Automated Tools for Dark Web Data Tracking
September 15, 2016
Naturally, tracking stolen data through the dark web is a challenge. Investigators have traditionally infiltrated chatrooms and forums in the effort—a tedious procedure with no guarantee of success. Now, automated tools may give organizations a leg up, we learn from the article, “Tools to Track Stolen Data Through the Dark Web” at GCN. Reporter Mark Pomerleau informs us:
“The Department of Veterans Affairs last month said it was seeking software that can search the dark web for exploited VA data improperly outside its control, distinguish between VA data and other data and create a ‘one-way encrypted hash’ of VA data to ensure that other parties cannot ascertain or use it. The software would also use VA’s encrypted data hash to search the dark web for VA content. We learned:
Some companies, such as Terbium Labs, have developed similar hashing technologies. ‘It’s not code that’s embedded in the data so much as a computation done on the data itself,’ Danny Rogers, a Terbium Labs co-founder, told Defense One regarding its cryptographic hashing. This capability essentially enables a company or agency to recognize its stolen data if discovered. Bitglass, a cloud access security broker, uses watermarking technology to track stolen data. A digital watermark or encryption algorithm is applied to files such as spreadsheets, Word documents or PDFs that requires users to go through an authentication process in order to access it.
We’re told such watermarks can even thwart hackers trying to copy-and-paste into a new document, and that Bitglass tests its tech by leaking and following false data onto the dark web. Pomerleau notes that regulations can make it difficult to implement commercial solutions within a government agency. However, government personnel are very motivated to find solutions that will allow them to work securely outside the office.
The article wraps up with a mention of DARPA’s Memex search engine, designed to plumb the even-more-extensive deep web. Law enforcement is currently using Memex, but the software is expected to eventually make it to the commercial market.
Cynthia Murrell, September 15, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Law Enforcement Utilizes New and Traditional Methods for Dark Web Matters
September 15, 2016
While the Dark Web may be thought of as a home to drug dealers, several individuals have been apprehended by law enforcement. Edinburgh News published a report: FBI Helps Catch Edinburgh Man Selling Drugs on ‘Dark Web’. David Trail was convicted for creating a similar website to eBay, but on the Dark Web, called Topix2. Stolen credit card information from his former employer, Scotweb were found in the search of his home. The article states,
Detective Inspector Brian Stuart, of the Cybercrime Unit, said: ‘Following information from colleagues in FBI, Germany’s West Hessen Police and the UK’s National Crime Agency, Police Scotland identified David Trail and his operation and ownership of a hidden website designed to enable its users to buy and sell illegal drugs anonymously and beyond the reach of law enforcement. His targeting of a previous employer, overcoming their security, almost had a devastating effect on the company’s ability to remain in business.
As this piece notes, law enforcement used a combination of new and traditional policing techniques to apprehend Trail. Another common practice we have been seeing is the cooperation of intelligence authorities across borders — and across levels of law enforcement. In the Internet age this is a necessity, and even more so when the nature of the Dark Web is taken into account.
Megan Feil, September 15, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Is the UK Tolling the App Death Knell for Government Services?
September 14, 2016
The article titled Why Britain Banned Mobile Apps on GovInsider introduces Ben Terret and the innovative UK Government Digital Service program, the first of its kind in the world. Terret spearheaded a strict “no apps” policy in favor of websites while emphasizing efficiency, clarity, cost savings, and relevance of the information. This all adds up to creating a simple and streamlined experience for UK citizens. Terret explains why this approach is superior in an app-crazed world,
Apps are “very expensive to produce, and they’re very very expensive to maintain because you have to keep updating them when there are software changes,” Terrett says. “I would say if you times that by 300, you’re suddenly talking about a huge team people and a ton of money to maintain that ecosystem”…Sites can adapt to any screen size, work on all devices, and are open to everyone to use regardless of their device.
So what do these websites look like? They are clean, simple, and operated under the assumption that “Google is the homepage.” Terrett measures the success of a given digital services by monitoring how many users complete a transaction, or how many continued to search for additional information, documents, or services. Terrett’s argument against apps is a convincing one, especially based on the issue of cutting expenses. Whether this argument translates into the private sector is another question.
Chelsea Kerwin, September 14, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Mobile Data May Help Fight Disease
September 14, 2016
Data from smartphones and other mobile devices may give us a new tool in the fight against communicable diseases. Pen State News reports, “Walking and Talking Behaviors May Help Predict Epidemics and Trends.” A recent study, completed by an impressive roster of academics at several institutions, reveals a strong connection between our movements and our communications. So strong, in fact, that a dataset on one can pretty accurately predict the other. The article cites one participant, researcher Dashun Wang of Penn State:
[Wang] added that because movement and communication are connected, researchers may only need one type of data to make predictions about the other phenomenon. For instance, communication data could reveal information about how people move. …
The equation could better forecast, among other things, how a virus might spread, according to the researchers, who report their findings today (June 6) in the Proceedings of the National Academy of Sciences. In the study, they tested the equation on a simulated epidemic and found that either location or communication datasets could be used to reliably predict the movement of the disease.
Perhaps not as dramatic but still useful, the same process could be used to predict the spread of trends and ideas. The research was performed on three databases full of messages from users in Portugal and another (mysteriously unidentified) country and on four years of Rwandan mobile-phone data. These data sets document who contacted whom, when, and where.
Containing epidemics is a vital cause, and the potential to boost its success is worth celebrating. However, let us take note of who is funding this study: The U.S. Army Research Laboratory, the Office of Naval Research, the Defense Threat Reduction Agency and the James S. McDonnell Foundation’s program, Studying Complex Systems. Note the first three organizations in the list; it will be interesting to learn what other capabilities derive from this research (once they are unclassified, of course).
Cynthia Murrell, September 14, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Ads Appear Here, There, and Everywhere Across Google Landscape
September 12, 2016
The article on CNN Money titled Google Is Going to Start Showing You More Ads discusses the surge in ads that users can expect to barely notice over the coming weeks and months. In efforts to ramp up mobile ad revenue to match the increasing emphasis on mobile search, Google is making mobile ads bigger, more numerous, and just more. The article explains,
Google will be simplifying the work flow for businesses to create display ads with images. The company says advertisers need to “simply provide headlines, a description, an image, and a URL,” and Google will automatically design ads for the business. Location-based ads will start showing up on Google too. If you search for “shoe store” or “car repair near me,” ads for local businesses will populate the search results… The changes come as Google is trying to stay ahead of customers’ changing demands.
Google claims in the article that the increase is already showing strong results for advertisers, which click-through rates (CTR) up 20%. But it is hard to believe. As ads flood the space between articles, search results, and even Google Map directions, they seem to be no more significant than an increase in white noise. If Google really wants to revolutionize marketing, they are going to need to dig deeper than just squeezing more ads in between the lines.
Chelsea Kerwin, September 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
How Collaboration and Experimentation Are Key to Advancing Machine Learning Technology
September 12, 2016
The article on CIO titled Machine Learning “Still a Cottage Industry” conveys the sentiments of a man at the heart of the industry in Australia, Professor Bob Williamson. Williamson is the Commonwealth Scientific and Industrial Research Organisation’s (CSIRO’s) Data 61 group chief scientist. His work in machine learning and data analytics led him to the conclusion that for machine learning to truly move forward, scientists must find a way to collaborate. He is quoted in the article,
There’s these walled gardens: ‘I’ve gone and coded my models in a particular way, you’ve got your models coded in a different way, we can’t share’. This is a real challenge for the community. No one’s cracked this yet.” A number of start-ups have entered the “machine-learning-as-a-service” market, such as BigML, Wise.io and Precog, and the big names including IBM, Microsoft and Amazon haven’t been far behind. Though these MLaaSs herald some impressive results, Williamson warned businesses to be cautious.
Williamson speaks to the possibility of stagnation in machine learning due to the emphasis on data mining as opposed to experimenting. He hopes businesses will do more with their data than simply look for patterns. It is a refreshing take on the industry from an outsider/insider, a scientist more interested in the science of it all than the massive stacks of cash at stake.
Chelsea Kerwin, September 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Cairo Authorities Perform Bitcoin Sting
September 8, 2016
Egyptian authorities refuse to let a 30-year-old dentist get away with trading in digital currency, despite there being no law on the books to prohibit the practice. The Merkle informs us, “Egyptian Dentist Apprehended in Bitcoin Sting Operation in Cairo.” Reporter Traderman reveals:
According to today’s post on the facebook page of The Ministry of the Interior, Mr. Ahmed was captured with $13,900 in cash, as well as a cellular phone and a smart tablet that were used in the trading operation. Authorities setup Ahmed by contacting him about a potential deal on LocalBitcoins, where Ahmed was selling the digital currency for $570 per coin.
The investigation was carried out with the cooperation of the Cairo Department of Public Safety and the Cairo Security Directorate. Mr. Ahmed has apparently confessed to trading bitcoin, but it is unclear what specific law Mr. Ahmed was breaking, as there are no regulations on digital currencies in Egypt.
The write-up tells us manufacturer AMECO, based in Cairo, has been accepting bitcoin apparently unmolested since 2014. Traderman also notes that, as of their writing, about seven Egyptian bitcoin vendors operating on LocalBitcoins, all of whom seem to be running modest operations. It will be interesting to see whether law-enforcement continues to crack down on bitcoin within their borders, and, if so, what justification authorities may offer. Perhaps they will go so far as to pass a law.
Cynthia Murrell, September 8, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Government Seeks Sentiment Analysis on Its PR Efforts
September 6, 2016
Sentiment analysis is taking off — government agencies are using it for PR purposes. Next Gov released a story, Spy Agency Wants Tech that Shows How Well Its PR Team Is Doing, which covers the National Geospatial-Intelligence Agency’s request for information about sentiment analysis. The NGA hopes to use this technology to assess their PR efforts to increase public awareness of their agency and communicate its mission, especially to groups such as college students, recruits and those in the private sector. Commenting on the bigger picture, the author writes,
The request for information appears to be part of a broader effort within the intelligence community to improve public opinion about its operations, especially among younger, tech-savvy citizens. The CIA has been using Twitter since 2014 to inform the public about the agency’s past missions and to demonstrate that it has a sense of humor, according to an Nextgov interview last year with its social media team. The CIA’s social media director said at the time there weren’t plans to use sentiment analysis technology to analyze the public’s tweets about the CIA because it was unclear how accurate those systems are.
The technologies used in sentiment analysis such as natural language processing and computational linguistics are attractive in many sectors for PR and other purposes, the government is no exception. Especially now that CIA and other organizations are using social media, the space is certainly ripe for government sentiment analysis. Though, we must echo the question posed by the CIA’s social media director in regards to accuracy.
Megan Feil, September 6, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph There is a Louisville, Kentucky Hidden Web/DarkWeb meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Verizon Strategizes to Get Paid for Installing Big Brand Apps That You Will Probably Never Open
September 5, 2016
The article titled Verizon Offered to Install Marketers’ Apps Directly on Subscribers’ Phones on AdAge discusses the next phase in Verizon’s marketing strategy, a seeming inheritance of product placement: automatic installations for big brands onto your phone. Next time you notice an app that you didn’t download on your phone, look no further. Verizon has been in talks with both retail and finance brands about charging between $1 and $2 per device, which sounds small until you multiply it by 75 million Verizon smartphone subscribers. The article discusses some of the potential drawbacks.
Verizon has stoked some user frustration in the past with “bloatware,” as have many carriers and phone manufacturers. Bloatware comprises the often irrelevant apps that arrive pre-installed on phones, though they’re less often major brands’ apps and more often small, proprietary services from the carriers and manufacturers…There is no guarantee, however, that Verizon subscribers open the apps they find pre-installed on their phones. “If a user is not interested, they just delete it without activating.
Sara Choi, COO of AirFox, is quoted in the article making a great point about the importance to carriers to innovate new strategies for profit growth. Ultimately, the best use for this marketing technique is a huge number of immediate downloads. How to engage users once you have gotten into their phones is the next question. If this goes through, there will be no need to search to get an ad, which could mean bad news for online ad search.
Chelsea Kerwin, September 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
The Zen of More Tabs from Yandex
September 5, 2016
Serendipitous information discovery has been attempted through many apps, browsers and more. Attempting a solution, Russia’s giant in online search, Yandex, launched a new feature to their browser. A news release from PR Newswire appeared on 4 Traders entitled Yandex Adds AI-based Personal Recommendations to Browser tells us more. Fueling this feature is Yandex’s personalized content recommendation technology called Zen, which selects articles, videos, images and more for its infinite content stream. This is the first time personally targeted content will appear in new tabs for the user. The press release offers a description of the new feature,
The intelligent content discovery feed in Yandex Browser delivers personal recommendations based on the user’s location, browsing history, their viewing history and preferences in Zen, among hundreds of other factors. Zen uses natural language processing and computer vision to understand the verbal and visual content on the pages the user has viewed, liked or disliked, to offer them the content they are likely to like. To start exploring this new internet experience, all one needs to do is download Yandex Browser and give Zen some browsing history to work with. Alternatively, liking or disliking a few websites on Zen’s start up page will help it understand your preferences on the outset.
The world of online search and information discovery is ever-evolving. For a preview of the new Yandex feature, go to their demo. This service works on all platforms in 24 different countries and in 15 different languages. The design of this feature implies people want to actually read all of their recommended content. Whether that’s the case or not, whether Zen is accurate enough for the design to be effective, time will tell.
Megan Feil, September 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/DarkWeb meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/