<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/category/uncategorized/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Tue, 03 Mar 2020 21:29:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>Uncategorized &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Using AI to Identify the Resistance</title>
		<link>https://telegrid.com/using-ai-identify-resistance?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=using-ai-identify-resistance</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 12 Oct 2018 16:14:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=2192</guid>

					<description><![CDATA[<p>Last month the New York Times published a now famous op-ed from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/using-ai-identify-resistance">Using AI to Identify the Resistance</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone size-full wp-image-2193" src="https://telegrid.com/wp-content/uploads/2018/10/Resistance.jpg" alt="" width="700" height="400" srcset="https://telegrid.com/wp-content/uploads/2018/10/Resistance.jpg 700w, https://telegrid.com/wp-content/uploads/2018/10/Resistance-300x171.jpg 300w" sizes="(max-width: 700px) 100vw, 700px" /></p>
<p>Last month the New York Times published a now famous <a href="https://www.nytimes.com/2018/09/05/opinion/trump-white-house-anonymous-resistance.html">op-ed</a> from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  Watching this unfold I began to wonder whether Artificial Intelligence could have identified the author.  I have applied machine learning to all sorts of pattern recognition problems and this seemed like just another example.</p>
<p>TELEGRID is a market leader in the field of behavioral biometrics which includes voice recognition.  Voice recognition utilizes subtle nuances in a user’s speech pattern to perform user verification or identification.  This field is widely researched and several technologies have made their way into commercial products.  For instance, last year, Amazon announced that Alexa could <a href="https://www.zdnet.com/article/amazons-alexa-can-now-recognise-different-voices/">differentiate between voices</a>.</p>
<p>If we can perform speaker identification then author identification is not a big leap.  Handwriting recognition, which uses optical character recognition, has also been around for a long time and is used widely in the banking industry for signature verification.</p>
<p>But what about text that is not handwritten, is there enough difference in authors’ styles to identify them?</p>
<p>Stylometry is the identification of linguistic style in written language.  While around for hundreds of years, it was not until 1964 that <a href="https://www.press.uchicago.edu/ucp/books/book/distributed/I/bo5667096.html">Mosteller and Wallace</a> applied statistical modeling to identify the authors of the Federalist Papers.  This began the application of machine learning to author identification of other classic literature and even <a href="https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS13/paper/viewFile/5917/6043">tweets</a>.</p>
<p>The results of this research have been positive but the lack of a valid business case has limited the technology’s penetration.  For instance while it might be interesting to find out if someone forged their college essay, it is doubtful that Universities will pay for it.  One potential market is artist verification for auction houses.  While not linguistic, perhaps this will be the market that helps the development of author identification.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at TELEGRID.  TELEGRID has unique expertise in secure authentication, behavioral biometrics, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/using-ai-identify-resistance">Using AI to Identify the Resistance</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Machine Learning Marketing: Ignore Size</title>
		<link>https://telegrid.com/machine-learning-marketing-ignore-size?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=machine-learning-marketing-ignore-size</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 28 Jun 2018 19:50:06 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1875</guid>

					<description><![CDATA[<p>TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/machine-learning-marketing-ignore-size">Machine Learning Marketing: Ignore Size</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user <a href="https://telegrid.com/smrte-unified-authentication">authentication</a>.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend in Machine Learning marketing whereby size is being promoted as the ultimate differentiator.  I believe this ignores the math behind Machine Learning and so I decided to focus this post on helping consumers ask the right questions.</p>
<p style="text-align: center;"><strong>My Data Set is Bigger </strong></p>
<p>Recently a team at the University of Manchester released a <a href="https://gizmodo.com/this-ai-knows-who-you-are-by-the-way-you-walk-1826368997">study</a> about a system that identifies users by the way they walk.  The system uses pressure pads on the floor and a high-res camera to authenticate users based on their footsteps.   The article states that the team “compiled a database consisting of 20,000 footstep signals from more than 120 individuals.  It’s now the largest footsteps database in existence.”  I would love to hear the debate between this researcher and the researcher who has the second largest footsteps database in existence.</p>
<p>I understand the importance of having a large data set to cross validate and test an algorithm but Machine Learning marketing should be focused on the algorithm and not the data set size.  For instance with algorithms that suffer from high bias (AKA underfitting), the size of the data set will not have much of an impact.  Additionally certain algorithms (e.g., Support Vector Machines) can be very slow if the data set is too large.  If the speed of your Machine Learning system is important this should matter to you.</p>
<p style="text-align: center;"><strong>My Feature Set is Bigger </strong></p>
<p>In Machine Learning features are used to predict an outcome.  For user authentication features include motion sensor data, keyboard clicking rhythm, GPS location, etc.  I recently saw an advertisement for a Machine Learning system that claimed its algorithm was the best because it used 1,000 features.</p>
<p>This Machine Learning marketing was claiming that the higher the number of features the better the quality of the Machine Learning algorithm.  However, if your algorithm suffers from high variance (AKA overfitting) the number of features should be reduced not increased.  Additionally, performing linear algebra functions on matrices with a high number of features can consume valuable resources.  This is an issue for Machine Learning systems that are designed to run on low power and low compute devices like mobile devices.</p>
<p style="text-align: center;"><strong>My Number of Iterations is Bigger </strong></p>
<p>Researchers often base the superiority of their prediction on the number of times the underlying algorithm was run.  For instance, a recent <a href="https://www.technologyreview.com/s/611397/machine-learning-predicts-world-cup-winner/">study</a> on the World Cup found that Germany had a 12.8% chance of winning.  As the Machine Learning marketing clearly shows the support for this prediction was the fact that the algorithm was run 100,000 times.  Despite the number of iterations Germany crashed out in the first round.  Now you can blame the algorithm, the human element or simply the fact that the study was performed by German researchers and was therefore biased from the start.  One thing is clear though, the number of iterations had little impact on the accuracy of this Machine Learning algorithm.</p>
<p>I believe the lesson from these examples is that we must cut through size-based Machine Learning marketing and challenge developers to justify their choices.  You wouldn’t select a software package simply because it was written by 10,000 engineers would you?  We should ask developers why they picked specific features.  Are all the selected features necessary or is the correlation high enough so that a few can be removed?  How is the large data set being used to improve the algorithm?  Also, how will the algorithm design affect its performance on your specific hardware?</p>
<p>We need to refocus Machine Learning marketing away from size and instead towards justification of the Machine Learning model.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/machine-learning-marketing-ignore-size">Machine Learning Marketing: Ignore Size</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Getting Started with the Robot Operating System (ROS)</title>
		<link>https://telegrid.com/getting-started-robot-operating-system-ros?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=getting-started-robot-operating-system-ros</link>
		
		<dc:creator><![CDATA[Beth Flippo]]></dc:creator>
		<pubDate>Mon, 25 Jun 2018 13:32:43 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1850</guid>

					<description><![CDATA[<p>When I first heard of the Robot Operating System (ROS) I thought it was just that &#8211; an operating system for robots.  Well I was wrong it is not an OS but rather an open-source &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/getting-started-robot-operating-system-ros">Getting Started with the Robot Operating System (ROS)</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When I first heard of the Robot Operating System (ROS) I thought it was just that &#8211; an operating system for robots.  Well I was wrong it is not an OS but rather an open-source set of software libraries for writing software to control a robot’s behavior.  As with any open source software it encourages collaborative software development for robotics. ROS is essentially a framework and is currently supported on Ubuntu Linux and maintained by the Open Source Robotics Foundation.</p>
<p>In ROS a process is called a node and every node is responsible for one task. Nodes communicate with each other using messages passed through logical channels known as topics. Nodes can send or receive data from another node using by publishing or subscribing to a topic.<img loading="lazy" class="alignnone wp-image-1852 aligncenter" src="https://telegrid.com/wp-content/uploads/2018/06/ros-300x115.jpg" alt="" width="376" height="144" srcset="https://telegrid.com/wp-content/uploads/2018/06/ros-300x115.jpg 300w, https://telegrid.com/wp-content/uploads/2018/06/ros.jpg 573w" sizes="(max-width: 376px) 100vw, 376px" /><em>Nodes and topics. Image adapted from a <a href="https://www.youtube.com/watch?v=bJB9tv4ThV4">tutorial </a>from <a href="https://homes.cs.washington.edu/~jstn/">Justin Huang</a>.</em></p>
<p>In order to start learning ROS you will need a robot.  For beginners, the best place to start is with a good affordable robot called the Turtlebot.  Turtlebot is the most affordable advanced ROS robot on the market.   It uses off-the-shelf consumer electronics like the Orbbec Astra Pro sensor, a standard netbook and a robot base built from a repurposed robot vacuum cleaner to keep costs low.</p>
<p>TurtleBot is a low-cost, personal robot kit with open-source software.  Turtlebot was designed in collaboration with the original makers of ROS, Willow Garage in 2010 and has since become the go-to software platform for roboticists around the world.</p>
<p><img loading="lazy" class=" wp-image-1854 alignleft" src="https://telegrid.com/wp-content/uploads/2018/06/turtlebot-300x180.png" alt="" width="442" height="265" srcset="https://telegrid.com/wp-content/uploads/2018/06/turtlebot-300x180.png 300w, https://telegrid.com/wp-content/uploads/2018/06/turtlebot-768x461.png 768w, https://telegrid.com/wp-content/uploads/2018/06/turtlebot.png 800w, https://telegrid.com/wp-content/uploads/2018/06/turtlebot-480x288.png 480w, https://telegrid.com/wp-content/uploads/2018/06/turtlebot-320x192.png 320w, https://telegrid.com/wp-content/uploads/2018/06/turtlebot-240x144.png 240w" sizes="(max-width: 442px) 100vw, 442px" /></p>
<p>A TurtleBot allows you to build a custom robot that can drive around as well as see in 3D.  You can create amazing applications and learn more about ROS.  As an entry level mobile robotics platform, TurtleBot has many of the same capabilities of the company’s larger robotics p</p>
<p>latforms, like PR2.</p>
<p>Still want to learn ROS without buying a robot?  Easy – robot simulation.  A robotics simulator is used to create applications for a physical robot without depending on the actual machine which saves time and money. In most cases these applications can be transferred onto the physical robot without modifications.</p>
<p><img loading="lazy" class=" wp-image-1857 alignright" src="https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-300x225.jpg" alt="" width="358" height="268" srcset="https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-300x225.jpg 300w, https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-768x576.jpg 768w, https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-1024x768.jpg 1024w, https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-960x720.jpg 960w, https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-480x360.jpg 480w, https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-320x240.jpg 320w, https://telegrid.com/wp-content/uploads/2018/06/gazebo_grid-240x180.jpg 240w" sizes="(max-width: 358px) 100vw, 358px" /></p>
<p>The Open Source Robotics Foundation (OSRF) provides a free and open source robot simulator called Gazebo.  Gazebo</p>
<p>is an open source robot simulation application.  Used by both hobbyists an</p>
<p>d professionals alike, one can build models that act like real robots and move in their own world, ruled by its four, state of the art, physics engines the default being ODE Open Dynamics Engine.</p>
<p>The ROS Foundation provides a free Turtlebot Simulator which allows you to learn ROS and write code that can be moved to a real Turtlebot robot.  You can be up and running in 15 minutes!</p>
<p>To learn more check out these links:</p>
<p><span style="text-decoration: underline;"><strong><a href="http://www.ros.org">www.ros.org </a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="http://gazebosim.org/">gazebosim.org/</a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="http://www.turtlebot.com">www.turtlebot.com</a></strong></span></p>
<p><a href="http://wiki.ros.org/turtlebot_gazebo"><span style="text-decoration: underline;"><strong>wiki.ros.org/turtlebot_gazebo</strong></span></a></p>
<p>&nbsp;</p>
<p>B</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/getting-started-robot-operating-system-ros">Getting Started with the Robot Operating System (ROS)</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>THE B-HIVE: Cheap Software Defined Radio (SDR) Changes Everything!</title>
		<link>https://telegrid.com/cheap-software-defined-radio-sdr-changes-everything?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cheap-software-defined-radio-sdr-changes-everything</link>
		
		<dc:creator><![CDATA[Beth Flippo]]></dc:creator>
		<pubDate>Mon, 18 Jun 2018 21:16:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1815</guid>

					<description><![CDATA[<p>Growing up I had a friend who was into Amateur radio also known as Ham.  You could spot his house a mile away with the huge antenna on his roof.  Back then kids interested in &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/cheap-software-defined-radio-sdr-changes-everything">THE B-HIVE: Cheap Software Defined Radio (SDR) Changes Everything!</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Growing up I had a friend w<img loading="lazy" class="size-medium wp-image-1818 alignright" src="https://telegrid.com/wp-content/uploads/2018/06/ham-300x225.jpg" alt="" width="300" height="225" srcset="https://telegrid.com/wp-content/uploads/2018/06/ham-300x225.jpg 300w, https://telegrid.com/wp-content/uploads/2018/06/ham-480x360.jpg 480w, https://telegrid.com/wp-content/uploads/2018/06/ham-320x240.jpg 320w, https://telegrid.com/wp-content/uploads/2018/06/ham-240x180.jpg 240w, https://telegrid.com/wp-content/uploads/2018/06/ham.jpg 710w" sizes="(max-width: 300px) 100vw, 300px" />ho was into Amateur radio also known as Ham.  You could spot his house a mile away with the huge antenna on his roof.  Back then kids interested in amateur radio joined a Ham Radio Club and were then relentlessly teased by their fellow classmates.</p>
<p>What we didn’t know then was that those kids were on the forefront of wireless communications which will become so important in the future.  They were communicating far and wide before cell phones were even a dream.</p>
<p>Ham radios communicate on a variety of radio frequencies that are allocated by the FCC for amateur use.  No License is required to purchase the equipment or to receive (listen), however, an FCC License is required to transmit on Amateur Radio frequencies in the USA.</p>
<p>Ham radios may operate from just above the AM broadcast band (1605 to 1705 kHz) to the microwave region in the GHz range with many ham bands found above the AM band to just above the citizens band (27 MHz). These bands are often referred to as short-wave bands which &#8220;bounce&#8221; off the ionosphere from the transmitter to the receiver&#8217;s antenna. The higher the frequency the &#8220;shorter&#8221; the wavelength.  This is different than FM radio and TV stations which use line-of-sight frequencies and are limited to 40 or 50 miles.</p>
<p>As a kid, I asked my Dad what it would take to get started in amateur radio and his response, <strong>money</strong>.</p>
<p>The equipment or “gear” for ham radio is expensive.  Radio components such as modulators, demodulators and tuners are traditionally implemented in hardware components which are expensive.</p>
<p>All that changed with the advent of modern computing and analog to digital converters which allowed most of these traditionally hardware-based components to be implemented in software.  This led to the creation of  what is now known as Software Defined Radio (SDR) which enables easy signal processing and the production of inexpensive wideband scanner radios.</p>
<p><img loading="lazy" class="alignnone size-medium wp-image-1827 alignleft" src="https://telegrid.com/wp-content/uploads/2018/06/rtl-sdr-new-225x300.png" alt="" width="225" height="300" srcset="https://telegrid.com/wp-content/uploads/2018/06/rtl-sdr-new-225x300.png 225w, https://telegrid.com/wp-content/uploads/2018/06/rtl-sdr-new.png 350w" sizes="(max-width: 225px) 100vw, 225px" />The introduction of SDR was originally limited mostly to military organizations but SDR was transformed with the introduction of the RTL-SDR (www.rtl-sdr.com), a $25 SDR USB dongle.</p>
<p>The RTL-SDR operates in the 500 kHz – 1766 MHz frequency range and connects to a PC or laptop via USB.  The open source software application SDR# can be used to display the measurable frequency spectrum and even demodulate FM radio so you can hear music.</p>
<p>Other inexpensive SDR followed including the HackRF (https://greatscottgadgets.com/hackrf/) which can operate up to 6GHz.  It is considerably more expensive at $300 but higher frequencies require more expensive components.</p>
<p><img loading="lazy" class="size-medium wp-image-1823 alignright" src="https://telegrid.com/wp-content/uploads/2018/06/sdrapp-300x253.jpg" alt="" width="300" height="253" srcset="https://telegrid.com/wp-content/uploads/2018/06/sdrapp-300x253.jpg 300w, https://telegrid.com/wp-content/uploads/2018/06/sdrapp.jpg 603w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Now anyone on a budget, including hobbyists (like me) can access the radio spectrum. This type of scanner capability would have cost hundreds or even thousands of dollars just a few years ago.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>So what can you do with SDR?  This list is just few ideas from the rtl-sdr blog:</p>
<table>
<tbody>
<tr>
<td width="300">
<ul>
<li>Use as a police radio scanner.</li>
<li>Listening to EMS/Ambulance/Fire communications.</li>
<li>Listening to aircraft traffic control conversations.</li>
<li>Tracking aircraft positions like a radar with ADSB decoding.</li>
<li>Decoding aircraft ACARS short messages.</li>
<li>Scanning trunking radio conversations.</li>
<li>Decoding unencrypted digital voice transmissions such as P25/DMR/D-STAR.</li>
<li>Tracking maritime boat positions like a radar with AIS decoding.</li>
<li>Decoding POCSAG/FLEX pager traffic.</li>
<li>Scanning for cordless phones and baby monitors.</li>
</ul>
</td>
<td width="323">
<ul>
<li>Tracking and receiving meteorological agency launched weather balloon data.</li>
<li>Tracking your own self launched high altitude balloon for payload recovery.</li>
<li>Receiving wireless temperature sensors and wireless power meter sensors.</li>
<li>Listening to VHF amateur radio.</li>
<li>Decoding ham radio APRS packets.</li>
<li>Watching analogue broadcast TV.</li>
<li>Sniffing GSM signals.</li>
<li>Receiving NOAA weather satellite images.</li>
<li>Monitoring meteor scatter.</li>
<li>Listening to FM radio, and decoding RDS information.</li>
<li>Listening to the ISS (International Space Station).</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>So what is TELEGRID doing with them? We are creating exciting solutions for the US Military using this technology.  We just and can’t talk about it here.  If you want more information or have a new, exciting idea that requires a custom RF solution, please give us a call at 973 994-4440 – <strong>we love to talk about RF</strong>!</p>
<p>Want to learn more.  Click on the following links:</p>
<p><span style="text-decoration: underline;"><strong><a href="http://www.arrl.org/clubs">http://www.arrl.org/clubs</a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="https://www.rtl-sdr.com">https://www.rtl-sdr.com</a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="https://greatscottgadgets.com/hackrf/">https://greatscottgadgets.com/hackrf/</a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="https://electronics.howstuffworks.com/ham-radio2.htm">https://electronics.howstuffworks.com/ham-radio2.htm</a></strong></span></p>
<p>&nbsp;</p>
<p>B</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/cheap-software-defined-radio-sdr-changes-everything">THE B-HIVE: Cheap Software Defined Radio (SDR) Changes Everything!</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>THE B-HIVE: Hacking the CAN Bus</title>
		<link>https://telegrid.com/b-hive-hacking-can-bus?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=b-hive-hacking-can-bus</link>
		
		<dc:creator><![CDATA[Beth Flippo]]></dc:creator>
		<pubDate>Tue, 12 Jun 2018 16:04:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1795</guid>

					<description><![CDATA[<p>Let’s face it, when it comes to hacks we have become, well, quite complacent.  We figure it is out of our control anyway and it’s not like we are going to go off grid. Right? &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/b-hive-hacking-can-bus">THE B-HIVE: Hacking the CAN Bus</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Let’s face it, when it comes to hacks we have become, well, quite complacent.  We figure it is out of our control anyway and it’s not like we are going to go off grid. Right? Besides its just data, not like they can physically hurt us.</p>
<p><img loading="lazy" class="alignleft size-medium wp-image-1801" src="https://telegrid.com/wp-content/uploads/2018/06/jeep2.png" alt="" width="284" height="173" />I thought so too until I watched a 2014 video of Charlie Miller and Chris Valasek forcing a Jeep Cherokee to go off the highway into a ditch at full speed.  What’s the big deal?  THEY WEREN’T IN THE CAR!  They were driving behind the Jeep and were able to control it remotely. Scary.</p>
<p>How did they do it?  First, they hacked into the vehicle through an unsecure Wi-Fi connection – easy, unfortunately.</p>
<p>But how did they control the car?  By hacking the vehicle control network – the CAN Bus.</p>
<p>As cars became more advanced and offered more features the need for a common communication protocol emerged.   In 1983, a team at Bosch started developing the Controller Area Network (CAN) Bus to solve this complex problem.  New features including airbags, power steering, acceleration, braking, cruise control, audio components, power windows &amp; doors now had a standard way to communicate with each other.  These components connect directly to the CAN Bus through Electronic Control Units (ECUs) which primarily consist of microprocessors and sensors.  In simplest terms, the CAN bus is a network where any system in the car can send and receive commands, kind of like an electronic command center.</p>
<p>The original CAN Bus was designed at a time when the thought of hacking vehicle software or any software was a far-off thought.  It was so incredibly difficult to even write custom embedded code that the idea of someone hacking it was just crazy.  Well, here we are at crazy.</p>
<p>The implementation of the CAN bus also allowed car manufacturers to move forward with the On-Board Diagnostics (OBD) protocol standard currently OBD-II. OBD-II offers a set of problem codes that can be easily interpreted by mechanics when trying to diagnose a problem. You can find the typeical OBD port under the steering column.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-1802" src="https://telegrid.com/wp-content/uploads/2018/06/module2.png" alt="" width="253" height="160" />All you need to buy is a CAN bus module – here’s one from Sparkfun.com (<a href="https://www.sparkfun.com/products/13262"><span style="text-decoration: underline;"><strong>https://www.sparkfun.com/products/13262</strong></span></a>).</p>
<p>Hook it up to your car’s OBD connector and a laptop and you can see all the information being transmitted on your cars CAN bus.  Cool right?  But wait – Did it ask you to login?</p>
<p>Nope … and that’s where our problem begins.</p>
<p><img loading="lazy" class="alignright size-full wp-image-1798" src="https://telegrid.com/wp-content/uploads/2018/06/laptop.png" alt="" width="289" height="213" /></p>
<p>The CAN Bus has no security measures, period.  Messages are transmitted on the bus with only unique identifiers.  The lower the numerical value of the ID, the higher the message priority.  The problem is that there is no origination or destination indication transmitted with the message.  In a world of TCP/IP the idea that a message can be transmitted without knowing the sender is nuts!  This allows ANYONE to transmit messages on the bus with any ID at any time.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-1797" src="https://telegrid.com/wp-content/uploads/2018/06/candata.png" alt="" width="299" height="249" />Lack of security leaves the CAN Bus susceptible to many different attack scenarios.  The easiest attack is a brute force attack where a hacker simply has to transmit high priority messages on the bus at such a high rate that the other messages can’t get through.  This will eventually immobilize the car and the driver.</p>
<p>The real danger, however,  is when a sophisticated hacker deciphers valid CAN Bus messages and is able to retransmit them at will which allows a hacker to gain control of the vehicle.  (This is also how self-driving cars work – but we will talk about that another time).</p>
<p>So what are we to do?  Many ideas have come up about how to implement security.  One method calls for adding authentication or encryption to the bus.  The issue with these types of methods is that they can introduce latency on the bus which will affect vehicle performance.  These methods also call for a network connection to a remote Certificate Authority (CA) and a central powerful processor which do not exist today.  These solutions probably will not happen without a complete vehicle network redesign which is a big deal.</p>
<p>Other methods include using Artificial Intelligence (AI) to identify “normal” CAN Bus behavior and then perform anomaly detection.  Again, this is a good method but requires a great deal of training to produce a behavioral model.  That means countless hours driving different “control” vehicles with different drivers in order to produce unique patterns.</p>
<p>My team at TELEGRID has a different approach that can identify a CAN Bus attacker without affecting the vehicle performance or long training periods.  We are currently working on this solution for US military vehicles and can’t discuss it here so give us a call (973.994.4440) for more information.</p>
<p>Apparently one sure security method available today involves ensuring that the external Wi-Fi connections to the vehicle are secure.  After the initial Jeep hack, Chrysler secured the Wi-Fi connection that made the hack possible and issued a recall for all at-risk vehicles.  Problem solved?  Well, no, because a few years later Charlie and Chris were again able to hack into a Jeep vehicle even after the recall through a different open connection.  Sigh.</p>
<p>In the meantime, all we can do is hope that car manufacturers will put as much emphasis on vehicle security as they do on heated and cooled seats.</p>
<p>Want to learn more?  Check out these links:</p>
<p><span style="text-decoration: underline;"><strong><a href="http://illmatics.com/carhacking.html">http://illmatics.com/carhacking.html</a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/">https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/</a></strong></span></p>
<p><span style="text-decoration: underline;"><strong><a href="https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec">https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec</a></strong></span></p>
<p>Thank you to the TELEGRID team for spending countless hours in the car listening to my country music and to Charlie Miller and Chris Valasek – not all super heroes wear capes.</p>
<p>Thanks for reading and that’s the buzz from the B-hive.</p>
<p>B</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/b-hive-hacking-can-bus">THE B-HIVE: Hacking the CAN Bus</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Protect Anonymity in Machine Learning</title>
		<link>https://telegrid.com/protect-anonymity-in-machine-learning?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-anonymity-in-machine-learning</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 29 May 2018 14:03:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1629</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-anonymity-in-machine-learning">How to Protect Anonymity in Machine Learning</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and the enforcement of strict data usage policies.   Companies, specifically those that employ machine learning, have complained about the onerous regulation, claiming that their security practices already protect individual privacy. The problem is that some of these security methods, like employing subject anonymity, have been shown to fail. Luckily there is a new field called Differential Privacy which aims to protect anonymity in machine learning.</p>
<p>TELEGRID recently completed a review by an Institutional Review Board (IRB) for a test involving biometrics.  An IRB is an ethics board that approves and monitors research involving human subjects &#8211; think of drug trials for the Food and Drug Administration.  In fact when our Government customer first asked us to go before an IRB I replied, “Why?  I am not putting shampoo in anyone’s eyes.”  However, since we were collecting biometrics from human subjects we were required to speak to an IRB about how we intended to protect the subjects’ information from data leakage.</p>
<p>Aside from the mountain of paperwork, the process was fairly painless and we were deemed exempt based on the type of data we were collecting, the level of security we maintain at our offices, and our ability to maintain subject anonymity.  While I agree with the type of data and cybersecurity controls being a basis for exemption, past studies have raised doubts about the ability to protect anonymity in machine learning.</p>
<p>For instance, in 2006, researchers from the University of Texas at Austin were able to <a href="https://www.wired.com/2007/12/why-anonymous-data-sometimes-isnt/">identify Netflix users</a> by matching a database of anonymous users’ movie preferences with users who publicly entered movie ranking on IMDb.  Anonymity was challenged again in 2013 when a Harvard professor <a href="https://www.forbes.com/sites/adamtanner/2013/04/25/harvard-professor-re-identifies-anonymous-volunteers-in-dna-study/">identified 40%</a> of a sample of anonymous participants in the Personal Genome Project.  While both studies relied on a secondary dataset, which may not always be available, they did show that it is possible to identify subjects in anonymous databases.</p>
<p>To protect anonymity in machine learning researchers have been working on a new technique called Differential Privacy.  Differential Privacy allows machine learning algorithms to arrive at the same conclusion whether or not a subject is included in the input data set.  To explain it we will use the classic example of a pollster asking a subject which political party they voted for.  If the pollster collected other data, which can be cross referenced to a public database, it is possible to identify the subject and their voting history.  To institute Differential Privacy we would instead ask the subject to flip a coin, and based on the result, either tell the truth or lie about who they voted for.  Using statistics it is possible to extract the ‘noise’ of the coin flip.</p>
<p>In short, Differential Privacy is the controlled injection of noise into a data sample to provide a subject with the ability to plausibly deny that they gave a specific response.</p>
<p>Differential Privacy is still in its infancy, and requires a larger data set in order to overcome the injected noise, but it is currently the most promising option we have to protect anonymity in machine learning. If you would like to learn more about Differential Privacy I would suggest starting with this <a href="https://twimlai.com/twiml-talk-132-differential-privacy-theory-practice-with-aaron-roth/">episode</a> from the podcast This Week in Machine Learning &amp; AI.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-anonymity-in-machine-learning">How to Protect Anonymity in Machine Learning</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Forged Passports, CBP and Digital Signatures</title>
		<link>https://telegrid.com/forged-passports-cbp-digital-signatures?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=forged-passports-cbp-digital-signatures</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 16:20:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1605</guid>

					<description><![CDATA[<p>Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security.  The gap is not related to the &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/forged-passports-cbp-digital-signatures">Forged Passports, CBP and Digital Signatures</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week Senators Ron Wyden and Claire McCaskill released a <a href="https://www.wyden.senate.gov/imo/media/doc/wyden-mccaskill-epassport-security-letter-to-cbp.pdf">letter</a> demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security.  The gap is not related to the border wall or drug submarines, but that we are not checking digital signatures on e-Passports.  Even though it sounds like an obscure cybersecurity issue, the fact that CBP is not checking digital signatures is a big deal.  This gap, if exploited, could allow bad guys to access the United States with forged passports.</p>
<p>As any James Bond fan knows, forged passports are a problem.  For example, a recent Reuters <a href="https://www.reuters.com/article/us-northkorea-kim-passports-exclusive/exclusive-north-korean-leaders-used-brazilian-passports-to-apply-for-western-visas-sources-idUSKCN1GB2AY">article</a> detailed how Kim Jong-il and Kim Jong-un of North Korea allegedly used a Brazilian passport to obtain visas from foreign countries.  To combat this threat e-Passports were developed over a decade ago and since 2015 the US has required them from countries on the visa-waiver list.</p>
<p>e-Passports include a chip containing electronic information that matches the physical information on a passport.  To prevent forged passports, the information on this chip is digitally signed by the issuing country’s Certificate Authority (CA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop">Click to Subscribe</a></h4>
<p>The digital signing process involves hashing the electronic passport data and then encrypting that hash with the CA’s private key.  Software then decrypts the signature with the CA’s public key and compares the result to its own hash of the passport data.  The only way these two values would match is if the signature was created from a matching public-private key pair.  For more information on how digital signatures work watch our <a href="https://telegrid.com/identity-management-videos">video tutorial on Public Key Infrastructure (PKI)</a>.</p>
<p>Even though CBP is checking that the electronic and physical information match, there is no way to guarantee that both are not fake if the digital signature is not verified.  This leaves our border open to forged passports.</p>
<p>In a 2010 <a href="https://www.gao.gov/assets/310/300986.pdf">report</a> the Government Accountability Office (GAO) gave the two main reasons why CBP is not checking digital signatures.</p>
<p>1) “A database needs to be established and populated with the digital certificates needed to fully validate the digital signatures that can be accessed by CBP inspection workstations at the ports of entry.”</p>
<p>2) “CBP needs to develop and implement functionality on its inspection workstations to access the database.”</p>
<p>The first issue could be resolved by accessing the ICAO Public Key Directory (PKD) and downloading the CA certificates.  The International Civil Aviation Organization (ICAO) specifically created the PKD as a central repository for countries to exchange information required to validate e-Passports.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop">Click to Subscribe</a></h4>
<p>The second issue I do not believe is a question of a software upgrade since checking digital signatures is a standard process.  Rather, I believe it is the time to access the certificate database and perform revocation checking.  This is similar to the issue the retail sector had when chip based credit cards were introduced.  Considering how many people CBP has to clear each day I understand the concern.  However, there are solutions available.  To speed up revocation checking CBP can create local CRLs or OSCP responders that are updated daily.  This is similar to the approach the US Army takes with revocation checking on its tactical networks.</p>
<p>At the end of the day, these are not difficult problems and I expect CBP to solve them quickly &#8211; most likely by contacting <a href="https://telegrid.com/contact-us">TELEGRID</a> (hint, hint).</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication, and secure embedded systems.</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/forged-passports-cbp-digital-signatures">Forged Passports, CBP and Digital Signatures</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mental Hypervisors and Hardware Cybersecurity</title>
		<link>https://telegrid.com/mental-hypervisors?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mental-hypervisors</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 17 Apr 2017 13:31:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1088</guid>

					<description><![CDATA[<p>Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others.  The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/mental-hypervisors">Mental Hypervisors and Hardware Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Forbes Magazine had an interesting <a href="https://www.forbes.com/sites/thomasbrewster/2016/02/17/hacking-smart-security-alarms/#5a681c9d1b77">article</a> last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others.  The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there was one quote that I found particularly interesting.</p>
<p>When quoting the security expert Dr Andrew Zonenberg the author <a href="https://www.forbes.com/sites/thomasbrewster/2016/02/17/simplisafe-alarm-attacks/#22ee0923b002">wrote</a> “SimpliSafe has also installed a one-time programmable chip in its alarm, meaning there&#8217;s no chance of an over-the-air update. It means there&#8217;s no patch coming, leaving all owners without a remedy other than to stop using the equipment, Zonenberg said.”</p>
<p>A one-time programmable chip? Meaning you ship the product and hope that you never have an issue!  Can you imagine designing a system that could never be fixed?  Where would Microsoft or Apple be if they could not send security updates to their customers?  It seems SimpliSafe has learned their lesson and will soon be releasing hardware that allows over-the-air firmware updates.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>I believe we can learn two lessons from this story.</p>
<p>1) There is a hardware talent gap.  Our reliance on cloud and application development has created a shortage of good hardware and embedded software engineers.  The essence of virtualization is the separation of physical hardware from the operating system.  It seems some engineers have developed mental hypervisors and no longer understand the dependence of software on the underlying hardware.</p>
<p>When designing a new product, even a purely software product, I would recommend hiring a few electrical engineers.  They will be able to explain how keys should be stored in a TrustZone or how a Trusted Platform Module can enhance software security through attestation.  Even if they end up performing tasks similar to software engineers their skill set is imperative for the future security of your products.</p>
<p>2) As Benjamin Franklin said, “If you fail to plan you are planning to fail.”  Most companies’ product design and development process begins with generating a Technical Requirements Document (TRD) and an Operational Requirements Document (ORD).  At TELEGRID we add another document, the Security Requirements Document (SRD).  The SRD is developed by our Cybersecurity Subject Matter Experts (SMEs) and is based on NIST requirements and DISA Security Technical Implementation Guides (STIGs).  It is a forward looking security document to ensure product flexibility.  It helps engineers view the product from a different perspective and identify future security threats.</p>
<p>We need to remember that cybersecurity is a game of cat and mouse.  We must break our mental hypervisors to ensure the future security of both our product’s software and its hardware.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/mental-hypervisors">Mental Hypervisors and Hardware Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Credential Stuffing – Just Like Grandma Used to Make</title>
		<link>https://telegrid.com/credential-stuffing?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=credential-stuffing</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 16 Feb 2017 16:21:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=995</guid>

					<description><![CDATA[<p>Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post.  It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/credential-stuffing">Credential Stuffing – Just Like Grandma Used to Make</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post.  It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, botnet technology and the human element.  The reason why I find this type of attack so interesting is that it often affects unsuspecting organizations, can scale very quickly, and its resolution requires an impossible change in human nature.  The specific study I would like to focus on here was made by Shape Security and is detailed in the <a href="http://info.shapesecurity.com/2017-Credential-Spill-Report-Thankyou.html">2017 Credential Spill Report</a>.  It is focused on Credential Stuffing – a method of cyber-attack based on the proven belief that people always reuse their “favorite” passwords to access different network resources. If you steal this “favorite” password you could, using Credential Stuffing, access high value network resources like an online banking account.  Automating the process using a botnet makes this method of attack a serious concern.</p>
<p>According to the study over 3 billion (that’s billion with a B) credentials were stolen in 2016 alone and Credential Stuffing is responsible for “more than 90% of login traffic on many of the world’s largest websites and mobile applications.”  Additionally, according to the study, Credential Stuffing had “up to a 2% success rate in taking over accounts on systems that did not report public data breaches.”</p>
<p>90% of login traffic with a 2% success rate…that is scary!  The reason why Credential Stuffing is so effective is because, as mentioned previously, it takes advantage of organizational ambivalence, botnet technology and human nature.  Let’s look at each of these elements.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p><u>Organizational Ambivalence</u> – Most organizations do not view Credential Stuffing as a traditional cyber-attack.  Indeed the Shape Security report states that these attacks happened “on systems that did not report public data breaches.”  The logic here is that since the credentials were stolen from another site and an organization cannot control a user’s password, organizations are not responsible.</p>
<p><u>Botnet Technology</u> – A botnet is a network of compromised computers organized by a perpetrator to perform a specific cyber-attack.  Add to a botnet the Sentry MBA software, which is the Credential Stuffing attack tool of choice, and you have cheap and easy automated Credential Stuffing attack tool.  Using a botnet also allows perpetrators to evade typical Credential Stuffing defenses like IP blacklists.</p>
<p><a href="http://telegrid.com/2016/02/cybersecurity-and-the-human-element/">Human Element</a> – This is always the most difficult aspect of cybersecurity.  Memorizing multiple passwords is frustrating and is the main reason for password reuse.  Indeed Credential Stuffing relies on the fact that roughly <a href="http://telegrid.com/2016/06/is-your-password-worth-10/">60% of people reuse passwords</a>.</p>
<p>There is no reason to believe that password reuse will disappear and that is why the only way to resolve Credential Stuffing is at the organizational level.  According to the Draft Special Publication <a href="https://pages.nist.gov/800-63-3/sp800-63b.html#memorized-secret-verifiers">800-63B </a>Digital Identity Guidelines, NIST is now recommending that organizations check a user’s password against a list of stolen passwords and provide alternates if the user’s password is on the list.  How long before the recommendation becomes a requirement?</p>
<p>The Open Web Application Security Project (OWASP) has issued a Credential Stuffing <a href="https://www.owasp.org/index.php/Credential_Stuffing_Prevention_Cheat_Sheet">cheat sheet</a> which lists 5 ways to protect your organization.  Some, like Multi-Factor Authentication (MFA), require a large network redesign effort or the implementation of a simple Single Sign-On solution like the TELEGRID <a href="http://telegrid.com/privileged-access-management/">SMRTe</a>.  Others, like requiring a multi-step login process or disallowing email addresses as user IDs, can be implemented today with very little effort.  Every organization should review the OWASP cheat sheet or they might be the next target of a Credential Stuffing cyber-attack.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/credential-stuffing">Credential Stuffing – Just Like Grandma Used to Make</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Rise of the CISO and Cybersecurity Tool Development</title>
		<link>https://telegrid.com/rise-ciso-means-cybersecurity-developers?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rise-ciso-means-cybersecurity-developers</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 14 Oct 2016 17:45:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=773</guid>

					<description><![CDATA[<p>PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries.  In the results PwC found that “59% of survey respondents say they &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/rise-ciso-means-cybersecurity-developers">The Rise of the CISO and Cybersecurity Tool Development</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>PwC released its Global State of Information Security® <a href="http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html">Survey</a> 2017 which is based on responses of 10,000 C-level executives from over 133 countries.  In the results PwC found that “59% of survey respondents say they are boosting their spending on security as a result of digitization.”  Hidden within the survey is the growing importance of the Chief Information Security Officer (CISO) and also what it means for developers of cybersecurity tools.</p>
<p>David Burg, PwC’s U.S. and global leader of cybersecurity and privacy, put it best in an <a href="http://www.cio.com/article/3128814/security/why-cybersecurity-spending-will-drive-business-digitization.html?utm_content=buffere83d2&amp;utm_medium=social&amp;utm_source=linkedin.com&amp;utm_campaign=buffer">interview</a> with Clint Boulton of CIO.com.  “What&#8217;s becoming clear is that senior execs &#8212; CEOs, marketing chiefs and others who worry about digital &#8212; are turning to CISOs and saying, OK how do I solve this? … It&#8217;s an important pivot. To remain competitive, organizations today must make a budgetary commitment to the integration of cybersecurity with digitization from the outset.”</p>
<p>At the New York Metro Joint Cyber Security Conference, a panelist made an interesting analogy between the rise of the CISO and the historic rise of Human Resources.  He said that if you followed the development of organizational charts from the early 1900s to today you would see the Human Resources department moving from the bottom of the organizational chart all the way up to the C-Suite.  He predicts that the same is and will continue to happen to the CISO position.</p>
<p>So what does this mean for developers of cybersecurity tools?</p>
<p>The rise of the CISO presents cybersecurity developers with a unique opportunity.  As cybersecurity planning moves earlier in the product development cycle, cybersecurity developers will be able to design their solutions as development tools, not bolt-on solutions.  Part of this effort includes reusing existing systems rather than reinventing the wheel.  For instance, in the past it might have been necessary to give administrators another database to manage, but now developers will be able to use existing protocols and communicate with existing databases.  This is a huge benefit and is something TELEGRID has already taken advantage of with its <a href="http://telegrid.com/privileged-access-management/">Privileged Access Management System</a>.</p>
<p>If cybersecurity experts are engaged earlier in the development lifecycle, we can design solutions the way they are supposed to be.  As a company of engineers, <a href="http://telegrid.com/">TELEGRID</a> knows that having a seat at the table early in the design process is very important.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com/">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/rise-ciso-means-cybersecurity-developers">The Rise of the CISO and Cybersecurity Tool Development</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
