Monday, May 1, 2023

How hackers are saving AI

Presented by SentinelOne: Delivered every Monday by 10 a.m., Weekly Cybersecurity examines the latest news in cybersecurity policy and politics.
May 01, 2023 View in browser
 
POLITICO's Weekly Cybersecurity newsletter logo

By John Sakellariadis

Presented by

SentinelOne

With help from Maggie Miller

Driving the Day

— The movers and shakers of the cybersecurity world have experience preventing digital systems from going haywire. And even if nobody asked, they're already racing to ensure that chatty chat bots never make the leap to murderous machines.

HAPPY MONDAY, and welcome to Morning Cybersecurity! My salve to the Knicks’ painful loss in Game 1 yesterday?

Giannis Antetokounmpo’s ballad on the meaning of failure in sports.

Got tips, feedback or other commentary? Send them my way at jsakellariadis@politico.com. You can also follow @POLITICOPro and @MorningCybersec on Twitter. Full team contact info is below.

A message from SentinelOne:

The SentinelOne Singularity Platform and Security DataLake is the only FedRAMP Authorized solution empowering centralized security operations in a world of big-data, decentralized IT. SentinelOne DELIVERS Industry leading, autonomous protection, detection, and response across attack surfaces. Unmatched cross-platform security analytics and intelligence with scalable, cost-effective long-term data retention. Expert-level, US-based personnel for deep-dive, comprehensive analysis, and active threat hunting. SentinelOne brings the most innovative and impactful cyber technology solutions to our federal government customers.

 
Artificial Intelligence

KEEPING ON THE GUARDRAILS — If you’re concerned about a future of truth-shattering large language models, ask not what artificial intelligence can do for cyber, but what cyber can do for artificial intelligence.

That’s one of my biggest takeaways from spending a week at the RSA security conference in San Francisco, where yours truly dedicated his 96 hours in the Bay Area (or, really, in a city-sized conference center within the Bay Area) to asking anyone and everyone about the epoch-shifting tech.

That doesn’t mean AI won’t radically change the meaning of things like anti-virus or APTs. A 30-minute stroll past some of the 5,000-plus security vendors camped out on RSA’s enormous subterranean expo floor will at least show you it’s already supercharged the industry’s snake-oil problem.

But while the rest of the Beltway seems to be running around wondering what to do about large language models — and just as importantly, who should do it — cyber experts inside and outside the government are already racing to keep the guardrails on AI.

3-part framework — Take acting national cyber director Kemba Walden, for example.

During a closed-door press gaggle in one of the drabbest rooms at RSA, I asked Walden about AI, a topic that only plays a bit part in her office’s new cybersecurity strategy. Is that a glaring omission for a document meant to keep the U.S. on the long-term path to digital safety?

AI is a triad of data, processing power and algorithms, Walden told me. And with revealing rapidity, she then proceeded to list how different subsections of the strategy (like say, sections 3.1, 3.3, 4.3, 4.6 and 2.4, to name a few) could ensure each ingredient of the AI stew wouldn’t go bad.

“It's all the things that ride on cyberspace that I'm trying to secure,” Walden said. “Tech innovation is one of them. AI is one of them.”

Back off Beijing — Or Rob Joyce, the director of the NSA’s cybersecurity directorate, who thankfully opted to hold his small press gathering off the conference grounds.

In a windowed meeting room the next day, I peppered Joyce with question after question about AI: whether it was something an adversary like Beijing could really “steal,” why it mattered that the U.S. keep its edge, and whether the NSA was doing much to ensure it did.

Joyce told me he views AI as an “accelerant” with far-reaching economic and military applications, and added he was “very concerned” about IP theft against U.S. AI giants, as I reported last week.

The good news? He admitted his agency is already helping those companies batten down their digital doors against keyboard sleuths.

Born of the same seed — One reason the security community appears outfront on AI is that there’s so much overlap between the two industries — a fact that became painfully obvious when my desperation for a bay view took me to the offices of a nearby tech giant.

To companies like Google, the dividing lines between the “hard” problems of computer exploitation and the “soft” problems of AI trust and safety aren’t as big as they might appear, Royal Hansen, the company’s vice president of privacy, safety and security engineering, told me.

“Security is a subset of quality,” Hansen said. And just as traditional security is about ensuring code is neither exploitable or exploitative, so too is trust and safety in AI largely about ensuring “things do what they’re supposed to do.”

Part of a mindset — And if there’s one community of people who have it in their DNA to scour digital systems for unintended bugs, it's hackers, argued Sven Cattell, who has been finding holes in AI systems for more than a half-decade.

Standing on RSA’s expo floor last week, Cattell first told me how some of the best AI security researchers he’s ever encountered are hackers who have learned enough AI to understand how it works, as opposed to AI experts who try to self-teach the hacking.

But I couldn’t hear Cattell too well amid the din of vendors with substance-rich sales promotions, like an appearance by former NFL star Jerry Rice or a night of standup with comedian Nick Offerman. So, I called Cattell again on Sunday for clarification.

“A lot of the trust and safety work in AI involves threat modeling,” said Cattell, president of the AI village at Defcon. And hackers are better at that than anyone because “you kind of have to do weird things in order to do a good threat model.”

 

A message from SentinelOne:

Advertisement Image

 
On the Hill

HOUSE JUDICIARY SUBPOENAS CISA — The Republican-led House Judiciary Committee is subpoenaing CISA and two other federal agencies for information related to the agencies’ alleged suppression of right-wing voices on social media platforms like Twitter and Facebook.

In a letter sent Friday to CISA Director Jen Easterly, Chair Jim Jordan (R-Ohio) accused the agency of failing to comply with a March 22 request that the agency share internal and external communications regarding prior content moderation efforts with social media platforms — charges that remain unsubstantiated, even according to the committee.

The subpoenaed information is necessary to determine “the extent to which CISA coerced, pressured, worked with, or relied upon social media and other tech companies in order to censor speech,” reads the letter, versions of which were also sent to the Centers for Disease Control and Prevention and the State Department's Global Engagement Center.

Politely not buying it — In a statement, DHS spokesperson Mia Ehrenberg said the civilian cyber defense agency does not censor speech or request that content be taken down by social media companies.

She also criticized the committee’s decision to resort to a subpoena, suggesting it had not given CISA adequate time to comply with the prior request.

“Instead of working with the Department, as numerous committees have done this Congress, the House Judiciary Committee has unnecessarily escalated to a subpoena,” reads her statement.

 

GET READY FOR GLOBAL TECH DAY: Join POLITICO Live as we launch our first Global Tech Day alongside London Tech Week on Thursday, June 15. Register now for continuing updates and to be a part of this momentous and program-packed day! From the blockchain, to AI, and autonomous vehicles, technology is changing how power is exercised around the world, so who will write the rules? REGSITER HERE.

 
 

Want to receive this newsletter every weekday? Subscribe to POLITICO Pro. You’ll also receive daily policy news and other intelligence you need to act on the day’s biggest stories.

Critical Infrastructure

DUDE, WHERE’S MY CYBER? — The cannabis industry is growing something new these days: an industry-led intelligence sharing group to help cultivators and dispensaries beat back a growing array of digital threats.

Like information sharing and analysis organizations in other sectors, the Cannabis ISAO doesn’t just focus on stopping bad things that can happen to its members via ones and zeros. But the roughly two-year-old nonprofit organization is finding that keyboard-borne threats increasingly represent one of the biggest challenges confronting cannabis companies, Ben Taylor, the executive director of the organization, told me.

“It's a very immature industry,” Taylor said. “And as they experienced rapid growth, we're worried from a cyber security perspective that [members] are becoming increasingly vulnerable.”

Grassroots organization — Like other ISAOs, Taylor’s pot-focused group works to give its members a leg up on cyber defense by consolidating, analyzing and sharing information on digital and physical menaces to the industry.

These days, business email compromise, fraud and ransomware represents the biggest security threats facing cannabis companies, said Taylor.

Taking a hit — I first reached out to Taylor because I wasn’t sure the ISAO was the real deal. But once we got past the jokes, Taylor said the stigma around the industry represents a significant challenge for members.

Since marijuana isn’t legal in all states, Taylor said, cannabis companies are often hesitant about working with the FBI or CISA. And it’s not always clear those federal agencies can pony up help to an industry that doesn’t stand on solid legal footing at the federal level, said Taylor, who is now working to hash out those issues for members.

“The threat is real,” said Taylor.

Tweet of the Weekend

There is a Jamil Jaffer and a Jameel Jaffer who both weigh in on cybersecurity issues from time to time. Only thing is, their views are diametrically opposed — and people are VERY confused. Here’s an amazing thread on the “ideological dopplegangers.”

@jamil_n_jaffer

Twitter

What We're Reading

The Department of Justice detected the SolarWinds hack six months earlier than previously reported, journalist Kim Zetter reports for Wired.

A message from SentinelOne:

Today’s Federal Agencies are challenged by a growing list of adversaries operating in an increasingly complex cyber threat landscape. With staffing, expertise, and budget constraints, they are faced with managing multiple, disjointed security tools and increasing operational costs. At SentinelOne, we are uniquely positioned to help Agencies tackle these problems and combat our most aggressive and malicious adversaries.

The SentinelOne Singularity Platform delivers a single, unified console to manage the full breadth of AI-powered cybersecurity protection, detection, and response technologies for all-surface protection.

Our platform runs on the industry’s first and only unified, M-21-31 Security Data Lake that fuses SentinelOne and 3rd Party security data, threat hunting, deep-dive analytics, and autonomous enforcement into a single unified console.

Authorized through the FedRAMP program, the SentinelOne Platform and Security Data Lake are architected to surpass the stringent operational and security requirements, protecting our nation’s most critical and sensitive data and information.

 
Quick Bytes

— The Biden administration has a new pitch to re-up a controversial surveillance program. (POLITICO)

— Government transparency report shows a steep decline in “backdoor searches” on Americans, but critics remain unswayed. (POLITICO)

— Ukraine inks new cyber assistance agreements on the sidelines of the RSA conference. (POLITICO)

— CISA and the FDA are warning of a critical security flaw in genomics devices. (TechCrunch)

 

DON’T MISS THE POLITICO ENERGY SUMMIT: A new world energy order is emerging and America’s place in it is at a critical juncture. Join POLITICO on Thursday, May 18 for our first-ever energy summit to explore how the U.S. is positioning itself in a complicated energy future. We’ll explore progress on infrastructure and climate funding dedicated to building a renewable energy economy, Biden’s environmental justice proposals, and so much more. REGISTER HERE.

 
 
 

Follow us on Twitter

Heidi Vogt @HeidiVogt

Maggie Miller @magmill95

John Sakellariadis @johnnysaks130

 

Follow us

Follow us on Facebook Follow us on Twitter Follow us on Instagram Listen on Apple Podcast
 

To change your alert settings, please log in at https://www.politico.com/_login?base=https%3A%2F%2Fwww.politico.com/settings

This email was sent to edwardlorilla1986.paxforex@blogger.com by: POLITICO, LLC 1000 Wilson Blvd. Arlington, VA, 22209, USA

Please click here and follow the steps to unsubscribe.

No comments:

Post a Comment

Exposed: 3 Cent Crypto to Explode December 16th?

Chris Rowe, the man who spotted 44 different coins that have returned over 100%, is now making the biggest crypto call of his ...