Superior Customer Service Promised through the Accenture Virtual Agent Amelia

August 17, 2016

The article titled Accenture Forms New Business Unit Around IPsoft’s Amelia AI Platform on ZDNet introduces Amelia as a virtual agent capable of providing services in industries such as banking, insurance, and travel. Amelia looks an awful lot like Ava from the film Ex Machina, wherein an AI robot manipulates a young programmer by appealing to his empathy. Similarly, Accenture’s Amelia is supposed to be far more expressive and empathetic than her kin in the female AI world such as Siri or Amazon’s Alexa. The article states,

“Accenture said it will develop a suite of go-to-market strategies and consulting services based off of the Amelia platform…the point is to appeal to executives who “are overwhelmed by the plethora of technologies and many products that are advertising AI or Cognitive capabilities”…For Accenture, the formation of the Amelia practice is the latest push by the company to establish a presence in the rapidly expanding AI market, which research firm IDC predicts will reach $9.2 billion by 2019.”

What’s that behind Amelia, you ask? Looks like a parade of consultants ready and willing to advise the hapless executives who are so overwhelmed by their options. The Amelia AI Platform is being positioned as a superior customer service agent who will usher in the era of digital employees.

Chelsea Kerwin, August 17, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

SEO Is a Dirty Web Trick

August 17, 2016

Search engine optimization is the bane of Web experts.  Why?  If you know how to use it you can increase your rankings in search engines and drive more traffic to your pages, but if you are a novice at SEO you are screwed.  Search Engine Land shares some bad SEO stories in “SEO Is As Dirty As Ever.”

SEO has a bad reputation in many people’s eyes, because it is viewed as a surreptitious way to increase traffic.  However, if used correctly SEO is not only a nifty trick, but is a good tool.  As with anything, however, it can go wrong.  One bad SEO practice is using outdated techniques like keyword stuffing, copying and pasting text, and hidden text.  Another common mistake is not having a noindex tag, blocking robots, JavaScript frameworks not being indexed.

Do not forget other shady techniques like the always famous shady sales, removing links, paid links, spam, link networks, removing links, building another Web site on a different domain, abusing review sites, and reusing content.  One thing to remember is that:

“It’s not just local or niche companies that are doing bad things; in fact, enterprise and large websites can get away with murder compared to smaller sites. This encourages some of the worst practices I’ve ever seen, and some of these companies do practically everything search engines tell them not to do.”

Ugh! The pot is identifying another pot and complaining about its color and cleanliness.

 

Whitney Grace, August 17, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

IBM’s Champion Human Resources Department Announces “Permanent” Layoff Tactics

August 16, 2016

The article on Business Insider titled Leaked IBM Email Says Cutting “Redundant” Jobs Is a “Permanent and Ongoing” Part of Its Business Model explores the language and overall human resource strategy of IBM. Netherland IBM personnel learned in the email that layoffs are coming, but also that layoffs will be a regular aspect of how IBM “optimizes” their workforce. The article tells us,

“IBM isn’t new to layoffs, although these are the first to affect the Netherlands. IBM’s troubled business units, like its global technology services unit, are shrinking faster than its booming businesses, like its big data/analytics, machine learning (aka Watson), and digital advertising agency are growing…All told, IBM eliminated and gained jobs in about equal numbers last year, it said. It added about 70,000 jobs, CEO Rometty said, and cut about that number, too.”

IBM seems to be performing a balancing act that involves gaining personnel in areas like data analytics while shedding employees in other areas that are less successful, or “redundant.” This allows them to break even, although the employees that they fire might feel that Watson itself could have delivered the news more gracefully and with more tact than the IBM HR department did. At any rate, we assume that IBM’s senior management asked Watson what to do and that this permanent layoffs strategy was the informed answer provided by the supercomputer.

 

 
Chelsea Kerwin, August 16, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

 

Content Cannot Be Searched If It Is Not There

August 16, 2016

Google Europe is already dealing with a slew of “right to be forgotten” requests, but Twitter had its own recent fight with deletion related issue.  TechCrunch shares the story about “Deleted Tweet Archive PostGhost Shut Down After Twitter Cease And Desist” order.  PostGhost was a Web site that archived tweets from famous public figures.  PostGhost gained its own fame for recording deleted tweets.

The idea behind PostGhost was to allow a transparent and accurate record.  The Library of Congress already does something similar as it archives every Tweet.  Twitter, however, did not like PostGhost and sent them a cease and desist threatening to remove their API access.  Apparently,Google it is illegal to post deleted tweets, something that evolved from the European “right to be forgotten” laws.

So is PostGhost or Twitter wrong?

“There are two schools of thought when something like this happens. The first is that it’s Twitter’s prerogative to censor anything and all the things. It’s their sandbox and we just play in it.  The second school of thought says that Twitter is free-riding on our time and attention and in exchange for that they should work with their readers and users in a sane way.”

Twitter is a platform for a small percentage of users, the famous and public figures, who instantly have access to millions of people when they voice their thoughts.  When these figures put their thoughts on the Internet it has more meaning than the average tweet.  Other Web sites do the same, but it looks like public figures are exempt from this rule.  Why?  I am guessing money is exchanging hands.

 

Whitney Grace, August 16, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

As a.I. Scientists Forge Ahead Teaching Robots to Hunt Prey, White House Discusses Regulations And “Understandings”

August 15, 2016

The article on Engadget titled Scientists Are Teaching Robots How to Hunt Down Prey marks advancements in artificial intelligence that may well feed into an A.I. arms race. The scientists working on this project at the University of Zurich see their work in a much less harmful way. The ability to search for and retrieve prey involves identifying and tracking a target. Some of the applications mentioned are futuristic shopping carts or luggage that can follow around its owner. Whether the scientists are experiencing severe tunnel vision or are actually just terrifically naïve is unknown. The article explains,

“The predator robot’s hardware is actually modeled directly after members of the animal kingdom, as the robot uses a special “silicon retina” that mimics the human eye. Delbruck is the inventor, created as part of the VISUALISE project. It allows robots to track with pixels that detect changes in illumination and transmit information in real time instead of a slower series of frames like a regular camera uses.”

Meanwhile, conversations about an A.I. arms race are also occurring, as illustrated by the article on ZDNet titled White House: We’re “Clear-Eyed” About Weaponizing A.I. Humans have a long history of short-sightedness when it comes to weapons technology, perhaps starting with the initial reasoning behind the invention of dynamite. The creator stated that he believed he had created a weapon so terrible that no one would ever dare use it. Obviously, that didn’t work out. But the White House Chief of Staff, Denis McDonough, claims that by establishing a “code of conduct and set of understandings” we can prevent a repetition of history. Commencing eyebrow raise.
Chelsea Kerwin, August 15, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

Snowden Makes Rare Comment on Putin’s Politics

August 15, 2016

I off hand heard a comment from someone living in Russia that President Vladimir Putin was returning the country to a time resembling the Soviet days.  To my western ears, that does not sound good.  Things are about to get worse for Russian citizens due to a new law the government signed into law.  Yahoo Tech reports in the article that “Putin Signs Controversial Anti-Terror Measures Into Law” that these new laws are meant to be anti-terror laws, but are better referred to as “Big Brother” laws.

The new laws give the government greater surveillance powers of its citizens.  This means that under the guise of providing extra security communications-based companies will be forced to store people’s calls, messages, photos, videos, and metadata for three years.  The companies must also allow security services full access to all the data and any encryption tools necessary.  It gets even worse:

“They also criminalise several offences, lower the age of criminal responsibility to 14 for some crimes and extend prison sentences for online crimes like abetting terrorism.  The passage of the bills through Russia’s lower and upper houses of parliament sent shockwaves through the internet and telecoms industries.”

Communications-based companies are worried that the new laws will cut into their profit margins.  It is predicted that the new infrastructure necessary to store the massive amount of data will cost four times the industry’s annual profit.  It is recommended that a tax on the entire industry, then use that money to build the infrastructure would be a better option.

The US whistleblower Edward Snowden, currently in Russia for asylum, made a rare comment on Russia’s politics via Twitter about the new laws:

“ ‘Signing the #BigBrother law must be condemned,’ he said, adding that he would criticise the law despite fearing retaliation from Russian authorities.”

Snowden wrote what is already written on the wall when it comes to Russia: Putin is changing the country for the worse and it is scary to imagine where it will go next.

 

Whitney Grace, August 15, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

These Are the False Records of the Starship Google

August 12, 2016

Star Trek technology was/is designed by prop masters and special effects artists based on preconceived notations of the time.  The original Trek series ran on analog, while the franchise reboot has holograms and streamlined ships free of the 1960s “groovy” design.  Google wants to make Star Trek technology a reality and in manner ways they have with a search engine and a digital assistant that responds to vocal commands.  Is Google getting too big for its britches, however?  STAT asked the question in its story, “’Silicon Valley Arrogance’?  Google Misfires As It Strives To Turn Star Trek Fiction Into Reality.”

Google wanted to create the Star Trek tricorder, a handheld computer that records, scans, and processes any type of data from soil samples to medical information.  Google created a biotech venture, Verily Life Sciences, to invent a cancer scanning tricorder, but the project is not doing so well.  The cancer tricorder is only one example of Google’s misfire in medical technology.  Verily appears to be working on projects that are more in the realm of science fantasy and are used as marketing devices to promote Google as the “technology company of the future.”

Google wants to maker new scientific inroads in medical technology, pulling on their expertise with big data and their initiative:

“’Part of the Silicon Valley ethos is about changing the world, about disruptive technology, about ignoring existing business models,’ and ‘taking on grand challenges,’ …

‘That’s admirable,’…but in Verily’s case, ‘it also feels pretty quixotic.’”

Fantasy drives innovation, which is why science fiction series like Star Trek are inspiration.  Much of the technology from the original Trek series and later installations are available now, but we are still far from making everything from the show a reality.  We should not halt experimentation on new technology, but big claims like Google’s are probably best kept silent until there is a working prototype.

 

Whitney Grace, August 12, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

No Dark Web Necessary

August 11, 2016

Do increased Facebook restrictions on hate speech and illegal activity send those users straight to the Dark Web? From The Atlantic comes and article entitled, American Neo-Nazis Are on Russia’s Facebook, which hints that is not always the case. This piece explains that location of an online group called “United Aryan Front” moved from Facebook to a Russia’s version of Facebook: VKontakte. The article describes a shift to cyber racism,

The move to VK is part of the growing tendency of white supremacists to interact in online forums, rather than through real-life groups like the KKK, according to Heidi Beirich, director of the Southern Poverty Law Center’s anti-terror Intelligence Project. Through the early 2000s, skinheads and other groups would host dozens of events per year with hundreds of attendees, she says, but now there are only a handful of those rallies each year. “People online are talking about the same kinds of things that used to happen at the rallies, but now they’re doing it completely through the web,” she said.

It is interesting to consider the spaces people choose, or are forced into, for conducting ill-intentioned activities. Even when Facebook cracks down on it, hate speech amongst other activities is not relegated solely to the Dark Web. While organized online hate speech analogous to rallies may be experiencing a surge in the online world, rallies are not the only avenue for real-world racism. At the core of this article, like many we cover on the Dark Web, is a question about the relationship between place and malicious activity.

 

Megan Feil, August 11, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden/Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

The Reach of Cyber Threat Intelligence Companies

August 10, 2016

The social media monitoring complex appears to be gaining a follower. LittleSis News shared an article highlighting their investigative findings, You are being followed: The business of social media surveillance. This post not only reveals the technology companies engaged in surveillance and developing tools for surveillance, those at LittleSis News also filed freedom of information requests to twenty police departments about their social media monitoring. The article concludes with,

“Because social media incites within us a compulsion to share our thoughts, even potentially illegal ones, law enforcement sees it as a tool to preempt behavior that appears threatening to the status quo. We caught a glimpse of where this road could take us in Michigan, where the local news recently reported that a man calling for civil unrest on Facebook because of the Flint water crisis was nearly the target of a criminal investigation. At its worst, social media monitoring could create classes of “pre-criminals” apprehended before they commit crimes if police and prosecutors are able to argue that social media postings forecast intent. This is the predictive business model to which Geofeedia CEO Phil Harris aspires.”

In addition to Geofeedia, the other cyber threat intelligence companies listed are: BrightPlanet, ZeroFOX, Intrado, LifeRaft, Magnet Forensics, Media Sonar Technologies, Signal Corporation Limited. These companies specialize in everything from analyzing deep web content to digital forensics software. Ultimately data is their specialty, not people. These technologies and their applications will undoubtedly stir up questions about the relationship between people, the data they produce on social media, and state actors.

 

Megan Feil, August 10, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden/Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

Dark Web Purchases Potentially More Challenging Than Media Portrays

August 8, 2016

German TV journalists recently discovered acquiring weapons on the Dark Web may be more challenging than media coverage suggests. Vice’s Motherboard published an article on this called TV Journalists Try Buying AK-47 on Dark Web, Fail. Producers for German channel ARD, working for a show “Fear of terror—how vulnerable is Germany” lost about $800 in bitcoin during the attempted transaction through a middleman. We learned,

“It’s not totally clear if this was because the seller wasn’t legitimate, or whether the package had been intercepted. Regardless, this shouldn’t be much of a surprise: The dark web gun trade is rife with scammers. One con-artist previously told Motherboard he would ask legal sellers to send him photos of weapons next to a piece of paper with his username. From here, he would “just send a bag of sugar,” when an order came in. And undercover law enforcement agents also sell weapons in order to identify potential customers.”

Motherboard is careful to reference cases of successful Dark Web gun sales. Not that readers would be so quick to assume guns cannot be easily purchased on the Dark Web after seeing numerous media coverage that is the case. For the average reader, is the knowledge of the Dark Web from media or personal experience? We see a lot of articles reporting number of web sites that exist, perhaps because of the inability to accurately report a number of users on the Dark Web. While that may not be retrievable, perhaps the number of Tor downloads may be.

 

Megan Feil, August 8, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta