The Dark Web Cuts the Violence
March 23, 2016
Drug dealing is a shady business that takes place in a nefarious underground and runs discreetly under our noses. Along with drug dealing comes a variety of violence involving guns, criminal offenses, and often death. Countless people have lost their lives related to drug dealing, and that does not even include the people who overdosed. Would you believe that the drug dealing violence is being curbed by the Dark Web? TechDirt reveals, “How The Dark Net Is Making Drug Purchases Safer By Eliminating Associated Violence And Improving Quality.”
The Dark Web is the Internet’s underbelly, where stolen information and sex trafficking victims are sold, terrorists mingle, and, of course, drugs are peddled. Who would have thought that the Dark Web would actually provide a beneficial service to society by sending drug dealers online and taking them off the streets? With the drug dealers goes the associated violence. There also appears to be a system of checks and balances, where drug users can leave feedback a la eBay. It pushes the drug quality up as well, but is that a good or bad thing?
“The new report comes from the European Monitoring Centre for Drugs and Drug Addiction, which is funded by the European Union, and, as usual, is accompanied by an official comment from the relevant EU commissioner. Unfortunately, Dimitris Avramopoulos, the European Commissioner for Migration, Home Affairs and Citizenship, trots out the usual unthinking reaction to drug sales that has made the long-running and totally futile “war on drugs” one of the most destructive and counterproductive policies ever devised:
‘We should stop the abuse of the Internet by those wanting to turn it into a drug market. Technology is offering fresh opportunities for law enforcement to tackle online drug markets and reduce threats to public health. Let us seize these opportunities to attack the problem head-on and reduce drug supply online.’”
The war on drugs is a futile fight, but illegal substances do not benefit anyone. While it is a boon to society for the crime to be taken off the streets, take into consideration that the Dark Web is also a breeding ground for crimes arguably worse than drug dealing.
Whitney Grace, March 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Dark Web Crime Has Its Limits
February 12, 2016
The Dark Web is an intriguing and mysterious phenomenon, but rumors about what can be found there are exaggerated. Infomania examines what is and what is not readily available in that murky realm in, “Murder-for-Hire on the Dark Web? It Can’t Be True!”
Anonymity is the key factor in whether certain types of criminals hang out their shingles on the TOR network. Crimes that can be more easily committed without risking identification include drug trafficking, fraud, and information leaks. On the other hand, contract assassins, torture-as-entertainment, and human trafficking are not actually to be found, despite reports to the contrary. See the article for details on each of these, and more. The article cites independent researcher Chris Monteiro as it summarizes:
The dark web is rife with cyber crime. But it’s more rampant with sensationalized myths about assassination and torture schemes — which, as Chris can attest, simply aren’t true. “What’s interesting is so much of the coverage of these scam sites is taken at face value. Like, ‘There is a website. Therefore its contents must be true.’ Even when mainstream media picks it up, very few pick it up skeptically,” he says.
Take the Assassination Market, for example. When news outlets got wind of its alleged existence in 2013, they ran with the idea of “Murder-for-hire!!” on the Internet underground. Although Chris has finally demonstrated that these sites are not real, their legend lives on in Internet folklore. “Talking about the facts — this is how cybercrime works, this is how Tor and Bitcoin work — is a lot less sexy than saying, ‘If you click on the wrong link, you’ll be kidnapped, and you’ll end up in a room where you’ll be livestreamed, murdered, and you’re all over the internet!’” Chris says. “All I can do is point out what’s proven and what isn’t.”
So, next time someone spins a scary tale about killers-for-hire who are easily found online, you can point them to this article. Yes, drug trafficking, stolen data, and other infractions are big problems associated with the Dark Web, but let us not jump at shadows.
Cynthia Murrell, February 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Its Official: Facebook and the Dark Web
February 5, 2016
A piece from Nextgov suggests just how ubiquitous the Dark Web could become. Published as Facebook is giving users a new way to access it on the ‘Dark Web’, this article tells us “a sizeable community” of its users are also Dark Web users; Facebook has not released exact figures. Why are people using the Dark Web for everyday internet browsing purposes? The article states:
“Facebook’s Tor site is one way for people to access their accounts when the regular Facebook site is blocked by governments—such as when Bangladesh cut off access to Facebook, its Messenger and Whatsapp chat platforms, and messaging app Viber for about three weeks in November 2015. As the ban took effect, the overall number of Tor users in Bangladesh spiked by about 10 times, to more than 20,000 a day. When the ban was lifted, the number dropped back to its previous level.”
Public perception of the darknet is changing. If there was any metric to lend credibility to the Dark Web being increasingly used for mainstream purposes, it is Facebook adding a .onion address. Individual’s desire for security, uninterrupted and expansive internet access will only contribute to the Dark Web’s user base. While the Silk Road-type element is sure to remain as well, it will be interesting to see how things evolve.
Megan Feil, February 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Google Wants ISIS to Stay Off the Regular Web
January 29, 2016
Propaganda from the Islamic State (Isis) exists not only in the Dark Web, but is also infiltrating the familiar internet. A Wired article discusses the best case scenario to stop such information from spreading in their article Google: ISIS must be ‘contained to the Dark Web’. Google describes ISIS only existing in the Dark Web as success. This information helps explain why,
“As Isis has become more prominent in Syria and Iraq, social media, alongside traditional offline methods, have have been used to spread the group’s messages and recruit members. In 2014 analysis of the group’s online activity showed that they routinely hijack hashtags, use bots, and post gruesome videos to Twitter, Facebook, and YouTube. The UK’s internet counter terrorism unit claims to remove 1,000 illegal pieces of terrorism related content from the internet each week — it says that roughly 800 of these are to do with Syria and Iraq. The group claims in the 12 months before June 2012 that 39,000 internet takedowns were completed.”
The director of Google Ideas is quoted as describing ISIS’ tactics ranging from communication to spamming to typical email scams; he explains they are not “tech-savy.” Unfortunately, tech chops is not a requirement for effective marketing, so the question still remains whether containing this group and their messages to the Dark Web is possible — and whether that means success with growing numbers of people using the Dark Web.
Megan Feil, January 29, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Bing Goes Green, as in Dollar Bills and Brand New Logo
January 29, 2016
The article on Microsoft News titled Microsoft Releasing New Bing Logo Today briefly overviews the recent growth and profitability of the often mocked and overlooked search engine. Microsoft also updated Cortana lately, which is deeply connected to Bing search. So what will the new Bing logo look like? The article explains,
“In the new logo, Microsoft is switching its color scheme to green as it “is easier to see over yellow” and “b” in now in upper case. This new version of the logo will be used across various Microsoft apps and services. Speaking to AdAge, Rik van der Kooi, Microsoft’s corporate VP of advertiser and publisher solutions said that Bing is the only search engine that is experiencing steady, consistent growth and have increased our share for 26 consecutive quarters.”
The article also points out that it is Bing powering Yahoo, AOL, Apple Siri and several other services, from behind the scenes. The green logo looks less like an imitation of Google, especially with the capitalization. Perhaps the new logo is meant to be easier on the eyes, but it is also certainly trying to keep up the positive attention Bing has been receiving lately as 1/3 of the search market.
Chelsea Kerwin, January 29, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Critics Blast Zuckerbergs Free Internet
January 26, 2016
Mark Zuckerberg is giving the subcontinent India access to free Internet. In some eyes Zuckerberg is being generous, but his critics are saying he’s doing it to gain control of a 1.2 billion untapped market. The New York Post shares Zuckerberg’s magnanimous act in “Mark Zuckerberg Defends His Free Internet Bid In India.”
