<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why InfoSec has to be integrated into the purchasing process ... in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15255#M1692</link>
    <description>&lt;P&gt;&amp;gt; Flyslinger2 (Contributor II) posted a new reply in Industry News on 10-04-2018&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Here&amp;nbsp;is the Bloomberg write up that Fox news referenced.&lt;BR /&gt;&lt;BR /&gt;I started out, more than 30 years ago, researching malware and other forms of&lt;BR /&gt;covert interference (including a number of instances involveing hardware). While&lt;BR /&gt;the possibility of a hardware attack similar to this is quite possible, the details of&lt;BR /&gt;this story are quite suspect.&lt;BR /&gt;&lt;BR /&gt;(First of all, you mention that Faux News is interested. That *automatically*&lt;BR /&gt;raises alarms &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;There is the issue that this relates to a separate chip found on the circuit boards.&lt;BR /&gt;If you are smart enough to make a chip that can do everything this superchip is&lt;BR /&gt;supposed to do, you should be smart enough to put the functions into another chip&lt;BR /&gt;on the the system (perhaps the system management controller that the superchip&lt;BR /&gt;is supposed to control) so that an extraneous chip won't raise alarms.&lt;BR /&gt;&lt;BR /&gt;Then there are all the functions this superchip is supposed to do. It is supposed to&lt;BR /&gt;manage communications. It is supposed to subvert the operating system.&lt;BR /&gt;(*Which* operating system? How would they know that would be the one used?)&lt;BR /&gt;It is supposed to divert password checks.&lt;BR /&gt;&lt;BR /&gt;Oh, right. It's supposed to subvert the system controller. I once reviewed a&lt;BR /&gt;supposed antiviral system that Western Digital used as a demonstration of their&lt;BR /&gt;new system controller chip. They made a total hash of it. Even system&lt;BR /&gt;controllers don't have the kind of reference monitor function that this superchip&lt;BR /&gt;would rely on.&lt;BR /&gt;&lt;BR /&gt;Other parts of the story refer to other chips, some as small as a pencil tip, that&lt;BR /&gt;could be layered into the circuit board itself. Yes, it could. But how would you&lt;BR /&gt;make contacts with it? (And you'd need multiple contacts ...)&lt;BR /&gt;&lt;BR /&gt;While the spy parts of the story sound reasonable, the tech parts don't. Now, it&lt;BR /&gt;may be that there are similar types of hardware attacks mounted. It may even be&lt;BR /&gt;that almost the whole story it true, but that the "sources" lied to Bloomberg about&lt;BR /&gt;the tech for reasons of their own. But this smacks, to me, of the tale of the&lt;BR /&gt;&lt;A href="http://catless.ncl.ac.uk/Risks/13/06#subj3.1" target="_blank"&gt;Desert Storm Virus of 1991&lt;/A&gt;. An April Fools joke that deceived the author of a&lt;BR /&gt;book about the 1991 Desert Storm campaign--and also the Pentagon press office.&lt;BR /&gt;(Because they'd read the book ...)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; It is very&lt;BR /&gt;&amp;gt; interesting.&lt;BR /&gt;&lt;BR /&gt;No. It's not.&lt;BR /&gt;&lt;BR /&gt;And I like the little tagline: "Bloomberg LP has been a Supermicro customer.&lt;BR /&gt;According to a Bloomberg LP spokesperson, the company has found no evidence&lt;BR /&gt;to suggest that it has been affected by the hardware issues raised in the article."&lt;BR /&gt;&lt;BR /&gt;Yeah, right. Like they'd know ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;What's most interesting about these ciphers is how robustly lousy&lt;BR /&gt;they are. - Bruce Schneier (on the GSM cryptographic algorithms)&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Oct 2018 16:56:04 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2018-10-12T16:56:04Z</dc:date>
    <item>
      <title>Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15227#M1684</link>
      <description>&lt;P&gt;&lt;A href="https://www.foxbusiness.com/politics/chinese-hackers" target="_self"&gt;Several&lt;/A&gt;&amp;nbsp;big name companies purchased corrupt gear from a manufacturer.&amp;nbsp; Of course China is involved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The purchasing process has to embed InfoSec into it.&amp;nbsp; Strong language needs to be added to procurement contracts that protect the interests of the end user-whether personal, civilian or Federal.&amp;nbsp; &amp;nbsp;You would also hope that there are process in place to test the gear to confirm that no suspicious activities were taking place.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 11:57:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15227#M1684</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-10-04T11:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15230#M1686</link>
      <description>&lt;P&gt;The process Mark&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/297159657"&gt;@Flyslinger2&lt;/a&gt;&amp;nbsp;is promoting here is called Supply Chain Risk Management (SCRM). For the U. S. Federal government, the guidelines are found in NIST &lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/publications/detail/sp/800-161/final" target="_blank"&gt;Special Publication (SP) 800-161,&amp;nbsp;Supply Chain Risk Management Practices for Federal Information Systems and Organizations&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;(2015). The SCRM effort began under President George W. Bush in January 2008 as Initiative #11 of the classified&amp;nbsp;&lt;EM&gt;Comprehensive National Cybersecurity Initiative&lt;/EM&gt; (CNCI) under&amp;nbsp;National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23). The CNCI was later declassified and continued under President Obama. President Obama further extended the focus in 2013 in &lt;A href="https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity" target="_blank"&gt;&lt;STRONG&gt;Executive Order (EO) 13636 Improving Critical. Infrastructure Cybersecurity&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp; and in 2014 in&amp;nbsp;&lt;A href="https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil" target="_blank"&gt;&lt;STRONG&gt;Presidential Policy Directive (PPD) 21,&amp;nbsp;Critical Infrastructure Security and Resilience&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While all of those documents are written for the government, obviously many of the principles found in them can, and should be followed by commercial enterprises. In particular, note that most of the critical infrastructure of the U.S. is owned, maintained, and operated not by any government entity but by private or commercial organizations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More recently the international standards community has added guidance for SCRM with&amp;nbsp;Open Trusted Technology Provider Standard (O-TTPS) is ISO Standard 20243:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.iso.org/standard/74399.html" target="_blank"&gt;ISO/IEC 20243-1:2018,&amp;nbsp;Information technology -- Open Trusted Technology ProviderTM Standard (O-TTPS) -- Mitigating maliciously tainted and counterfeit products -- Part 1: Requirements and recommendations&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;ISO/IEC 20243-2:2018&lt;BR /&gt;&lt;A href="https://www.iso.org/standard/74400.html" target="_self"&gt;Information technology -- Open Trusted Technology ProviderTM Standard (O-TTPS) -- Mitigating maliciously tainted and counterfeit products -- Part 2: Assessment procedures for the O-TTPS and ISO/IEC 20243-1:2018&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was directly involved in CNCI 11 during the initial phases in 2008 to 1010. One of our early challenges was helping educate participants in a shift in the meaning of the term &lt;EM&gt;supply chain risk&lt;/EM&gt;. For decades the logistics community has used the term to refer to&amp;nbsp;&lt;EM&gt;risks &lt;STRONG&gt;TO&lt;/STRONG&gt; the supply chain&lt;/EM&gt;. Under CNCI 11 and subsequent work of SCRM, the term means&amp;nbsp;&lt;EM&gt;risks to the mission (or the infrastructure) &lt;STRONG&gt;THROUGH&lt;/STRONG&gt; the supply chain.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a side comment, I noticed that two of the four authors of SP 800-161 have been involved in the SCRM effort since those early days ten years ago.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 14:11:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15230#M1686</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2018-10-04T14:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15246#M1691</link>
      <description>&lt;P&gt;&lt;A href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies" target="_self"&gt;Here&lt;/A&gt;&amp;nbsp;is the Bloomberg write up that Fox news referenced. It is very interesting.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 16:35:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15246#M1691</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-10-04T16:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15255#M1692</link>
      <description>&lt;P&gt;&amp;gt; Flyslinger2 (Contributor II) posted a new reply in Industry News on 10-04-2018&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Here&amp;nbsp;is the Bloomberg write up that Fox news referenced.&lt;BR /&gt;&lt;BR /&gt;I started out, more than 30 years ago, researching malware and other forms of&lt;BR /&gt;covert interference (including a number of instances involveing hardware). While&lt;BR /&gt;the possibility of a hardware attack similar to this is quite possible, the details of&lt;BR /&gt;this story are quite suspect.&lt;BR /&gt;&lt;BR /&gt;(First of all, you mention that Faux News is interested. That *automatically*&lt;BR /&gt;raises alarms &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;There is the issue that this relates to a separate chip found on the circuit boards.&lt;BR /&gt;If you are smart enough to make a chip that can do everything this superchip is&lt;BR /&gt;supposed to do, you should be smart enough to put the functions into another chip&lt;BR /&gt;on the the system (perhaps the system management controller that the superchip&lt;BR /&gt;is supposed to control) so that an extraneous chip won't raise alarms.&lt;BR /&gt;&lt;BR /&gt;Then there are all the functions this superchip is supposed to do. It is supposed to&lt;BR /&gt;manage communications. It is supposed to subvert the operating system.&lt;BR /&gt;(*Which* operating system? How would they know that would be the one used?)&lt;BR /&gt;It is supposed to divert password checks.&lt;BR /&gt;&lt;BR /&gt;Oh, right. It's supposed to subvert the system controller. I once reviewed a&lt;BR /&gt;supposed antiviral system that Western Digital used as a demonstration of their&lt;BR /&gt;new system controller chip. They made a total hash of it. Even system&lt;BR /&gt;controllers don't have the kind of reference monitor function that this superchip&lt;BR /&gt;would rely on.&lt;BR /&gt;&lt;BR /&gt;Other parts of the story refer to other chips, some as small as a pencil tip, that&lt;BR /&gt;could be layered into the circuit board itself. Yes, it could. But how would you&lt;BR /&gt;make contacts with it? (And you'd need multiple contacts ...)&lt;BR /&gt;&lt;BR /&gt;While the spy parts of the story sound reasonable, the tech parts don't. Now, it&lt;BR /&gt;may be that there are similar types of hardware attacks mounted. It may even be&lt;BR /&gt;that almost the whole story it true, but that the "sources" lied to Bloomberg about&lt;BR /&gt;the tech for reasons of their own. But this smacks, to me, of the tale of the&lt;BR /&gt;&lt;A href="http://catless.ncl.ac.uk/Risks/13/06#subj3.1" target="_blank"&gt;Desert Storm Virus of 1991&lt;/A&gt;. An April Fools joke that deceived the author of a&lt;BR /&gt;book about the 1991 Desert Storm campaign--and also the Pentagon press office.&lt;BR /&gt;(Because they'd read the book ...)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; It is very&lt;BR /&gt;&amp;gt; interesting.&lt;BR /&gt;&lt;BR /&gt;No. It's not.&lt;BR /&gt;&lt;BR /&gt;And I like the little tagline: "Bloomberg LP has been a Supermicro customer.&lt;BR /&gt;According to a Bloomberg LP spokesperson, the company has found no evidence&lt;BR /&gt;to suggest that it has been affected by the hardware issues raised in the article."&lt;BR /&gt;&lt;BR /&gt;Yeah, right. Like they'd know ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;What's most interesting about these ciphers is how robustly lousy&lt;BR /&gt;they are. - Bruce Schneier (on the GSM cryptographic algorithms)&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Oct 2018 16:56:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15255#M1692</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-10-12T16:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15267#M1694</link>
      <description>&lt;P&gt;Mark&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/297159657"&gt;@Flyslinger2&lt;/a&gt;&amp;nbsp;&amp;amp; Rob&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The US government is moving forward with embedding SCRM into information systems management by adding SCRM content to the Risk Management Framework (RMF). See the Final Public Draft of &lt;A href="https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/draft" target="_blank"&gt;NIST SP 800-37, Revision 2&lt;/A&gt;, &lt;EM&gt;Risk Management Framework for Information Systems and Organizations--A System Life Cycle Approach for Security and Privacy&lt;/EM&gt;. Public comment period on this draft is open until October 31.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 10:34:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15267#M1694</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2018-10-05T10:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15272#M1695</link>
      <description>&lt;P&gt;Current federal customer is not happy with my mentioning this to them.&amp;nbsp; All they can see is more intrusion into their project, higher costs, and more delays.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not well met where the rubber meets the road. Not surprised.&amp;nbsp; "Whats wrong with business as usual?"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I laugh.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 11:23:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15272#M1695</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-10-05T11:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why InfoSec has to be integrated into the purchasing process ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15274#M1696</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/297159657"&gt;@Flyslinger2&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Current federal customer is not happy with my mentioning this to them.&amp;nbsp; All they can see is more intrusion into their project, higher costs, and more delays.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not well met where the rubber meets the road. Not surprised.&amp;nbsp; "Whats wrong with business as usual?"&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Mark, et al.,&lt;/P&gt;&lt;P&gt;The standard benchmark priorities for most projects, and especially government acquisitions, are described by the three-legged stool of &lt;EM&gt;Cost&lt;/EM&gt;, &lt;EM&gt;Schedule&lt;/EM&gt;, and &lt;EM&gt;Performance&lt;/EM&gt;. While the training materials and reference documents use language and illustrations trying to present those three as co-equal, in reality they never are. My observation has been that &lt;EM&gt;Cost&lt;/EM&gt; is most often dominant over both schedule and performance. Occasionally, &lt;EM&gt;Schedule&lt;/EM&gt; assumes dominance, especially when an agency head has personally promised&amp;nbsp;a completion date in public testimony to one or more committees of Congress. I have never seen&amp;nbsp;&lt;EM&gt;Performance&lt;/EM&gt;&amp;nbsp;be the dominant concern in the triad.&lt;/P&gt;&lt;P&gt;When either cost or schedule are threatened, the solution is generally to reduce the performance requirements. Secondary requirements, not directly related to mission performance, tend to be loosened first, then direct mission performance functions.&amp;nbsp;Security and privacy requirements fall under the &lt;EM&gt;Performance&lt;/EM&gt; group, and are almost always secondary to mission. Thus, those security and privacy requirements get redefined as "desirements" and are discounted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only path I have figured out on how to overcome the attitude Mark described is to show clearly and concretely how failure to meet directed security capabilities will&amp;nbsp;negatively impact both Cost and Schedule by delaying system authorization (&lt;EM&gt;Schedule&lt;/EM&gt;) when the first system assessment is failed and adding post-production &lt;EM&gt;Cost&lt;/EM&gt; to go back and&amp;nbsp;bolt on the security features that should have been built in in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Enjoy!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 12:52:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Why-InfoSec-has-to-be-integrated-into-the-purchasing-process/m-p/15274#M1696</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2018-10-05T12:52:20Z</dc:date>
    </item>
  </channel>
</rss>

