New Terrorism and Technology Reports Released

October 11, 2016

Attempting to understand the level of threat a terrorist organization poses continues to be difficult. DefenseSystems.com published Report: Electronic jihad grows in sophistication, which shares the cyber-jihad survey from the Institute for Critical Infrastructure Technology. The authors of this survey present social media and other cyberspace tools to be “the great equalizer” in warfare. In addition to social media, there are a few hacker groups which have launched attacks on western websites and Arab media: the Cyber Caliphate, the dedicated hacker division of the Islamic State, and the Terrorist Team for Electronic Jihad. The write-up explains,

The cyber jihad survey notes that ISIS has mostly dedicated its expanding offensive cyber capabilities to specific social media accounts, including the Twitter and YouTube accounts of U.S. Central Command. Offensive capabilities are thought to include the use of malware, insider threats and “preconfigured tools.” Malware efforts have included spear-phishing emails containing malware designed to sweep up the IP addresses and geolocation data about anti-ISIS groups in the ISIS stronghold of Raqqa, Syria. As ISIS and other cyber-jihadists become more sophisticated and aggressive, experts worry that they will eventually attempt more audacious attacks.

However, a report from the federal government suggests ISIS’ Twitter traffic dropped 45 percent in the past two years. While terrorist group’s technology may be expanding in the arena of offensive strikes, officials believe the decline in Twitter popularity suggests recruitment may be slowing. We think there needs to more analysis of recruitment via Dark Web.

Megan Feil, October 11, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Design of Our Future

September 26, 2016

An article at Co.Exist suggests we all pause to consider what we want our world to look like, in “We Need To Spend More Time Questioning Our Technology-Driven Future.” Along with the boundless potential of today’s fast-evolving technology come consequences, many of them unforeseen. Writer Ben Schiller cites futurist Gerd Leonhard, author of the book, Technology vs. Humanity. Far from a modern Luddite, Leonhard is a consultant for Google and a daily advocate for the wonders of advancing technology. His thorough understanding of the topic allows him to see potential pitfalls, as well.

The shape of technology today calls for society to update the way it approaches doing business, says Leonhard, and move past the “industrial-age paradigm of profit and growth at all costs, or some outmoded technological imperative that may have served us well in the 1980s.” He also points to the environmental problems created by fossil fuel companies as an example—if we aren’t careful, the AI and genetic engineering fields could develop their own “externalities,” or problems others will pay for, one way or another. Can we even imagine all the ways either of those fields could potentially cause harm?

Schiller writes of Leonhard:

The futurist outlines a philosophy he calls ‘exponential humanism’—the human equivalent of exponential technology. As a species we’re not developing the necessary skills and ethical frameworks to deal with technology that’s moving faster than we are, he says. We may be able to merge biology and technology, augment our minds and bodies, become superhuman, end disease, and even prolong life. But we’re yet to ask ourselves whether, for example, extending life is actually a good thing (as a society—there will always be individuals who for some reason want to live to 150). And, more to the point, will these incredible advances be available to everyone, or just a few people? To Leonhard, our current technological determinism—the view that technology itself is the purpose—is as dangerous as Luddism was 200-odd years ago. Without moral debate, we’re trusting in technology for its own sake, not because it actually improves our lives.

The write-up gives a few ideas on how to proactively shape our future. For example, Facebook could take responsibility for the content on its site instead of resting on its algorithm. Leonhard also suggests companies that replace workers with machines pay a tax  that would help soften the blow to society, perhaps even with a minimum guaranteed income. Far-fetched? Perhaps. But in a future with fewer jobs and more freely-available products, a market-driven economy might just be doomed. If that is the case, what would we prefer to see emerge in its place?

Cynthia Murrell, September 26, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/

For the Paranoid at Heart: New Privacy Concerns from Columbia University and Google

September 23, 2016

The article on PhysOrg titled Location Data on Two Apps Enough to Identify Someone, Says Study illustrates the inadequacy of deleting names and personal details from big data sets. Location metadata undermines the anonymity of this data. Researchers at Columbia University and Google teamed up to establish that individuals can easily be identified simply by comparing their movements across two data sets. The article states,

What this really shows is that simply removing identifying information from large-scale data sets is not sufficient,” said Yves-Alexandre de Montjoye, a research scientist at the MIT Media Lab who was not involved in the study. “We need to move to a model of privacy-through-security. Instead of anonymizing data and making it public, there should be technical controls over who gets access to the data, how it is used, and for what purpose.

Just by bringing your phone with you, (and who doesn’t?) you create vast amounts of location metadata about yourself, often without your knowledge. As more and more apps require you to offer your location, it becomes less difficult for various companies to access the data. If you are interested in exploring how easy it is to figure out your identity based on your social media usage, visit You Are Where You Go.

Chelsea Kerwin, September 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/

 

Gleaning Insights and Advantages from Semantic Tagging for Digital Content

September 22, 2016

The article titled Semantic Tagging Can Improve Digital Content Publishing on Aptara Corp. blog reveals the importance of indexing. The article waves the flag of semantic tagging at the publishing industry, which has been pushed into digital content kicking and screaming. The difficulties involved in compatibility across networks, operating systems, and a device are quite a headache. Semantic tagging could help, if only anyone understood what it is. The article enlightens us,

Put simply, semantic markups are used in the behind-the-scene operations. However, their importance cannot be understated; proprietary software is required to create the metadata and assign the appropriate tags, which influence the level of quality experienced when delivering, finding and interacting with the content… There have been many articles that have agreed the concept of intelligent content is best summarized by Ann Rockley’s definition, which is “content that’s structurally rich and semantically categorized and therefore automatically discoverable, reusable, reconfigurable and adaptable.

The application to the publishing industry is obvious when put in terms of increasing searchability. Any student who has used JSTOR knows the frustrations of searching digital content. It is a complicated process that indexing, if administered correctly, will make much easier. The article points out that authors are competing not only with each other, but also with the endless stream of content being created on social media platforms like Facebook and Twitter. Publishers need to take advantage of semantic markups and every other resource at their disposal to even the playing field.

Chelsea Kerwin, September 22, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/

No More Data Mining for Intelligence

August 23, 2016

The U.S. intelligence community will no longer receive information from Dataminr, which serves as a Twitter “fire hose” (Twitter owns five percent of Dataminr). An article, Twitter Turns Off Fire Hose For Intelligence Community from ThreatPost offers the story. A Twitter spokesperson stated they have had a longstanding policy against selling data for surveillance. However, the Journal reported their arrangement was terminated after a CIA test program concluded. The article continues,

Dataminr is the only company allowed to sell data culled from the Twitter fire hose. It mines Tweets and correlates that data with location data and other sources, and fires off alerts to subscribers of breaking news. Reportedly, Dataminr subscribers knew about the recent terror attacks in Brussels and Paris before mainstream media had reported the news. The Journal said its inside the intelligence community said the government isn’t pleased with the decision and hopes to convince Twitter to reconsider.

User data shared on social media has such a myriad of potential applications for business, law enforcement, education, journalism and countless other sectors. This story highlights how applications for journalism may be better received than applications for government intelligence. This is something worth noticing.

Megan Feil, August 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

USAGov Wants More Followers on Snapchat

August 12, 2016

The article on GCN titled Tracking the Ephemeral: USAGov’s Plan for Snapchat portrays the somewhat desperate attempts of the government to reach out to millennials. Perhaps shocking to non-users of the self-immolating picture app, Snapchat claims over a hundred million active users each day, mostly comprised of 13 to 34 year olds. The General Service Administration of USAGov plans to use Snapchat to study the success of their outreach like how many followers they receive and how many views their content gets. The article mentions,

“And while the videos and multimedia that make up “Snapchat stories” disappear after just 24 hours, the USAGov team believes the engagement metrics will provide lasting value. Snapchat lets account owners see how many people are watching each story, if they watch the whole story and when and where they stop before it’s over — allowing USAGov to analyze what kind of content works best.”

If you are wondering how this plan is affected by the Federal Records Acts which stipulates documentation of content, GSA is way ahead of you with a strategy of downloading each story and saving it as a record. All in all the government is coming across as a somewhat clingy boyfriend trying to find out what is up with his ex by using her favorite social media outlet. Not a great look for the US government. But at least they aren’t using ChatRoulette.

 

Chelsea Kerwin, August 12, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

The Reach of Cyber Threat Intelligence Companies

August 10, 2016

The social media monitoring complex appears to be gaining a follower. LittleSis News shared an article highlighting their investigative findings, You are being followed: The business of social media surveillance. This post not only reveals the technology companies engaged in surveillance and developing tools for surveillance, those at LittleSis News also filed freedom of information requests to twenty police departments about their social media monitoring. The article concludes with,

“Because social media incites within us a compulsion to share our thoughts, even potentially illegal ones, law enforcement sees it as a tool to preempt behavior that appears threatening to the status quo. We caught a glimpse of where this road could take us in Michigan, where the local news recently reported that a man calling for civil unrest on Facebook because of the Flint water crisis was nearly the target of a criminal investigation. At its worst, social media monitoring could create classes of “pre-criminals” apprehended before they commit crimes if police and prosecutors are able to argue that social media postings forecast intent. This is the predictive business model to which Geofeedia CEO Phil Harris aspires.”

In addition to Geofeedia, the other cyber threat intelligence companies listed are: BrightPlanet, ZeroFOX, Intrado, LifeRaft, Magnet Forensics, Media Sonar Technologies, Signal Corporation Limited. These companies specialize in everything from analyzing deep web content to digital forensics software. Ultimately data is their specialty, not people. These technologies and their applications will undoubtedly stir up questions about the relationship between people, the data they produce on social media, and state actors.

 

Megan Feil, August 10, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden/Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

Facebook vs. LinkedIn for Job Hunters

August 4, 2016

The article on Lifehacker titled Facebook Can Be Just As Important AS LinkedIn For Finding a Job emphasizes the importance of industry connections. As everyone knows, trying to a find a job online is like trying to date online. A huge number of job postings are scams, schemes, or utter bollox. Navigating these toads and finding the job equivalent to Prince Charming is frustrating, which is why Facebook might offer a happy alternative. The article states,

“As business site Entrepreneur points out, the role Facebook plays in helping people find jobs shouldn’t be surprising. Any time you can connect with someone who works in your industry, that’s one more person who could potentially help you get a job. Research from Facebook itself shows that both strong and weak ties on the site can lead to jobs… Well, weak ties are important collectively because of their quantity, but strong ties are important individually because of their quality.”

Obviously, knowing someone in the industry you seek to work in is the key to finding and getting a job. But a site like Facebook is much easier to exploit than LinkedIn because more people use it and more people check it. LinkedIn’s endless emails eventually become white noise, but scrolling through Facebook’s Newsfeed is an infinite source of time-wasting pleasure for the bulk of users. Time to put the networking back into social networking, job seekers.

 

Chelsea Kerwin, August 4, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Jurors for Google v. Oracle Case Exposed to Major Privacy Violation Potential

August 1, 2016

The article titled Judge Doesn’t Want Google to Google the Favorite Books and Songs of Potential Jurors on Billboard provides some context into the difficulties of putting Google on trial. Oracle is currently suing Google for copyright violations involving a Java API code. The federal judge presiding over the case, William Alsup, is trying to figure out how to protect the privacy of the jurors from both parties—but mostly Google. The article quotes from Alsup,

“For example, if a search found that a juror’s favorite book is To Kill A Mockingbird, it wouldn’t be hard for counsel to construct a copyright jury argument (or a line of expert questions) based on an analogy to that work and to play upon the recent death of Harper Lee, all in an effort to ingratiate himself or herself into the heartstrings of that juror,” he writes. ” The same could be done… with any number of other juror attitudes…”

Alsup considered a straightforward ban on researching jurors, but this would put both sides’ attorneys at a disadvantage. Instead, Google and Oracle have until the end of the month to either consent to a voluntary ban, or agree to clearly inform the jurors of their intentions regarding social media research.

 

Chelsea Kerwin, August 1, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

You Do Not Tay?

July 25, 2016

The article titled Microsoft CaptionBot: AI Image Guessing App Really Isn’t Sure Who Barack Obama Is on International Business Times assesses Microsoft’s latest attempt at AI following the catastrophic Twitter robot Tay which quickly “learned” and repeated some pretty darn offensive ideas about Hitler and Obama. The newly released version named CaptionBot is more focused on image descriptions. The article states,

“Users are asked to upload any photo to the site, then Microsoft’s AI system attempts to describe what is in the image. The system can recognise celebrities and understands the basics of image composition but…, it isn’t yet perfect… You know when you recognise someone, but can’t quite put your finger on who it is? Caption Bot doesn’t do that, it just fails to even describe what a photo of Barack Obama is, never mind who he might be.”

From the examples, it is clear that while CaptionBot is much better at understanding and defining objects than people, objects often create difficulty as well. An image of a yellow vehicle from Cars was described (without confidence) as a white toilet next to a yellow building. To be sure, if you stare at the image long enough, the toilet shape emerges.

 

Chelsea Kerwin, July 25, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden Web/DarkWeb meet up on July 26, 2016. Information is at this link: http://bit.ly/29tVKpx.2

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta