Photo Farming in the Early Days
November 9, 2015
Have you ever wondered what your town looked like while it was still urban and used as farmland? Instead of having to visit your local historical society or library (although we do encourage you to do so), the United States Farm Security Administration and Office Of War Information (known as FSA-OWI for short) developed Photogrammer. Photogrammer is a Web-based image platform for organizing, viewing, and searching farm photos from 1935-1945.
Photogrammer uses an interactive map of the United States, where users can click on a state and then a city or county within it to see the photos from the timeline. The archive contains over 170,000 photos, but only 90,000 have a geographic classification. They have also been grouped by the photographer who took the photos, although it is limited to fifteen people. Other than city, photographer, year, and month, the collection c,an be sorted by collection tags and lot numbers (although these are not discussed in much detail).
While farm photographs from 1935-1945 do not appear to need their own photographic database, the collection’s history is interesting:
“In order to build support for and justify government programs, the Historical Section set out to document America, often at her most vulnerable, and the successful administration of relief service. The Farm Security Administration—Office of War Information (FSA-OWI) produced some of the most iconic images of the Great Depression and World War II and included photographers such as Dorothea Lange, Walker Evans, and Arthur Rothstein who shaped the visual culture of the era both in its moment and in American memory. Unit photographers were sent across the country. The negatives were sent to Washington, DC. The growing collection came to be known as “The File.” With the United State’s entry into WWII, the unit moved into the Office of War Information and the collection became known as the FSA-OWI File.”
While the photos do have historical importance, rather than creating a separate database with its small flaws, it would be more useful if it was incorporated into a larger historical archive, like the Library of Congress, instead of making it a pet project.
Whitney Grace, November 9, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Banks Turn to Blockchain Technology
November 9, 2015
Cryptocurrency has come a long way, and now big banks are taking the technology behind Bitcoin very seriously, we learn in “Nine of the World’s Biggest Banks Form Blockchain Partnership” at Re/code. Led by financial technology firm R3, banks are signing on to apply blockchain tech to the financial markets. A few of the banks involved so far include Goldman Sacks, Barclays, JP Morgan, Royal Bank of Scotland, Credit Suisse, and Commonwealth Bank of Australia. The article notes:
“The blockchain works as a huge, decentralized ledger of every bitcoin transaction ever made that is verified and shared by a global network of computers and therefore is virtually tamper-proof. The Bank of England has a team dedicated to it and calls it a ‘key technological innovation.’ The data that can be secured using the technology is not restricted to bitcoin transactions. Two parties could use it to exchange any other information, within minutes and with no need for a third party to verify it. [R3 CEO David] Rutter said the initial focus would be to agree on an underlying architecture, but it had not yet been decided whether that would be underpinned by bitcoin’s blockchain or another one, such as one being built by Ethereum, which offers more features than the original bitcoin technology.”
Rutter did mention he expects this tech to be used post-trade, not directly in exchange or OTC trading, at least not soon. It is hoped the use of blockchain technology will increase security while reducing security and errors.
Cynthia Murrell, November 9, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Neglect Exposes Private Medical Files
October 28, 2015
Data such as financial information and medical files are supposed to be protected behind secure firewalls and barriers that ensure people’s information does not fall into the wrong hands. While digital security is at the best it has ever been, sometimes a hacker does not to rely on his/her skills to get sensitive information. Sometimes all they need to do is wait for an idiotic mistake, such as what happened on Amazon Web Services wrote Gizmodo in “Error Exposes 1.5 Million People’s Private Records On Amazon Web Services.”
Tech junkie Chris Vickery heard a rumor that “strange data dumps” could appear on Amazon Web Services, so he decided to go looking for some. He hunted through AWS, found one such dump, and it was a huge haul or it would have been if Vickery was a hacker. Vickery discovered it was medical information belonging to 1.5 million people and from these organizations: Kansas’ State Self Insurance Fund, CSAC Excess Insurance Authority, and the Salt Lake County Database.
“The data came from Systema Software, a small company that manages insurance claims. It still isn’t clear how the data ended up on the site, but the company did confirm to Vickery that it happened. Shortly after Vickery made contact with the affected organizations, the database disappeared from the Amazon subdomain.”
The 1.5 million people should be thanking Vickery, because he alerted these organizations and the data was immediately removed from the Amazon cloud. It turns out that Vickery was the only one to access the data, but it begs the question what would happen if a malicious hacker had gotten hold of the data? You can count on that the medical information would have been sold to the highest bidder.
Vickery’s discovery is not isolated. Other organizations are bound to be negligent in data and your personal information could be posted in an unsecure area. How can you get organizations to better protect your information? Good question.
Whitney Grace, October 28, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Lexmark, a Printer Supply Company, Receives Hold Rating from Analysts
October 20, 2015
The article on Dakota Financial News titled Lexmark International Given Average Recommendation of “Hold” by Brokerages (NYSE: LXK) piles on the bad news for Lexmark, a company best known for its printer supply services. It is a tough time to be in the printing business, and Lexmark has received numerous analyst ratings of “Hold” and “Sell.” The article details the trend,
“Lexmark International (NYSE:LXK) traded down 0.59% during trading on Wednesday, hitting $28.59. The company had a trading volume of 259,296 shares. Lexmark International has a one year low of $27.22 and a one year high of $47.69. The stock has a 50-day moving average of $30.27 and a 200 day moving average of $39.70. The company’s market capitalization is $1.76 billion…The company reported $0.97 earnings per share (EPS) for the quarter, beating analysts’ consensus estimates of $0.85 by $0.12. “
Certainly not a vote of confidence in Lexmark, which owns both Brainware and ISYS Search Software. The article goes into some detail about the companies other work beyond printer supplies including enterprise content and process management software and healthcare archive with integration abilities for unstructured patient information. Perhaps these extras are saving the company from falling entirely into the “sell” category and maintaining at “Hold.”
Chelsea Kerwin, October 20, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Coveo Touts Secure, Intelligent Cloud Search
October 19, 2015
Security is a perpetual concern, especially for those who work in the cloud. Enterprise search firm Coveo want us to know they take security very seriously. Their press release, “Coveo Completes Security Evaluation for cloud-Based Intelligent Search Offerings,” is posted at MarketWatch. The question is, “What does secure mean?” The definition may depend on one’s knowledge of the exploit world.
The write-up states:
“Marking its commitment to be the most secure intelligent search provider in the marketplace, Coveo announced that it has completed a comprehensive evaluation of data security and compliance procedures and processes. Coveo engaged with Brightline CPAs & Associates, which conducted a series of tests to evaluate the effectiveness of operations and controls that address data integrity and security. With data security threats on the rise across various industries and around the world, Coveo recognizes how important it is to provide clients of its cloud, intelligent search offerings with the highest security standards. Over the years, Coveo has implemented a set of industry-standard operations, infrastructure and services to ensure the integrity and privacy of customer data, including:
— SOC II and SOC I examinations
— Strong logical and physical access controls
— Systematic application and source code scanning
— Comprehensive background checks on all employees
— 24/7/365 live, dedicated operations and security teams
— Formal, ongoing 3rd party compliance and security reviews”
We are reminded that Coveo was recently named “most innovative leader” for the second year running in the Gartner Enterprise Search Magic Quadrant, with that report lauding the company’s “unusually rich security functions.” Founded in 2005, Coveo maintains offices in the U.S. (SanMateo, CA), the Netherlands, and Quebec.
Cynthia Murrell, October 19, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Predictive Search Tries to Work with Videos
October 14, 2015
Predictive search is a common feature in search engines such as Google. It is more well-known as auto-complete, where based on spelling and keyword content the search engine predicts what a user is searching for. Predictive search speeds up the act of searching, but ever since YouTube became the second biggest search engine after Google one has to wonder if “Does Video Enhance Predictive Search?” asks Search Engine Watch.
Search engine and publisher of travel deals Travelzoo created a video series called “#zootips” that was designed to answer travel questions people might search for on Google. The idea behind the video series was that the videos would act as a type of predictive feature anticipating a traveler’s needs.
“‘There’s always push and pull with information,’ says Justin Soffer, vice president of marketing at Travelzoo. ‘A lot of what search is, is people pulling – meaning they’re looking for something specific. What videos are doing is more of a push, telling people what to look for and showing them things.’ ”
Along with Travelzoo, representatives from SEO-PR and Imagination Publishing also agree that video will enhance video search. Travelzoo says that video makes Web content more personal, because an actual person is delivering it. SEO-PR recommends researching keywords with Google Trends and creating videos centered on those words. Imagination Publishing believes that video content will increase a Web site’s Google ranking as it ranks media rich pages higher and there is an increase in voice search and demand for how-to videos.
It is predicted that YouTube’s demand as a search engine will increase more content will be created for video. If you understand how video and predictive analytics work, you will have an edge in future Google rankings.
Whitney Grace, October 14, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Sell Your Soul for a next to Nothing on the Dark Web
October 13, 2015
The article on ZDNet titled The Price of Your Identity in the Dark Web? No More Than a Dollar provides the startlingly cheap value of stolen data on the Dark Web. We have gotten used to hearing about data breaches at companies that we know and use (ahem, Ashley Madison), but what happens next? The article explains,
“Burrowing into the Dark Web — a small area of the Deep Web which is not accessible unless via the Tor Onion network — stolen data for sale is easy to find. Accounts belonging to US mobile operators can be purchased for as little as $14 each, while compromised eBay, PayPal, Facebook, Netflix, Amazon and Uber accounts are also for sale. PayPal and eBay accounts which have a few months or years of transaction history can be sold for up to $300 each.”
According to the Privacy Rights Clearinghouse the most common industries affected by data breaches are healthcare, government, retail, and education sectors. But it also stresses that a high number of data breaches are not caused by hackers or malicious persons at all. Instead, unintended disclosure is often the culprit. Dishearteningly, there is really no way to escape being a target besides living out some Ron Swanson off the grid fantasy scenario. Every organization that collects personal information is a potential breach target. It is up to the organizations to protect the information, and while many are making that a top priority, most have a long way to go.
Chelsea Kerwin, October 13, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Web Site Search Goes Camping
October 12, 2015
It is a common fact that if you are a major retailer and your Web site’s search function is horrible, you are losing millions of dollars in sales. Cabela’s is the world’s largest marketer of hunting, fishing, camping, and other outdoor merchandise decided to upgrade their Web site with GroupBy says PR Newswire in the press release, “Cabela’s And GroupBy Partner To Improve Site Search.”
With GroupBy’s advice, Cabela’s has made a good choice:
“After careful evaluation, Cabela’s selected Searchandiser to replace their Oracle Endeca site search, as they required a robust solution that would deliver accurate search results and an improved user experience for their customers. ‘At Cabela’s we strive to continually improve our customer experience and search relevance is an opportunity area we have identified,’ said Scott Johnstone, Cabela’s Technology Partner Relationship Manager. ‘To that end, we are partnering with GroupBy Inc. to leverage their merchandising tools, search expertise and the underlying technology.’”
As Cabela’s market expands, with Searchandiser creates a better online shopping experience for users with more secure transactions. Any outdoor enthusiast with tell you that equipment is vital for a good adventure. As more people are heading outside to experience the great outdoors, they rely on a decent Web site to order their supplies and gear. Cabela’s is set to meet the new surge with better searching functionalities.
Whitney Grace, October 12, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
CFO Ruth Porat Leads Transparency Directive at Alphabet Google
October 12, 2015
The article titled Google Opens Up to Wall Street on The Wall Street Journal describes the transparency efforts ramping up at Google under the direction of new CFO Ruth Porat. It seems that as risks go up for the “Alphabet” Google thing, the company wants to be more transparent to the Wall Street crowd.
“The new approach has contributed to recent gains in Google shares, Mr. Mahaney said. Google shares are up about 15% in the past three months, while the tech-heavy Nasdaq Composite Index has dropped about 8%. Google still doesn’t offer revenue or earnings forecasts, as many companies do. But Ms. Porat is trying to provide insight to help investors better understand how Google runs its business and help analysts more easily build financial models. A Google spokesman declined to comment.”
The most impactful initiative the article discusses is “Office Hours,” or analyst and investor briefings wherein Google speaks to public information that will effect expenses, such as the seasonal hiring of recent college graduates. Investor and analyst briefings of this sort are common at most companies, although they skirt securities regulations. As long as Google only discusses already publicly disclosed information in the sessions they are safe.
Chelsea Kerwin, October 12, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Google Faces Sanctions over Refusal to Embrace Right to Be Forgotten Ruling
October 2, 2015
The article on Reuters titled France Rejects Google Appeal on Cleaning Up Search Results Globally explores the ramifications of Europe’s recently passed Right to be Forgotten law. The law stipulates that search engines be compelled by requests to remove information. Google has made some attempts to yield to the law, granting 40% of the 320,000 requests to remove incorrect, irrelevant, or controversial information, but only on the European version of its sites. The article delves into the current state of affairs,
“The French authority, the CNIL, in June ordered Google to de-list on request search results appearing under a person’s name from all its websites, including Google.com. The company refused in July and requested that the CNIL abandon its efforts, which the regulator officially refused to do on Monday…France is the first European country to open a legal process to punish Google for not applying the right to be forgotten globally.”
Google countered that while the company was happy to meet the French and European standards in Europe, they did not see how the European law could be globally enforced. This refusal will almost certainly be met with fines and sanctions, but that may be the least of Alphabet Google’s troubles considering its ongoing disapproval by Europe.
Chelsea Kerwin, October 02, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

