instead began measuring time from the ground up, with atomic clocks. The official length of the basic unit, the second, was fixed at 9,192,631,770 vibrations of an atom of cesium 133. Eighty-six thousand four hundred such seconds compose one day.

    But Earth's rotation slows ever so slightly from year to year, and the astronomical second (like the astronomical day) has gradually grown longer
    than the atomic one. To compensate, starting in 1972, metrologists began occasionally inserting an extra second — a leap second -- to the end of an atomic day. In effect, whenever atomic time is a full second ahead, it stops for a second to allow Earth to catch up. Ten leap seconds were added to the atomic time scale in 1972, and 27 more have been added since.

    Adding that extra second is no small task. Moreover, Earth's rotation is slightly erratic, so the leap second is both irregular and unpredictable.
    Fifty years ago, those qualities made inserting the leap second difficult. Today the endeavor is a technical nightmare, because precise timing has
    become integral to society’s highly computerized infrastructure.

    ------------------------------

    Date: Sat, 19 Nov 2022 07:03:41 -0500
    From: Jan Wolitzky <jan.wolitzky@gmail.com>
    Subject: Timer on GE ovens automagically reprogrammed to gobble rather
    than ding (Business Wire)

    A former colleague reports that his *smart* GE oven got an automatic
    software upgrade. Now, when the timer runs down, instead of a chime, it
    makes a sound like a turkey.

    https://www.businesswire.com/news/home/20211103005746/en/GE-Profile%E2%84%A2-Launches-First-of-Its-Kind-Turkey-Mode-to-Ease-Cooking-Stress-for-the-Most-High-Pressure-Meal-of-the-Year

    (And when your expensive oven is hacked and bricked, does it honk to tell
    you your goose is cooked?)

    [The Internet of Every Oven is already a turkey -- i.e., someone (or some
    thing) that does something thoughtless or annoying. PGN]

    ------------------------------

    Date: Thu, 17 Nov 2022 17:02:29 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Akamai finds 13 million malicious newly observed domains a month
    (SC Media)

    Akamai researchers on Wednesday reported that based on a newly observed
    domain (NOD) dataset, they have flagged almost 79 million domains as
    malicious in the first half of 2022. The researchers say this equals approximately 13 million malicious domains per month, representing 20.1% of
    all the NODs that successfully resolved.

    In a blog post, the Akamai researchers explained that whenever a domain name
    is queried for the first time in the last 60 days, the researchers consider
    it an NOD. The NOD dataset lets the researchers zoom in on the long-tail rgistered domain names, typos, and domains that are only very rarely queried
    on a global scale.

    NOD data lets Akamai classify a new domain very early in the threat
    lifecycle. All of its NOD-based detection systems and rules are fully automated. The researchers say that once a new NOD gets identified, the time needed for Akamai to classify it as malicious is measured in minutes -- not hours or days. All of this gets done with no human intervention, which lets Akamai mitigate the new DNS threats quickly, according to the researchers.

    https://www.scmagazine.com/analysis/malware/akamai-finds-13-million-malicious-newly-observed-domains-a-month

    ------------------------------

    Date: Tue, 15 Nov 2022 06:53:11 -0700
    From: Matthew Kruk <mkrukg@gmail.com>
    Subject: Inside the turmoil at Sobeys-owned stores after ransomware (CBC)

    https://www.cbc.ca/news/canada/nova-scotia/inside-turmoil-sobeys-ransomware= -attack-1.6650636

    Employees of Empire Co., the parent company of Sobeys, have begun to speak
    out about the turmoil unfolding inside the grocery chain since a ransomware attack began plaguing its computer systems earlier this month.

    Workers from across the country say some stores have run short of items
    because orders cannot be placed as usual, while at others, food that had
    gone bad initially either piled up or was frozen because it couldn't be
    removed from the inventory system.

    Pharmacies were unable to fill new prescriptions for a week, customers
    cannot redeem loyalty points or use gift cards, and staff were concerned
    last week they wouldn't get paid because the payroll system is down.

    ``It's basically been a mess -- the word that can best describe it -- just a mess,'' said one employee who works in the front end at a Safeway in western Canada.

    ------------------------------

    Date: Sun, 20 Nov 2022 16:21:07 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: $10.7 Million Payment To Virginia In Google Privacy Settlement
    (VA Patch)

    Virginia was part of a record $391.5 million settlement with Google over the company's user privacy practices. Here is the state's share.

    https://patch.com/virginia/across-va/10-7-million-payment-va-google-privacy-settlement

    Almost $400M, wow -- that'll sure teach Google a lesson about privacy. They might have to look under TWO executive suite couch cushions to find it.

    ------------------------------

    Date: Wed, 16 Nov 2022 10:28:03 -0500
    From: Gene Spafford <spaf@purdue.edu>
    Subject: Short Videos on Ethics in AI and Software Development

    Purdue has just released a series of short videos on ethics related to AI
    and software development. I can definitely recommend this if you are
    interested in the topics, and especially if you haven't thought much about
    this topic.

