Black Hat & DEF CON 2013 – Privacy, Security, and AI

I attended Black Hat and DEF CON USA 2013 this year in Las Vegas.  These two computer  security conferences were both founded by hacker Jeff Moss aka The Dark Tangent.  The Dark Tangent sold Black Hat for $14 million in 2005, but retained control of DEF CON.  He chairs the Black Hat conference, sits on the DHS Security Advisory Council, and is the chief security officer for ICANN, so he is pretty hardcore.  Black Hat, owned by UBM, costs thousands to attend and is supposedly more corporate, while DEF CON costs only $180, has cooler badges, and is more, uh, cultural.  This was my second year attending BH/DC, but next year I might skip Black Hat and try out the even more underground security conference, BSides.

Of course, I am no hacker; I am just a sysadmin, but I like to see what hijinks the hackers are up to these days.  Whether we are talking about the builders or the breakers,  hackers are having more and more impact.  Software is eating the world after all.  Look at China siphoning off intellectual property from US companies.  Look at the way hacking has branched out into organized crime.  If Snowden is to be believed, NSA analysts can hack anyone at will.   It’s also sobering to consider the impact that hacking will have on implantable medical devices.1  If I have learned anything from my interest in computer security, it is that many, if not most, of the electronic systems we rely on today were not designed with security in mind.  (I’m looking at you IP spoofing.)  This is true of internet protocols, industrial control systems, and yes, medical devices as well.

I am a computer consultant, so I do attend these things in that capacity as well, but I won’t bore everyone with how depressing it is to see my poor Windows systems continuing to get pwned by pass-the-hash and other exploits.  STILL!  After all these years.  Ugh!

One of the first talks that I attended was by Matthew Cole, who talked about a case in which the Italians convicted a bunch of CIA agents for kidnapping a Muslim cleric (aka extraordinary rendition) in Italy.  I had never heard of this case or of Cole, but this event from a couple of years ago is relevant today because, ironically, the Italians also used cell phone metadata2 to piece together their case against the CIA.  Cell phone metadata is the stuff that the NSA is gathering on each and every one of us Americans right now.  Also, Hezbollah supposedly used metadata analysis to arrest some CIA operatives back in 2011.  So Cole is calling out the CIA for sloppy tradecraft (spying) and failure to learn from past mistakes.  But it’s interesting to see some specific examples of how this supposedly innocuous metadata can be used against Americans.  This whole Third Party Doctrine thing needs to get reigned in.

I noticed that several of the presentations at Black Hat and DEF CON this year focused on machine learning algorithms.  One interesting project called CrowdSource was even funded by DARPA.  Their goal was to apply machine learning to the problem of malware analysis.  As any coder knows, Stack Overflow is one of the most useful forums for finding answers, and the creators of CrowdSource reasoned that malware authors are no different.  So they downloaded Stack Overflow, yes, the entire site, and used it to create semantic mappings between function calls and their natural language descriptions.  They then applied some machine learning math to help them predict just what their decompiled malware was trying to do.  I love this approach.  As the authors point out, it will stay up-to-date as long as Stack Overflow stays relevant, and they can even link back to the relevant Stack Overflow pages to show how conclusions were reached.  Clever.

Another example of machine learning being applied in the computer security domain was presented by Brazilian security expert Alexandre Pinto.  One problem that many companies face in computer security is realizing when they have been hacked.  Gone are the days of flashy hacker vandals making their exploits known to the world.  Malicious actors these days strive for stealth, and it is remarkably difficult to separate their footprints from the riotous chaos that constitutes “normal” network behavior.  Alex Pinto started out by lamenting that these SIEM systems that corporations use to log activity on their networks are incredibly difficult to configure and are remarkably ineffective.3

So Pinto went on sabbatical and started brushing up on machine learning.  He figured that the only way to address this big data problem was to enlist the help of robots.  He whipped up a neat little proof of concept example using a support vector machine to cluster IP addresses in his firewall logs.  This is sort of a trivial example, since IP blacklists are widely available and frontal attacks on firewalls don’t pose as much of a threat as the users with their browsers.  Nonetheless, the technique Pinto demonstrated could be adapted to cluster all manner of logged events on a network.  If he threw in some  heuristics (rules of thumb) such as the  “kill chain” event grouping suggested by John “Four” Flynn at Black Hat last year, it would add some codified human intelligence into the machine learning process and contribute to stronger computer security.

This is interesting because we are starting to see rudimentary AI being publicly discussed in the realm of computer security.  I assume of course that the NSA has had plenty of computer science PhDs working on more advanced AI based computer attacks and defenses for some time.  Yep, attacks.  Where the story gets more interesting is with this presentation at DEF CON by Soen Vanned:

Evolving Exploits Through Genetic Algorithms
SOEN HACKER FOR TEAM VANNED

This talk will discuss the next logical step from dumb fuzzing to breeding exploits via machine learning and evolution. Using genetic algorithms, this talk will take simple SQL exploits and breed them into precision tactical weapons. Stop looking at SQL error messages and carefully crafting injections, let genetic algorithms take over, and create lethal exploits to PWN sites for you!

Genetic algorithms basically try to mimic evolution by interbreeding and mutating potential solutions to evolve the fittest specimens.  In Soen’s case, of course, the “solutions” were SQL injection attack strings used to compromise web applications.4

So we have machine learning on the defense side trying to identify and analyze attacks, and we have it on the offense side trying to evolve exploits to bypass signature based filters.  This is starting to look like high frequency trading.  Have we had duelling AI’s going at each other behind the scenes between nation states for years already?  Maybe Peter Rothman is right and the Singularity already happened.

With the recent Snowden revelations, there was much talk about privacy.  Hackers are way ahead of the curve in these matters.  NSA whisteblower William Binney revealed details about NSA spying programs targeting Americans last year at DEF CON 2012.  This year, DEF CON featured a presentation by some folks from Montana who are working on privacy legislation at the state level.  Eric Fulton, a computer security specialist, worked with Montana state representative Daniel Zolnikov to prepare privacy bill HB 400 that ultimately died in a Montana state legislature committee.  But they are not giving up.  This bill was killed a few months prior to the Snowden revelations, so the public was less aware of privacy concerns at that time.  Fulton and Zolnikov plan to revise and break up HB 400 into smaller privacy bills that can be introduced in the future.

Here are the main points of HB 400:

(a) data subjects must be given notice when their personal information is being collected;
(b) personal information may be used only for the purpose stated and not for any other purposes;
(c) personal information may not be collected or disclosed without the data subject’s consent;
(d) personal information that is collected must be kept secure from any potential abuses;
(e) data subjects must be informed as to who is collecting personal information;
(f) data subjects must be allowed to access their personal information and make corrections to any inaccurate data;
(g) data subjects must have a method available to them to hold data collectors accountable for following the principles contained in this section.

These all seem fairly reasonable to me.  Maybe it’s a good idea to have states start enforcing privacy rights.

This question of privacy and who owns your personal data has been on my mind for some time.  Some guy promoting this Open-Source Everything idea gave a rambling, disjointed talk about hacking capitalism which was disappointingly bad.  He reiterated Lanier’s idea that people should own the data they create.  The problem is that most interesting data is created by interacting with services.  So you don’t in fact own your data, because the service providers control it on their servers.  But I would go farther and say you shouldn’t assert full ownership of this data as intellectual property, because it wouldn’t exist without the service you interacted with.  If phone services didn’t exist, phone call metadata wouldn’t exist.  So that’s a problem I hadn’t really thought through before.  Aside from the fact that it’s incredibly difficult to assert ownership of data in the first place, we can’t really claim exclusive ownership of so called “personal” data even in theory.  So we should go create something without using a service and assert ownership of that.

On the other hand, it would be nice to have something akin to privacy continue to exist in this world. Noah Schiffman and Skydog gave a talk called the Dark Arts of OSINT (OSINT = Open Source Intelligence), in which they showed how math can be applied to harvest publicly available data about anyone.  It is really amazing how much can currently be learned about you with only a couple of pieces of information.  SkyDog highlighted some of his favorite tools such as: Maltego, Search Diggity, and even Recorded Future5.  Schiffman then went on to lay out the math that can be used to do deep correlation between disconnected sets of information.  He cited the simple example of US Census data:

87% of the US population can be uniquely identified by gender, ZIP code, and full date of birth.

So that’s a tough attack to protect against.  Privacy really is dead.  The only solution that seemed even remotely plausible for maintaining anonymity was to spread misinformation about yourself to increase the noise to signal ratio and make it harder for malicious actors to build a profile of you.  I think Vinge talks about a service to provide this in Rainbow’s End.  Also, some guy at DEF CON told me about a service that is starting up to provide false information to various service providers on your behalf, but I think I lost his card.  I will look into that more.  If anyone knows about a service that does this, please post in comments.

Information systems are becoming more and more important in the real world every day.  Bits are taking control of atoms.  The people that can actually access and control these systems wield incredible power.  Some hackers do sell their work to oppressive governments and criminals.  However, hackers are inherently defiant and unpredictable.  I actually take consolation from this.  If a global information police state does emerge, we can trust that there will always be some hacker out there to throw a wrench in the works.  If for no other reason than the lulz.

 

  1. RIP to Barnaby Jack who was slated to speak on this topic at BlackHat this year.  I did not know him personally, but he seemed to have been a pretty cool guy.
  2. Ironically, the Italians supposedly used this Analyst Notebook software for this which they received from the US to help with intelligence analysis after 9/11.  Be careful sharing your toys there fellas.
  3. A Mandiant report from 2012 suggested that only 6% of intrusions are detected by internal processes.
  4. His Forced Evolution project is up on github if you can read python: https://github.com/soen-vanned/forced-evolution/
  5. This is an interesting future prediction service that I should probably write more about.

Health Extension #11: Aging – Death by Damage vs. Death by Design

Sorry for the provocative title,  let me start by clarifying that  I in no way subscribe to intelligent design.  I am just trying to contrast the viewpoints of the two speakers that I saw at Health Extension Salon #11 last week: Cythia Kenyon and Justin Rebo.  More on that later.

The Health Extension Salon was held at Runway SF this month, and it was outstanding as usual.  I haven’t been getting out enough lately, so it was great to chat with interesting people and hear about amazing science.  Runway SF, as you may know, is an incubator/co-work sort of thing in the Twitter building on Market Street in San Francisco.  I guess it’s by invitation only.  They have an igloo, and I saw some quadra-copters laying around and whatnot.  So  you know, it’s pretty cool.

I bumped into Hank Pellissier, who I first met years ago at my East Bay Futurist Meetup, and he told me a bit more about his new book, Brighter Brains.  Hank has compiled a huge list of factors that affect intelligence from environmental factors to inbreeding.  It seems like an interesting survey.

Then I listened in to a conversation with some blindingly smart people, R.J. and J.Y. among others, and wisely kept my mouth shut.  J.Y. suggested that programmed death might be an adaptive trait that increases a species’ evolvability.  More on that later as well.  He also blew my mind by wondering aloud if the lunar cycles of women were a throwback to our ancient ancestors that dwelled in tidal pools.  He pointed out that many illnesses varied in intensity of symptoms based on the time period during a woman’s menstrual cycle, but that the medical profession failed to take this into account when prescribing dosages of medicine.  Thus, many women find themselves overdosed for half the month and underdosed for the other half.  He suggested that there is a vast potential to exploit this to improve women’s health.  I hope some bio-hackers look into this further.

J.Y. also suggested that anaphylaxis (like from a severe nut allergy) might be the result of a sort of epinephrine (adrenaline) regulation problem.  This was an idea his young child apparently suggested upon learning that an epinephrine injection was the only reliable treatment.  From the mouth of babes.  I got the impression that J.Y. was brimming with ideas for potential medical breakthroughs.

Before introducing the speakers, the charismatic and charming Dinelle Lucchesi challenged the crowd to call out potential roadblocks standing in the way of progress in anti-aging research.  There was some disagreement about whether the fact that aging is not designated as an illness by the FDA is an issue.  Justin Rebo thought this was unimportant since any effective anti-aging treatment would be sure to combat any number of illnesses.  It was also suggested that aging is difficult to measure with bio-markers.  But my favorite roadblock was that “biology is hard.”  Yep, that sums it up.

Health Extension founder and awesome person, Joe Betts-LaCroix, then took to the stage to reiterate the fact that aging research is underfunded:

  1. Most healthcare money treats age-related diseases.

  2. Aging is the single biggest risk factor for these diseases.

  3. But funding to address the biochemical processes of aging is <0.01% of healthcare spending!

Typical shortsighted narrow-mindedness prevents us from exploring preventative medicine to the degree that we should.  But I was also excited to hear that Health Extension has commissioned a study by students from Moscow’s Skolkovo Management School* to make a quantitative case for more funding in aging research.  I guess Joe will be heading off to Washington with this in hand to beat Congressmen over the head with it or something.  I wish him the best of luck, but he might be better off packing a suitcase full of money.

The first guest presenter of the evening was Justin Rebo, CEO of Open Biotechnology.  In 2009, working with SENS, he built a device to filter out senescent immune cells from the blood.  This mechanism was interesting in that he attached metallic particles to antibodies which selectively bound to defective T cells, and then was able to pull them from the blood using a magnet.  There is something brutal and almost mechanical about this approach.  I like it.  I guess it might help with the ineffectiveness of flu vaccines for the old.  This blood scrubber seems to be something like a dialysis machine in that it filters all the blood of an animal and replaces it.  This work focuses on bioremediation of the blood, which reminds me of the work being done around rejuvenation of old mice using blood from young mice.  Rebo is now working on a new version of this device, which will add positive factors in addition to removing the negative ones.  He sees great promise in getting the blood compounds of older creatures to match the levels found in young animals.

So Rebo’s approach seems well aligned with the SENS model, in that it both treats aging as an accumulation of damage and toxins and seeks to remediate the damage.  This looks to be a sensible short-term solution (Well, except for this whole move the mitochondrial DNA into the nucleus business, that seems crazy.  But what do I know?).  The next speaker of the evening seemed to suggest a deeper cause of aging: it’s programmed by our genes.

Cynthia Kenyon is a distinguished scientist based at UCSF:

In 1993, Kenyon and colleagues’ discovery that a single gene mutation could double the lifespan of C. elegans sparked an intensive study of the molecular biology of aging. These findings have now led to the discovery that an evolutionarily conserved hormone signaling system controls aging in other organisms as well, including mammals.

– from her Biosketch

She gave a presentation similar to her 2011 TED Talk, which is definitely worth watching.  Kenyon’s sparkling wit is a pleasure to experience.  The upshot of her presentation was that this longevity mutation she found in C. elegans (Daf-2) somewhat impaired the worms ability to bind to insulin and IGF-1, and this caused another gene called Daf-16 (if it was in the nucleus) to trigger all sorts of protective pathways and thus extend life **.  Sugar impairs this process, which is why Kenyon reluctantly admits that she eats a low glycemic diet.  This was a big topic of interest among the folks that thronged her with questions after her talk.  But Kenyon is a real scientist and cautiously avoided advocating for this diet since she says it hasn’t been proven to extend life.

As I mulled the two presentations over preparing to write this post, it occurred to me that there was some tension between the two talks.  Rebo and SENS are boldly striding ahead assuming that aging is a process of damage and that we can combat it by repairing damage.  But Kenyon seems to suggest a deeper, perhaps longer-term strategy of activating the body’s built in protective pathways to extend life.  She prefers small molecules for this, since they are easier to test.  Also, this modulation requires some finesse.  You can’t just go knocking genes out entirely.  If you couldn’t bind insulin at all, that would be a problem.

Kenyon’s work also suggests that aging might be a process that is controlled by genetic timers.  “How does the body know when menopause should occur?” she mused.  Perhaps the entire aging process is carefully timed by genetic pathways.  Maybe age-related death is an adaptive trait.  Wait, what?  Yep.  Think back to what J.Y. said earlier.  Death improves evolvability.  You would expect that an organism that died on a timer to evolve more.  Consider an environment that can support 100 organisms.  The more frequently those creatures die (assuming they can still reproduce), the greater the genetic diversity.  Uh, maybe I better stop here and go ask Razib.

For the sake of argument, let’s just say that aging and death are programmed, and that this does improve evolvability.  Well that suggests that the “repair the damage” guys are missing the boat somewhat.  After all, the body seems to have these protective pathways waiting to be activated.  That’s sort of how calorie restriction might work.  It tricks the body into activating protective genetic pathways.  Because a timed death is fine as long as you get to reproduce, but during time of stress, such as famine, our genes have a special bag of tricks that can help us survive.

But there is a further twist.  Kenyon mentioned that deactivating sensory input extends life in fruit flies.   They can’t sense their food and thus live longer.  I guess it has been shown that insulin rises more if you smell food.  So you calorie restriction people are best off skipping dinner with non-CR friends entirely.  It’s not just the food itself, but the signal of the food, that works it’s way into your genetic expression somehow.

But now we are getting into hormesis territory.  Someone get Seth Roberts on the phone.  A little bit of toxin triggers the body’s natural defenses.  Kenyon pointed out that mildly inhibited respiration was associated with extended lifespans and wondered if the resulting increase in toxins such as ROS were the cause.   Get my homeopathist on the phone.  So are the small amounts of herbicide on that non-organic food I disdain actually helpful?  Oh brother, now I have to rethink everything.  Maybe the SENS people should too, given that some of the supposedly damaging toxins like amyloid plaques might turn out to be protective mechanisms.  I guess this goes back to my favorite quote of the evening, “Biology is hard.”

Overall, I was impressed by both speakers.  Both the pragmatic Rebo and the deeply insightful Kenyon are striving to extend human health spans.  I don’t want to lose sight of this when I drill down into the details.  At the end of the day, successful anti-aging treatments will reduce suffering and increase health and happiness.  Imagine an 80-year-old as vibrant and healthy as a 20-year-old.  Even if I dropped dead right at 81, I would take that sort of old age in a heartbeat.  It’s a real shame that these aging researchers are so bereft of funding.  If anyone reading this knows any good policy wonks or lobbyists who care about longevity, you should direct them to the next Health Extension Salon so they can get involved.  Hey, I’m doing my part.  I’m getting the word out.

* Skolkovo might be the world’s coolest looking school by the way.

** It’s worth noting that at least some of Kenyon’s insulin/IGF mutants had normal reproduction. http://rstb.royalsocietypublishing.org/content/366/1561/9.full Thus there doesn’t seem to be a tradeoff between fertility and longevity.

What the World Needs is a Rationalist Grumpy Cat

39935696

On Independence Day this year, I spent some time lamenting the impact of money on our political process here in the US.  As I always say, I follow Lawrence Lessig’s lead on this issue.  It seems that money purchases policy.  I support Rootstrikers in this regard, because they are working to fight this influence.  But I also wonder: why must it be so that money controls the voting of the public?  Shouldn’t the public be voting to advance their own self-interest?  (No laughter, please.)  Ananya Roy points out ways that this is actually true: middle class people vote more than poor people, and middle class housing credits receive ten times more money than housing for the poor.  But if it can be shown that money does consistently influence policy, then the public must be influenced to vote against their own self-interest in some cases.

Lessig would have us put limits on the amount of money spent.  That looks great on paper.  But it’s hard to take power away from the powerful.  So then I thought: well, maybe a public more critical of the media it consumes would be harder to manipulate into voting against their own self-interest (Or really taking any actions against their own self interest.).  Then the Situationists came to mind because I sort of like the mad way they expressed the spectacle of art imitating life imitating art in a sort of strange loop.  Not that I claim to really understand what the hell they or any of these French postmodernists are saying.   But, you know, it’s mind-bending in a recreational drug use sort of way.  Debord seems to show that media representations supplant lived experience, leading to mediated relationships between people.  Society’s focus shifts from being something to having something to appearing to have something.  Bling, bling, etc.

My point being that it’s sort of nontrivial to promote critical media consumption.  How do we even divide our very identities and relationships from the media we consume?  Or do we even need to do that?  Shouldn’t we be critical of ourselves too?  But anyway, then I decided that really I should go even more meta, from promoting media criticism to promoting rationality itself.  The Center For Applied Rationality is already in the business of doing this.  But the average person watching 2030 hours of television a week isn’t going to shell out for some weekend rationality retreat.  CFAR seems to be aiming at the elite of super-rationalists, which makes sense if the goal is to recruit Friendly AI builders.  But what about the poor schmucks getting suckered into voting for corn subsidies that end up killing them with diabetes from all the resulting cheap high fructose corn syrup?

So then I thought, well, maybe someone could take the CFAR rationality checklist*, which has some concrete examples of how to think more rationally, and convert it into some simple Lolcat-style memes.  Well, I asked around, and I guess this is being tried already: http://prettyrational.com.  The problem is that prettyrational.com is only funny if you already know Bayes’ theorem.  What the world needs is more like a rationalist version of Grumpy Cat or Honey Badger or something.  Seriously.  What if the decision making of those in the bottom percentiles of rationality could be improved just a little bit by spreading some simple rules of thumb.  Consider this one from that CFAR checklist:

I notice when my mind is arguing for a side (instead of evaluating which side to choose), and flag this as an error mode.

But you know, uh, punch it up a little and put a cat in there or something.  Anyway, that’s what Rootstrikers should really switch its focus to: making memes to increase rationality so that the plutocrats can throw all the money they want around, but the public will be too savvy to get their cognitive bias buttons pushed.  So all you hilarious rationalists out there (both of you) get yourselves over to Meme Generator and crank out something to benefit society.

* That CFAR checklist is worth reading, by the way.  One unexpected conclusion that I draw from it is that having a healthy self-esteem will make it easier to be rational.