Yahoo Takes on ISIS, in Its Way

January 9, 2017

The article on VentureBeat titled Yahoo Takes Steps to Remove Content Posted From ISIS and Other Terrorist Groups remarks on the recent changes Yahoo made to its community guidelines. The updated guidelines now specify that any content or accounts involved with terrorist organizations, even those that “celebrate” violence connected to terrorist activity are up for deletion or deactivation. The article speaks to the relevance of these new guidelines that follow hard upon the heels of Orlando and San Bernardino,

Twitter has responded as well, “suspending over 125,000 accounts” related to terrorism. Messaging app Telegram has also blocked 78 channels that engaged in ISIS-related activity. Kathleen Lefstad, Yahoo’s policy manager for trust and safety, wrote that this new category is in addition to other types of content that are flagged, including hate speech, bullying or harassment, and sharing adult or sexualized content of someone without their consent.

ISIS has grown infamous for its social media presence and ability to draw foreign supporters through social media platforms. Yahoo’s crackdown is a welcome sign of awareness that these platforms must take some responsibility for how their services are being abused. Priorities, folks. If Facebook’s machine learning content security can remove any sign of a woman’s nipple within 24 hours, shouldn’t content that endorses terrorism be deleted in half the time?

Chelsea Kerwin, January 9, 2017

When Censorship Means More Money, Facebook Leans In

December 8, 2016

The article on Vanity Fair titled Facebook Is Reportedly Building a Censorship Tool to Win Over China suggests that the people nervous about what it will mean to address the fake news proliferation are correct. The fear that Facebook managing fake news stories might lead to actual censorship of the news is not so far-fetched after all. The article states,

Auditing fake news is considered to be a slippery-slope problem for the company, which is just now starting to use fact-checkers to “grade” the veracity of news stories shared on its Web site and to crack down on false or partially false news stories shared on Facebook. Still, beneath it all, Facebook remains a publicly traded company with a fiduciary duty to its shareholders—and that duty is to make money.

Zuckerberg’s interest in capturing China’s 700M+ internet users has led to the creation of a censorship tool that can “automatically suppress content in specific geographic areas.” The tool has not been implemented (yet), but it suggests that Zuckerberg has a flexible relationship with freedom of information, especially where money is at stake. And there is a lot of money at stake. The article delves into the confusion over whether Facebook is a media company or not. But whatever type of company it is, it is a company. And that means money comes first.

Chelsea Kerwin, December 8, 2016

Fake and Bake: Wikileaks Excitement

November 29, 2016

I love the chatter about fake news. I noted the story “Putting This Out There for Everyone’s Information (Is This for Real?) Before ItsNews 11-18-16… Wikileaks Is Gone.” According to the write up, a person named Jim Stone thinks that Wikileaks is a gone goose. The source cited above “felt drawn to put this [the story about Wikileaks as a disappeared organization] out there. To step away from the possibility that the story is bogus, the author of Kauilapele blog crawfishes:

Once more, I do not know for sure if this is true.

What’s the big reveal? Here you go:

The destruction of WikiLeaks was an unprecedented global effort.

There you go. Will accuracy and truthiness algorithms snag the Kauilapele item as possibly incorrect? Run those Bing, Google, and Yandex queries and decide for yourself.

Stephen E Arnold, November 29, 2016

Machine Learning Does Not Have All the Answers

November 25, 2016

Despite our broader knowledge, we still believe that if we press a few buttons and press enter computers can do all work for us.  The advent of machine learning and artificial intelligence does not repress this belief, but instead big data vendors rely on this image to sell their wares.  Big data, though, has its weaknesses and before you deploy a solution you should read Network World’s, “6 Machine Learning Misunderstandings.”

Pulling from Juniper Networks’s security intelligence software engineer Roman Sinayev explains some of the pitfalls to avoid before implementing big data technology.  It is important not to take into consideration all the variables and unexpected variables, otherwise that one forgotten factor could wreck havoc on your system.  Also, do not forget to actually understand the data you are analyzing and its origin.  Pushing forward on a project without understanding the data background is a guaranteed fail.

Other practical advice, is to build a test model, add more data when the model does not deliver, but some advice that is new even to us is:

One type of algorithm that has recently been successful in practical applications is ensemble learning – a process by which multiple models combine to solve a computational intelligence problem. One example of ensemble learning is stacking simple classifiers like logistic regressions. These ensemble learning methods can improve predictive performance more than any of these classifiers individually.

Employing more than one algorithm?  It makes sense and is practical advice why did that not cross our minds? The rest of the advice offered is general stuff that can be applied to any project in any field, just change the lingo and expert providing it.

Whitney Grace, November 25, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Palantir Technologies: Less War with Gotham?

November 9, 2016

I read “Peter Thiel Explains Why His Company’s Defense Contracts Could Lead to Less War.” I noted that the write up appeared in the Washington Post, a favorite of Jeff Bezos I believe. The write up referenced a refrain which I have heard before:

Washington “insiders” currently leading the government have “squandered” money, time and human lives on international conflicts.

What I highlighted as an interesting passage was this one:

a spokesman for Thiel explained that the technology allows the military to have a more targeted response to threats, which could render unnecessary the wide-scale conflicts that Thiel sharply criticized.

I also put a star by this statement from the write up:

“If we can pinpoint real security threats, we can defend ourselves without resorting to the crude tactic of invading other countries,” Thiel said in a statement sent to The Post.

The write up pointed out that Palantir booked about $350 million in business between 2007 and 2016 and added:

The total value of the contracts awarded to Palantir is actually higher. Many contracts are paid in a series of installments as work is completed or funds are allocated, meaning the total value of the contract may be reflected over several years. In May, for example, Palantir was awarded a contract worth $222.1 million from the Defense Department to provide software and technical support to the U.S. Special Operations Command. The initial amount paid was $5 million with the remainder to come in installments over four years.

I was surprised at the Washington Post’s write up. No ads for Alexa and no Beltway snarkiness. That too was interesting to me. And I don’t have a dog in the fight. For those with dogs in the fight, there may be some billability worries ahead. I wonder if the traffic jam at 355 and Quince Orchard will now abate when IBM folks do their daily commute.

Stephen E Arnold, November 9, 2016

New EU Legislation on Terrorist Content

October 12, 2016

Balancing counterterrorism with digital rights continues to be a point of discussion. An article, EU parliament pushes ahead with plans to block, remove terrorist content online from Ars Technica reiterates the . Now, national authorities are required to ensure action are taken to remove illegal content hosted from within their territory that “constitutes public incitement to commit a terrorist offence”. If this is not feasible, they may take the necessary measures to block access to such content. Parliament’s chief negotiator, German MEP Monika Hohlmeier’s perspective is shared,

Hohlmeier said that the proposal strikes the right balance between security on the one hand and data protection and freedom of expression on the other. “It’s not so much a question of whether terrorists are using particular ways to hide on the Internet, or encryption, but they very often have perfect propaganda machinery. Our approach is to try to close websites, and if this is not possible to block these Internet websites,” she said. She added that enhanced cooperation was needed between police and justice authorities as well as private actors.

European digital rights organisation EDRi asserts that speed of action is taking undue priority over “legislation fit for the purpose.” Perhaps there is an opportunity for cyber security technology developed by justice authorities and the private sector to hit the mark on balancing the fine line between censorship and counterterrorism.

Megan Feil, October 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Is the Cloud Really Raining Dollar Signs?

October 5, 2016

Cloud computing offers people the ability to access their files from any place in the world as long as they have a good Internet connection and a cloud account.  Many companies are transferring their mainframes to the cloud, so their employees can work remotely.  Individuals love having their files, especially photos and music, on the cloud for instantaneous access.  It is a fast growing IT business and Forbes reports that “Gartner Predicts $111B In IT Spend Will Shift To Cloud This Year Growing To Be $216B By 2020.”

Within the next five years it is predicted more companies will shift their inner workings to the cloud, which will indirectly and directly affect more than one trillion projected to be spent in IT.  Application software spending is expected to shift 37% towards more cloud usage and business process outsourcing is expected to grow 43%, all by 2020.

Why wait for 2020 to see the final results, however?  2016 already has seen a lot of cloud growth and even more is expected before the year ends:

$42B in Business Process Outsourcing IT spend, or 35% of the total market, is forecast to shift to the cloud this year. 25% of the application software spending is predicted to shift to the cloud this year, or $36B.

