Category Archives: Security

Graffiti Analysis and Law Enforcement

Working on a global intrusion detection system today, four years after Gartner incorrectly predicted they would no longer be relevant , presents a number of challenges. Most notably, creating an accurate signature for an attack, let alone an attacker, can be a very sophisticated and delicate process that requires non-trivial amounts of intelligent (i.e. human) intervention.

I recently spent the better part of a day discussing this with Marty Roesch of Sourcefire/Snort fame. He really gets it.

However, rather than bring up the individual vendors and their issues directly (IDS mud-slinging is so 2003), I would like to put forward an example of a similar practice — tracking graffiti by signature analysis:

“In addition to having a dramatic impact on graffiti, it will have an impact on tracking gangs. I’m excited about it.”
– Los Angeles County Supervisor, Don Knabe

“It’s a way to focus in on those vandals who really are creating a big problem through multiple acts over long periods of time that we haven’t been able to get at, because at best, we only get him on one count.”
– City of Paramount, City Manager Linda Benedetti-Leal

“We are able to track all of the graffiti and specifically the individual taggers, and identify where they were putting up their graffiti”
– Capt. Todd Rogers of the Los Angeles County Sheriff’s Office, Carson Station

Yes, all of those graffiti-crazed taggers are to be identified by their signatures. Clever approach. Who would have thought you could use painted signatures, or “tags”, to identify people? Yes, I’m being sarcastic.

Eye

Now they can be charged with many more incidents than just the one where they are caught in the act. Or in other words, now police can read tags and identify the source, just like the people who write them. Or are the police hoping to prove (e.g. nonrepudiation) the source of a tag? Technology always has that mystical charm, no?

Notable problems with this, let alone the controversy over fingerprint analysis, can be found in the history of other signature analysis:

An example of a paradigm shift in the handwriting world occurred when the writing instrument of choice changed from a nibbed pen (such as a fountain pen) to the ballpoint pen in 1945. Because the ballpoint pen uses highly viscous ink and a non-flexing tip, it produces a writing line with little or no shading (stress) . Forensic document examiners in the late 1940’s had to adapt their analysis techniques in order to account for the loss of this traditionally important data.

Do different paint cans make an impact on the tag comparison? What about a switch between paint and marker? What about someone tagging over another person’s tag — layers of graffiti or defaced signatures?

More interesting, perhaps, is the case of forgeries. How will a graffiti tracker handle one gang trying to frame another gang? Will individuals forge others’ tags to get them taken off the street, and then simply use randomness (e.g. enlist a group to each paint the same message with their own style) to avoid capture?

The more traditional signature analysis experts raise another issue:

Because of the pattern of fluctuations found in a normal signature, any digital signature that is fraudulently captured or stolen can only be used once. The second usage of a “stolen” signature would prove it is non-genuine since it would be an exact (or near-exact) match to a signature used for an earlier transaction. This is in direct contrast to a stolen fingerprint file which would be expected to be exactly the same on each transaction.

What then with a graffiti perpetrator using a template? If a spray-paint tag is actually exactly the same because it is based on a fixed image, what will the graffiti tracker do to detect the source of the image?

Attack detection is not just about picking a stereotype, or a simple image of a “bad” actor and going on in life. Detection continues as a security practice, far more than prevention, because it is based on intelligent and adaptive practices that tries to make sense of constantly changing patterns to provide measurable results. The testimonials above are hopeful about the future because they have an optimists’ view of detection — the new silver bullet — leading to prevention. In reality, the detection will be complex and require ongoing intelligence for oversight.

The technology available for signature analysis is still only as capable as the people who manage it. None of these detection systems make any sense as prevention investments without humans, or until artificial intelligence is relevant.

Gartner was foolish to confuse the technology so badly — the skills needed by a cop to arrest a felon are entirely different than those for an investigator who needs to solve a crime. On the other hand, it is important to acknowledge the fact that the author of the Gartner report (Rich Stiennon) now works for a company that sells all-in-one (e.g. confused, complex, and master-of-none, or silver-bullet) security boxes.

Zen Sarcasm

Not sure where these came from, but I found them amusing:

1. The journey of a thousand miles begins with a broken fan belt.

2. It’s always darkest before dawn. So if you’re going to read your neighbor’s newspaper, that’s the time to do it.

3. Don’t be irreplaceable. If you can’t be replaced, you can’t be promoted

4. Always remember that you’re unique. Just like everyone else.

5. Never test the depth of the water with both feet.

7. Before you criticize someone, you should walk a mile in their shoes. That way, when you criticize them, you’re a mile away and you have their shoes.

8. If at first you don’t succeed, skydiving is not for you.

9. Give a man a fish and he will eat for a day. Teach him how to fish, and he will sit in a boat and drink beer all day.

10. If you lend someone $20 and never see that person again, it may have been worth it.

11. If you tell the truth, you don’t have to remember why or when.

12. Some days you’re the bug; some days you’re the windshield.

13. A closed mouth gathers no foot.

14. There are two theories to arguing. Neither wins.

15. Experience is something you don’t get until just after you need it.

There could be more about the importance of nothingness, or the lessons from passive versus active involvement, but at least it is funny.

Number 13, for example, could be taken to mean that a closed mouth is best because there is less risk. However, this seems counter to many Zen sayings that laud open spaces for their utility, and do not try to fight against the risks of utility.

Tao Te Ching #11, as translated by Charles Muller, gives a fine example:

Thirty spokes join together in the hub.
It is because of what is not there that the cart is useful.
Clay is formed into a vessel.
It is because of its emptiness that the vessel is useful.
Cut doors and windows to make a room.
It is because of its emptiness that the room is useful.
Therefore, what is present is used for profit.

But it is in absence that there is usefulness.

An absence of speech versus a closed mouth. Very different images to me. Both could lead to less interference and therefore an opening of the mind. So a closed mouth might make sense, but it is not the best representation for openness. I guess that is what makes the above a Zen Sarcasm list.

Car-2-Car System Risks

I stepped out of my home the other day and saw a man laying on the ground, his new scooter a few feet away on the ground leaking oil. A small crowd had gathered around him as he described his injuries and what had happened. “A woman in a car just swerved from the far right over to the left and hit me” he said as he nursed his left shoulder and minded a scrape to his ankle. The armored jacket and helmet had clearly helped avoid further injury. He should have been wearing boots.

It seemed highly plausible that someone trying to make a last-minute left turn had decided it would make sense to abruptly cross three lanes without signaling and did not see a scooter coming. She might not have even looked at all and thought she could react in time if something appeared. After she hit the man, she apparently told a pedestrian she was going to park and then come back. Of course she never returned.

I immediately thought a vehicle sensor system could have saved this man and his scooter from injury, and perhaps even given him the identification information of the driver who swerved.

On the flip side, what if the car had some kind of positioning radar that showed another moving object within close proximity and therefore gave a warning siren when the driver tried to steer towards it? This is the same basic system as people now have in their rear bumper for backing up in tight spaces, but would be based on more sophisticated in-flight sensors.

The downside to a system like this, I simply couldn’t avoid, would be all the regular privacy concerns. In particular, should the system capture VIN and/or plate information? That would be useful in a hit-and-run scenario. Both of these could hardly be called secret information, but the ability to collect them remotely and compile them raises the risk to our privacy to a whole new level. Credit card security uses this line of reasoning; a person swiping a single card at a time is not a primary concern for data security standards, but a system that reads cards and stores the information is high risk.

I left the scene after helping move the scooter to a safe spot (it had toppled in the middle of a lane) and ensuring that the injured man was in good hands (rescue squad just pulling up).

Now I come to find out that something very similar to what I was thinking is already underway around the world:

The near-collision warning is a demonstration of technology that is expected to be rolled out to all shapes and sizes of cars in the coming years.

It is being developed by the European Car-2-Car consortium and is backed by General Motors, Audi, BMW, Fiat, Honda, Renault and a range of in-car hardware manufacturers and several universities.

The security implications of the system are absolutely stunning:

GPS tracks the position of the car while sensor data from the car – such as speed, direction, road conditions and if the windscreen wipers are on and if the brakes have been stamped on – is monitored by the on-board computer.

A wireless system similar to existing wi-fi technology – based on the 802.11p protocol – transmits and receives data to and from nearby cars, creating an ad-hoc network.

Data hops from car to car and the on-board computers can build a picture of road and traffic conditions based on information from multiple vehicles across a great distance.

Cars travelling in opposite directions can share information about where they have been and so informing each other about where they are going.

Wouldn’t you like to share all that information with a car nearby, especially someone you are trying to get away from? What about spoofed data or non-repudiation? How will this system handle people running secondary boxes to fool nearby drivers?

They say the system will rely on multiple signals, as though from multiple vehicles, but what is to stop someone from running five boxes themselves to get motorists to slow down (e.g. a cranky neighbor who wants cars in to slow while passing by)?

I suspect there will have to be a certificate system at the core of this and that begs the question of who will become the authority to all these devices? The government? Does that make them also the master repository of the information? Driving is said to be a privilege, not a right, so will someone make the case that it is ok to trace and trap the whereabouts of every vehicle at all times? Will code violations and fines be issued based on this system?

Professor Horst Wieker, from the department of telecommunications at the University of Applied Sciences, Saarbruck, said the aim was to create “foresighted driving”.

He said: “This technology allows us to build a short-range and long-range picture of road traffic conditions.

Further research brought me to a similar approach in 2004 at the University of Rutgers.

The intent sounds fine, except for the fact that there is no mention of the security implications of collecting this kind of information. Drivers tend to use and dispose of information immediately. No one at the scene of the accident could remember more than a few letters of the license plate from the car involved. Technology could certainly help, but at what level of new risk? Are people adequately assessing the security trade-offs of data generated by a peer-to-peer system? It does not appear so. I suspect the automobile manufacturers working on this do not have a strong consumer information privacy group or advocate in house. Time to propose another lower-risk way to assess traffic conditions?

Singapore seems to have a different approach that is already working, but they also apparently based their system upon reducing the environmental and economic impact of gridlock and accidents.

The Pig

by Roald Dahl

In England once there lived a big
And wonderfully clever pig.
To everybody it was plain
That Piggy had a massive brain.
He worked out sums inside his head,
There was no book he hadn’t read.
He knew what made an airplane fly,
He knew how engines worked and why.
He knew all this, but in the end
One question drove him round the bend:
He simply couldn’t puzzle out
What LIFE was really all about.
What was the reason for his birth?
Why was he placed upon this earth?
His giant brain went round and round.
Alas, no answer could be found.
Till suddenly one wondrous night.
All in a flash he saw the light.
He jumped up like a ballet dancer
And yelled, “By gum, I’ve got the answer!”
“They want my bacon slice by slice
“To sell at a tremendous price!
“They want my tender juicy chops
“To put in all the butcher’s shops!
“They want my pork to make a roast
“And that’s the part’ll cost the most!
“They want my sausages in strings!
“They even want my chitterlings!
“The butcher’s shop! The carving knife!
“That is the reason for my life!”
Such thoughts as these are not designed
To give a pig great piece of mind.
Next morning, in comes Farmer Bland,
A pail of pigswill in his hand,
And piggy with a mighty roar,
Bashes the farmer to the floor…
Now comes the rather grizzly bit
So let’s not make too much of it,
Except that you must understand
That Piggy did eat Farmer Bland,
He ate him up from head to toe,
Chewing the pieces nice and slow.
It took an hour to reach the feet,
Because there was so much to eat,
And when he finished, Pig, of course,
Felt absolutely no remorse.
Slowly he scratched his brainy head
And with a little smile he said,
“I had a fairly powerful hunch
“That he might have me for his lunch.
“And so, because I feared the worst,
“I thought I’d better eat him first. “

The pig clearly thought negotiation of terms, or finding common values, was out of the question.