Thursday Morning: Fast and Furious Edition

[image (modified): Adam Wilson via Flickr]

[image (modified): Adam Wilson via Flickr]

Insane amount of overseas news overnight. Clearly did not include me winning $1.5B Powerball lottery. Attacks in Jakarta and Turkey are no joke.

Let’s move on.

Some U.S. utilities’ still wide open to hacking
Dudes, how many times do you need to be told your cheese is still hanging out in the wind? Some heads should roll at this point. US government’s Industrial Control Systems Cyber Emergency Response Team’s Marty Edwards sounded pretty torqued about this situation at the S4 ICS Security Conference this week. I don’t blame him; if a utility gets hacked, it’s not like your grandmother’s PC getting held ransom. It means the public’s health and safety are at risk. Get on it.

Your cellphone is listening to your TV — and you
Bruce Schneier wrote about the Internet of Things’ expansive monitoring of consumers, citing the example of SilverPush — an application which listens to your television to determine your consumption habits. Bet some folks thought this was an app still in the offing. Nope. In use now, to determine current TV program listings and ratings. Listening-to-your-consumption apps have now been around for years.

Wonder if our pets can hear all this racket inaudible to humans? Will pet food companies embed ads shouting out to our pets?

But you may be able to hide from devices
…depending on whether you are using location-based services, and if you can use the app developed by Binghamton University. A paper on this technology was presented last month at the Institute of Electrical and Electronics Engineers (IEEE) GLOBECOM Conference, Symposium on Communication & Information System Security. The lead researcher explained the purpose of the app:

“With Facebook, Twitter, LinkedIn and others we provide a huge amount of data to the service providers everyday. In particular, we upload personal photos, location information, daily updates, to the Internet without any protection,” Guo said. “There is such a chance for tragedy if that information is used to in a bad way.”

The app isn’t yet available, but when it is, it should prevent personally identifying location-based data from being used by the wrong folks.

VW emissions scandal: Well, this is blunt
I think you can kiss the idea of nuance goodbye, gang.

“Volkswagen made a decision to cheat on emissions tests and then tried to cover it up,” said CARB chair Mary Nichols in a statement.
“They continued and compounded the lie, and when they were caught they tried to deny it. The result is thousands of tons of nitrogen oxide that have harmed the health of Californians.”

Yeah. That.

The last bits
Nest thermostats froze out consumers after a botched update. (Do you really need internet-mediated temperature controls?)
Phone numbers may become a thing of the past if Facebook has its way. (Um, hell no to the Facebook. Just no.)
Senator Al Franken quizzes Google about data collection and usage on K-12 students. (Hope he checks toy manufacturers like Mattel and VTech, too.)

That’s a wrap, hope your day passes at a comfortable speed.

Wednesday Morning: Wonderful, Just Wonderful

I debated about posting Jonny Lang’s Lie to Me. Nah, we’re lied to every day, might as well ask for the truth for once, even if it’s ugly. The truth is that nothing’s okay though we wish like hell it were otherwise.

That said, let’s forge on into the fraught and frothing fjords…

‘Nope.’ That’s what California Air Resources Board said
Huh-uh, no way, nada — CARB told Volkswagen in response to VW’s proposed recall plans for emissions standard-cheating 2.0L vehicles sold into California. Because:

  • The proposed plans contain gaps and lack sufficient detail.
  • The descriptions of proposed repairs lack enough information for a technical evaluation; and
  • The proposals do not adequately address overall impacts on vehicle performance, emissions and safety

Wonder if CARB’s response will be different with regard to VW’s 3.0L vehicles? Shall we take bets?

Fugly, in multiples — cybersec edition
Ebay’s got bugs, and not just at auction.

Need more than tape to fix this problem with cheap web cameras.

Popular antivirus may pose a hacking threat, patch has been issued. Same antivirus manufacturer has a nifty relationship with INTERPOL, too, to share information about cyberthreats. Wonder if they phoned INTERPOL and said, “Cyberthreat. It me!”

(BTW, I love it when spell check helpfully says, “‘Cybersec’ is wrong, don’t you mean ‘cybersex’?”…um, no.)

General Motors: We won’t sue white hats doing our work for us!
No lawsuits, but don’t expect any rewards for finding vulnerabilities (unlike competitor Tesla’s bug report program).

Big of you, GM. Way to protect your intellectual property and brand at the same time.

The biggest threat to nation’s power grid is S_______
Beady-eyed and focused, slips beneath our radar, gnaws into our electricity transport with annoying frequency, causing hundreds of hours of power outages. Stuxnet? No. Bloody squirrels.

In short, it’s all wonderful this Wednesday. Just wonderful. Pass the Glenmorangie, please.

Will James Clapper Be the First Known Victim of OmniCISA’s Regulatory Immunity?

According to Medium, Crackas With Attitude just hacked James Clapper and his wife.

One of the group’s hackers, who’s known as “Cracka,” contacted me on Monday, claiming to have broken into a series of accounts connected to Clapper, including his home telephone and internet, his personal email, and his wife’s Yahoo email. While in control of Clapper’s Verizon FiOS account, Cracka claimed to have changed the settings so that every call to his house number would get forwarded to the Free Palestine Movement.

[snip]

The hacker also sent me a list of call logs to Clapper’s home number. In the log, there was a number listed as belonging to Vonna Heaton, an executive at Ball Aerospace and a former senior executive at the National Geospatial-Intelligence Agency. When I called that number, the woman who picked up identified as Vonna Heaton. When I told her who I was, she declined to answer any questions.

Viscerally, I’m laughing my ass off that Verizon (among others) has shared Clapper’s metadata without his authority. “Not wittingly,” they might say if he asks them about that. But I recognize that it’s actually not a good thing for someone in such a sensitive position to have his metadata exposed (I mean, to the extent that it wasn’t already exposed in the OPM hack).

I would also find some amusement if Clapper ends up being the first public victim of OmniCISA’s regulatory immunity for corporations.

Yahoo and Verizon can self-report this cyber intrusion to DHS, and if they do then the government can’t initiate regulatory action against them for giving inadequate protection from hacking for the Director of National Intelligence’s data.

And whether or not Clapper is the first victim of OmniCISA’s regulatory immunity, he is among the first Americans that the passage of OmniCISA failed to protect from hacking.

 

Tuesday Morning: The Week’s Peak Crey

I cannot with the unexpected engagement picture in my Twitter timeline of news oligarch Rupert Murdoch and model Jerry Hall, on the heels of losing David Bowie and in the wake of El Chapo-Penn. Tell me this is the craziest it will get this week.

D-Day for Microsoft’s earlier Internet Explorer versions
In case you didn’t already know this, Microsoft is slowly killing off its Internet Explorer browser brand, beginning with the end of technical support for all but IE 11.

Beginning January 12, 2016, only the most current version of Internet Explorer available for a supported operating system will receive technical supports and security updates. Internet Explorer 11 is the last version of Internet Explorer, and will continue to receive security updates, compatibility fixes, and technical support on Windows 7, Windows 8.1, and Windows 10.

Some organizations are still relying on older IE versions — a dicey proposition if other non-Microsoft browsers aren’t compatible with their systems. Get a move on, people.

OMG! Terrorists may use drones!
Hoocoudanode cheap and readily available drones might be repurposed by terrorists for flying IEDs. The breathlessness. Really. But wait, they can be stopped!

“The best defence against the hostile use of drones is to employ a hierarchy of countermeasures encompassing regulatory countermeasures, passive countermeasures and active countermeasures.”

I don’t know about you, but I picture the sky soon dark with counterterror drones, swarming like the air over a northern Michigan road in mayfly season.

Processor troubles
Intel’s Skylake processors run into problems with complex computing, freezing PCs. A BIOS update is being distributed as a fix. But this isn’t the only bug out there. Read this, especially this bit: “…CPUs are now complex enough that they’ve become too complicated to test effectively.”

Hmm. In other words, future shock has moved beyond consumers.

NPR interviewed VW CEO Matthias Mueller
I’m sure Porsche has been wondering what the hell they were thinking, tieing up with Volkswagen. Porsche’s top guy is now tasked with clean up after VW, and he’s struggling. Witness NPR handing Mueller a shovel, and watching as he just keeps digging.

NPR: You said this was a technical problem, but the American people feel this is not a technical problem, this is an ethical problem that’s deep inside the company. How do you change that perception in the U.S.?

Matthias Mueller: Frankly spoken, it was a technical problem. We made a default, we had a … not the right interpretation of the American law. And we had some targets for our technical engineers, and they solved this problem and reached targets with some software solutions which haven’t been compatible to the American law. That is the thing. And the other question you mentioned — it was an ethical problem? I cannot understand why you say that.