Zuckerberg’s free Internet in India is dubbed “Free Basics” and it offers full access to Facebook and other affiliated sites, while blocking access to Google, Twitter, and other rivals. Free Basics’s partner Indian telecom partner Reliance Communication was forced to temporarily shut down service.
Critics are angry with Zuckerberg, claiming he is violating net neutrality and it comes as a slap in the face after he defended it within the United States. Free Basics could potentially ruin Internet competition in India and gain an iron grasp on a developing market. An even more intriguing piece to the story is that Free Basics was formerly named Internet.org, but Zuckerberg was forced to change it so new Internet users would not think that Facebook and related Web sites were all that existed.
“The local tech entrepreneur warned that ‘the incentive to invest in better, faster and cheaper access to the entire Internet will be replaced with one of providing better, faster and cheaper access to [Facebook’s] websites and apps’…In his Monday op-ed piece, Zuckerberg at times sounded exasperated as he insisted that the limited access provided by Free Basics was better than no access at all.”
Free Basics has already been deployed in thirty-five countries and provides free Internet for fifteen million people.
What’s the problem with wanting one’s way like blocking our competitors’ services? Absolutely nothing, if you rule the world. If not, there may be push back. I learned this in kindergarten. Zuckerberg can expect lots of push back.
Whitney Grace, January 26, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
She Is a Meme Librarian
January 20, 2016
Memes are random bits of Internet culture that come and go faster than the highest DSL speed. There are so many memes out there that it seems impossible to catalog the trends, much less each one. The Independent tells us that Amanda Brennan has made a career out of studying and documenting memes, becoming the world’s first meme librarian: “Meet Tumblr’s ‘Meme Librarian,’ The Woman With The Best Job On The Internet.”
Brennan works at Tumblr and her official title is content and community manager, but she prefers the title “meme librarian.” She earned a Master’s in Information from Rutgers and during graduate school she documented memes for Know Your Meme, followed by Tumblr.
“[In graduate school] immediately I knew I did not want to work in a traditional library. Which is weird because people go to library school and they’re like ‘I want to change the world with books!’ And I was like ‘I want to change the world of information.’ And they started a social media specialization in the library school, and I was like, ‘This is it. This is the right time for me to be here.’”
Brennan is like many librarians, obsessed with taxonomy and connections between information. The Internet gave her an outlet to explore and study to her heart’s content, but she was particularly drawn to memes, their origins, and how they traveled around the Internet. After sending an email to Know Your Meme about an internship, her career as a meme librarian was sealed. She tracks meme trends and discovers how they evolve not only in social media, but how the rest of the Internet swallows them up.
I wonder if this will be a future focus of library science in the future?
Whitney Grace, January 20, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Scientific Research Has Turned into a Safe Space
December 31, 2015
The Internet is a cold, cruel place, especially if you hang out in the comments section on YouTube, eBay forums, social media, and 4chan. If you practice restraint and limit your social media circles to trusted individuals, you can surf the Internet without encountering trolls and haters. Some people do not practice common sense, so they encounter many hateful situations on the Internet and as a result they demand “safe spaces.” Safe spaces are where people do not encounter anything negative.
Safe spaces are stupid. Period. What is disappointing is that the “safe space” and “only positive things” has made its way into the scientific community according to Nature in the article, “‘Novel, Amazing, Innovative’: Positive Words On The Rise In Science Papers.”
The University Medical Center in the Netherlands studied the use of positive and negative words in the titles of scientific papers and abstracts from 1974-2014 published on the medical database PubMed. The researchers discovered that positive words in titles grew from 2% in 1974 to 17.5% in 2014. Negative word usage increased from 1.3% to 2.4%, while neutral words did not see any change. The trend only applies to research papers, as the same test was run using published books and it showed little change.
“The most obvious interpretation of the results is that they reflect an increase in hype and exaggeration, rather than a real improvement in the incidence or quality of discoveries… The findings “fit our own observations that in order to get published, you need to emphasize what is special and unique about your study,” he says. Researchers may be tempted to make their findings stand out from thousands of others — a tendency that might also explain the more modest rise in usage of negative words.”
While there is some doubt associated with the findings, because it was only applied to PubMed. The original research team thinks that it points to much larger problem, because not all research can be “innovative” or “novel.” The positive word over usage is polluting the social, psychological, and biomedical sciences.
Under the table, this really points to how scientists and researchers are fighting for tenure. What would this mean for search engine optimization if all searches and descriptions had to have a smile? Will they even invent a safe space filter?
Whitney Grace, December 31, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Know Thy Hacker
December 10, 2015
Writer Alastair Paterson at SecurityWeek suggests that corporations and organizations prepare their defenses by turning a hacking technique against the hackers in, “Using an Attacker’s ‘Shadow’ to Your Advantage.” The article explains:
“A ‘digital shadow’ is a subset of a digital footprint and consists of exposed personal, technical or organizational information that is often highly confidential, sensitive or proprietary. Adversaries can exploit these digital shadows to reveal weak points in an organization and launch targeted attacks. This is not necessarily a bad thing, though. Some digital shadows can prove advantageous to your organization; the digital shadows of your attackers. The adversary also casts a shadow similar to that of private and public corporations. These ‘shadows’ can be used to better understand the threat you face. This includes attacker patterns, motives, attempted threat vectors, and activities. Armed with this enhanced understanding, organizations are better able to assess and align their security postures.”
Paterson observes that one need not delve into the Dark Web to discern these patterns, particularly when the potential attacker is a “hactivist” (though one can find information there, too, if one is so bold). Rather, hactivists often use social media to chronicle their goals and activities. Monitoring these sources can give a company clues about upcoming attacks through records like target lists, responsibility claims, and discussions on new hacking techniques. Keeping an eye on such activity can help companies build appropriate defenses.
Cynthia Murrell, December 10, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Computers Pose Barriers to Scientific Reproducibility
December 9, 2015
These days, it is hard to imagine performing scientific research without the help of computers. Phys.org details the problem that poses in its thorough article, “How Computers Broke Science—And What We Can Do to Fix It.” Many of us learned in school that reliable scientific conclusions rest on a foundation of reproducibility. That is, if an experiment’s results can be reproduced by other scientists following the same steps, the results can be trusted. However, now many of those steps are hidden within researchers’ hard drives, making the test of reproducibility difficult or impossible to apply. Writer, Ben Marwick points out:
“Stanford statisticians Jonathan Buckheit and David Donoho [PDF] described this issue as early as 1995, when the personal computer was still a fairly new idea.
‘An article about computational science in a scientific publication is not the scholarship itself, it is merely advertising of the scholarship. The actual scholarship is the complete software development environment and the complete set of instructions which generated the figures.’
“They make a radical claim. It means all those private files on our personal computers, and the private analysis tasks we do as we work toward preparing for publication should be made public along with the journal article.
This would be a huge change in the way scientists work. We’d need to prepare from the start for everything we do on the computer to eventually be made available for others to see. For many researchers, that’s an overwhelming thought. Victoria Stodden has found the biggest objection to sharing files is the time it takes to prepare them by writing documentation and cleaning them up. The second biggest concern is the risk of not receiving credit for the files if someone else uses them.”
So, do we give up on the test of reproducibility, or do we find a way to address those concerns? Well, this is the scientific community we’re talking about. There are already many researchers in several fields devising solutions. Poetically, those solutions tend to be software-based. For example, some are turning to executable scripts instead of the harder-to-record series of mouse clicks. There are also suggestions for standardized file formats and organizational structures. See the article for more details on these efforts.
A final caveat: Marwick notes that computers are not the only problem with reproducibility today. He also cites “poor experimental design, inappropriate statistical methods, a highly competitive research environment and the high value placed on novelty and publication in high-profile journals” as contributing factors. Now we know at least one issue is being addressed.
Cynthia Murrell, December 9, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

