Big Data Processing Is Relative to Paradigm of Today
September 7, 2016
The size and volume that characterizes an information set as big data — and the tools used to process — is relative to the current era. A story from NPR reminds us of this as they ask, Can Web Search Predict Cancer? Promise And Worry Of Big Data And Health. In 1600’s England, a statistician essentially founded demography by compiling details of death records into tables. Today, trends from big data are drawn through a combination of assistance from computer technology and people’s analytical skills. Microsoft scientists conducted a study showing that Bing search queries may hold clues to a future diagnosis of pancreatic cancer.
The Microsoft scientists themselves acknowledge this [lack of comprehensive knowledge and predictive abilities] in the study. “Clinical trials are necessary to understand whether our learned model has practical utility, including in combination with other screening methods,” they write. Therein lies the crux of this big data future: It’s a logical progression for the modern hyper-connected world, but one that will continue to require the solid grounding of a traditional health professional, to steer data toward usefulness, to avoid unwarranted anxiety or even unnecessary testing, and to zero in on actual causes, not just correlations within particular health trends.”
As the producers of data points in many social-related data sets, and as the original analyzers of big data, it makes sense that people remain a key part of big data analytics. While this may be especially pertinent in matters related to health, it may be more intuitively understood in this sector in contrast to others. Whether health or another sector, can the human variable ever be taken out of the data equation? Perhaps such a world will give rise to whatever is beyond the current buzz around the phrase big data.
Megan Feil, September 7, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/Dark Web meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Social Media Snooping Site Emerges for Landlord and Employers
September 2, 2016
The promise of unlocking the insights in big data is one that many search and analytics companies make. CNet shares the scoop on a new company: Disturbing new site scrapes your private Facebook and informs landlords, employers. Their website is Score Assured and it provides a service as an intermediary between your social media accounts and your landlord. Through scanning every word you have typed on Facebook, Twitter, LinkedIn or even Tinder, this service will then filter all the words through a neuro-linguistic programming tool to provide a report on your reputation. We learned,
There’s no reason to believe that Score Assured’s “analysis” will offer in any way an accurate portrayal of who you are or your financial wherewithal. States across the country are already preparing or enacting legislation to ensure that potential employers have no right to ask for your password to Facebook or other social media. In Washington, for example, it’s illegal for an employer to ask for your password. Score Assured offers landlords and employers (the employer service isn’t live yet) the chance to ask for such passwords slightly more indirectly. Psychologically, the company is preying on a weakness humans have been displaying for some time now: the willingness to give up their privacy to get something they think they really want.
Scraping and finding tools are not new, but could this application be any more 2016? The author of this piece is onto the zeitgeist of “I’ve got nothing to hide.” Consequently, data — even social data — becomes a commodity. Users’ willingness to consent is the sociologically interesting piece here. It remains to be seen whether the data mining technology is anything special.
Megan Feil, September 2, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Intuitive Interfaces Matter on Dark Web Sites Too
September 1, 2016
Did you know some sites on the Dark Web have a sleek look and intuitive user experience? VeriClouds published this information, including screenshots and more in a piece called Dark Web: Sophisticated eCommerce platform trading in your personal information. Channels for cybercriminals allow users to search for Dark Web commodities such as personal or sensitive information by: category, product type, price, sale type, location and shipping options. Mirroring the processes and policies of traditional retail, some sellers also have refund options. The article states:
Platforms like these are so much more than just rudimentary command line setups or chat rooms. They offer many of the same features as online stores like Amazon or Ebay with vendor ratings, buyer feedback, detailed search options and facilitated transaction and delivery services. Collections of data are presented with detailed descriptions (similar to an ecommerce product pages), and some even provide tutorials on how to best utilize that data to scam victims.
On one level, this report shows us how much an intuitive user experience has become the expectation, not an added bonus — anywhere on the web. Related to this heightened expectation for even intangible “things” to have an effective look and feel, we are reminded this is the information age. As information is a commodity, it is no surprise to see the rise in cyber theft of such invisible goods on the Dark Web or otherwise. For example, as the article mentioned, last year’s estimate by the Federal Trade Commission showed 9.9 million victims of identity theft.
Megan Feil, September 1, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Google Enables Users to Delete Search History, Piece by Piece
August 31, 2016
The article on CIO titled Google Quietly Brings Forgetting to the U.S. draws attention to Google have enabled Americans to view and edit their search history. Simply visit My Activity and login to witness the mind-boggling amount of data Google has collected in your search career. To delete, all you have to do is complete two clicks. But the article points out that to delete a lot of searches, you will need an afternoon dedicated to cleaning up your history. And afterward you might find that your searches are less customized, as are your ads and autofills. But the article emphasizes a more communal concern,
There’s something else to consider here, though, and this has societal implications. Google’s forget policy has some key right-to-know overlaps with its takedown policy. The takedown policy allows people to request that stories about or images of them be removed from the database. The forget policy allows the user to decide on his own to delete something…I like being able to edit my history, but I am painfully aware that allowing the worst among us to do the same can have undesired consequences.
Of course, by “the worse among us” he means terrorists. But for many people, the right to privacy is more important than the hypothetical ways that terrorists will potentially suffer within a more totalitarian, Big Brother state. Indeed, Google’s claim that the search history information is entirely private is already suspect. If Google personnel or Google partners can see this data, doesn’t that mean it is no longer private?
Chelsea Kerwin, August 31, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Another Day Another Possible Data Breach
August 19, 2016
Has the next Ashley Madison incident happened? International Business Times reports on breached information that has surfaced on the Dark Web. The article, Fling.com breach: Passwords and sexual preferences of 40 million users up for sale on dark web, sheds some light on what happened in the alleged 40 million records posted on the The Real Deal marketplace. One source claims the leaked data was old information. Another source reports a victim who says they never had an account with Fling.com. The article states,
“The leak is the latest in a long line of dating websites being targeted by hackers and follows similar incidents at Ashley Madison, Mate1, BeautifulPeople and Adult Friend Finder. In each of these cases, hundreds of thousands – if not millions – of sensitive records were compromised. While in the case of Ashley Madison alone, the release of information had severe consequences – including blackmail attempts, high-profile resignations, and even suicide. Despite claims the data is five years old, any users of Fling.com are now advised to change their passwords in order to stay safe from future account exploitation.”
Many are asking about the facts related to this data breach on the Dark Web — when it happened and if the records are accurate. We’re not sure if it’s true, but it is sensational. The interesting aspect of this story is in the terms of service for Fling.com. The article reveals Fling.com is released from any liability related to users’ information.
Megan Feil, August 19, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/
Content Cannot Be Searched If It Is Not There
August 16, 2016
Google Europe is already dealing with a slew of “right to be forgotten” requests, but Twitter had its own recent fight with deletion related issue. TechCrunch shares the story about “Deleted Tweet Archive PostGhost Shut Down After Twitter Cease And Desist” order. PostGhost was a Web site that archived tweets from famous public figures. PostGhost gained its own fame for recording deleted tweets.
The idea behind PostGhost was to allow a transparent and accurate record. The Library of Congress already does something similar as it archives every Tweet. Twitter, however, did not like PostGhost and sent them a cease and desist threatening to remove their API access. Apparently,Google it is illegal to post deleted tweets, something that evolved from the European “right to be forgotten” laws.
So is PostGhost or Twitter wrong?
“There are two schools of thought when something like this happens. The first is that it’s Twitter’s prerogative to censor anything and all the things. It’s their sandbox and we just play in it. The second school of thought says that Twitter is free-riding on our time and attention and in exchange for that they should work with their readers and users in a sane way.”
Twitter is a platform for a small percentage of users, the famous and public figures, who instantly have access to millions of people when they voice their thoughts. When these figures put their thoughts on the Internet it has more meaning than the average tweet. Other Web sites do the same, but it looks like public figures are exempt from this rule. Why? I am guessing money is exchanging hands.
Whitney Grace, August 16, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/
The Reach of Cyber Threat Intelligence Companies
August 10, 2016
The social media monitoring complex appears to be gaining a follower. LittleSis News shared an article highlighting their investigative findings, You are being followed: The business of social media surveillance. This post not only reveals the technology companies engaged in surveillance and developing tools for surveillance, those at LittleSis News also filed freedom of information requests to twenty police departments about their social media monitoring. The article concludes with,
“Because social media incites within us a compulsion to share our thoughts, even potentially illegal ones, law enforcement sees it as a tool to preempt behavior that appears threatening to the status quo. We caught a glimpse of where this road could take us in Michigan, where the local news recently reported that a man calling for civil unrest on Facebook because of the Flint water crisis was nearly the target of a criminal investigation. At its worst, social media monitoring could create classes of “pre-criminals” apprehended before they commit crimes if police and prosecutors are able to argue that social media postings forecast intent. This is the predictive business model to which Geofeedia CEO Phil Harris aspires.”
In addition to Geofeedia, the other cyber threat intelligence companies listed are: BrightPlanet, ZeroFOX, Intrado, LifeRaft, Magnet Forensics, Media Sonar Technologies, Signal Corporation Limited. These companies specialize in everything from analyzing deep web content to digital forensics software. Ultimately data is their specialty, not people. These technologies and their applications will undoubtedly stir up questions about the relationship between people, the data they produce on social media, and state actors.
Megan Feil, August 10, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden/Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/
Technology: The New Dr. Evil in the Digital Dark Age
August 9, 2016
When I ride my mule down the streets of Harrod’s Creek, I marvel at the young folks who walk while playing with their mobile phones. Heading home after buying oats for Melissa, I look forward to my kerosene lamps.
Technology does not frighten me. I find technology and the whiz kids amusing. I read “Technology Is Now Pop Culture’s Favorite Enemy.” Goodness. I find gizmos and bits fun. The write up suggests that fun loving, top one percenters in education and wealth are finding themselves at the wrong end of a varmint trap.
I find it interesting that technology, which some folks in big cities believe is the way out of a gloomy tunnel, is maybe not flowers, butterflies, and rainbows. (The unicorns have taken to the woods it seems. No unicorns at the moment.)
I learned:
The ubiquitous nature of futuristic technology has lead to an exponential increase in our distrust of each other and the products we use, but most interesting, has taken away some of the blame from government bodies and corporations. We no longer fear agency bodies as much as we fear the physical technology they use.
That seems harsh. I like the phrase, “We’re from the government and here to help you.” Don’t you?
The write up adds a philosophical note:
Despite us being more savvy of how to use social media or despite us having a better understanding of how computers work in general, most of us still aren’t fluent in how it all fits together. We give so much of ourselves over to our devices, and we don’t ask for much in return. When we give something that inanimate that much control over us, it’s terrifying to think that we’re willingly giving up our freedom.
Let’s think about technology in terms of public Web search. One plugs a query into a system. The system returns a list of results; that is, suggestions where information related to the query may be found.
But what is happening is that the person reviewing the outputs does not have to ask, “Are these results accurate? Are they advertising? Are they comprehensive?” There is another question as well, “Is the information objective?” And what about, “Is the information accurate; that is, verifiable?”
The search systems perform another magic trick. The user becomes a content input. This means that the person with access to the queries as a group or the query subset related to a particular individual has new information. In my experience, knowledge is power, and the folks using the search system do not generally have access to this information.
Asymmetry results. The technology outfits offering service have more information than the users. Search does more to illuminate the dark corners of those using the search system than the results of a search illuminate the user’s mind.
Without the inclination to figure out what’s valid and what’s not or lacking the expertise to perform this type of search results vetting, the users become the used.
That sounds philosophical but there is a practical value to the observation. Without access and capability, the information presented becomes a strong influence on how one thinks, views facts, and has behavior influenced.
My thought is, “Welcome to the medieval world.” It is good to be a king or a queen. To be an information peasant is the opposite.
Giddy up, Melissa. Time to be heading back to the digital hollow to think about the new digital Dr. Evil.
Stephen E Arnold, August 9, 2016
Jurors for Google v. Oracle Case Exposed to Major Privacy Violation Potential
August 1, 2016
The article titled Judge Doesn’t Want Google to Google the Favorite Books and Songs of Potential Jurors on Billboard provides some context into the difficulties of putting Google on trial. Oracle is currently suing Google for copyright violations involving a Java API code. The federal judge presiding over the case, William Alsup, is trying to figure out how to protect the privacy of the jurors from both parties—but mostly Google. The article quotes from Alsup,
“For example, if a search found that a juror’s favorite book is To Kill A Mockingbird, it wouldn’t be hard for counsel to construct a copyright jury argument (or a line of expert questions) based on an analogy to that work and to play upon the recent death of Harper Lee, all in an effort to ingratiate himself or herself into the heartstrings of that juror,” he writes. ” The same could be done… with any number of other juror attitudes…”
Alsup considered a straightforward ban on researching jurors, but this would put both sides’ attorneys at a disadvantage. Instead, Google and Oracle have until the end of the month to either consent to a voluntary ban, or agree to clearly inform the jurors of their intentions regarding social media research.
Chelsea Kerwin, August 1, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Environmental Big Data Applied to Sustainable Health Purchasing
July 29, 2016
The US healthcare system has some of the best medical procedures and practices in the world, but the governing system is a violent mess. One aspect tangled in the nightmare is purchasing. Wharton University explains how big data can improve sustainability in everything in purchasing in everything from drugs to cleaning supplies: “The Four A’s: Turning Big Data Into Useful Information.”
The health care system is one of the biggest participants in group purchasing organizations (GPOs). One significant downplayed feature that all GPOs share is its green product usage. GPOs rely on using green products to cut back on waste and cost (in some cases), however, they could do more if they had access to environmental big data. It helps the immediate bottom line, but it does more for the future:
“Longer term, it makes good business sense for hospitals and clinics, which spend so much battling environmentally caused illnesses, to reduce, and where possible eliminate, the chemicals and other pollutants that are damaging their patients’ health. That is precisely why Premier’s GreenHealthy program is eager to move beyond price alone and take EPP into consideration. ‘Price doesn’t give us the whole story,’ said [Kevin Lewis, national program coordinator for the GreenHealthy division of Premier Inc]. ‘Our prime concern is making our patients safer.’”
Individual health service providers, however, do not have access to certain healthcare metrics and data, unless they ask for it from manufacturers/supplies. Even worse is that the health metrics data is often outdated.
The GPOs and the health providers could work together to exchange information to keep all data along the supply chain updated. It would create a sustainability chain that would benefit the environment and the bottom line.
Whitney Grace, July 29, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph