<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Eric Sharret &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/author/administrator/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Fri, 12 Oct 2018 16:18:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>Eric Sharret &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Using AI to Identify the Resistance</title>
		<link>https://telegrid.com/using-ai-identify-resistance?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=using-ai-identify-resistance</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 12 Oct 2018 16:14:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=2192</guid>

					<description><![CDATA[<p>Last month the New York Times published a now famous op-ed from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/using-ai-identify-resistance">Using AI to Identify the Resistance</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone size-full wp-image-2193" src="https://telegrid.com/wp-content/uploads/2018/10/Resistance.jpg" alt="" width="700" height="400" srcset="https://telegrid.com/wp-content/uploads/2018/10/Resistance.jpg 700w, https://telegrid.com/wp-content/uploads/2018/10/Resistance-300x171.jpg 300w" sizes="(max-width: 700px) 100vw, 700px" /></p>
<p>Last month the New York Times published a now famous <a href="https://www.nytimes.com/2018/09/05/opinion/trump-white-house-anonymous-resistance.html">op-ed</a> from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  Watching this unfold I began to wonder whether Artificial Intelligence could have identified the author.  I have applied machine learning to all sorts of pattern recognition problems and this seemed like just another example.</p>
<p>TELEGRID is a market leader in the field of behavioral biometrics which includes voice recognition.  Voice recognition utilizes subtle nuances in a user’s speech pattern to perform user verification or identification.  This field is widely researched and several technologies have made their way into commercial products.  For instance, last year, Amazon announced that Alexa could <a href="https://www.zdnet.com/article/amazons-alexa-can-now-recognise-different-voices/">differentiate between voices</a>.</p>
<p>If we can perform speaker identification then author identification is not a big leap.  Handwriting recognition, which uses optical character recognition, has also been around for a long time and is used widely in the banking industry for signature verification.</p>
<p>But what about text that is not handwritten, is there enough difference in authors’ styles to identify them?</p>
<p>Stylometry is the identification of linguistic style in written language.  While around for hundreds of years, it was not until 1964 that <a href="https://www.press.uchicago.edu/ucp/books/book/distributed/I/bo5667096.html">Mosteller and Wallace</a> applied statistical modeling to identify the authors of the Federalist Papers.  This began the application of machine learning to author identification of other classic literature and even <a href="https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS13/paper/viewFile/5917/6043">tweets</a>.</p>
<p>The results of this research have been positive but the lack of a valid business case has limited the technology’s penetration.  For instance while it might be interesting to find out if someone forged their college essay, it is doubtful that Universities will pay for it.  One potential market is artist verification for auction houses.  While not linguistic, perhaps this will be the market that helps the development of author identification.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at TELEGRID.  TELEGRID has unique expertise in secure authentication, behavioral biometrics, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/using-ai-identify-resistance">Using AI to Identify the Resistance</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Machine Learning Marketing: Ignore Size</title>
		<link>https://telegrid.com/machine-learning-marketing-ignore-size?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=machine-learning-marketing-ignore-size</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 28 Jun 2018 19:50:06 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1875</guid>

					<description><![CDATA[<p>TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/machine-learning-marketing-ignore-size">Machine Learning Marketing: Ignore Size</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user <a href="https://telegrid.com/smrte-unified-authentication">authentication</a>.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend in Machine Learning marketing whereby size is being promoted as the ultimate differentiator.  I believe this ignores the math behind Machine Learning and so I decided to focus this post on helping consumers ask the right questions.</p>
<p style="text-align: center;"><strong>My Data Set is Bigger </strong></p>
<p>Recently a team at the University of Manchester released a <a href="https://gizmodo.com/this-ai-knows-who-you-are-by-the-way-you-walk-1826368997">study</a> about a system that identifies users by the way they walk.  The system uses pressure pads on the floor and a high-res camera to authenticate users based on their footsteps.   The article states that the team “compiled a database consisting of 20,000 footstep signals from more than 120 individuals.  It’s now the largest footsteps database in existence.”  I would love to hear the debate between this researcher and the researcher who has the second largest footsteps database in existence.</p>
<p>I understand the importance of having a large data set to cross validate and test an algorithm but Machine Learning marketing should be focused on the algorithm and not the data set size.  For instance with algorithms that suffer from high bias (AKA underfitting), the size of the data set will not have much of an impact.  Additionally certain algorithms (e.g., Support Vector Machines) can be very slow if the data set is too large.  If the speed of your Machine Learning system is important this should matter to you.</p>
<p style="text-align: center;"><strong>My Feature Set is Bigger </strong></p>
<p>In Machine Learning features are used to predict an outcome.  For user authentication features include motion sensor data, keyboard clicking rhythm, GPS location, etc.  I recently saw an advertisement for a Machine Learning system that claimed its algorithm was the best because it used 1,000 features.</p>
<p>This Machine Learning marketing was claiming that the higher the number of features the better the quality of the Machine Learning algorithm.  However, if your algorithm suffers from high variance (AKA overfitting) the number of features should be reduced not increased.  Additionally, performing linear algebra functions on matrices with a high number of features can consume valuable resources.  This is an issue for Machine Learning systems that are designed to run on low power and low compute devices like mobile devices.</p>
<p style="text-align: center;"><strong>My Number of Iterations is Bigger </strong></p>
<p>Researchers often base the superiority of their prediction on the number of times the underlying algorithm was run.  For instance, a recent <a href="https://www.technologyreview.com/s/611397/machine-learning-predicts-world-cup-winner/">study</a> on the World Cup found that Germany had a 12.8% chance of winning.  As the Machine Learning marketing clearly shows the support for this prediction was the fact that the algorithm was run 100,000 times.  Despite the number of iterations Germany crashed out in the first round.  Now you can blame the algorithm, the human element or simply the fact that the study was performed by German researchers and was therefore biased from the start.  One thing is clear though, the number of iterations had little impact on the accuracy of this Machine Learning algorithm.</p>
<p>I believe the lesson from these examples is that we must cut through size-based Machine Learning marketing and challenge developers to justify their choices.  You wouldn’t select a software package simply because it was written by 10,000 engineers would you?  We should ask developers why they picked specific features.  Are all the selected features necessary or is the correlation high enough so that a few can be removed?  How is the large data set being used to improve the algorithm?  Also, how will the algorithm design affect its performance on your specific hardware?</p>
<p>We need to refocus Machine Learning marketing away from size and instead towards justification of the Machine Learning model.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/machine-learning-marketing-ignore-size">Machine Learning Marketing: Ignore Size</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Protect Anonymity in Machine Learning</title>
		<link>https://telegrid.com/protect-anonymity-in-machine-learning?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-anonymity-in-machine-learning</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 29 May 2018 14:03:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1629</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-anonymity-in-machine-learning">How to Protect Anonymity in Machine Learning</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and the enforcement of strict data usage policies.   Companies, specifically those that employ machine learning, have complained about the onerous regulation, claiming that their security practices already protect individual privacy. The problem is that some of these security methods, like employing subject anonymity, have been shown to fail. Luckily there is a new field called Differential Privacy which aims to protect anonymity in machine learning.</p>
<p>TELEGRID recently completed a review by an Institutional Review Board (IRB) for a test involving biometrics.  An IRB is an ethics board that approves and monitors research involving human subjects &#8211; think of drug trials for the Food and Drug Administration.  In fact when our Government customer first asked us to go before an IRB I replied, “Why?  I am not putting shampoo in anyone’s eyes.”  However, since we were collecting biometrics from human subjects we were required to speak to an IRB about how we intended to protect the subjects’ information from data leakage.</p>
<p>Aside from the mountain of paperwork, the process was fairly painless and we were deemed exempt based on the type of data we were collecting, the level of security we maintain at our offices, and our ability to maintain subject anonymity.  While I agree with the type of data and cybersecurity controls being a basis for exemption, past studies have raised doubts about the ability to protect anonymity in machine learning.</p>
<p>For instance, in 2006, researchers from the University of Texas at Austin were able to <a href="https://www.wired.com/2007/12/why-anonymous-data-sometimes-isnt/">identify Netflix users</a> by matching a database of anonymous users’ movie preferences with users who publicly entered movie ranking on IMDb.  Anonymity was challenged again in 2013 when a Harvard professor <a href="https://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous-volunteers-in-dna-study/">identified 40%</a> of a sample of anonymous participants in the Personal Genome Project.  While both studies relied on a secondary dataset, which may not always be available, they did show that it is possible to identify subjects in anonymous databases.</p>
<p>To protect anonymity in machine learning researchers have been working on a new technique called Differential Privacy.  Differential Privacy allows machine learning algorithms to arrive at the same conclusion whether or not a subject is included in the input data set.  To explain it we will use the classic example of a pollster asking a subject which political party they voted for.  If the pollster collected other data, which can be cross referenced to a public database, it is possible to identify the subject and their voting history.  To institute Differential Privacy we would instead ask the subject to flip a coin, and based on the result, either tell the truth or lie about who they voted for.  Using statistics it is possible to extract the ‘noise’ of the coin flip.</p>
<p>In short, Differential Privacy is the controlled injection of noise into a data sample to provide a subject with the ability to plausibly deny that they gave a specific response.</p>
<p>Differential Privacy is still in its infancy, and requires a larger data set in order to overcome the injected noise, but it is currently the most promising option we have to protect anonymity in machine learning. If you would like to learn more about Differential Privacy I would suggest starting with this <a href="https://twimlai.com/twiml-talk-132-differential-privacy-theory-practice-with-aaron-roth/">episode</a> from the podcast This Week in Machine Learning &amp; AI.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-anonymity-in-machine-learning">How to Protect Anonymity in Machine Learning</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adversarial AI and Mitigation Methods</title>
		<link>https://telegrid.com/adversarial-ai?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adversarial-ai</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 09 Apr 2018 17:43:36 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1620</guid>

					<description><![CDATA[<p>Adversarial Artificial Intelligence or Adversarial AI is the new buzzword on Capitol Hill.  In the past few weeks there have been hearings on Adversarial AI in the House and the Senate, multiple articles written on &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/adversarial-ai">Adversarial AI and Mitigation Methods</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Adversarial Artificial Intelligence or Adversarial AI is the new buzzword on Capitol Hill.  In the past few weeks there have been hearings on Adversarial AI in the House and the Senate, multiple articles written on the subject and even calls for a <a href="http://www.nextgov.com/policy/2018/03/how-much-does-artificial-intelligence-threaten-national-security/146844/">commission</a> to investigate the threat.  However, there have been very few details about the specific threat or how to mitigate it.  As a cybersecurity company that designs Machine Learning products for user authentication TELEGRID has a unique perspective on this subject.</p>
<p><strong>Secure Your “AI Supply Chain”<sup>TM</sup></strong></p>
<p>Machine Learning, like any other piece of software, suffers from garbage in, garbage out.  Take the classic example of an image classifier that is designed to identify a bus.  What happens if you start to feed it pictures of giraffes and label them buses?  I mean they are both yellow and black right?  Turns out the machine will start to look at pictures of giraffes and call them buses.</p>
<p>Mislabeled data is one of the biggest Adversarial AI attacks.  By feeding in incorrect data adversaries can trick machines into falsely classifying images.  How many false positives must an operator see before they stop paying attention?</p>
<p>Messing up an algorithm is concerning but tricking it to perform an action is very dangerous.  This is called an enchanting attack and was highlighted in a recent <a href="https://blog.openai.com/adversarial-example-research/">post</a> by Google and UC Berkley researchers.  These researchers manipulated data to force a Reinforcement Learning (RL) algorithm to purposefully lose a video game.  Imagine if an adversary could use this method to cause a robotic tank to purposefully fire on its own forces.</p>
<p>To mitigate this threat we need to actively focus on our AI supply chain like we do with our hardware supply chain.  Before you buy a Machine Learning product ask the company where its training data comes from.  Is it crowdsourced, meaning anyone can label the data and put in a Trojan horse?  If it is built by a team of professionals what country are they located in?  We need to remember that labelled data is to Machine Learning what microchips are to hardware.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop">Click to Subscribe</a></h4>
<p><strong>Know Your Algorithms</strong></p>
<p>While the bus/giraffe example is a little simplistic the truth is that we often do not know what machine learning is focusing on.  In a <a href="http://innovation.uci.edu/2017/08/husky-or-wolf-using-a-black-box-learning-model-to-avoid-adoption-errors/">study</a> at UCI, students were asked to use Machine Learning to differentiate between a wolf and a husky.  When they pulled back the covers they realized that it was the snow in the background that was actually the main classifier.  Another study found that when trying to identify traffic lights it was actually the arm of the traffic light separating the sky from the ground that was the main classifier.  So if a picture of the horizon was passed into the algorithm it would also return the term traffic light.</p>
<p>To mitigate this threat we must know our algorithms.  Indeed the Defense Advanced Research Projects Agency (DARPA) has started to do a lot of <a href="https://www.afcea.org/content/ai-please-explain-yourself">work</a> in this area.  By understanding what it is that AI is using to make its decisions we can not only decide if the decision has merit, but also how Adversarial AI can manipulate it.</p>
<p>Admiral Michael Rogers, the director of the NSA, made an interesting related point at a <a href="https://www.c4isrnet.com/it-networks/2018/04/04/how-artificial-intelligence-went-from-an-advantage-to-a-worldwide-threat/">hearing</a> before the Intelligence Committee.  “With the power of machine learning, artificial intelligence and big-data analytics, data concentrations now increasingly are targets of attraction to a whole host of actors.”  While the simplest reaction to this comment is to secure all data that is not always practicable.  However, if we know what patterns our AI is looking for, we will know what data must be protected.</p>
<p>At the moment Adversarial AI is confined to experiments where the researchers control the data, the algorithm and the RL reward.  Despite that, there is enough research to be concerned and it is justifiable for our leadership to ask questions.  In my opinion though we should not be looking at our enemies but rather ourselves.  Adversarial AI can be mitigated but first we must take the time to better understand our own AI by understanding its data inputs and the algorithms that use that data.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop">Click to Subscribe</a></h4>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/adversarial-ai">Adversarial AI and Mitigation Methods</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Forged Passports, CBP and Digital Signatures</title>
		<link>https://telegrid.com/forged-passports-cbp-digital-signatures?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=forged-passports-cbp-digital-signatures</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 16:20:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1605</guid>

					<description><![CDATA[<p>Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security.  The gap is not related to the &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/forged-passports-cbp-digital-signatures">Forged Passports, CBP and Digital Signatures</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week Senators Ron Wyden and Claire McCaskill released a <a href="https://www.wyden.senate.gov/imo/media/doc/wyden-mccaskill-epassport-security-letter-to-cbp.pdf">letter</a> demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security.  The gap is not related to the border wall or drug submarines, but that we are not checking digital signatures on e-Passports.  Even though it sounds like an obscure cybersecurity issue, the fact that CBP is not checking digital signatures is a big deal.  This gap, if exploited, could allow bad guys to access the United States with forged passports.</p>
<p>As any James Bond fan knows, forged passports are a problem.  For example, a recent Reuters <a href="https://www.reuters.com/article/us-northkorea-kim-passports-exclusive/exclusive-north-korean-leaders-used-brazilian-passports-to-apply-for-western-visas-sources-idUSKCN1GB2AY">article</a> detailed how Kim Jong-il and Kim Jong-un of North Korea allegedly used a Brazilian passport to obtain visas from foreign countries.  To combat this threat e-Passports were developed over a decade ago and since 2015 the US has required them from countries on the visa-waiver list.</p>
<p>e-Passports include a chip containing electronic information that matches the physical information on a passport.  To prevent forged passports, the information on this chip is digitally signed by the issuing country’s Certificate Authority (CA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop">Click to Subscribe</a></h4>
<p>The digital signing process involves hashing the electronic passport data and then encrypting that hash with the CA’s private key.  Software then decrypts the signature with the CA’s public key and compares the result to its own hash of the passport data.  The only way these two values would match is if the signature was created from a matching public-private key pair.  For more information on how digital signatures work watch our <a href="https://telegrid.com/identity-management-videos">video tutorial on Public Key Infrastructure (PKI)</a>.</p>
<p>Even though CBP is checking that the electronic and physical information match, there is no way to guarantee that both are not fake if the digital signature is not verified.  This leaves our border open to forged passports.</p>
<p>In a 2010 <a href="https://www.gao.gov/assets/310/300986.pdf">report</a> the Government Accountability Office (GAO) gave the two main reasons why CBP is not checking digital signatures.</p>
<p>1) “A database needs to be established and populated with the digital certificates needed to fully validate the digital signatures that can be accessed by CBP inspection workstations at the ports of entry.”</p>
<p>2) “CBP needs to develop and implement functionality on its inspection workstations to access the database.”</p>
<p>The first issue could be resolved by accessing the ICAO Public Key Directory (PKD) and downloading the CA certificates.  The International Civil Aviation Organization (ICAO) specifically created the PKD as a central repository for countries to exchange information required to validate e-Passports.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop">Click to Subscribe</a></h4>
<p>The second issue I do not believe is a question of a software upgrade since checking digital signatures is a standard process.  Rather, I believe it is the time to access the certificate database and perform revocation checking.  This is similar to the issue the retail sector had when chip based credit cards were introduced.  Considering how many people CBP has to clear each day I understand the concern.  However, there are solutions available.  To speed up revocation checking CBP can create local CRLs or OSCP responders that are updated daily.  This is similar to the approach the US Army takes with revocation checking on its tactical networks.</p>
<p>At the end of the day, these are not difficult problems and I expect CBP to solve them quickly &#8211; most likely by contacting <a href="https://telegrid.com/contact-us">TELEGRID</a> (hint, hint).</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/forged-passports-cbp-digital-signatures">Forged Passports, CBP and Digital Signatures</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIST&#8217;s Tougher Approach to Identity Risk</title>
		<link>https://telegrid.com/nist-identity-risk?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nist-identity-risk</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 14:52:53 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1597</guid>

					<description><![CDATA[<p>According to Verizon’s 2017 Data Breach Investigations Report (DBIR), &#8220;81% of hacking-related breaches leveraged either stolen and/or weak passwords.&#8221; The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/nist-identity-risk">NIST&#8217;s Tougher Approach to Identity Risk</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: Arial;">According to Verizon’s 2017 Data Breach Investigations Report (<a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/">DBIR</a>), &#8220;81% of hacking-related breaches leveraged either stolen and/or weak passwords.&#8221; The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they are taking a tougher approach to identity risk than to other areas of network security. As proof I would point to the differences between the NIST 800-63 Digital Identity Guidelines and the NIST 800-30 Guide for Conducting Risk Assessments. NIST&#8217;s tougher approach to identity risk will require organizations to invest heavily in their Identity and Access Management (IdAM) infrastructures. </span></p>
<p>I know, I know, everybody loves a post about NIST guidelines. However, we thought this post was necessary due to the interest we received from our <a href="https://telegrid.com/nist-800-63-3">white paper detailing the updated NIST 800-63</a> and the number of views the accompanying <a href="https://www.youtube.com/watch?v=RFjPjqoR9eg">video has received on youtube</a>, which broke the record for most views of a non-cat, NIST video.</p>
<p>To give a brief background, the updated NIST 800-63 separates digital identity into Identity Assurance Level (IAL), Authenticator Assurance Level (AAL) and Federated Assurance Level (FAL). Within each Assurance Level, NIST defines 3 risk levels. The higher the level of risk the more restrictions that are placed on the organization (e.g., in-person vetting, multi-factor authentication, Holder of Key, etc.).</p>
<p>The main question that we receive from customers is, &#8220;How do I determine which Assurance Level applies to my organization?&#8221;</p>
<p>The NIST guidelines provide flow charts to help determine assurance level by judging risk on a scale of low, medium and high. If an organization judges any of the risks to be high (or medium for risk to Personal Safety) the Assurance Level is IAL3, AAL3 or FAL3 resulting in large IdAM changes for the organization.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<p>The problem with judging risk is that it is subjective. If asked to take the risk of financial loss or criminal violation wouldn’t we be risk-averse and select high? To alleviate this issue the guidelines point to NIST 800-30 which was designed to help organizations perform risk assessments in a more analytical manner.</p>
<p>While reviewing the 800-30 guidelines we were struck by a few core differences which we believe highlights NIST&#8217;s tougher approach to identity risk.</p>
<p>During a risk assessment NIST 800-30 guides organizations to view all elements of risk including threat, vulnerability and impact. However, NIST 800-63, &#8220;asks agencies to look at the potential <b>impacts</b> of a federation failure. In other words, what would occur if an unauthorized user could compromise an assertion?&#8221;</p>
<p>The reason this is important is that by focusing on impact without threat and vulnerability, organizations disregard several key points. For instance judging threat includes an assessment of who has the capability to perform the attack and do they have the desire to do so. Additionally judging vulnerability includes an assessment of existing security controls which may prevent the attack. Both threat and vulnerability serve to tamper the impact of an attack. If we only look at impact we will most likely take a tougher approach.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<p>Another example is the number of risk categories. NIST 800-30 recommends 5 risk categories with semi-quantitative values for each (e.g., Very High is 96-100 while High is 80-95). NIST 800-63 only has 3 categories, or 2 for Personal Safety. This reduces granularity and leads to the selection of higher Assurance Levels.</p>
<p>What is the reason for NIST&#8217;s tougher approach to identity risk? Perhaps it is that for all of the fear of hackers cracking firewalls, the DBIR proves that the majority of attacks are still due to stolen credentials and privilege misuse. By creating a subjective risk assessment model that skews towards higher Assurance Levels, perhaps NIST is telling organizations that they should invest more heavily in IdAM security. Perhaps organizations should pay attention.</p>
<p>&nbsp;</p>
<p align="justify">Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication (MFA) and secure embedded systems.</p>
<p><span style="font-family: Arial;"><br />
</span></p>
<p align="justify"><span style="font-family: Arial;">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</span></p>
<p>The post <a rel="nofollow" href="https://telegrid.com/nist-identity-risk">NIST&#8217;s Tougher Approach to Identity Risk</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hardware’s Burden: Meltdown and Spectre</title>
		<link>https://telegrid.com/meltdown-and-spectre?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=meltdown-and-spectre</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 18:24:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1381</guid>

					<description><![CDATA[<p>While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/meltdown-and-spectre">Hardware’s Burden: Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s announcement of two major cybersecurity flaws in Intel chips, Meltdown and Spectre.  Meltdown and Spectre caused widespread panic and raised questions about the security of Intel chips and the last 20 years of processor design.  Jumping into action Intel was quick to release patches but the impact of these flaws will be felt for years to come.</p>
<p>While it is easy to say that Meltdown and Spectre prove that hardware is just as risky as software, I believe we should instead focus on how we got here.  I believe there is a lesson rooted in our approach to technological innovation as highlighted by Marc Andreessen’s seminal article <a href="https://a16z.com/2016/08/20/why-software-is-eating-the-world/">Why Software Is Eating the World</a>.</p>
<p>Software Defined Everything has become the rallying cry of organizations.  In a drive to reduce cost and speed up innovation we have started to treat hardware as a commodity and focus on software as the solution.  But there is a problem.  What if our hardware cannot keep up with our software?  Are we asking too much of our hardware?</p>
<p>Moore’s law states that processor speeds double every two years (or eighteen months according to Intel).  In technology two years is an eternity so engineers have devised ground breaking methods to speed up processors.   One such method, called speculative execution, allows a processor to perform a function before it knows whether the function is required.  If the function is not required then it is discarded but the act of completing it, just in case, allows the processor to perform operations more quickly.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>While designed as an optimization technique, Meltdown and Spectre proved that a cache timing attack <a href="https://youtu.be/q3WZiiaXHps">could take advantage of speculative execution</a> to expose secure kernel memory.  As described by <a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">The Register</a>, “To make the transition from user mode to kernel mode and back to user mode as fast and efficient as possible, the kernel is present in all processes&#8217; virtual memory address spaces, although it is invisible to these programs…It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.”</p>
<p><a href="https://youtu.be/q3WZiiaXHps">https://youtu.be/q3WZiiaXHps</a></p>
<p>Another example of the desire to use software to solve the limitations of hardware is the deployment of Virtual Machines (VMs).  VMs have truly changed the world, creating the cloud and allowing organizations to dramatically reduce cost.  VM technology allows collocated, software-based operating systems to share expensive hardware resources.  VM security is based on hardware Trusted Platform Module (TPM) storing secure information and software hypervisors scheduling access to hardware resources.</p>
<p>Despite these barriers, side channel attacks can still be used to cross the boundary between collocated VMs and steal private information.  These attacks involve an attacker VM alternating execution with a target VM to observe behavior of the underlying hardware.  They take advantage of the fact that, in order to conserve memory and speed up processing, VMs often share caches and libraries (i.e., memory page deduplication).  While difficult, multiple researchers have shown a side channel attack’s ability to retrieve secure information including <a href="https://eprint.iacr.org/2014/435.pdf">private keys</a>.  Other researchers have shown the ability to perform Denial of Service (DoS) attacks by using the VM <a href="http://www.ccs.neu.edu/home/pjd/papers/nca11-xen.pdf">scheduler</a> to monopolize hardware resources at the expense of collocated VMs.</p>
<p>With the advent of Software Defined Networking (SDN) will the next attack be listening to other people’s traffic on bare metal switches?</p>
<p>If we are asking too much of our hardware what can we do to correct it?  Should we accept slower processors, which has been the result of Intel’s patches?  Should we no longer allow collocation of VMs or demand completely separate data centers for our servers?</p>
<p>I am sure we will not start accepting slower speeds or higher costs so the next best option seems to be <a href="https://www.telegrid.com/10-commandments-embedded-software-security">education</a>.  Developers need to understand how hardware and software interoperates in order to prevent future cybersecurity attacks.  For instance, in addition to a six week course on Python, developers should also invest in a six week course on machine language.  Perhaps if they understood how hardware resources are actually used by software they will know when to push hardware and when not to.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/meltdown-and-spectre">Hardware’s Burden: Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authentication Token Cybersecurity and NIST 800-63-3</title>
		<link>https://telegrid.com/authentication-token-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=authentication-token-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 07 Dec 2017 15:29:02 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[mobile security]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1355</guid>

					<description><![CDATA[<p>In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/authentication-token-cybersecurity">Authentication Token Cybersecurity and NIST 800-63-3</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content">
<div class="entry-content">
<p align="justify"><span style="font-family: Arial; font-size: medium;">In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting the cybersecurity risks when using SMS for multi-factor authentication.  While the final version has not had as much focus, the truth is the new guidelines will cause the government, the military and many commercial organizations to re-architect their Identity and Access Management (IdAM) infrastructures and rethink their authentication token distribution methods.</span></p>
<p>The reason is that NIST 800-63-3 goes farther than its predecessor by covering all aspects of IdAM from initial risk assessment to deployment of federated identity solutions.  Whereas NIST 800-63-2 focused almost exclusively on credential type (i.e., soft or hard token), NIST 800-63-3 includes Assurance Levels for Identity Proofing (how the user applied for the token), Authenticator Type (the form of the token) and Federated Architecture (how credentials are passed internally).</p>
<p align="justify">Federated Assurance Level (FAL) is by far the most important change since it will have the largest effect on internal networks.  The reason NIST is so focused on FAL is that they have seen an increase in cybersecurity attacks that take advantage of how authentication tokens are passed from an Identity Provider to a Service Provider.  These attacks include Man-in-the-Middle, Compromised Tokens, and Denial of Service and are not specific to any one standard (e.g., SAML, OAuth, Kerberos, etc.).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p align="justify">To combat these cybersecurity attacks, the NIST guidelines now require that a user present a proof of key ownership in addition to an authentication token.  This was instituted for the most secure systems, those that are deemed FAL3, because relying solely on authentication tokens exposes the network.  The requirement to present a proof of key ownership is known as Holder of Key.</p>
<p align="justify">Holder of Key is not a new concept, however, the only standards based method to implement it is with PKI certificates and mutual TLS authentication.  This is an issue for organizations that either do not implement PKI or implement a Break and Inspect tool.  Break and Inspect refers to breaking a TLS connection between two parties in order to examine the secure contents of a message.  Break and Inspect is necessary because hackers typically hide their malicious activity within TLS traffic.  Once a TLS connection is broken, it is impossible to reestablish TLS with mutual authentication between the user and an application without also storing each user&#8217;s private key.  Storing every user&#8217;s private key is a HUGE cybersecurity risk.</p>
<p align="justify">Congress passed the Federal Information Security Modernization Act (FISMA) which created a requirement for federal agencies to manage information security based on publications that are developed by NIST.  In 2014 the DoD CIO, effectively joining federal agencies, issued Instruction 8510.01 replacing its own risk management process with NIST’s Risk Management Framework.  This made NIST’s Special Publication 800-63-3 a requirement of the Federal Government, the military, and most government contractors.  So, if you have not heard of NIST 800-63-3 and Holder of Key yet&#8230;you will soon.</p>
<p align="justify">If you currently implement Federated Identity or Single Sign-On (SSO) and are interested in getting more information on NIST 800-63-3 and Holder of Key, you should download TELEGRID’s <a href="https://telegrid.com/nist-800-63-3">white paper</a> on Authentication Token Cybersecurity and NIST 800-63-3 Holder of Key.  The <a href="https://telegrid.com/nist-800-63-3">white paper</a> provides information on specific authentication token cybersecurity attacks and how to seamlessly implement PKI even if you employ a Break and Inspect tool.  TELEGRID&#8217;s website also has helpful <a href="https://telegrid.com/identity-management-videos"> video tutorials</a> on NIST 800-63-3 to help organizations meet the new Digital Identity Guidelines.</p>
<p><span style="font-family: Arial; font-size: medium;"><br />
</span></p>
<p align="justify">Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p><span style="font-family: Arial; font-size: medium;"><br />
</span></p>
<p align="justify">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
</div>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/authentication-token-cybersecurity">Authentication Token Cybersecurity and NIST 800-63-3</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Active Directory Cyber Attacks</title>
		<link>https://telegrid.com/active-directory-cyber-attacks?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=active-directory-cyber-attacks</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 13:06:06 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1132</guid>

					<description><![CDATA[<p>Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/active-directory-cyber-attacks">Active Directory Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your account privileges.  In the past few months though we have seen a shift towards more sophisticated Active Directory cyber attacks which take advantage of the nature of AD and other Authentication, Authorization and Accounting (AAA) servers.</p>
<p>AAA servers like AD and Radius servers are the central point for all access requests.  Anytime a user wishes to access an application, server, etc. their credentials are sent to a AAA server to determine whether they are legitimate (authentication) and are allowed access (authorization).  Depending on their configuration, the AAA server will also log access (accounting) although this is more commonly performed in commercial mobile networks.</p>
<p>Since the AAA server communicates with multiple applications and devices, across multiple security domains, it has become a prime target for botnet and denial of service (DoS) attacks.  Hackers and cybersecurity researchers have begun to take notice.  Let’s look at three examples.<br />
&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>&nbsp;<br />
First, IBM X-Force Research <a href="https://securityintelligence.com/qakbot-banking-trojan-causes-massive-active-directory-lockouts/">recently</a> identified a banking trojan virus, Qakbot, that locked out thousands of AD users.  Qakbot is financial malware and is typically used to drain online bank accounts.  This was the first time researchers have seen it used as a DoS attack by preventing users from accessing applications and devices.</p>
<p>Second, researcher Guido Vranken used fuzzing, where malformed data is injected into a software application, to expose several vulnerabilities in FreeRadius, the most popular open source RADIUS server.  As <a href="http://www.securityweek.com/code-execution-dos-vulnerabilities-found-freeradius">Security Week</a> pointed out, “The list of vulnerabilities includes memory leak, out-of-bounds read, memory exhaustion, buffer overflow and other issues that can be exploited to remotely execute arbitrary code or cause a DoS condition.”  Luckily the open source community was quick to address the vulnerabilities.</p>
<p>Third, at this year’s Black Hat conference, Threat Intelligence engineers gave a <a href="https://www.scmagazine.com/active-directory-botnet-sets-up-cc-infrastructure-inside-infected-networks-while-bypassing-defenses/article/677864/">talk</a> about a method to turn the AD Domain Controller into a botnet’s command and control server.  As they pointed out, the AAA architecture, where disparate computers take access instructions from a central controller, closely mimics that of a botnet.  If malware were installed it could take advantage of existing AD commands and user attributes to transfer information between infected clients and out of the network.  If there was only one AD domain controller for the entire network, this would allow data transfer between security domains.</p>
<p>For the moment many of these attacks can be prevented by patching, monitoring and constructing proper network architectures.  However, as the hacker community continues to turn its attention to AAA it is only a matter of time before widespread zero day Active Directory cyber attacks are unleashed.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/active-directory-cyber-attacks">Active Directory Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware and 3 Rays of Hope</title>
		<link>https://telegrid.com/ransomware-3-rays-hope?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware-3-rays-hope</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 29 Jun 2017 14:57:07 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1107</guid>

					<description><![CDATA[<p>This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck.  This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ransomware-3-rays-hope">Ransomware and 3 Rays of Hope</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck.  This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers in 150 countries.  It seems these two attacks are linked because they both use the Server Message Block (SMB) protocol to rapidly infect machines on a Windows network.  This is the EternalBlue exploit that was reportedly stolen from the National Security Agency (NSA).</p>
<p>It seems the scale and timing of the ransomware attacks should be a major cause for concern.  However, I believe that the nature in which these attacks are being dealt with highlights 3 rays of hope that we are turning a corner in cybersecurity.</p>
<p>The first ray of hope is the amount of money being raised from these ransomware attacks.  As mentioned, WannaCry affected 300,000 computers with each user being asked for $300 to unlock their data files.  That should equate to $90,000,000.  <a href="http://www.cnbc.com/2017/05/15/wannacry-ransomware-hackers-have-only-made-50000-worth-of-bitcoin.html">It is estimated</a>, however, that only $50,000 was collected.  This means that the vast majority of users figured out another way to deal with the crisis.  Perhaps users backed up their data or, in the case of <a href="https://www.bloomberg.com/news/articles/2017-06-27/ukraine-russia-report-ransomware-computer-virus-attacks">Rosneft</a>, switched to an entire backup system.  With virtual machines and cloud computing, administrators can simply tear down infected systems and rebuild them to a previous image.  The way organizations are dealing with ransomware is a clear sign of better planning.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>The second ray of hope is how the attacks are being thwarted.  WannaCry was undone by a 22 year old white hat hacker who recognized a simple kill switch.  In short, ransomware is designed to recognize traps by sending a request to a fake website.  This test is designed to fail and lets the ransomware know that it is on a real machine and not trapped in a simulated sandbox.  To stop WannaCry this 22 year old simply bought the fake domain and set up a real website.  When the ransomware stopped getting a failed signal it shut itself off.  While interesting, the fact that the ransomware was undone by a simple fix is not the ray of hope.  The ray of hope is that WannaCry was undone by an anonymous 22 year old researcher, not a major cybersecurity company.  We should be happy that there is an army of white hat hackers out there working to keep the internet safe.</p>
<p>The third ray of hope is the scale of the attack.  While it is estimated that WannaCry infected 300,000 computers, this new variant has so far only affected 2,000.  The SMB protocol exploit, on which both attacks rely, can be resolved by a simple Windows patch.  The reason WannaCry was so widespread is that administrators did not update their systems.  Perhaps the reduced scale of this new attack points to the fact that administrators are becoming more careful with security patches.</p>
<p>While we can take comfort from these 3 rays of hope, we are not out of the woods yet.  Cybersecurity is a game of cat and mouse and this week’s ransomware attack will not be the last.  However, organizations spent over <a href="http://www.informationweek.com/strategic-cio/security-and-risk-strategy/global-it-security-spending-will-top-$81-billion-in-2016/d/d-id/1326547">$80 billion</a> on cybersecurity in 2016 and the rapid nature in which ransomware is being dealt with proves that this was money well spent.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p><span style="font-family: Arial; font-size: medium;">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</span></p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ransomware-3-rays-hope">Ransomware and 3 Rays of Hope</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
