AN EXPLANATION OF THE FACTIONS  
 

[ DONATE TO RMN ] [ View Thread ] [ Archive Search Page ] [ RMN Reading Room ] [ CGI Media News Room ] [ SUBSCRIBE TO RMN ]

RMN is Reader Supported

Our Goal for
APR 6 - MAY 5:
$1,420

Powered by FundRazr

Click Widget
or Click Here to contribute.

Checks & Money Orders:

Raye Allan Smith
P.O. Box 95
Ashtabula, OH 44005


Users Online:
58

Who Founded RMNews?


Dewitt Jones' Video
"Celebrate What's Right
With The World"


"When the
Starships Fly!"

Listen at YouTube


The Theme for The Obergon Chronicles

Listen at YouTube


The Obergon Chronicles ebook


RUMOR MILL
NEWS RADIO


CGI ROOM
Common Ground
Independent Media


WHAT ARE
THE FACTIONS?


THE AMAZING
RAYELAN ALLAN


BIORHYTHMS

LOTTO PICKS

OTHER WAYS TO DONATE





RUMOR MILL NEWS AGENTS WHO'VE BEEN INTERVIEWED ON RUMOR MILL NEWS RADIO

______________

NOVEMBER 2008

Kevin Courtois - Kcbjedi
______________

Dr Robin Falkov

______________

Melinda Pillsbury Hr1

Melinda Pillsbury Hr2

______________

Daneen Peterson

______________

Daneen Peterson

______________

Disclosure Hr1

Disclosure Hr2
______________

Scribe
______________

in_PHI_nitti
______________

Jasmine Hr1
Jasmine Hr2
______________

Tom Chittum Hr1
Tom Chittum Hr2
______________

Kevin Courtois
______________

Dr Syberlux
______________

Gary Larrabee Hr1
Gary Larrabee Hr2
______________

Kevin Courtois
______________

Pravdaseeker Hr1
Pravdaseeker Hr2
______________

DECEMBER 2008

Tom Chittum
______________

Crystal River
______________

Stewart Swerdlow Hr1
Stewart Swerdlow Hr2
______________

Janet Swerdlow Hr1
Janet Swerdlow Hr2
______________

Dr. Robin Falkov Hr1
Dr. Robin Falkov Hr2
Dr. Robin Falkov Hr3

JANUARY 2009 ______________

Patriotlad
______________

Patriotlad
______________

Crystal River
______________

Patriotlad
______________

Dr. Robin Falcov
______________

Patriotlad

FEBRUARY 2009

Find UFOs, The Apocalypse, New World Order, Political Analysis,
Alternative Health, Armageddon, Conspiracies, Prophecies, Spirituality,
Home Schooling, Home Mortgages and more, in:

Rumor Mill News Reading Room, Current Archive

Reader: DARPA goes full Tron with its grand battle of the hack bots. Never go full Tron!!

Posted By: RumorMail
Date: Thursday, 7-Jul-2016 15:58:09
www.rumormill.news/50911

In Response To: 18 artificial intelligence researchers reveal the profound changes coming to our lives (RumorMail)

Snip

Darpa Goes Full Tron With Its Grand Battle of the Hack Bots

On a giant flat-screen TV in an old Emeryville, California warehouse, a floating orb fires red, blue, pink, and yellow beams into a honeycomb of hexagonal blocks. The blocks are black, white, and gray, but as the beams hit them, they change—flashing, fading, absorbing color. And when they do, scores tally just above.

On the same screen, from adjacent windows, three commentators provide additional color, as if this was a videogame championship. “You can see who’s being owned, and who’s doing the owning,” says one, a theoretical physicist named Hakeem Oluseyi.

But this isn’t a videogame. The other two commentators are veteran white-hat hackers, experts at reverse-engineering software in search of security holes. The slick-bald guy (with the ponytail in back) is Visi, and the thin one with the hipster beard is HJ, short for Hawaii John. No other names given. They’re hackers.

All this is dress rehearsal for a $55 million hacking contest put on by Darpa, the visionary research wing of the US Defense Department. The contest is called the Cyber Grand Challenge, and it’s set for early August. Seven teams will compete inside seven supercomputers erected in a ballroom at the Paris hotel in Las Vegas, each unleashing artificially intelligent software that will defend one machine—and virtually attack the rest.

No one has ever really deployed a bot like that—software that can, completely on its own, find and repair security holes in real time. If these bots reach maturity, it would be a fundamental shift in computer security. But none of that is visual. So, to prove it can work, Darpa is going all Tron, visually recreating what goes on inside those seven machines. It’s not enough to have bots play Capture the Flag. You need to see it. “What’s happening inside the central processing unit? What’s happening inside the memory?” says Mike Walker, the veteran white-hat hacker turned Darpa program manager who oversees the Grand Challenge. “That’s what we’re trying to do here.”

June 10265 R11 Arena ViewClick to Open Overlay Gallery
Darpa’s Cyber Grand Challenge visualization in “arena view,” showing what the hack bots are doing inside seven supercomputers. Darpa
Inside the Grid

On the TV, Oluseyi, Visi, and HJ are describing that Tron-like visualization, a software universe Darpa built in tandem with voidAlpha, a videogame company. VoidAlpha works out of this reclaimed warehouse, and Walker is here too. He and his Darpa team arrived in Emeryville last week so they could hone the visualization and try it out.

This isn’t the first time the security community has tried to build useful visualizations of what goes on inside a computer network. In fact, there’s a whole sub-community devoted to network visuals. But for Visi and HJ, Darpa has captured the art of reverse engineering in an unprecedented way. “This has never been available, even to reverse engineers using the most cutting edge tools,” Visi says.

For decades, human hackers, including Visi and HJ, have played Capture the Flag, the oldest, biggest, and most famous hacking contest. But the Cyber Grand Challenge is for bots, and Darpa wants to bring these bots into the wider world. Having this kind of visualization helps people understand how that might work—and it can help them build better bots. “A Grand Challenge is about starting technology revolutions,” Walker says. “That’s partially through the development of new technology, but it’s also about bringing a community to bear on the problem.”

Plus, it looks cool. For people who watched Jeff Bridges ride a light cycle around a computer-generated vision of a circuit board (twice!), or watched Angelina Jolie, in Hackers, mess around inside a supercomputer called Gibson (we see what you did there, and no doubt @GreatDismal did, too), the idea of getting to see what’s actually happening in the soul of a machine is more than tantalizing.
The Physical and the Virtual

The competition’s wardrobe-sized supercomputers are already at the Paris, sitting quietly in storage. They arrived at the end of June. And in the coming weeks, a team led by Darpa contractor Sean O’Brien will forklift them into an 83,000 square-foot ballroom and onto a clear plexiglass stage.

That transparency is literal and metaphoric. The visible air gap between the machine and everything else in the room ensures that data will only travel to the outside world on CDs carried by a robotic arm. “No networking cable will cross the air gap,” O’Brien says.

That way, everyone—even the most skeptical and paranoid hacker among the crowd at Def Con—will know the competition is on the up-and-up. Even the contestants, the seven teams that spent the last two years designing the bots, will sit outside the air gap.

As these contestants watch, the bots will go to work inside the machines, analyzing and defending software they’ve never seen before. They’ll look for security vulnerabilities in their own machine. They’ll scramble to patch those vulns and keep their systems running. And at the same time, they’ll strive to show Darpa’s referees they can exploit holes in the other machines. That’s how Capture the Flag works—except for the bots.

CGC racks and powerClick to Open Overlay Gallery
Darpa tests the supercomputers—enormous racks of servers—that serve as the playing field fothe Cyber Grand Challenge. Darpa
Closing the Window

Traditionally, finding and patching security holes is a human talent. But machines are playing an ever expanding role. Google, for instance, is building sweeping systems that can identify vulns via fuzz testing, a technique that involves throwing random inputs at a piece of software. Google’s system can simultaneously fuzz dozens of Android phones, and it’s using deep neural networks—networks of hardware and software that can learn by analyzing vast amounts of data—to gradually learn what sort of fuzzing is likely to work and what’s not.

At least, that’s the idea. These kinds of systems are a long way from handling the whole process on their own. They don’t identify and patch holes in software while people are using it. And they’re certainly not in the toolkit of the average online company. “This a long ways off,” says Orion Hindawi, CEO of Tanium, a security company just down the road from today’s dress rehearsal. “It’s an extremely expensive way to solve the problem.”

But with the Cyber Grand Challenge, DARPA is aiming for all that. It seeks bots that can identify and patch vulns in the moment—without any human intervention. “We’re trying to close the window to a minute,” Walker says. “Or seconds.” In the same way self-driving cars have improved enormously since they picked their way through a Grand Challenge obstacle course in the Mojave desert, Walker hopes the bots will get better, eventually outperforming humans. The battle in Las Vegas might be the first time people are just an audience for AIs fighting for hacker supremacy, but it won’t be the last.

Air conditioningClick to Open Overlay Gallery
The massive air conditioning units that will cool the supercomputers inside the Paris ballroom. Darpa
Nerd Detector

To a certain subset of the population, the idea of real-life Tron is enough of a sell. “You could use this as a nerd detector,” Oluseyi says during practice commentary. But Tron was a fantasy. Come on, a security program that looks like the commander of Babylon 5? What are the odds?

With the Cyber Grand Challenge, the visual metaphor is more literal. One view is akin to an arena. That’s still very Tron-like, but instead of light cycles and flying discs, you get those honeycombs of hexagons. The hexagons represent real software services running inside the supercomputers. And the colored beams hitting the hexagons show data flowing into those services, including data from the bots. The audience can see when a bot finds a hole, when it patches the hole, when a bot accidentally breaks the service, when the service is inaccessible because a patch is taking too long, and so on.

What’s more, Darpa’s visualization can drill down and really look at those streams of data—about 84,000 attempts at reverse engineering over an eight-hour contest. This is called the “trace view.” It can actually demonstrate what each bot is doing—what code is executing when. “It literally shows the execution flow of data being given to a program,” Visi says, “and what the program is doing with that data.” Matt Wynn, one of the voidAlpha designers that built the visualization, believes the company could turn this into a bone fide debugger, something engineers could use hone and debug code in the real world.

From afar, the trace view looks almost like a wire fence rolled up into cylinder. But up close, you can see the route of the moving data. A code loop—when a service executes the same routine over and over again—looks like a loop, a developing spiral. For Visi, this is what sets Darpa’s project apart. It can show you what’s happening inside the machine over time. It’s not a snapshot. It’s a narrative.
Human and Machine

If you’re not a hacker, this is still hard to grasp—at least initially. But that’s why Darpa hired commentators. It’s all about taking what’s inside the head of someone like Visi—a seasoned reverse engineer—and showing it to everyone. “There’s a distinct need to get that fusion of knowledge and understanding out to a larger audience,” he says. When reverse engineering, he mentally visualizes the hack, and Darpa wants to visualize it for real. It wants to give everyone else that same image.

The image on screen is beautiful. It’s intriguing. And, ultimately, it’s enlightening. But it still looks small. And it shouldn’t. It should show the enormity of the task—the massive amounts of code and traffic those bots will deal with. That’s why Darpa brought in Oluseyi, the physicist. On the Internet, he’s known for a TED talk on infinity. “Program analysis,” Walker says, “is a duel with the infinite.” And Oluseyi is here to make sure we all see it.

Read More



RMN is an RA production.

Articles In This Thread

18 artificial intelligence researchers reveal the profound changes coming to our lives
RumorMail -- Thursday, 7-Jul-2016 14:59:03
Reader: Scientists are teaching Robots how to Hunt down 'Prey'
RumorMail -- Thursday, 7-Jul-2016 15:55:07
Reader: DARPA goes full Tron with its grand battle of the hack bots. Never go full Tron!!
RumorMail -- Thursday, 7-Jul-2016 15:58:09
Reader: Einstein's theory of relativity is a major failure because it failed to address the quantum reality
RumorMail -- Sunday, 10-Jul-2016 12:15:37
Hyperloop Connecting Helsinki and Stockholm Turns 300-Mile Trip Into 28 Minute Ride
RumorMail -- Thursday, 7-Jul-2016 16:01:29

The only pay your RMN moderators receive
comes from ads.
If you're using an ad blocker, please consider putting RMN in
your ad blocker's whitelist.


Serving Truth and Freedom
Worldwide since 1996
 
Politically Incorrect News
Stranger than Fiction
Usually True!


Powered
by FundRazr
Click Widget
or Click Here to contribute.


Organic Sulfur 4 Health

^


AGENTS WEBPAGES

Provided free to RMN Agents

Organic Sulfur 4 Health

^


AGENTS WEBPAGES

Provided free to RMN Agents



[ DONATE TO RMN ] [ View Thread ] [ Archive Search Page ] [ RMN Reading Room ] [ CGI Media News Room ] [ SUBSCRIBE TO RMN ]

Rumor Mill News Reading Room, Current Archive is maintained by Forum Admin with WebBBS 5.12.

If you can't find what you're looking
for using our RMN search, try the DuckDuckGo search below:


AN EXPLANATION OF THE FACTIONS