NPR: Because Volkswagen, in the U.S., intentionally lied to EPA regulators when they asked them about the problem before it came to light.

Mueller: We didn’t lie. We didn’t understand the question first. And then we worked since 2014 to solve the problem. And we did it together and it was a default of VW that it needed such a long time.

Somebody needs to explain the Law of Holes to Mueller.

Also worth revisiting the definition of crazy today. Carry on.

Ukraine’s Power System Hacking: Coordinated in More than One Way?

[original graphic: outsidethebeltway.com]

[original graphic: outsidethebeltway.com]

Analysis by industrial control team SANS determined hacking of Ukrainian electrical power utilities reported on 23-DEC-2015 was a coordinated attack. It required multiple phases to achieve a sustained loss of electricity to roughly 80,000 customers. SANS reported they “are confident” the following events occurred:

  • The adversary initiated an intrusion into production SCADA systems
  • Infected workstations and servers
  • Acted to “blind” the dispatchers
  • Acted to damage the SCADA system hosts (servers and workstations)
  • Action would have delayed restoration and introduce risk, especially if the SCADA system was essential to coordinate actions
  • Action can also make forensics more difficult
  • Flooded the call centers to deny customers calling to report power out

An investigation is still underway, and the following are still subject to confirmation:

  • The adversaries infected workstations and moved through the environment
  • Acted to open breakers and cause the outage (assessed through technical analysis of the Ukrainian SCADA system in comparison to the impact)
  • Initiated a possible DDoS on the company websites

The part that piques my attention is the defeat of SCADA systems by way of a multiphased attack — not unlike Stuxnet. Hmm…

Another interesting feature of this cyber attack is its location. It’s not near sites of militarized hostilities along the border with Russia. where many are of Russian ethnicity, but in the western portion of Ukraine.

More specifically, the affected power company served the Ivano-Frankivsk region, through which a large amount of natural gas is piped toward the EU. Note the map included above, showing the location and direction of pipelines as well as their output volume. Were the pipelines one of the targets of the cyber attack, along with the electricity generation capacity in the region through which the pipes run? Was this hack planned and coordinated not only to take out power and slow response to the outage but to reduce the pipeline output through Ukraine to the EU?

Monday Morning: So — We Meet Again

[image (modified): Leo Suarez via Flickr]

[image (modified): Leo Suarez via Flickr]

Monday: the bad penny we never escape, turning up once again beneath our cart’s wheels just as we set in motion. Just give a hard shove, push on, and don’t look back.

Volkswagen’s bad news, good news as Detroit’s auto show opens
Bad news first: In news dump zone on Friday afternoon, we heard Volkswagen wasn’t going to release documents pertaining to the emissions control defeat scandal to several U.S. states’ attorneys. VW said it couldn’t due to privacy laws, which sounds dicey; why do corporations have privacy rights? You’d think only U.S. businesses would attempt such excuses.

The good news was held until VW’s CEO Matthias Mueller arrived in U.S. for the soft opening of the North American International Auto Show in Detroit. VW is working on a catalytic converter it believes will resolved the emissions problem for roughly 2/3 of the affected vehicles. I’m guessing this is fix is intended for the oldest vehicles, and that the newest ones are likely to be swapped with a new vehicle, or a sizeable discount on a replacement will be offered. Color me skeptical about the effectiveness of this fix; if this was such an obvious and easy solution, it would already appear on VW’s diesel-powered passenger vehicles. Fuel economy will likely diminish due to increased back pressure — but that’s why I think this fix is for the oldest cars. It would encourage VW loyalists to buy a new one.

Juniper Network shuts the (a?) backdoor
The network equipment company says it’s “dropping” NSA-developed code after the revelation of a backdoor into their network device software. Does anyone believe all covert access by NSA has now been eliminated, though, if Juniper’s source code isn’t open?

Apple’s devices monitoring your emotions soon?
Ridiculously cash-rich Apple snapped up artificial intelligence company Emotient, which makes an application to interpret users’ emotions based on their facial expressions — sentiment analysis, they call it. I call it creepy as hell, especially since smartphone users can’t be absolutely certain their cameras aren’t in use unless they physically cover the apertures.

And yes, I do cover apertures on my devices with low-tack adhesive tape. It’s the first thing I do after opening the box on any new camera-enabled device, even before charging the battery.

That’s enough to get your cart moving. I hope to have a post up later, on the recent power outage in Ukraine.

In Response to Continued Resonance of Awlaki Videos, US Relaunched Social Media Propaganda Campaign

As far as we know, the perpetrators of the November attack on Paris were radicalized by each other, in specific neighborhoods in Europe.

According to the complaint filed against his Enrique Marquez, the friend who got him guns, Syed Rizwan Farook, adopted radical beliefs after consuming the lectures, videos, and magazine of Anwar al-Awlaki. In fact, Farook and Marquez moved towards planning an attack in 2011, in the immediate wake of the drone killing of Awlaki and his son. As to Tashfeen Malik, Farook’s wife, while she did some searches on ISIS just before Farook started an attack on his workplace, public reporting suggests that like the French terrorists, she adopted extreme beliefs through relationships formed in brick and mortar life.

Nevertheless, in response to the anxiety produced by these attacks, the Obama Administration is rolling out yet another propaganda campaign against ISIS. As part of it, it shifts the approach to funding NGOs to do the propaganda work, something I argued any such efforts should be doing in a piece for Vice this week. Though as I noted, any such effort needs to stop countering ISIS propaganda and offering a positive vision that will be meaningful to those with grievances. That was one of the things included in a briefing to Silicon Valley today.

There is also a need for more credible positive messaging and content that provides alternatives to young people concerned about many of the grievances ISIL highlights

The other part of the campaign is a bit sillier. The Administration asked for tech companies to do things like measuring resonance of ISIL messages.

Some have suggested that a measurement of level of radicalization could provide insights to measure levels of radicalization to violence. While it is unclear whether radicalization is measureable or could be measured, such a measurement would be extremely useful to help shape and target counter-messaging and efforts focused on countering violent extremism. This type of approach requires consideration of First Amendment protections and privacy and civil liberties concerns, additional front-end research on specific drivers of radicalization and themes among violent extremist populations, careful design of intervention tools, dedicated technical expertise, and the ability to iteratively improve the tools based on experience in deploying them. Industry certainly has a lot of expertise in measuring resonance in order to see how effective and broad a messaging campaign reaches an audience. A partnership to determine if resonance can be measured for both ISIL and counter-ISIL content in order to guide and improve and more effectively counter the ISIL narrative could be beneficial.

This seems to be a problematic approach both because this should be the intelligence community’s job and because they’re supposed to be pretending this isn’t about focusing on Muslims. Plus, as I noted, the recent big attacks weren’t primarily about social media. More importantly, Jim Comey has testified that the social media companies already are helpful.

Comey, apparently, only went along to demand encryption — and it showed up in the briefing document shared at the meeting.

In addition to using technology to recruit and radicalize, terrorists are using technology to mobilize supporters to attack and to plan, move money for, coordinate, and execute attacks. The roles played by terrorist leaders and attack plotters in this activity vary, ranging from providing general direction to small groups to undertake attacks of their own design wherever they are located to offering repeated and specific guidance on how to execute attacks. To avoid law enforcement and the intelligence community detecting their activities, terrorists are using encrypted forms of communications at various stages of attack plotting and execution. We expect terrorists will continue to use technology to mobilize, facilitate, and operationalize attacks, including using encrypted communications where law enforcement cannot obtain the content of the communication even with court authorization. We would be happy to provide classified briefings in which we could share additional information.

While Apple was at this meeting, some of the other key players the government would have to address about encryption were not, making this appeal rather silly.

And note the seduction here: the government wants to tell the tech companies how extremists (they really mean only ISIS) are using encryption, but they’re only willing to do so in a classified setting. That would make it harder to counter the bogus claims the government has repeatedly been caught making.

Ultimately, the Administration seems to have no awareness of another of the key problems. They recognize that ISIS’ propaganda is splashy. But they accord no responsibility for mainstream media for magnifying it.

[T]here is a shortage of compelling credible alternative content; and this content is often not as effectively produced or distributed as pro-ISIL content and lacks the sensational quality that can capture the media’s attention.

If the government is going to ask the private sector to do their part, why aren’t they on a plane demanding that CNN stop fear-mongering all the time, both magnifying the effect of ISIS’ propaganda and increasing the polarization between Muslims and right wingers? If CNN can’t be asked to adjust its business model to stop empowering terrorists, why is Silicon Valley being asked to, when the latter are more central to baselines security?

 

Update: Here’s a list of participants.

Denis McDonough,White House Chief of Staff,

Lisa Monaco, Assistant to the President for Homeland Security & Counter Terrorism

Todd Park, White House Advisor for Technology

Megan Smith, White House Chief Technology Officer

Loretta Lynch, Attorney General

James Clapper, Director, National Intelligence

James Comey, Director, FBI

Tony Blinken, Deputy Secretary, Department of State

Mike Rogers, Director of the National Security Agency

Jeh Johnson, Secretary of Homeland Security

Friday Morning: Looks Like We Made It!

Looks like we survived the first business week of the year, made it through floods and fire and other apocalyptic events. Can’t imagine what next week will bring at this rate.

Saudi Arabia may sell shares in oil producer Aramco
Listing Aramco could create the most valuable company in the world, worth over a trillion in U.S. dollars. The move may raise cash to pay down some of the Saudi government’s debt, but it opens the oil producer to public scrutiny. Would it be worth the hassle?

With Russia increasingly eating into Aramco’s market share of China, and OECD countries’ oil consumption falling, selling shares in Aramco may not raise enough cash as its revenues may remain flat. Prices for utilities have already been raised within Saudi Arabia, shifting a portion of expenses to the public. What other cash-producing moves might Saudi Arabia make in the next year?

Detroit’s annual Autoshow brings VW’s CEO for more than a visit to tradeshow booth
Looks like Volkswagen’s Matthias Mueller will be tap dancing a lot next week — first at the 2016 North American International Auto Show, which unofficially opens Sunday, and then with the Environmental Protection Agency.

What’s the German word for “mea culpa”? Might be a nice name for a true “clean diesel” vehicle.

Data breaches now so common, court throws out suit
You’re going to have to show more than your privacy was lost if you sue a company for a data breach. Judge Joanna Seybert for U.S. District Court for the Eastern District of New York dismissed a class action suit against craft supplies retailer Michael’s last week, writing that lead plaintiff “has not asserted any injuries that are ‘certainly impending’ or based on a ‘substantial risk that the harm will occur.” Whalen’s credit card had been used fraudulently, but she wasn’t liable for the charges.

Annoyingly, Clapper v Amnesty International USA was used as precedent, much as it had been in last summer’s suit against Home Depot for a data breach. At this rate, retailers will continue to thumb their noses at protecting their customers’ data, though identity theft-related losses amount to more than all other property theft losses combined [pdf].

Don’t forget China: DOJ raids Chinese hoverboard company’s stall at CES 2016
I can’t find any previous examples of law enforcement conducting a raid at a trade show — if you know of one, please share in comments. The Department of Justice’s raid yesterday on Changzhou First International Trade Co.’s booth at CES 2016 doesn’t appear to have precedent. Changzhou’s hoverboard product looks an awful lot like Future Motion’s Onewheel, which had been the subject of a Kickstarter project. The Chinese hoverboard was expected to market for $500, versus the Onewheel at $1500.

Makes me wonder if there are other examples of internet-mediated crowd-funded technology at risk of intellectual property theft.

Pass the Patron. I’m declaring it tequila-thirty early today.

Wednesday Morning: Otherwise Known as Mike-Mike-Mike Day

My condolences to the poor Mikes among us who have suffered every Hump Day since Geico’s TV commercial became so popular.

North Korean nuclear test detected by ‘earthquake’
About 10:00 a.m. North Korean local time Wednesday, an event measured at 5.1 on Richter scale occurred near the site of recent underground nuclear testing. South Korea described the “earthquake” as “man-made” shortly after. Interestingly, China called it a “suspected explosion” — blunt language for China so early after the event.

NK’s Kim Jong Un later confirmed a “miniaturized hydrogen nuclear device” had been successfully tested. Governments and NGOs are now studying the event to validate this announcement. The explosion’s size calls the type of bomb into question — was this a hydrogen or an atomic weapon?

I’m amused at the way the news dispersed. While validating the story, I searched for “North Korea earthquake”; the earliest site in the search was BNO News (a.k.a. @BreakingNews) approximately 45 minutes after the event, followed 17 minutes later by Thompson Reuters Foundation. Not Reuters News, but the Foundation, and only the briefest regurgitation of an early South Korean statement. Interesting.

Spies’ ugly deaths
Examining the deaths of spies from 250 AD to present, Lapham’s Quarterly shows us how very cruel humans remain toward each other over the last millennia. Clearly, vicious deaths have not foiled the use of spies.

Zika virus outbreak moves Brazil to caution women against pregnancy now
An outbreak of the mosquito-borne Zika virus in Brazil may be linked to a sizeable uptick in microcephalic births — 2782 this past year, compared to 150 the previous year. The Brazilian government is now cautioning women to defer pregnancy until the end of the rainy season when the virus’ spread has been slowed.

Compared to number of Ebola virus cases in 2014-2015, Zika poses a much greater risk in terms of spread and future affected population. The virus has not received much attention, in spite of more than a million cases in Brazil, as symptoms among children and adults are relatively mild.

BCP now available in Oregon over the counter
Thanks to recent state legislation, women in Oregon now have greater access to birth control pills over the counter. California will soon implement the same legislation.

That’s one way of reducing the future number of white male libertarian terrorists demanding unfettered use of public space and offerings of snacks.

Microsoft’s tracking users’ minutes in Windows 10
No longer content with tracking the number of devices using Windows operating system, Microsoft now measures how long each user spends in Windows 10. Why such granular measures? The company won’t say.

Worth remembering two things: 1) Users don’t *own* operating system software — they’re licensees; 2) Software and system holes open to licensors may be holes open to others.

New cross-platform ransomware relies on JavaScript*
Won’t matter whether users run Windows, Linux, Apple’s Mac OS: if a device runs JavaScript, it’s at risk for a new ransomware infection. Do read the article; this malware is particularly insidious because it hides in legitimate code, making it difficult to detect for elimination. And do make sure you keep backup copies of critical files off your devices in case you’re hit by this ransomware.

Buckle up tight in your bobsled. It’s all downhill after lunch, kids.

[* this word edited to JavaScript from Java./Rayne]

Tuesday Morning: Wow, You Survived Business Day 1

The post-holiday season debris field continues to thin out, making its way by the truckful to the landfill. I wonder how much oil the season’s plastic wrappings consumed.

Here’s what the trash man left behind this morning.

Hackers caused power outage — the first of its kind?
Marcy’s already posted about the electrical power disruption in Ukraine this past week, labeled by some as the first known hacker-caused outage. I find the location of this malware-based outage disturbing due to its location in western Ukraine. Given the level of tensions with Russia along the eastern portion of the country, particularly near Donetsk over the past couple of years, an outage in the west seems counterintuitive if the hackers were motivated by Ukraine-Russian conflict.

And hey, look, the hackers may have used backdoors! Hoocudanode hackers would use backdoors?!

Fortunately, one government is clued in: the Dutch grok the risks inherent in government-mandated backdoors and are willing to support better encryption.

‘Netflix and chill’ in a new Volvo
I’ve never been offered a compelling case for self-driving cars. Every excuse offered — like greater fuel efficiency and reduced traffic jams — only make greater arguments for more and better public transportation.

The latest excuse: watching streaming video while not-driving is Volvo’s rationalization for developing automotive artificial intelligence.

I’m not alone in my skepticism. I suspect Isaac Asimov is rolling in his grave.

US Govt sues pollution-cheater VW — while GOP Congress seeks bailout for VW
WHAT?! Is this nuts or what? A foreign car company deliberately broke U.S. laws, damaging the environment while lying to consumers and eating into U.S.-made automotive market share. The Environmental Protection Agency filed suit against Volkswagen for its use of illegal emissions control defeat systems. The violation of consumers’ trust has yet to be addressed.

Thank goodness for the GOP-led House, which stands ready to offer a freaking bailout to a lying, cheating foreign carmaker which screwed the American public. Yeah, that’ll fix everything.

Remember conservatives whining about bailing out General Motors during 2008’s financial crisis? All of them really need a job working for VW.

Massive data breach affecting 191 million voters — and nobody wants to own up to the database problem
An infosec researcher disclosed last week a database containing records on 191 million voters was exposed. You probably heard about this already and shrugged, because data breaches happen almost daily now. No big deal, right?

Except that 191 million voters is more than the number of people who cast a vote in 2012 or even 2008 presidential elections. This database must represent more than a couple election cycles of voter data because of its size — and nobody’s responding appropriately to the magnitude of the problem.

Nobody’s owning up to the database or the problem, either.

Here’s a novel idea: perhaps Congress, instead of bailing out lying, cheating foreign automakers, ought to spend their time investigating violations of voters’ data — those folks that put them in office?

Any member of Congress not concerned about this breach should also avoid bitching about voter fraud, because hypocrisy. Ditto the DNC and the Hillary Clinton campaign.

Whew, there it is, another mark on the 2016 resolution checklist. Have you checked anything off your list yet? Fess up.