Gartner is a respected research firm and these numbers are predicting hefty growth (here is the source).  The cloud shift will surely affect more than one trillion.  The bigger question is will cloud security improve enough by 2020 that more companies will shift in that direction?

Whitney Grace, October 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

What Content Management Systems Ring the Chimes of US Government Procurement Teams?

September 28, 2016

The answer to this question does not require a consultant in content management or, as the insiders term it, CMS. Navigate to Digital Gov’s run down. The list is, like many things about the US government, “unofficial.” You can look up an agency like the Economic Research Service and learn that the whiz kids at ERS rely upon Umbraco, an open source CMS which works with Microsoft software. It should. Umbraco lists Microsoft as a customer. What this says about SharePoint I will leave to you, gentle reader.

There are some interesting systems in use; for example:

  • EpiServer from former Microsoft Sweden folks
  • DotNetNuke for the Department of Defense. The name of the product may have resonated with someone at the DoD.
  • RedDot, a German software product which is now an OpenText property
  • WebZerve, product of xpdient Inc.
  • InMagic Presto, which I thought was a law firm centric system. InMagic is now owned by a Canadian firm.

The list is a sure fire guide for those who want to sell CMS consulting services to government agencies. Any notion of standardization or buying US software seems to be out of fashion.

Stephen E Arnold, September 28, 2016

Technology That Literally Can Read Your Lips (Coming Soon)

August 19, 2016

The article on Inquisitr titled Emerging New “Lip-Reading” Technology To Radically Revolutionize Modern-Day Crime Solving explains the advances in visual speech recognition technology. In 1974 Gene Hackman could have used this technology in the classic film “The Conversation” where he plays a surveillance expert trying to get better audio surveillance in public settings where background noise makes clarity almost impossible. Apparently, we haven’t come very far since the 70s when it comes to audio speech recognition, but recent strides in lip reading technology in Norwich have experts excited. The article states,

“Lip-reading is one of the most challenging problems in artificial intelligence so it’s great to make progress on one of the trickier aspects, which is how to train machines to recognize the appearance and shape of human lips.” A few years ago German researchers at the Karlsruhe Institute of Technology claim they’ve introduced a lip-reading phone that allowed for soundless communication, a development that was to mark a massive leap forward into the future of speech technology.”
The article concludes that while progress has been made, there is still a great deal of ground to cover. The complications inherent in recognizing, isolating, and classifying lip movement patterns makes this work even more difficult than audio speech recognition, according to the article. At any rate, this is good news for some folks who want to “know” what is in a picture and what people say when there is no audio track.

The article concludes that while progress has been made, there is still a great deal of ground to cover. The complications inherent in recognizing, isolating, and classifying lip movement patterns makes this work even more difficult than audio speech recognition, according to the article. At any rate, this is good news for some folks who want to “know” what is in a picture and what people say when there is no audio track.

 

Chelsea Kerwin, August 19, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

Honkin News: Beyond Search Video News Program Available Now

August 2, 2016

Honkin’ News is now online via YouTube at https://youtu.be/hf93zTSixgo. The weekly program tries to separate the giblets from the goose feathers in online search and content processing. Each program draws upon articles and opinion appearing in the Beyond Search blog.

The Beyond Search program is presented by Stephen E Arnold, who resides in rural Kentucky. The five minute programs highlights stories appearing in the daily Beyond Search blog and includes observations not appearing in the printed version of the stories. No registration is required to view the free video.

Arnold told Beyond Search:

Online search and content processing generate modest excitement. Honkin’ News comments on some of the more interesting and unusual aspects of information retrieval, natural language processing, and the activities of those working to make software understand digital content. The inaugural program highlights Verizon’s Yahoo AOL integration strategy, explores why search fails, and how manufacturing binders and fishing lures might boost an open source information access strategy.

The video is created using high tech found in the hollows of rural Kentucky; for example, eight mm black-and-white film and two coal-fired computing devices. One surprising aspect of the video is the window showing the vista outside the window of the Beyond Search facility. The pond filled with mine drainage is not visible, however.

Kenny Toth, August 2, 2016

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta