Streaming analytics for analyzing endpoints and users for intrusive behavior has been around for about a quarter century, probably most heavily promoted by SRI with their extensive publications on their NIDES intrusion detection system. These 1998 notes show how I made SRI's statistics more understandable to me.Read More
1998 notes on streaming analytics with an obvious handwritten "typo"Read More
Friday evening, 16 March 2018, Attorney General Sessions fired Deputy FBI Director Andrew McCabe. McCabe was set to retire on Sunday. Jeff Sessions in a statement explained that he fired McCabe in part for "lack of candor - including under oath - on multiple occasions."
Note that Sessions did not say McCabe "lied" but that he "lacked candor".
That reason makes this video of Session's testimony under oath seem extra special.
While the Bloomberg title and much of the article focuses on fingerprints of professional hackers, I want to highlight two other aspects of the story - the differences in rewards and experience between the executive staff and the IT and cyber security staff.Read More
Last year I bought a new Sony TV with 4K and HDR anticipating a new 4K HDR Apple TV box. Last week my HDR Apple TV finally arrived, but I was disappointed when I apparently could not use the HDR capability.
After several days of experiments, I finally resolved all my issuesRead More
My entire career has been based on developing new cyber security technologies and products, and I would love to sell everyone the latest & greatest tech. But first, any potential user or customer should take care of many of the basic (and often cheap or free) things.Read More
On September 7 Equifax announced it had suffered a major breach exposing very sensitive information (names, Social Security numbers, birth dates, addresses, and, in some instances, driver's license numbers) on almost all Americans who participate in the economy. Unlike passwords or credit cards, this is information that cannot be changed.Read More
The article FBI pushes private sector to cut ties with Kaspersky discusses specific concerns about Kaspersky, but I think the issues are much broader.
In the briefings, FBI officials also raise the issue of Russia’s increasingly expansive surveillance laws and what they charge is a distinct culture wherein powerful Russian intelligence agencies are easily able to reach into private sector firms like Kaspersky with little check on government power.
This is not unique to Russia as governments and organizations all over the world want greater access to network activity, metadata, and contents on servers. The book After On: A Novel of Silicon Valley describes the fictitious social networking company Phluttr as a "EULA company" - a company where users essentially abdicate any 4th Amendment right to privacy when they agree to the End User License Agreement (which no one reads) and then contribute tons of information about themselves and their social connections.
Antivirus companies shipping metadata about all your files and network activity to their cloud servers, cloud-based file services (think about how they do de-duping), cloud-based email & messaging services, social networks, etc. all leak huge amounts of data about you.
The large amount of details users voluntarily give to companies is ripe for use in influence operations. For more details on the potential when analytics is applied to troves of data voluntarily provided, see The Data That Turned the World Upside Down:
The strength of their modeling was illustrated by how well it could predict a subject's answers. Kosinski continued to work on the models incessantly: before long, he was able to evaluate a person better than the average work colleague, merely on the basis of ten Facebook "likes." Seventy "likes" were enough to outdo what a person's friends knew, 150 what their parents knew, and 300 "likes" what their partner knew.
Google "cyber Pearl Harbor", and Google identifies tens of thousands of documents with that phrase. I've been hearing the phrase for almost as long as I have been in cyber security. It is almost always used with the sense that the cyber equivalent of the Japanese attack on Pearl Harbor is just around the corner.
But I claim that it has already happened. Or more precisely, the Information Operation Pearl Harbor has already happened, and cyber attacks played a significant role.
17 US intelligence agencies agreed that Russia actively interfered with the US elections [NPR] and, according to Former Director of National Intelligence James Clapper, Russia did so to help Donald Trump get elected [CNN].
And to gain a greater understanding on how you (and your neighbors) can be targeted by a skillfully executed information operation, read this article about some of the targeted information being collected about you in order to shape how you think and perceive the world.
The lapse in security was striking for putting at risk the identities, voting histories and views of voters across the political spectrum, with data drawn from a wide range of sources including social media, public government records and proprietary polling by political groups.
Chris Vickery, a risk analyst at cybersecurity firm UpGuard, said he found a spreadsheet of nearly 200 million Americans on a server run by Amazon's cloud hosting business that was left without a password or any other protection. Anyone with Internet access who found the server could also have downloaded the entire file.
In all, the leaked files amount to more than 1,000 gigabytes of data — more than four times the size of any previous breach of this type, according to Vickery. The exposed data also contained records of voters' views on specific issues including gun control, abortion and environmental issues, he said. Overall, Vickery said, there were billions of data points and 170 GB of social media posts scraped from Reddit alone.
"They're using this information to create political dossiers on individuals that are now available for anyone," said Jeffrey Chester, executive director of the Center for Digital Democracy. "These political data firms might as well be working for the Russians."
Democracies are very vulnerable to information operations, and Putin has figured this out. Why should an enemy drop bombs like the Japanese did in Pearl Harbor when they can achieve their political goals through information operations?
This morning I received the following alert on my iPhone (and yes, I do have 708 unread emails)
While the alert complained about the identity of "prc.apple.com", when I clicked on "Details", it referred to "instant.arubanetworks.com". Was the prc.apple.com certificate signed by arubanetworks?
I clicked on "More Details", and the following Subject Name and Issuer Name information popped up.
Scrolling down, I see the details of the signing algorithm: SHA-1.
Given that SHA-1 has been compromised (Announcing the first SHA1 collision), an untrusted certificate alert from a SHA-1 certificate had me concerned.
In the end, as is too often the case in security, I was left with lots of questions.
- Was there a verification problem with the "prc.apple.com" certificate or "instant.arubanetworks.com" certificate?
- Was the prc.apple.com certificate faked and signed with a bad instant.arubanetworks.com certificate?
- Was there a man-in-the-middle attack?
- Was Apple's software just buggy and in reality everything was fine?
- Was there a problem, but Apple's alert identified the wrong certificate that was having problems?
- What the heck Aruba? You are all about the IoT and you use SHA-1? Don't we already have enough troubles with IoT?
I have been using my MacBook Pro (Retina, 13-inch, Mid 2014 (currently running 10.12.4 Beta)) with a Thunderbolt Display. Today I (literally) dusted off an old LED Cinema Display to add a second large external display.
I connected the Cinema Display's mini DisplayPort to my Mac, but I found the screen was dimmer than I wanted. I tried a number of tricks to brighten the screen (F1 and F2 function keys on external keyboard (with multiple modifier keys), Control Panel, even a 3rd party application), but nothing seemed to change the brightness.
Then I connected the LED Cinema Display's USB cable, and surprise!, I could now control the brightness on both monitors.
- For Cinema Display, F1 and F2 changed the brightness
- For Thunderbolt Display, ctrl-F1 and ctrl-F2 changed the brightness
So, if you are using an LED Cinema Display with your MacBook Pro and are having troubles setting its brightness, make sure you have the display's USB cable connected to your Mac as well.
(Updated with additional videos on 2017-03-27)
I have had a lot of problems with my xfinity television service lately, where the video portion gets stuck on an image even though the audio keeps playing. I can use the controller to select different channels or select a pre-recorded video to watch, and while the audio changes, the video never changes.
I am encountering this about once a day. I find I often have this problem when trying to watch Bloomberg. I almost feel Bloomberg isn't a video signal but an application (with an embedded video), and it is buggy software. Whatever is the case, I hope xfinity fixes this soon.
Rebooting my cable box every day (sometimes multiple times per day) is not an acceptable fix.
The following video shows the problem (watch with audio on).
In 1988 I watched the Morris worm work its way through our University computers and through the computers of most of the people I interacted with on a professional basis. The Morris worm used numerous vectors (see "The Internet Worm Program: An Analysis") and a few evasion techniques to work its way through roughly 10% of the Internet (incidentally, "decimate" refers to the killing of one-tenth of a group, so technically the Morris worm decimated the Internet).
About two years later I started playing with Robert Baldwin's SU-Kuang bundled with Dan Farmer's COPS security checker system. SU-Kuang, named after the Kuang Grade Mark Eleven penetration program in William Gibson's Neuromancer, showed how an attacker with an initial set of capabilities could, through the knowledge of the UNIX security model, acquire more and more capabilities until it could achieve some particular goal such as becoming root or having the right privileges to access or modify a certain file. I learned a lot about the UNIX security model (and how one could hack UNIX systems) from Kuang.
In 1996 a colleague, Dan Zerkle, extended the Kuang approach to an entire network (see "NetKuang - A Multi-Host Configuration Vulnerability Checker"). It was disturbingly effective. And there were a number of other systems designed to automatically find their way through systems (see our 2004 report "A Taxonomy for Comparing Attack-Graph Approaches").
In 2004 I gave a talk at the Naval Postgraduate School where I discussed how (free) computer chess games could beat the pants off most human players. Given that the muti-vector Morris worm and Kuang systems as well the original fuzz tool were developed 16 years earlier (1988 was an amazing year), I suspected "GNU-Chess of MalCode" would become the new adversaries, and they would, like their computer chess game counter parts, be more effective than almost all humans playing the game.
Well, it has been another 12 years since I predicted the "GNU-Chess of MalCode" (it is easier to predict the future than predict when the future will arrive), and with DARPA's Cyber Grand Challenge we are starting to see the beginning of such systems. The EFF was very concerned, and engadget laughed at EFF.
I believe the threat is real.
Interestingly, also in 2004 DARPA held its first self-driving car Grand Challenge. Not a single car finished. The best car only made it about 7 miles. Today cars by Google and Tesla have driven themselves millions of miles on America's roads and highways.
I have to wonder how sophisticated automated malware will be 12 years from now?
The most persistent rumor about the iPhone 7 has been the removal of the headphone jack. There has been a lot of hostility and ink spilled on this topic like Nilay Patel's "Taking the headphone jack off phones is user-hostile and stupid". And there has been lots of speculation as to why Apple is making this move, including an effort to make the phone thinner, more water proof, or just because this is how Apple rolls (floppy disk, CD, etc.).
However, I think there is one reason for this rumored move by Apple rarely mentioned, and that is to drive the adoption of wireless headphones that will work with Apple Watch.
Whereas the strongest rumor about the phone has been about the headphone jack, the strongest rumor about the next Apple Watch has been the inclusion of GPS. Secondary rumors are the inclusion of a barometer, superior waterproofing, and higher capacity battery (see MacRumors article). This is all about making Apple Watch more of a fitness device. A greater ubiquity of wireless headphones will increase the appeal of the Apple Watch as a stand-alone fitness device. You will no longer need to run, ride, or workout with a giant phone attached to your arm.
I honestly believe that Apple sees widespread adoption of Apple Watch as one of the most powerful ways that Apple can improves lives for the better. You see this in companies they have acquired like Gliimpse (The Verge article) and in libraries that Apple provides developers like HealthKit, ResearchKit, and CareKit. In 2015, when Jim Cramer asked Tim Cook about next frontiers, Cook said heath was "the biggest one of all" (MacRumors article).
A thinner phone, a more waterproof phone, edge-to-edge OLED screens - these are tweeks to an already incredible device. They won't fundamentally change your life.
It is improved health, with Apple Watch spearheading that effort, that is a driving passion at Apple, or at least with Tim Cook. And I believe that the push for wireless headphones that work with Apple Watch is just one small but important part of Apple's larger health strategy.
I recently watched the movie “Zero Days” via the iTunes Store, and the movie included a couple of shots inside the Security Operations Center (SOC) of the Department of Homeland Security (DHS). In these shots we see a glimpse of DHS’s network monitoring system called EINSTEIN (Wikipedia, DHS). The segment covering the DHS SOC starts at about 1 hour and 26 minutes into the movie.
EINSTEIN is on its third major release. EINSTEIN 1 appears to be a basic NetFlow-class analyzer with anomaly detection, perhaps done in batch mode. EINSTEIN 2 added signature capabilities via threat intelligence feeds. EINSTEIN 3 adds blocking capability plus the ability to move the sensor farther upstream (e.g., running on ISP or backbone traffic).
Below are my analyses (guesses) of some of the EINSTEIN information shown at the SOC.
Figure 1 (from “Zero Days”) shows a summary of sensors information coming into DHS. Each row represents a single sensor. The following is my interpretation of the fields displayed.
- B/Pkt. This first visible column appears to be an average of bytes per packet. An empty packet (one with no payload) typically has about 54 bytes (plus or minus depending on a number of factors). The maximum packet size is about 1500 bytes (depending on physical networking technology). An average of about 600 bytes per packet seems about right.
- B/Pkt ZScore. The second column appears to show how anomalous the current bytes per packet rate is. If DHS is assuming their data is Gaussian distributed, a ZScore is the number of standard deviations the current value is from the mean. The bytes per packet for the first and third rows appear to be fairly normal, but the bytes per packet for the second row appears to be on the low side (2 standard deviations below the average). A low B/Pkts Zscore can be caused by a high number of empty packets like you would get if your site is being scanned or the focus of several types of DDoS attacks (e.g., SYN-flood). It could also be caused by random fluctuations in values. A Zscore of -2 (or lower) should be seen about 2.28% of the time.
- Current Bytes. This column is harder to interpret on its own, but given that the cell in the top row has the same value as the cell two columns over, my guess is Current Bytes is simply Bytes per Hour. We don’t know the actual value since the ellipses suggest there are more numbers we are not seeing.
- Average Bytes. This column is also hard to interpret. As with the previous column and the next column, the actual number is not known because some digits are missing from the display.
- B/Hr. The column appears to be Bytes per Hour. This is an overall traffic rate. It is unclear what technique they are using. For example, are they using an exponentially decaying average? And if so, what half-life are they using?
- P/Hr. This column appears to be Packets per Hour - another measure of traffic rate.
- Location. The far right column is named “Location”, and while we cannot see any values here, another shot in the movie shows the value for this column including “Springfield, …”, “Washington, …”, “Reston, VA”, and “Plano, TX”. Yet another shot in the video shows the column “Agency”, with values like “CBP”, “USDA”, and “VA”. And the next column is named “Collector” with values like “CBP3”, “USDA7”, and “VA1”. From these values each row represents a single sensor at a government site, and the “Location” is the city where this government site is located.
From this table it appears that the only value we can determine is anomalous is Bytes per Packet. For example, if volume increased or decreased a lot, it would not be obvious from the view from this image. A “B/Hr ZScore” or “P/Hr ZScore” column could flag these anomalous conditions. However, the next figure can helps visually spot anomalous traffic rates.
Traffic Rates View
Figure 2 shows traffic volume (i.e., bytes per hour or packets per hour) displayed on a protocol by protocol basis.
Trying to read the fuzzy image, the left column appears to be displaying traffic rates for
- Total (all traffic)
- ICMP - Internet Control Message Protocol
- IGRP - Interior Gateway Protocol
- RSVP - Resource Reservation Protocol
- Other - all other traffic that is not part of the named protocols
And the right column appears to be displaying traffic rates for
- HOPOPT - IPv6 Hop-by-Hop Option
- TCP - Transmission Control Protocol
- UDP - User Datagram Protocol
- ESP - Encapsulating Security Payload
My guess is that the red color represents outbound traffic rates and the blue color represents inbound traffic rates (or vice versa).
What is interesting are the five large peaks for TCP and UDP equally separated in time and of equal volumes. These peaks are also reflected in the “Total” chart as well, indicating, not surprisingly, that TCP and UDP traffic dominate the total amount of traffic. These large and rhythmic spikes may indicate there was a large amount of traffic generated by an automated process that spanned both UDP and TCP. Perhaps it is some type of network scan or multi-vector DDoS attack.
Admittedly this is a lot of guess work trying to interpret two still frames from the movie “Zero Days”, but this is the first time I’ve seen any images from DHS’s EINSTEIN monitoring system. Furthermore, the video segment appears to be part of a public or press tour of the DHS SOC, so any truly revealing images of EINSTEIN would not be displayed.
In particular, there is a scene showing a large blinking red light on the ceiling. I think the director was trying to show “Red Alert! Something bad is happening!” However, being someone without a security clearance, I know lights like these are turned on when people like me are in the building to tell everyone to cover up any sensitive information and not to talk about sensitive topics. In other words, the blinking red light was because the film crew was in the building.
I hate the term "artificial intelligence" because "artificial" implies that it is fake. Unfortunately, if you look at the history of this field, much of the early work was indeed artificial. Researchers would manually program their systems to achieve certain tasks, but the systems did not absorb feedback from their experience to adjust how they would behave in a future situation. They were static systems.
In my mind, "machine learning" is about the "learning". There is nothing artificial about it. The system may not necessarily be learning how humans learn, but it is learning. However, the terms AI and machine learning are still largely used interchangeably.
The field has gone through many twists and turns and several AI winters, but the early promises appear to be finally coming true. I believe there were three important factors necessary to let this happen: true learning systems that used feedback, significant computational horsepower, and lots and lots of data. A short 2.5 page paper in 1986 on back-propagation of errors helped address the first factor, but it wasn't until the recent emergence of the cloud that the last two factors could be addressed. Graphical processing units/engines (GPUs) are also being used to address the computation horsepower factor. It wasn't until about 2012 that these factors started to come together.
The a16z podcast AI, Deep Learning, and Machine Learning: A Primer provides a great 45 minute history and introduction to the field, including a nice demo of Google's TensorFlow at about the 25:45 mark in the video. The book The Master Algorithm covers similar ground but in more depth.
In Tony Fadell's announcement that he is leaving Nest, he said (emphasis added):
Although this news may feel sudden to some, this transition has been in progress since late last year and while I won’t be present day to day at Nest, I’ll remain involved in my new capacity as an advisor to Alphabet and Larry Page. This will give me the time and flexibility to pursue new opportunities to create and disrupt other industries – and to support others who want to do the same – just as we’ve done at Nest. We should all be disrupters!
The trouble with focusing on disruption, and indirectly saying everything else is a lesser cause, is that you end up with a bunch of crappy, half-baked solutions. Transforming the world requires Crossing the Chasm that separates the small populations of innovators and early adopters to the far larger populations of early and late majorities. It is only once you reach these populations that transformation can truly occur. Crossing that chasm takes patient nurturing of the technology, and that may take years and seem boring to a disruptor like Fadell.
ArsTechnia's article Nest’s time at Alphabet: A “virtually unlimited budget” with no results wrote:
Two-and-a-half years under Google/Alphabet, a quadrupling of the employee headcount, and half-a-billion dollars in acquisitions yielded minor yearly updates and a rebranded device. That's all.
Well, actually it yielded more - a major safety recall of its thermostat and disabling of one of its major features, shutting down the Revolv servers effectively bricking customers' $300 devices, and what felt like a never ending stream of bad press tarnishing the Google/Alphabet brand.
Tony Fadell and the tech industry in general need to stop worshipping disruption and also focus on nurturing the new technologies until they can cross the chasm and truly transform the world.
The New York Times article A Visionary Project Aims for Alpha Centauri, a Star 4.37 Light-Years Away describes an audacious project called Breakthrough Starshot. Its goal is to get a spacecraft to another solar system in 40 years. There are two important caveats:
- The spacecraft will just zip through the solar system without stopping.
- The spacecraft would be very, very small, only about a gram (about the weight of the guts of an iPhone).
You could think of it as a teeny tiny Rama (Rendezvous with Rama by Arthur C. Clarke) or maybe Earth's version of Kamin's flute (The Inner Light from Star Trek: The Next Generation) carrying knowledge about who we are to stars throughout the galaxy.
In 45 years we could be seeing photos of other worlds!
The cost is relatively small, estimated to be between $5 billion and $10 billion spread out over about 20 years. NASA's current budget is $19.3 billion per year, so the cost would be about 2.5% of NASA's budget over the 20 years. Or would it be better if this was privately funded like the interstellar project in Allen Steele's book Arkwright? (As of 2016-04-12 Mark Zuckerberg was estimated to be worth $48.2 billion; Bill Gates, $77.2 billion)
And since most of the technology will be spent developing the technologies and the giant laser array, all of which can be re-used, the marginal cost to send a fleet of spacecraft to additional solar systems should be very inexpensive.
In two decades we could take the initial steps to becoming an interstellar civilization.
Last year when analyzing raw PCAP-NG data from Yosemite, I noticed Apple embedded application name data in the PCAP data. The PCAP-NG format lets vendors create their own extensions to the data, and I thought Apple created a clever and handy extension. Last month I finally sat down to start learning Swift, so I did what I usually do when learning a new language - I wrote a network analyzer.
I had the pleasure of presenting at the Security Onion Conference in Augusta, GA today. I also had the challenge of following Richard Bejtlich's presentation. Richard is an excellent speaker, and I strongly encourage you to hear him talk live if you get a chance.
Here are the slides from my talk
Many thanks to Doug Burks for giving me a chance to present.