    The lead video is by Vint Cerf. I am also featured in the series.

    https://www.cla.purdue.edu/about/college-initiatives/leadingethically/techethics.html

    ------------------------------

    Date: Tue, 15 Nov 2022 00:33:50 +0000
    From: Richard Marlon Stein <rmstein@protonmail.com>
    Subject: Electronic Health Record Legal Settlements (JAMA Health Forum)

    https://jamanetwork.com/journals/jama-health-forum/fullarticle/2798437

    "Six EHR vendors reached settlement agreements totaling $379.8 million
    (Table). Settlements for 5 of the 6 vendors involved alleged kickbacks,
    which are payments from the vendor to clinicians. Most kickbacks were
    related to product promotion, and 1 was related to influencing clinicians to prescribe opioids. Settlements for 4 of 6 vendors involved alleged misrepresentation of EHR capabilities to falsely certify their product. One vendor allegedly miscalculated rates of electronic record sharing, which
    were used in incentive program attestation. Based on available Centers for Medicare & Medicaid Services attestation data, the EHR products associated
    with these 6 settlements were used by 76831 unique clinicians during the
    years of alleged misconduct."

    The "Gang of 6" EHR vendors: eClinicalWorks, Greenway Health LLC, Practice Fusion Inc, Viztek LLC, athenahealth Inc, CareCloud Health Inc.

    EHR manipulation and fake EHR product feature certification for profit.

    Difficult to confidently estimate patient impact. Unsettling to learn
    physician prescriptions are steered by prioritizing profit over patient
    needs. I doubt the DoJ would investigate and indict 77Kphysicians for their willing participation.

    Per-prescription kickback as a service (PKAAS)? Patients should consult
    their physicians.

    ------------------------------

    Date: Fri, 18 Nov 2022 10:26:14 PST
    From: Peter G Neumann <neumann@csl.sri.com>
    Subject: Is This the End Game for Cryptocurrency? (Paul Krugman)

    Paul Krugman, *The New York Times*, National Edition, Opinion, A25.
    18 Nov 2022 (PGN-excerpted)

    We should ask why crypto[currency] institutions were created in the first place.`

    ... These exchanges are -- wait for it -- financial institutions, whose
    ability to attract investors depends on -- wait for it again -- those investors' trust. In other words, the crypto ecosystem has basically
    evolved into exactly what it was supposed to replace: a system of financial intermediaries whose ability to operate depends on their perceived trustworthiness.

    In which case, what is the point? Why should an industry that at best has simply reinvented conventional banking have any fundamental value? ...

    As boosters love to remind us, previous predictions of crypto's imminent
    demise have proved wrong. Indeed, the fact that Bitcoin and its rivals
    aren't really usable as money needn't mean that they become worthless -- you can, after all, say the same thing about gold.

    But if the government finally moves in to regulate crypto firms, which
    would, among other things, prevent them from promising impossible-to-deliver returns, it's hard to see what advantage these firms would have over
    ordinary banks. Even if the value of Bitcoin goes to zero (which it still might), there's a strong case that the crypto industry, which loomed so
    large just a few months ago, is headed for oblivion.

    I cross-posted this to our Bay Area cryptographers' list. Here are two replies:

    Dave Jevans:
    Hopefully this is the beginning of effective enforcement of existing regulations and the appropriate extension of transparency regs. While unfortunate, the FTX debacle shows the lack of enforcement of existing regs.

    Crypto[currency] will be much stronger after this, as banks enter the
    custodial market. They have charters, audits, BSA officers, training, oversight, transparency to the board, and insurance.

    Steven Sprague:
    They are all learning still.
    Tokens are api messages for software with embedded value.
    Cost of audit for on chain events can slowly approach zero.
    Value of audited stuff is higher than un-audited.

    ------------------------------

    Date: Fri, 18 Nov 2022 12:15:30 -0500 (EST)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: Tuvalu Turns to Metaverse as Rising Seas Threaten Existence
    (Lucy Craymer)

    Lucy Craymer, Reuters, 15 Nov 2022 via ACM TechNews, 18 Nov 2022

    The Pacific island nation of Tuvalu said it intends to replicate itself in
    the metaverse to preserve its history and culture amid threatened submersion
    by rising sea levels. Tuvalu foreign minister Simon Kofe told the COP27
    climate summit, "Our land, our ocean, our culture are the most precious
    assets of our people and to keep them safe from harm, no matter what happens
    in the physical world, we will move them to the cloud." Kofe hopes the
    digital version of Tuvalu will allow the country to continue as a state,
    even if the ocean covers it completely. He said seven governments have
    agreed to continue recognizing Tuvalu even if it is covered in water, adding that its submersion would be challenging from the standpoint of
    international law.

    ------------------------------

    Date: Mon, 21 Nov 2022 12:03:24 -0500 (EST)
    From: ACM TechNews <technews-editor@acm.org>

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)