Do Not Forget to Show Your Work
November 24, 2016
Showing work is messy, necessary step to prove how one arrived at a solution. Most of the time it is never reviewed, but with big data people wonder how computer algorithms arrive at their conclusions. Engadget explains that computers are being forced to prove their results in, “MIT Makes Neural Networks Show Their Work.”
Understanding neural networks is extremely difficult, but MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) has developed a way to map the complex systems. CSAIL figured the task out by splitting networks in two smaller modules. One for extracting text segments and scoring according to their length and accordance and the second module predicts the segment’s subject and attempts to classify them. The mapping modules sounds almost as complex as the actual neural networks. To alleviate the stress and add a giggle to their research, CSAIL had the modules analyze beer reviews:
For their test, the team used online reviews from a beer rating website and had their network attempt to rank beers on a 5-star scale based on the brew’s aroma, palate, and appearance, using the site’s written reviews. After training the system, the CSAIL team found that their neural network rated beers based on aroma and appearance the same way that humans did 95 and 96 percent of the time, respectively. On the more subjective field of “palate,” the network agreed with people 80 percent of the time.
One set of data is as good as another to test CSAIL’s network mapping tool. CSAIL hopes to fine tune the machine learning project and use it in breast cancer research to analyze pathologist data.
Whitney Grace, November 24, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Mastering SEO Is Mastering the Internet
May 5, 2016
Search engine optimization, better known as SEO, is one of the prime tools Web site owners must master in order for their site to appear in search results. A common predicament most site owners find themselves in is that they may have a fantastic page, but if a search engine has not crawled it, the site might as well not exist. There are many aspects to mastering SEO and it can be daunting to attempt to make a site SEO friendly. While there are many guides that explain SEO, we recommend Mattias Geniar’s “A Technical Guide To SEO.”
Some SEO guides get too much into technical jargon, but Geniar’s approach uses plain speak so even if you have the most novice SEO skills it will be helpful. Here is how Geniar explains it:
“If you’re the owner or maintainer of a website, you know SEO matters. A lot. This guide is meant to be an accurate list of all technical aspects of search engine optimisation. There’s a lot more to being “SEO friendly” than just the technical part. Content is, as always, still king. It doesn’t matter how technically OK your site is, if the content isn’t up to snuff, it won’t do you much good.”
Understanding the code behind SEO can be challenging, but thank goodness content remains the most important aspect part of being picked up by Web crawlers. These tricks will only augment your content so it is picked up quicker and you will receive more hits on your site.
Whitney Grace, May 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Social Media Still a Crime Hub
March 14, 2016
It seems that most crime is concentrated on the hidden Dark Web, especially with news of identity thief and potential threats to national security making the news over the latest social media hotspot. Social media is still a hot bed for Internet crime and Motherboard has a little tale tell about, “SocioSpyder: The Tool Bought By The FBI To Monitor Social Media.” Social media remains a popular crime hub, because of the amount of the general public that use it making them susceptible to everything from terroristic propaganda to the latest scam to steal credit card numbers.
Law enforcement officials are well aware of how criminals use social media, but the biggest problem is having to sift through the large data stockpile from the various social media platforms. While some law enforcement officials might enjoy watching the latest cute kitten video, it is not a conducive use of their time. The FBI purchased SocioSpyder as their big data tool.
“ ‘SocioSpyder,’ as the product is called, ‘can be configured to collect posts, tweets, videos and chats on-demand or autonomously into a relational, searchable and graphable database,” according to the product’s website. SocioSpyder is made by Allied Associates International, a US-based contractor for government and military clients as well as other private companies, and which sells, amongst other things, software.
This particular piece of kit, which is only sold to law enforcement or intelligence agencies, allows an analyst to not only keep tabs on many different targets across various social networks at once, but also easily download all of the data and store it. In short, it’s pretty much a pre-configured web scraper for social media.”
SocioSpyder maps relationships within the data and understand how the user-generated content adds up to the bigger picture. Reportedly, the FBI spent $78,000 on the SocioSpyder software and the US Marshals bought a lesser version worth $22,500. SocioSpyder is being used to gather incriminating evidence against criminals and avoid potential crimes.
My biggest question: where can we get a version of SocioSpyder to generate reports for personal use?
Whitney Grace, March 14, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Hackers Revive Dark Web Forum Called Hell
February 8, 2016
After personal details of over four million Adult Friend Finder users was found on the Dark Web site called Hell, this notorious internet hacking forum was shut down by authorities around July 2015. Reported by Instant Tricks, an article Hell is back with Hell Reloaded on the Dark Web explains Hell is currently accessible again on the Dark Web. The article states,
“The exact date of the website’s returning on-line is troublesome to determine, for the posts don’t have a date next to them for security functions. However, judgement by the quantity of posts, it’s honest to mention that the web site came back simply over every week past. Hell is a web portal on the Dark internet that’s employed by hackers everywhere the globe to share their hacking tricks moreover as transfer and post taken knowledge.”
Hell is one of the world’s largest hacking forums on the Dark Web and, as such, is difficult to imagine the site will ever kick the bucket. Interestingly, in its re-emergence, it has been rendered with the same branding as if nothing had changed. “Stephen E Arnold’s Dark Web Notebook” describes this Dark Web resource. We recommend this read for security, law enforcement and information technology officials as these industries’ landscapes evolve due to the enduring presence of sites like Hell on the Dark Web.
Megan Feil, February 08, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Desktop Web Searches Began Permanent Decline in 2013
December 28, 2015
The article on Quartz titled The Product that Made Google Has Peaked for Good presents the startling information that desktop web search is expected to remain in permanent decline. The main reason for Google’s prestige and growth peaked in 2013, the article suggests, and then declined for 20 out of the last 21 months. The article reports,
“Google doesn’t regularly disclose the number of search queries that its users conduct. (It has been “more than 100 billion” per month for a while.)… And while a nice chunk of Google’s revenue growth is coming from YouTube, its overall “Google Websites” business—mostly search ads, but also YouTube, Google Maps, etc.—grew sales 14%, 13%, and 16% year-over-year during the first three quarters of 2015. The mobile era hasn’t resulted in any sort of collapse of Google’s ad business.”
The article also conveys that mobile searches accounted for over half of all global search queries. Yes, overall Google is still a healthy company, but this decline in desktop searches will still certainly force some fancy dancing from Alphabet Google. The article does not provide any possible reasons for the decline. The foundations of the company might seem a little less stable between this decline and the restless future of Internet ads.
Chelsea Kerwin, December 28, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Journalists Use Dark Web Technology to Protect Source Privacy
November 4, 2015
Canada’s paper the Globe and Mail suggests those with sensitive information to reveal some Dark Web tech: “SecureDrop at the Globe and Mail.” As governments get less squeamish about punishing whistleblowers, those with news the public deserves to know must be increasingly careful how they share their knowledge. The website begins by informing potential SecureDrop users how to securely connect through the Tor network. The visitor is informed:
“The Globe and Mail does not log any of your interactions with the SecureDrop system, including your visit to this page. It installs no tracking cookies or tracking software of any kind on your computer as part of the process. Your identity is not exposed to us during the upload process, and we do not know your unique code phrase. This means that even if a code phrase is compromised, we cannot comply with demands to provide documents that were uploaded by a source with that code phrase. SecureDrop itself is an open-source project that is subject to regular security audits, reducing the risk of bugs that could compromise your information. Information provided through SecureDrop is handled appropriately by our journalists. Journalists working with uploaded files are required to use only computers with encrypted hard drives and follow security best practices. Anonymous sources are a critical element of journalism, and The Globe and Mail has always protected its sources to the best of its abilities.
The page closes with a warning that no communication can be perfectly secure, but that this system is closer than most. Will more papers take measures to ensure folks can speak up without being tracked down?
Cynthia Murrell, November 4, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Compare Cell Phone Usage in Various Cities
October 8, 2015
Ever wonder how cell phone usage varies around the globe? Gizmodo reports on a tool that can tell us, called ManyCities, in their article, “This Website Lets You Study Cell Phone Use in Cities Around the World.” The project is a team effort from MIT’s SENSEable City Laboratory and networking firm Ericsson. Writer Jamie Condliffe tells us that ManyCities:
“…compiles mobile phone data — such as text message traffic, number of phone calls, and the amount of data downloaded —from base stations in Los Angeles, New York, London, and Hong Kong between April 2013 and January 2014. It’s all anonymised, so there’s no sensitive information on display, but there is enough data to understand usage patterns, even down the scale of small neighbourhoods. What’s nice about the site is that there are plenty of intuitive interpretations of the data available from the get-go. So, you can see how phone use varies geographically, say, or by time, spotting the general upward trend in data use or how holidays affect the number of phone calls. And then you can dig deeper, to compare data use over time between different neighbourhoods or cities: like, how does the number of texts sent in Hong Kong compare to New York? (It peaks in Hong Kong in the morning, but in the evening in New York, by the way.)”
The software includes some tools that go a little further, as well; users can cluster areas by usage patterns or incorporate demographic data. Condliffe notes that this information could help with a lot of tasks; forecasting activity and demand, for example. If only it were available in real time, he laments, though he predicts that will happen soon. Stay tuned.
Cynthia Murrell, October 8, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Mondeca Has a Sandbox
September 15, 2015
French semantic tech firm Mondeca has their own research arm, Mondeca Labs. Their website seems to be going for a playful, curiosity-fueled vibe. The intro states:
“Mondeca Labs is our sandbox: we try things out to illustrate the potential of Semantic Web technologies and get feedback from the Semantic Web community. Our credibility in the Semantic Web space is built on our contribution to international standards. Here we are always looking for new challenges.”
The page links to details on several interesting projects. One entry we noticed right away is for an inference engine; they say it is “coming soon,” but a mouse click reveals that no info is available past that hopeful declaration. The site does supply specifics about other projects; some notable examples include linked open vocabularies, a SKOS reader, and a temporal search engine. See their home page, above, for more.
Established in 1999, Mondeca has delivered pragmatic semantic solutions to clients in Europe and North America for over 15 years. The firm is based in Paris, France.
Cynthia Murrell, September 15, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Beyond Google, How to Work Your Search Engine
August 28, 2015
The article on Funnelback titled Five Ways to Improve Your Website Search offers tips that may seem obvious, but could always stand to be reinforced. Sometimes the Google site:<url> is not enough. The first tip, for example, is simply to be helpful. That means recognizing synonyms and perhaps adding an autocomplete function in case your site users think in different terms than you do. The worst case scenario is search is typing in a term and yielding no results, especially when the problem is just language and the thing being searched for is actually present, just not found. The article goes into the importance of the personal touch as well,
“You can use more than just the user’s search term to inform the results your search engine delivers… For example, if you search for ‘open day’ on a university website, it might be more appropriate to promote and display an ‘International Open Day’ event result to prospective international students instead of your ‘Domestic Student Open Day’ counterpart event. This change in search behavior could be determined by the user’s location – even if it wasn’t part of their original search query.”
The article also suggests learning from the search engine. Obviously, analyzing what customers are most likely to search for on your website will tell you a lot about what sort of marketing is working, and what sort of customers you are attracting. Don’t underestimate search.
Chelsea Kerwin, August 28, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Its Hacker Season
August 21, 2015
One of the quintessential cartoon feuds exists between Bugs Bunny and Daffy Duck as they argue whether or not it is duck or rabbit hunting season. Whoever wins gets the lovely prize of having their face blown off, thankfully cartoon violence does not obey the rules of life and death. The ensuing argument ends with hilarious consequences, but everyday another type of big game is always in season: your personal information. Hackers are constantly searching for ways to break into vulnerable systems and steal valuable information.
One a personal level it is frightening to be hacked, but corporations stand risk millions of dollars, customer information, trade secrets, and their reputations if their systems get hacked. There are many companies that specialize in software to prevent potential hackings, but Cybereason offers unique selling points in the article, “Introducing Cybereason: Real-Time Automated Cyber Hunting.”
“This is why Cybereason exists, to bring the fight against hackers off of the frontlines and into the depths of your environment, where they lurk after gaining unnoticed access. Security needs to be about having an ever-watchful eye over your endpoints, servers, and network, and the Cybereason platform will allow you to perform real-time, automated hunting across your entire environment.”
On their Web site they posted a product video that feeds on the US’s culture of fear and they present an Armageddon like situation complete with a female voice over artist with a British accent, a Guy Fawkes mask, and Matrix-like graphics. My favorite bit is when Cybereason is made to resemble a secret intelligence agency of superheroes.
Despite the clichéd video, it does give a thorough visualization of what Cybereason’s software and services can do. The fear factor might be a selling point for some clients, but I’d rather hear hard facts and direct solutions. It takes out the dramatic elements and actually tells me what the product can do for me. You have to love Cybereason’s ending phrase, “Let the hunt begin.” It makes me want to respond with, “May the odds ever be in your favor.”
Whitney Grace, August 21, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

