Politwoops Window Now Blackened

September 17, 2015

Why is Twitter helping politician around the world cover their tracks? The Bangkok Post reports, “Website that Saves Politicians’ Deleted Tweets Suspended.” Founded by the Open State Foundation as tool for transparency, Politwoops had made an agreement with Twitter in 2012 to use its API to post tweets that politicians (or their advisors) thought better of in retrospect. While Twitter reasons that any of their users should be able to take back tweets, the Open Foundation director asserts that public statements by public officials should remain part of the public record. The article states:

“Since being formed at a so-called hackathon five years ago, the website that is a useful tool for journalists and a frequent source of embarrassment for politicians, has spread to 30 countries from Egypt to the Vatican, as well as the European Parliament. It started operating in the US in 2012 thanks to the Sunlight Foundation, which fights for transparency in politics. Diplotwoops which screens deleted messages by diplomats and embassies around the world was set up in 2014. Twitter was not immediately available for comment, but the Open Foundation said it was told the social media giant decided to suspend access to Politwoops ‘following thoughtful internal deliberation and close consideration of a number of factors that doesn’t distinguish between users.’”

Um, except that one user is not like another. The public has a vested interest in knowing where elected officials stand, and it is tough to search when the content is no longer available. I wonder just what prompted Twitter’s “thoughtful internal deliberation.”

Cynthia Murrell, September 17, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search and Find Love but Maybe Not

September 13, 2015

My trusty alert service delivered me this search gem: “13 Apps 17 Dates 30 Days: I Tried 13 Dating Apps in 30 Days in Search of Love.” Shadows of Ashley Madison could not obscure this clickable topic.

Here’s what I learned:

  • There are sites with interesting names with which I was not familiar. Here are two examples Jack’D and Scruff.
  • Dating apps can be used to deliver ads. Love for someone I assume.
  • Finding love takes “time and energy.” Yep, just like my notions for information access.
  • Some love search apps ask users to involve their Twitter followers. Now that’s a great idea for some folks.

Main point of the write up: Love apps don’t work. Wow, revelation.

Stephen E Arnold, September 13, 2015

A Fun Japanese Elasticsearch Promotion Video

September 10, 2015

Elasticsearch is one of the top open source search engines and is employed by many companies including Netflix, Wikipedia, GitHub, and Facebook.  Elasticsearch wants to get a foothold into the Japanese technology market.  We can assume, because Japan is one of the world’s top producers of advanced technology and has a huge consumer base.  Once a technology is adopted in Japan, you can bet that it will have an even bigger adoption rate.

The company has launched a Japanese promotional campaign and a uploaded video entitled “Elasticsearch Product Video” to its YouTube channel.  The video comes with Japanese subtitles with appearances by CEO Steven Schuurman, VP of Engineering Kevin Kluge, Elasticsearch creator Shay Bannon, and VP of Sales Justin Hoffman.  The video showcases how Elasticsearch is open source software, how it has been integrated into many companies’ frameworks, its worldwide reach, product improvement, as well as the good it can do.

Justin Hoffman said that, “I think the concept of an open source company bringing a commercial product to market is very important to our company.  Because the customers want to know on one hand that you have the open source community and its evolution and development at the top of your priority list.  On the other hand, they appreciate that you’re innovating and bringing products to market that solve real problems.”

It is a neat video that runs down what Elasticsearch is capable of, the only complaint is that bland music in the background.  They could benefit from licensing the Jive Aces “Bring Me Sunshine” it relates the proper mood.

Whitney Grace, September 10, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Yammer Improvements and Changes on the Horizon

August 27, 2015

A few years ago, Yammer was an integral part of SharePoint’s marketing campaign as they sought to persuade users that they were moving toward a focus on social. With the upcoming release of SharePoint 2016, social is still important, although it feels less forced and more natural this time around. There will be changes to Yammer and Redmond Magazine covers it in their article, “Microsoft Announces Yammer Improvements To Come While Deprecating Some Yammer SharePoint Apps.”

The article says:

“Microsoft announced this week that it is working on a more team-oriented Yammer, and it will be bringing along some mobile app improvements, too. Yammer is Microsoft’s enterprise-grade social networking application that’s part of some Office 365 subscription plans. Yammer can be used as a standalone service, but it’s also used with SharePoint Server products and SharePoint Online implementations.”

To stay current on what else may change with the release of SharePoint Server 2016, stay tuned to ArnoldIT.com. Stephen E. Arnold is an expert on search and the enterprise. His dedicated SharePoint feed is a great way to stay up to date on the latest new surrounding SharePoint.

Emily Rae Aldridge, August 27, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Does the Tweet Thing

August 22, 2015

I read “Google Integrates Twitter into Its Desktop Search Results.” Meaty stuff.

But, dear, struggling Twitter. You keep trying. Users in hot spots like Sillycon Valley and public relations outfits in New York love the tweeter. Messages about the next big thing, a sleek baby unicorn, and the antics of a media star lubricate the modern world.

Here in Harrod’s Creek, where the failed middle school teachers work at the filling station and where failed webmasters moonlight as fry cooks at the eatery on the Ohio River, the tweeter is not such a big deal.

Consider me: Old, wheezing, and staring at a limited horizon. When I run a query for predictive analytics or dumps about philanderers, I just want an objective list of search results. Links to research papers and presentations about LaPlacian methods applied to mundane data problems are what I need to fry squirrel, kick back, snack, and read.

Now my results will be peppered with information from the tweeter thing. Is this an advance?

I suppose for those who ego surf like certain media stars with lots of children and ad sales reps gathering data to prove their campaigns’ value, the blend of search results and twitter peeps is a thrilling prospect.

The new Google is enchanted with the value of the tweeters’ toots. I understand the Twitter thing. It is the new Google that puzzles me.

Ah, back to revenue. Maybe? Maybe not. More relevant search results. Maybe not.

Stephen E Arnold, August 22, 2015

Sensible Advice on Content Marketing

August 21, 2015

Here’s a post on structured-content marketing that is refreshingly free of semantic search baloney. Tatiana Tilearcio at Synthesio shares what she learned from a seminar in, “Four Insights from a Content Marketing Crash Course.” The symposium, scheduled to be repeated in October in Connecticut, was presented by content-strategy outfit Content Boost. Tilearcio’s first takeaway promotes a firm foundation; she writes:

“Get Organized And Understand Your Goals Before You Create Your Content Marketing Plan.

Before you sit down to put together your strategic plan, you have to know the answer to the question ‘what’s the purpose for your content marketing, and what will it do to your brand?’ To do this, you need to first create a dream wish-list of what you would like to see for your brand. Next, you need to address how you want to go about enhancing your brand’s content marketing efforts and what your budget is. When creating a content marketing plan, or any marketing plan, a budget is essential. Without a proper budget of what your plan will cost, your ideas will never come to fruition. If you have identified all of this, then you are already well on your way to understanding what your campaign strategy is.”

The article also discusses blending efforts in blogging, social media, and email; co-sourcing content; ensuring users find value in gated assets; repurposing content; and the importance of strong titles. See the post for more details on each of these points. Based in Norwalk, Connecticut, Content Boost is part of the Technology Marketing Corporation, aka TMCnet.

Cynthia Murrell, August 21, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Geofeedias Political Action

August 20, 2015

The presidential election is a little over a year away and potential presidential candidates are starting on their campaign trails.  The Republican and Democratic parties are heating up with the GOP debates and voters are engaging with the candidates and each other via social media.   The information posted on social media is a gold mine for the political candidates to learn about the voters’ opinions and track their approval rating.  While Twitter and Facebook data is easy to come by with Google Analytics and other software, visual mapping of the social media data is a little hard to find.

To demonstrate its product capabilities, Geofeedia took social media Instagram, fed it into its data platform, and shared the visual results in the blog post, “Instagram Map: Republican Presidential Debate.”  Geofeedia noted that while business mogul Donald Trump did not fare well during the debate nor is he in the news, he is dominating the social media feeds:

“Of all social content coming out of the Quicken Loans Center, 93% of posts were positive in sentiment. The top keywords were GOP, debate, and first, which was to be expected. Although there was no decided winner, Donald Trump scored the most headlines for a few of his memorable comments. He was, however, the winner of the social sphere. His name was mentioned in social content more than any other candidate.”

One amazing thing is that social media allows political candidates to gauge the voters’ attitudes in real time!  They can alter their answers to debate questions instantaneous to sway approval in their favor.  Another interesting thing Geofeedia’s visual data models showed is a heat map where the most social media activity took place, which happened to be centered in the major US metropolises.  The 2016 election might be the one that harnesses social media to help elect the next president.  Also Geofeedia also has excellent visual mapping tools.

Whitney Grace, August 20, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Facebook Number One Security Compromiser         

August 18, 2015

While Facebook is a good way for a company to engage with clients and even “humanize” the business, according to Zerofox’s article, “Cisco: Facebook Scams Are Attackers’ #1 Choice For Breaches” Facebook is the number way for a criminal to learn about organization and hack into its system.  Cisco conducted a 2015 Midyear Security Report that researches how cyber criminals are exploiting social media to their own advantage.

The article describes potential targets as easy and click-happy:

Facebook’s 1.49 billion monthly active users make it the world’s largest nation-state, used by 70% of American each day. It is, for better or worse, a nation without borders. Adversaries exploit the social media giant for its sheer size and trusted nature, making it the medium of choice for both inexperienced and sophisticated network hackers alike. For the adversary, the barriers to entry have never been lower, and the targets have never been more trusting and click-happy.”

Other security organizations confirm the findings and some of it comes from people simply being too trusting such as accepting friend requests from unfamiliar people.  McAfee discovered that employees became cybercrime victims on social media over other business applications.

While Facebook might be the number one platform to attract criminals.  Twitter is used to attack government organizations and other popular platforms are also dealing with loads of fake profiles.  It does not come as a surprise, considering Facebook is now the “Walt-Mart” of social media information.  What types of scams are people falling victim too?  Is it just stolen passwords and information or are they giving their personal information away?

Whitney Grace, August 18, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Social Media Litigation is On the Rise

August 12, 2015

When you think about social media and litigation, it might seem it would only come up during a civil, domestic, criminal mischief, or even a thievery suit.  Businesses, however, rely on social media outlets like Facebook, Twitter, and Instagram to advertise their services, connect with their clients, and increase their Web presence.  It turns out that social media is also playing a bigger role not only for social cases, but for business ones as well.  The X1 eDiscovery Law and Tech Blog posted about the “Gibson Dunn Report: Number of Cases Involving Social Media Evidence ‘Skyrocket’” and how social media litigation has increased in the first half of 2015.

The biggest issue the post discusses is the authenticity of the social media evidence.  A person printing out a social media page or summarizing the content for court does not qualify as sufficient evidence.  The big question right now is how to guarantee that social media passes an authenticity test and can withstand the court proceedings.

This is where eDiscovery software comes into play:

“These cases cited by Gibson Dunn illustrate why best practices software is needed to properly collect and preserve social media evidence. Ideally, a proponent of the evidence can rely on uncontroverted direct testimony from the creator of the web page in question. In many cases, such as in the Vayner case where incriminating social media evidence is at issue, that option is not available. In such situations, the testimony of the examiner who preserved the social media or other Internet evidence “in combination with circumstantial indicia of authenticity (such as the dates and web addresses), would support a finding” that the website documents are what the proponent asserts.”

The post then goes into a spiel about how the X1 Social Discovery software can make social media display all the “circumstantial indicia” or “additional confirming circumstances,” for solid evidence in court.  What authenticates social media is the metadata and a MD5 checksum aka “hash value.” What really makes the information sink in is that Facebook apparently has every twenty unique metadata fields, which require eDiscovery software to determine authorship and the like.  It is key to know that everything leaves a data trail on the Internet, but the average Google search is not going to dig it up.

Whitney Grace, August 12, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Social Media Litigation Is on the Rise

August 6, 2015

When you think about social media and litigation, it might seem it would only come up during a civil, domestic, criminal mischief, or even a thievery suit.  Businesses, however, rely on social media outlets like Facebook, Twitter, and Instagram to advertise their services, connect with their clients, and increase their Web presence.  It turns out that social media is also playing a bigger role not only for social cases, but for business ones as well.  The X1 eDiscovery Law and Tech Blog posted about the “Gibson Dunn Report: Number of Cases Involving Social Media Evidence ‘Skyrocket’” and how social media litigation has increased in the first half of 2015.

The biggest issue the post discusses is the authenticity of the social media evidence.  A person printing out a social media page or summarizing the content for court does not qualify as sufficient evidence.  The big question right now is how to guarantee that social media passes an authenticity test and can withstand the court proceedings.

This is where eDiscovery software comes into play:

“These cases cited by Gibson Dunn illustrate why best practices software is needed to properly collect and preserve social media evidence. Ideally, a proponent of the evidence can rely on uncontroverted direct testimony from the creator of the web page in question. In many cases, such as in the Vayner case where incriminating social media evidence is at issue, that option is not available. In such situations, the testimony of the examiner who preserved the social media or other Internet evidence “in combination with circumstantial indicia of authenticity (such as the dates and web addresses), would support a finding” that the website documents are what the proponent asserts.”

The post then goes into a spiel about how the X1 Social Discovery software can make social media display all the “circumstantial indicia” or “additional confirming circumstances,” for solid evidence in court.  What authenticates social media is the metadata and a MD5 checksum aka “hash value.” What really makes the information sink in is that Facebook apparently has every twenty unique metadata fields, which require eDiscovery software to determine authorship and the like.  It is key to know that everything leaves a data trail on the Internet, but the average Google search is not going to dig it up.

Whitney Grace, August 6, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta