Big Data: Stunners from Researchers

November 18, 2016

I read “Big Data Shows People’s Collective Behavior Follows Strong Periodic Patterns.” May I suggest you sit down, take a deep breath, and contemplate a field of spring flowers before you read these findings. I am not kidding. Hot stuff, gentle reader.

According to the write up,

New research has revealed that by using big data to analyze massive data sets of modern and historical news, social media and Wikipedia page views, periodic patterns in the collective behavior of the population can be observed that could otherwise go unnoticed.

Here are the findings. I take no responsibility for the impact of these Big Data verified outputs. You are on your own. You now have your trigger warning about the findings from online news, newspapers, tweets, and Wikipedia usage. The findings are:

  • “People’s leisure and work were regulated by the weather with words like picnic or excursion consistently peaking every summer in the UK and the US.”
  • Diet, fruits, foods, and flowers were influenced by the seasons.
  • Measles surface in the spring
  • Gooseberries appear in June. (Well, maybe not in Harrod’s Creek.)
  • Football and Oktoberfest become popular in the fall. (Yep, October for Oktoberfest, right?)
  • People get depressed in the winter.

Now you have it. Big Data delivers.

Stephen E Arnold, November 18, 2016

Neural-Net AI Service Echobox Manages Newspaper Presences on Social Media

November 18, 2016

An article at Bloomberg Technology, titled “It Took Robots for This French Newspaper to Conquer Twitter,” introduces Echobox, a startup that uses a neural-network approach to managing clients’ social media presences. The newspaper mentioned in the title is the esteemed Liberation, but Echobox also counts among its clients the French Le Monde, Argentinia’s La Nacion, and The Straits Times out of Singapore, among many others. Apparently, the site charges by the page view, though more pricing details are not provided. Writer Jeremy Kahn reports that Echobox:

… Determines the most opportune time to post a particular story to drive readership, can recommend what headline or tweet to send out, and can select the best photograph to illustrate the post. Using the software to post an average of 27 articles per day, Grainger [Liberation’s CTO] said that Liberation had seen a 37 percent increase in the number of people it reached on Facebook and a 42 percent boost in its reach on Twitter. ‘We have way more articles being seen by 100,000 people or more than before,’ Grangier said. He also said it made life easier for his digital editors, allowing them to spend more time curating the stories they wanted to publish to social media and less on the logistics of actually posting that content.

So, it seems like the service is working. Echobox’s CTO Marc Fletcher described his company’s goal—to create a system that could look at content from an editor’s point of view. The company tailors their approach to each customer, of course. There are competitors in the social-media-management space, like SocialFlow and Buffer, but Kahn says Echobox goes further. He writes:

Echobox professes to offer a fuller range of automation than those services, with its software able to alter a posting schedule to adjust to breaking news, posting content related to that event, and delaying publication of less relevant stories. Echobox uses a neural network, a type of machine learning that is designed to mimic the way parts of the human brain works. This system first learns the audience composition and reading habits for each publication and then makes predictions about the best way to optimize a particular story for social media. Over time, the predictions should get more accurate as it ‘learns’ the nuances of the brand’s audience.

This gives us one more example of how AI capabilities are being put to practical use. Founded in 2013, Echobox  is based in London and maintains an office in New York City. The company also happens to be hiring as I write this.

Cynthia Murrell, November 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Job Hunting in Secret Is Not So Secret

November 3, 2016

While the American economy has recovered from the recession, finding a job is still difficult.  Finding a new job can be even harder has you try to be discreet while handling emails, phone calls, and Web traffic under the radar.  A bit of advice is to not search for jobs while at your current position, but that is easier said than done in many respects.  Social media is a useful job seeking tool and LinkedIn now offers a job search incognito mode.  SlashGear discusses the new mode in the article, “LinkedIn’s Open Candidates Feature Helps You Find A Job In Secret.”

The Open Candidates feature allows LinkedIn users to search for a new job while hiding their job search activity from their current employer.  It will try to hide your job search activity, while at the same time it will add a new search feature for recruiters that displays profiles of people who have listed themselves under the Open Candidates feature.  The hope is that it will bring more opportunity to these people.

However, nothing is ever secret on the Internet and LinkedIn can only do its best to help you:

While the new feature will probably be welcome by people who would prefer to carry out a job search while ruffling as few feathers as possible, LinkedIn does warn that even it will try to prevent your current employer from seeing that you’ve listed yourself as an Open Candidate, it can’t guarantee that it will be able to identify all of the recruiters associated with your company.  In other words, use at your own risk.

If you work in a company that tracks your online social life or for a tech organization, you will have difficulty using this feature.  LinkedIn and Microsoft employees will definitely need to use the first piece of advice, search for a new job on your personal computer/device using your own Internet.

Whitney Grace, November 3, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Americans Are Complacent About Online Data Breaches

November 1, 2016

Users of email, social networks, and other online services are aware of possible dangers that data breaches cause, but surprisingly are less concerned about it in 2016, a survey reveals.

Observer recently published a report titled Fears of the Web’s Dark Side—Strangely—Are Not Growing, which reveals:

People’s fears about their email being hacked have receded somewhat since 2014, bizarrely. Across the 1,071 Americans surveyed, that particular worry receded from 69 to 71 percent.

The survey commissioned by Craigconnects also reveals that online users are no longer very concerned about their data getting leaked online that may be used for identity theft; despite large scale breaches like Ashley Madison. Users, as the survey points out have accepted it as a trade-off for the convenience of Internet.

The reason for the complacency setting in probably lies in the fact that people have realized:

The business of social media company is built upon gathering as much information as possible about users and using that information to sell ads,” Michael W. Wellman, CEO of Virgil Security wrote the Observer in an email. “If the service is free, it’s the user that’s being sold.

Nearly 7 percent Americans are victims of identity theft. This, however, has not dissuaded them from taking precautionary measures to protect their identity online. Most users are aware that identity theft can be used for stealing money from bank accounts, but there are other dangers as well. For instance, prescription medication can be obtained legally using details of an identity theft victim. And then there are uses of the stolen data that only Dark Web actors know where such data of millions of victims is available for few hundred dollars.

Vishal Ingole November 1, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Big Brother Now in Corporate Avatar

October 31, 2016

Companies in the US are now tracking employee movements and interactions to determine how productive their assets are. Badges created by Humanyze; embedded in employee IDs track these key indicators and suggest appropriate measures to help improve employee productivity.

An article published on Business Insider titled Employees at a dozen Fortune 500 companies wear digital badges that watch and listen to their every move reveals:

Humanyze visualizes the data as webs of social interaction that reveal who’s talking to whom on a by-the-second basis. The goal: Revolutionize how companies think about how they organize themselves.

The badges though only track employees who have explicitly given permission to track their working hours, imagination is the only inhibiting factor that will determine how the meta-data can be used. For instance, as the badges are being embedded into employee IDs (that already have chips), it can also be used by someone with right tools to track the movement of an employee beyond working hours.

Social engineering in the past has been used in the past to breach IT security at large organizations. With Humanyze badges, hackers now will have one more weapon in their arsenal.

One worrisome aspect of these badges becomes apparent here:

But the badges are already around the necks of more than 10,000 employees in the US, Waber says. They’ve led to wild insights. One client moves the coffee machine around each night, so the next morning employees in nearby departments naturally talk more.

The ironic part is, companies are exposing themselves to this threat. Google, Facebook, Amazon are already tracking people online. With services like Humanyze, the Big Brother has also entered the corporate domain. The question is not how the data will be used by hacked; it’s just when?

Vishal Ingole October 31, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Posting to the Law Enforcement Database

October 28, 2016

The article titled Police Searches of Social Media Face Privacy Pushback on Underground Network discusses the revelations of an NPR article of the same name. While privacy laws are slow to catch up to the fast-paced changes in social media, law enforcement can use public data to track protesters (including retroactive tracking). The ACLU and social media networks are starting to push back against the notion that this is acceptable. The NPR article refers to the Twitter guidelines,

The guidelines bar search companies from allowing law enforcement agencies to use the data to “investigate, track or surveil Twitter’s users (…) in a manner that would require a subpoena, court order, or other valid legal process or that would otherwise have the potential to be inconsistent with our users’ reasonable expectations of privacy.” But that policy is very much open to interpretation, because police don’t usually need legal orders to search public social media…

Some police departments have acknowledged that fuzziness around privacy laws puts the onus on them to police their own officers. The Dunwoody, Georgia police department requires supervisor approval for social media searches. They explain that this is to prevent targeting “particular groups” of people. According to the article, how this issue unfolds is largely up to police departments and social media giants like Twitter and Facebook to decide. But social media has been around for over a decade. Where are the laws defining and protecting our privacy?

Chelsea Kerwin, October 28, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Another US Outfit Learns about the Online Idiosyncrasies of Nation States

October 27, 2016

Google learned that China does not listen to suggestions from the ad giant about its online policies. Now LinkedIn has bumped into a similar ethnocentrism in Russia, altogether a really fun place in some folks’ eyes. I read “LinkedIn Runs Afoul of Russian Data Law — Is It on the Verge of Being Banned?” I highlighted this passage:

Russia could end up banning LinkedIn in a matter of weeks as the government reportedly seeks to make an example of the business-oriented social network. The company is being targeted following its failure to comply with a 2014 federal law that demands online firms that deal with the personal information of Russian citizens store their data within the country. Earlier this year, the Kremlin’s media watchdog Roskomnadzor attained an injunction against LinkedIn from a lower court. If a Moscow city court decides to reject an appeal, set for November 10, the platform will be blocked.

As the punk band learned in 2012, Russian authorities have some interesting approaches to resolving life’s little challenges. Not only did the band end up in jail, few knew in which jail the musicians resided. I was told at a conference in Prague that losing track of the female prisoners was an unfortunate administrative error.

LinkedIn may want to keep the fate of the punk rock band in mind if the Moscow authorities gear up and speed to locations where LinkedIn may have advisors, employees, fellow travelers, or folks who are championing the social media recruitment online service. Just an idle thought.,

Stephen E Arnold, October 27, 2016

How to Find an Email Address

October 27, 2016

Like any marketers, search engine optimizers must reach out to potential clients, and valid email addresses are important resources. Now, Search Engine Journal explains “How to Find Anyone’s Email Address in 60 Seconds or Less.” Anyone’s, really? Perhaps that’s a bit of an exaggeration.

SEO pro, Joshua Daniels discusses six techniques to quickly find an email address. He writes:

If you’re a specialist in SEO or link acquisition, then you’ll know that generic email addresses are as much use as a chocolate fireguard when it comes to outreach. You need to develop personal connections with influencers, regardless of whether you work in PR or SEO, it’s always the same. But finding the right person’s email address can be a draining, time-consuming task. Who has time for that?

Well, actually, it’s not so difficult, or time-consuming. In this post, I’m going to walk you through the exact step-by-step process our agency uses to find (almost) anyone’s email address, in 60 seconds or less!

For each suggestion, Daniels provides instructions, most with screen shots. First, he recommends LinkedIn’s search function paired with Email Hunter, a tool which integrates with the career site. If that doesn’t work, he says, try a combination of the Twitter analyzer Followerwonk and corporate-email-finder Voila Norbert.

The article also suggests leveraging Google’s search operators with one of these formats: [site:companywebsite.com + “name” + contact] or [site:companywebsite.com + “name” + email]. To test whether an email address is correct, verify it with MailTester, and to target someone who posts on Twitter, search the results of All My Tweets for keywords like “email” or “@companyname.com”. If all else fails, Daniels advises, go old school—“… pick up the phone and just ask.”

Cynthia Murrell, October 27, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Trending Topics: Google and Twitter Compared

October 25, 2016

For those with no time to browse through the headlines, tools that aggregate trending topics can provide a cursory way to keep up with the news. The blog post from communications firm Cision, “How to Find Trending Topics Like an Expert,” examines the two leading trending topic tools—Google’s and Twitter’s. Each approaches its tasks differently, so the best choice depends on the user’s needs.

Though the Google Trends homepage is limited, according to writer Jim Dougherty, one can get further with its extension, Google Explore. He elaborates:

If we go to the Google Trends Explore page (google.com/trends/explore), our sorting options become more robust. We can sort by the following criteria:

*By country (or worldwide)

*By time (search within a customized date range – minimum: past hour, maximum: since 2004)

*By category (arts and entertainment, sports, health, et cetera)

*By Google Property (web search, image search, news search, Google Shopping, YouTube)

You can also use the search feature via the trends page or explore the page to search the popularity of a search term over a period (custom date ranges are permitted), and you can compare the popularity of search terms using this feature as well. The Explore page also allows you to download any chart to a .csv file, or to embed the table directly to a website.

The write-up goes on to note that there are no robust third-party tools to parse data found with Google Trends/ Explore, because the company has not made the API publicly available.

Unlike Google, we’re told, Twitter does not make it intuitive to find and analyze trending topics. However, its inclusion of location data can make Twitter a valuable source for this information, if you know how to find it. Dougherty suggests a work-around:

To ‘analyze’ current trends on the native Twitter app, you have to go to the ‘home’ page. In the lower left of the home page you’ll see ‘trending topics’ and immediately below that a ‘change’ button which allows you to modify the location of your search.

Location is a huge advantage of Twitter trends compared to Google: Although Google’s data is more robust and accessible in general, it can only be parsed by country. Twitter uses Yahoo’s GeoPlanet infrastructure for its location data so that it can be exercised at a much more granular level than Google Trends.

Since Twitter does publicly share its trending-topics API, there are third-party tools one can use with Twitter Trends, like TrendoGate, TrendsMap, and ttHistory. The post concludes with a reminder to maximize the usefulness of data with tools that “go beyond trends,” like (unsurprisingly) the monitoring software offered by Daugherty’s company. Paid add-ons may be worth it for some enterprises, but we recommend you check out what is freely available first.

Cynthia Murrell, October 25, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Half of the Largest Companies: Threat Vulnerable

October 24, 2016

Compromised Credentials, a research report by Digital Shadows reveals that around 1,000 companies comprising of Forbes Global 2000 are at risk as credentials of their employees are leaked or compromised.

As reported by Channel EMEA in Digital Shadows Global Study Reveals UAE Tops List in Middle East for…

The report found that 97 percent of those 1000 of the Forbes Global 2000 companies, spanning all businesses sectors and geographical regions, had leaked credentials publicly available online, many of them from third-party breaches.

Owing to large-scale data breaches in recent times, credentials of 5.5 million employees are available in public domain for anyone to see. Social networks like LinkedINMySpace and Tumblr were the affliction points of these breaches, the report states.

Analyzed geographically, companies in Middle-East seem to be the most affected:

The report revealed that the most affected country in the Middle East – with over 15,000 leaked credentials was the UAE. Saudi Arabia (3360), Kuwait (203) followed by Qatar (99) made up the rest of the list. This figure is relatively small as compared to the global figure due to the lower percentage of organizations that reside in the Middle East.

Affected organizations may not be able to contain the damages by simply resetting the passwords of the employees. It also needs to be seen if the information available is contemporary, not reposted and is unique. Moreover, mere password resetting can cause lot of friction within the IT departments of the organizations.

Without proper analysis, it will be difficult for the affected companies to gauge the extent of the damage. But considering the PR nightmare it leads to, will these companies come forward and acknowledge the breaches?

Vishal Ingole, October 24, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta