The Dark Web Cuts the Violence

March 23, 2016

Drug dealing is a shady business that takes place in a nefarious underground and runs discreetly under our noses.  Along with drug dealing comes a variety of violence involving guns, criminal offenses, and often death.   Countless people have lost their lives related to drug dealing, and that does not even include the people who overdosed.  Would you believe that the drug dealing violence is being curbed by the Dark Web?  TechDirt reveals, “How The Dark Net Is Making Drug Purchases Safer By Eliminating Associated Violence And Improving Quality.”

The Dark Web is the Internet’s underbelly, where stolen information and sex trafficking victims are sold, terrorists mingle, and, of course, drugs are peddled.  Who would have thought that the Dark Web would actually provide a beneficial service to society by sending drug dealers online and taking them off the streets?  With the drug dealers goes the associated violence.  There also appears to be a system of checks and balances, where drug users can leave feedback a la eBay.  It pushes the drug quality up as well, but is that a good or bad thing?

“The new report comes from the European Monitoring Centre for Drugs and Drug Addiction, which is funded by the European Union, and, as usual, is accompanied by an official comment from the relevant EU commissioner. Unfortunately, Dimitris Avramopoulos, the European Commissioner for Migration, Home Affairs and Citizenship, trots out the usual unthinking reaction to drug sales that has made the long-running and totally futile “war on drugs” one of the most destructive and counterproductive policies ever devised:

‘We should stop the abuse of the Internet by those wanting to turn it into a drug market. Technology is offering fresh opportunities for law enforcement to tackle online drug markets and reduce threats to public health. Let us seize these opportunities to attack the problem head-on and reduce drug supply online.’”

The war on drugs is a futile fight, but illegal substances do not benefit anyone.  While it is a boon to society for the crime to be taken off the streets, take into consideration that the Dark Web is also a breeding ground for crimes arguably worse than drug dealing.

 

Whitney Grace, March 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Tails Increases Ease of Online Anonymity

March 17, 2016

The interest in browsing the internet anonymously does not appear to be fading. Softpedia recently posted Debian Makes It a Lot Easier for Users to Install the Tails Anonymous Live CD. Called the “amnesic incognito live system”, Tails is a GNU/Linux Live CD distribution which is based on the Debian operating system and allows your online activities to remain anonymous. Tails is driven by Tor and provides its users access to the anonymous Tor network. The article tells us,

Now, we all know how to write a Live ISO image on a USB key or a CD disc, right? But what you probably don’t know is that there’s an app for that, called Tails Installer, which the skilled Debian Privacy Tools maintainers team included in Debian repos. “The previous process for getting started with Tails was very complex and was problematic for less tech-savvy users,” developers explained. “It required starting Tails three times, and copying the full ISO image onto a USB stick twice before having a fully functional Tails USB stick with persistence enabled.”

As the article points out, Tails has a stamp of approval from Edward Snowden. It seems like before Debian, it would have been quite the stretch for many users to even consider adopting the use of Tails. However, using a Linux-based operating system, the pre-requisite for Tails, may also be a hurdle preventing wide-scale adoption. Time will tell.

 

Megan Feil, March 17, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Facebook Faces French Frippery

February 12, 2016

Facebook and its privacy and information policies are under scrutiny in France. Unlike the US and other countries, French regulators can be a frisky bunch. I recall an incident involving a certain Russian who operated in an interesting manner. If recollection serves, the French authorities kept pecking and pecking and finally chewed the feet off the alleged wrong doer. Persistence and institutional coordination are different in the land of more than 200 types of cheese.

French Data Privacy Regulator Cracks down on Facebook” reports that the social media outfit has 90 days to “stop tracking non users’ Web activity without their consent.”

This begs the question, “Then what?”

Two things. France will cheerlead for actions against Facebook from its EC colleagues.

Plus the French bureaucracy, the outfit which “invented red tape,” will swing into action. This is often not a good thing. I recall a French born French citizen who had to display her great grandfather’s medal of honor to clear up a citizenship inquiry. The nifty part of this anecdote is that a letter from the president of France to her grandfather was not enough. The picture verified that the grandfather and the French president were shaking hands at the award ceremony. That’s bureaucratic attentiveness in action.

Facebook faces French friskiness in the institutional playground. At least, lunches are usually pretty good. That’s a benefit for the legal eagles who will flock to answer the “then what?” question.

Stephen E Arnold, February 12, 2016

Anonymity Not Always Secured for Tor and Dark Web Users

January 28, 2016

From the Washington Post comes an article pertinent to investigative security technologies called This is how the government is catching people who use child porn sites. This piece outlines the process used by the FBI to identify a Tor user’s identity, despite the anonymity Tor provides. The article explains how this occurred in one case unmasking the user Pewter,

“In order to uncover Pewter’s true identity and location, the FBI quietly turned to a technique more typically used by hackers. The agency, with a warrant, surreptitiously placed computer code, or malware, on all computers that logged into the Playpen site. When Pewter connected, the malware exploited a flaw in his browser, forcing his computer to reveal its true Internet protocol address. From there, a subpoena to Comcast yielded his real name and address.”

Some are concerned with privacy of the thousands of users whose computers are also hacked in processes such as the one described above. The user who was caught in this case is arguing the government’s use of such tools violated the Fourth Amendment. One federal prosecutor quoted in the article describes the search processes used in this case as a “gray area in the law”. His point, that technology is eclipsing the law, is definitely one that deserves more attention from all angles: the public, governmental agencies, and private companies.

 

Megan Feil, January 28, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

Oscobo: A Privacy Centric Web Search System

January 7, 2016

Before you get too excited, the Oscobo service uses results from Bing. Yep, that is the search engine which uses Baidu in China and Yandex in Russia for results.

The Oscobo search system is about privacy for its users, not about the dreary precision, recall, and relevance issues. “Oscobo Is An Anonymous Search Engine Targeting Brits” reports that the system reminded the article’s author of DuckDuckGo and Hulbee, both working to ensure the privacy of their users.

The results are filtered to cater to the needs of the UK online search it seems.

According to the write up, Oscobo’s business model

is simple paid search, based on bare-bones search data (i.e. whatever string a user is searching for) and their location — given the product is serving the U.K. market this is assumed to be the U.K., but whatever search string they input may further flesh out a more specific location.

There is no definition of “paid search”, however. You can check out the system at https://oscobo.co.uk/.

Stephen E Arnold, January 7, 2016

Google and Students: The Quest for Revenue

January 7, 2016

The Alphabet Google thing is getting more focused in its quest for revenue in the post desktop search world. I read “Google Is Tracking Students As It Sells More Products to Schools, Privacy Advocates Warn.” I remember the good old days when the Google was visiting universities to chat about its indexing of the institutions’ Web sites and the presentations related to the book scanning project. This write up seems, if Jeff Bezos’ newspaper is spot on, to suggest that the Alphabet Google thing is getting more interested in students, not just the institutions.

I read:

More than half of K-12 laptops or tablets purchased by U.S. schools in the third quarter were Chromebooks, cheap laptops that run Google software…. But Google is also tracking what those students are doing on its services and using some of that information to sell targeted ads, according to a complaint filed with federal officials by a leading privacy advocacy group.

The write up points out:

In just a few short years, Google has become a dominant force as a provider of education technology…. Google’s fast rise has partly been because of low costs: Chromebooks can often be bought in the $100 to $200 range, a fraction of the price for a MacBook. And its software is free to schools.

Low prices. Well, Amazon is into that type of marketing too, right? Collecting data. Isn’t Amazon gathering data for its recommendations service?

My reaction to the write up is that the newspaper will have more revelations about the Alphabet Google thing. The security and privacy issue is one that has the potential to create some excitement in the land of online giants.

Stephen E Arnold, January 7, 2015

New Years Resolutions in Personal Data Security

December 22, 2015

The article on ITProPortal titled What Did We Learn in Records Management in 2016 and What Lies Ahead for 2016? delves into the unlearnt lessons in data security. The article begins with a look back over major data breaches, including Ashley Madison, JP Morgan et al, and Vtech and gathers from them the trend of personal information being targeted by hackers. The article reports,

“A Crown Records Management Survey earlier in 2015 revealed two-thirds of people interviewed – all of them IT decision makers at UK companies with more than 200 employees – admitted losing important data… human error is continuing to put that information at risk as businesses fail to protect it properly…but there is legislation on the horizon that could prompt change – and a greater public awareness of data protection issues could also drive the agenda.”

The article also makes a few predictions about the upcoming developments in our approach to data protection. Among them includes the passage of the European Union General Data Protection Regulation (EU GDPR) and the resulting affect on businesses. In terms of apps, the article suggests that more people might start asking questions about the information required to use certain apps (especially when the data they request is completely irrelevant to the functions of the app.) Generally optimistic, these developments will only occur of people and businesses and governments take data breaches and privacy more seriously.

 

Chelsea Kerwin, December 22, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Internet Sovereignty, Apathy, and the Cloud

December 21, 2015

The OS News post titled Dark Clouds Over the Internet presents an argument that boils down to a choice between international accord and data sharing agreement, or the risk of the Internet being broken up into national networks. Some very worked up commenters engaged in an interesting discussion that spanned government overreaching, democracy, data security, privacy, and for some reason, climate change. One person summarized their opinion thusly:

“Best policy: don’t store data with someone else. There is no cloud. It’s just someone else’s computer.”

In response, a user named Alfman replied that companies are to blame for the current lack of data security, or more precisely, people are generally to blame for allowing this state of affairs to exist,

The privacy issues we’re now seeing are a direct consequence of corporate business models pushing our data into their central silos. None of this is surprising except perhaps how willing users have been to forgo their own privacy. Collectively, it seems that we are very willing to give up our rights for very little in exchange… makes it difficult to achieve critical mass around technologies promoting data independence.”

It is hard to argue with the apathy factor, with data breaches occurring regularly and so little being done by individuals to protect themselves. Good thing these commenters have figured it all out. Next up, solving climate change.

Chelsea Kerwin, December 21, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Big Brother GPS

September 9, 2014

With rising living costs, people are trying to cut back on their expenses. One of the ways they are reducing costs is by allowing their auto insurance companies to monitor their driving habits for a discount. Science Daily highlights a Rutgers University study called “How Fast You Drive Might Reveal Exactly Where You Are Going.” What these drivers do not know is that they are revealing where they are driving. Cue the privacy concerns.

The study found that even without a GPS device, a driver reveals where they are going based off how fast they drive. When you put dollar signs in someone eyes, however, they will probably forego some of their privacy rights. Companies claim they are not compromising privacy, but the data they track can be extrapolated to show a driver’s destination.

“The technique, dubbed “elastic pathing,” predicts pathways by seeing how speed patterns match street layouts. Take for example, a person whose home is at the end of a cul-de-sac a quarter mile from an intersection. The driver’s speed data would show a minute of driving at up to 30 miles per hour to reach that intersection. Then if a left turn leads the driver to a boulevard or expressway but a right turn leads to a narrow road with frequent traffic lights or stop signs, you could deduce which way the driver turned if the next batch of speed data showed a long stretch of fast driving or a slow stretch of stop-and-go driving. By repeatedly matching speed patterns with the most likely road patterns, the route and destination can be approximated.”

The article argues that insurance companies are not doing anything wrong, but they should not advertise that the speed devices are not collecting private information. It is even suggested that insurance companies consider using alternative speedometer readings for better privacy protection. Just wait a few years for this to make more headlines or a court case could subpeona the information. It is only a matter of time.

Whitney Grace, September 09, 2014
Sponsored by ArnoldIT.com, developer of Augmentext

Hidden from Google: Interesting but Thin

July 15, 2014

I learned about the Web site Hidden from Google. You can check out the service and maybe submit some results that have disappeared. You may not know if the deletion or hiding of the document is a result of the European Right to Be Forgotten action, but if content disappears, this site could be a useful checkpoint.

Here’s what the service looks like as of 9 21 am Eastern on July 15, 2014.

image

According to the Web site:

The purpose of this site is to list all links which are being censored by search engines due to the recent ruling of “Right to be forgotten” in the EU. This list is a way of archiving the actions of censorship on the Internet. It is up to the reader to decide whether our liberties are being upheld or violated by the recent rulings by the EU.

I noticed that deal old BBC appeared in the list, a handful of media superstars, and some Web sites unknown to me. The “unknown” censored search term is intriguing, but I was not too keen on poking around when I was not sure what I was seeking. Perhaps one of the fancy predictive search engines can provide the missing information or not.

When I clicked on the “source” link sometimes I got a story that seemed germane; for example, http://bbc.in/1xhjKyK linked to one of those tiresome banker misdeed stories. Others pointed to stories that did not seem negative; for example, a guardian article that redirected to a story in Entrepreneur Magazine. http://bit.ly/1jukI7T. Teething pains I presume or my own search ineptness.

I did some clicking around and concluded that the service is interesting but lacks in depth content. I looked for references to the US health care Web sites. I am interested in tracking online access to RFPs, RFQs, and agreements with vendors. These contracts are fascinating because the contractors extend the investigative capabilities of certain US law enforcement entities. Since I first researched the RAC, MIC, and ZPIC contractors, among others, I have noticed that content has become increasingly difficult to find. Content I could pinpoint in 2009 and 2010 now eludes me. Of course, I may be the problem. There could be latency issues when spiders come crawling. There can be churn among the contractors maintaining Web sites. There can be many other issues, including a 21st century version of Adam Smith’s invisible hand. The paw might be connected to an outfit like Xerox or some other company providing services to these programs.

Several questions:

First, if the service depends on crowdsourcing, I am not sure how many of today’s expert searchers will know when a document has gone missing. Unless I had prior knowledge of a Medicare Integrity Contractor statement of work, how would I know I could not find it? Is this a flaw the site will be able to work around.

Second, I am not sure the folks who filled out Google’s form and sent proof of their wants an archive of information that was to go into the waste basket. Is there some action a forgotten person will take when he or she learns he or she is remembered?

Third, the idea is a good one. What happens when Google makes its uncomfortable to provide access to data that Google has removed? Maybe Mother Google is toothless and addled with its newfound interest in Hollywood and fashionable Google Glass gizmos. On the other hand, Google has lots of attorneys in trailers not too far from where the engineers work.

Stephen E Arnold, July 15, 2014

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta