Facebook Exploits Dark Web to Avoid Local Censorship

March 9, 2016

The article on Nextgov titled Facebook Is Giving Users a New Way to Access It On the ‘Dark Web’ discusses the lesser-known services of the dark web such as user privacy. Facebook began taking advantage of the dark web in 2014, when it created a Tor address (recognizable through the .onion ending.) The article explains the perks of this for global Facebook users,

“Facebook’s Tor site is one way for people to access their accounts when the regular Facebook site is blocked by governments—such as when Bangladesh cut off access to Facebook, its Messenger and Whatsapp chat platforms, and messaging app Viber for about three weeks in November 2015. As the ban took effect, the overall number of Tor users in Bangladesh spiked by about 10 times, to more than 20,000 a day. When the ban was lifted, the number dropped..”

Facebook has encountered its fair share of hostility from international governments, particularly Russia. Russia has a long history of censorship, and has even clocked Wikipedia in the past, among other sites. But even if a site is not blocked, governments can still prevent full access through filtering of domain names and even specific keywords. The Tor option can certainly help global users access their Facebook accounts, but however else they use Tor is not publicly known, and Facebook’s lips are sealed.

 

Chelsea Kerwin, March 9, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

A Place to Express Yourself on the Dark Web

March 7, 2016

For evidence that the dark web is not all about drugs and cybercrime, check out this article at Motherboard: “The Dark Web Now Has a Literary Journal.” As it turns out, anonymity is also good for people who wish to freely explore their creativity and private thoughts.

The new journal, the Torist, was just launched by a professor at the University of Utah, Robert W. Ghel, and a person known simply as GMH. Inspired by the free discussions on their dark-web-based social network, Galaxy, they have seized their chance to create something unexpected. The journal’s preface asks:

“If a magazine publishes itself via a Tor hidden service, what does the creative output look like? How might it contrast itself with its clearweb counterparts? Who indeed will gravitate towards a dark web literary magazine?”

So, why is one of the Torist’s creators anonymous while the other is putting himself out there? Writer Joseph Cox tells us:

Gehl, after being pitched the idea of The Torist by GMH, decided to strip away his pseudonym, and work on the project under his own name. “I thought about that for a while,” Gehl said. “I thought that because GMH is anonymous/pseudonymous, and he’s running the servers, I could be a sort of ‘clear’ liason.”

So while Gehl used his name, and added legitimacy to the project in that way, GMH could continue to work with the freedom the anonymity awards. “I guess it’s easier to explore ideas and not worry as much how it turns out,” said GMH, who described himself as someone with a past studying the humanities, and playing with technology in his spare time.

Gehl and GMH say part of their reasoning behind the journal is to show people that anonymity and encryption can be forces for good. Privacy furthers discussion of controversial, personal, and difficult topics and, according to GMH, should be the default setting for all communications, especially online.

Submissions are currently being accepted, so go ahead and submit that poem or essay if you have something to get off your chest, anonymously. If you dare to venture into the dark web, that is.

 

Cynthia Murrell, March 7, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Encryption and Rap Lyrics

March 6, 2016

I read “Gang Used Rap Lyrics to Discuss Guns.” According to the write up:

Members of a gang, accused of smuggling automatic weapons into the UK by boat, used lyrics from a song by rapper the Notorious B.I.G. to discuss their arrival, a court has heard.

The write up added:

The Gimme the Loot lyrics were included in a message from Mr Defraine which read: “I’m ready to got this paper g you with me… my pockets looking kinda tight and I’m stressed yo munky let me get the vest”.

Argot can be a challenge for search and content processing. Were those $5,000 teddy bears on eBay really teddy bears?

Nope. Kinda munky maybe?

Stephen E Arnold, March 6, 2016

The FBI Uses Its Hacking Powers for Good

March 4, 2016

In a victory for basic human decency, Engadget informs us, the “FBI Hacked the Dark Web to Bust 1,500 Pedophiles.” Citing an article at Vice Motherboard, writer Jessica Conditt describes how the feds identified their suspects through a site called (brace yourself) “Playpen,” which was launched in August 2014. We learn:

Motherboard broke down the FBI’s hacking process as follows: The bureau seized the server running Playpen in February 2015, but didn’t shut it down immediately. Instead, the FBI took “unprecedented” measures and ran the site via its own servers from February 20th to March 4th, at the same time deploying a hacking tool known internally as a network investigative technique. The NIT identified at least 1,300 IP addresses belonging to visitors of the site.

“Basically, if you visited the homepage and started to sign up for a membership, or started to log in, the warrant authorized deployment of the NIT,” a public defender for one of the accused told Motherboard. He said he expected at least 1,500 court cases to stem from this one investigation, and called the operation an “extraordinary expansion of government surveillance and its use of illegal search methods on a massive scale,” Motherboard reported.

Check out this article at Wired to learn more about the “network investigative technique” (NIT). This is more evidence that, if motivated, the FBI is perfectly capable of leveraging the Dark Web to its advantage. Good to know.

 

Cynthia Murrell, March 4, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

If You See Something, Say Something Adopts New Cybersecurity Meaning

March 4, 2016

A post-9/11 campaign for increasing security awareness will inform a similar public service announcement campaign to bring cybersecurity top of mind. See something suspicious online? Homeland Security wants to know about it published by NextGov reports on this 2016 Department of Homeland Security initiative. The decision to launch this campaign comes from an IDC recommendation; the US lacks a culture of cybersecurity concern, unlike Israel, according to the article. While $1 million is allotted for this campaign, the article describes bigger future plans,

“Last week, the Obama administration rolled out a new Cybersecurity National Action Plan, which establishes a new public commission on cybersecurity and proposes billions in new funding to upgrade hard-to-secure legacy IT systems in use at federal agencies, among several other steps.”

This year’s cybersecurity public and private sector awareness campaign was modeled after the  “If You See Something, Say Something” campaign rolled out after September 11. However, this is not Homeland Security’s first attempt at educating the public about cybersecurity. The department has sponsored October as National Cybersecurity Awareness Month since 2004. As the article mentions, previous educational efforts have not appeared to influence culture. It would be interesting to know what metrics they are using to make that claim.

 

Megan Feil, March 4, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Delve Is No Jarvis

March 3, 2016

A podcast at SearchContentManagement, “Is Microsoft Delve Iron Man’s Edwin Jarvis? No Way,” examines the ways Delve has yet to live up to its hype. Microsoft extolled the product when it was released as part of the Office 365 suite last year. As any developer can tell you, though, it is far easier to market than deliver polished software. Editor Lauren Horwitz explains:

“While it was designed to be a business intelligence (BI), enterprise search and collaboration tool wrapped into one, it has yet to make good on that vision. Delve was intended to be able to search users’ documents, email messages, meetings and more, then serve up relevant content and messages to them based on their content and activities. At one level, Delve has failed because it hasn’t been as comprehensive a search tool as it was billed. At another level, users have significant concerns about their privacy, given the scope of documents and activities Delve is designed to scour. As BI and SharePoint expert Scott Robinson notes in this podcast, Delve was intended to be much like Edwin Jarvis, butler and human search tool for Iron Man’s Tony Stark. But Delve ain’t no Jarvis, Robinson said.”

So, Delve was intended to learn enough about a user to offer them just what they need when they need it, but the tool did not tap deeply enough into the user’s files to effectively anticipate their needs. On top of that, it’s process is so opaque that most users don’t appreciate what it is doing, Robinson indicated. For more on Delve’s underwhelming debut, check out the ten-minute podcast.

 

Cynthia Murrell, March 3, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Stolen Online Account Info Now More Valuable than Stolen Credit Card Details

March 2, 2016

You should be aware that criminals are now less interested in your credit cards and other “personally identifiable information” and more keen on exploiting your online accounts. As security firm Tripwire informs us in their State of Security blog, “Stolen Uber, PayPal Accounts More Coveted than Credit Cards on the Dark Web.” Writer Maritza Santillan explains:

“The price of these stolen identifiers on the underground marketplace, or ‘the Dark Web,’ shows the value of credit cards has declined in the last year, according to security firm Trend Micro. Last week, stolen Uber account information could be found on underground marketplaces for an average of $3.78 per account, while personally identifiable information, such as Social Security Numbers or dates of birth, ranged from $1 to $3.30 on average – down from $4 per record in 2014, reported CNBC. Furthermore, PayPal accounts – with a guaranteed balance of $500 –were found to have an average selling price of $6.43. Facebook logins sold for an average of $3.02, while Netflix credentials sold for about 76 cents. By contrast, U.S.-issued credit card information, which is sold in bundles, was listed for no more than 22 cents each, said CNBC.”

The article goes on to describe a few ways criminals can leverage these accounts, like booking Uber “ghost rides,” or assembling personal details for a very thorough identity theft. Pros say the trend means service providers to pay closer attention to usage patterns, and to beef up their authentication processes. Specifically, says Forrester’s Andras Cser, it is time to move beyond passwords; instead, he proposes, companies should look for changes in biometric data, like phone position and finger pressure, which would be communicated back to them by our mobile devices. So we’re about to be even more closely monitored by the companies we give our money to. All for our own good, of course.

 

Cynthia Murrell, March 2, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

IBM Continued to Brag About Watson, with Decreasing Transparency

February 29, 2016

A totally objective article sponsored by IBM on Your Story is titled How Cognitive Systems Like IBM Watson Are Changing the Way We Solve Problems. The article basically functions to promote all of the cognitive computing capabilities that most of us are already keenly aware that Watson possesses, and to raise awareness for the Hackathon event taking place in Bengaluru, India. The “article” endorses the event,

“Participants will have an unprecedented opportunity to collaborate, co-create and exchange ideas with one another and the world’s most forward-thinking cognitive experts. This half-day event will focus on sharing real-world applications of cognitive technologies, and allow attendees access to the next wave of innovations and applications through an interactive experience. The program will also include panel discussions and fireside chats between senior IBM executives and businesses that are already working with Watson.”

Since 2015, the “Watson for Oncology” program has involved Manipal Hospitals in Bengaluru, India. The program is the result of a partnership between IBM and Memorial Sloan Kettering Cancer Center in New York. Watson has now consumed almost 15 million pages of medical content from textbooks and journals in the hopes of providing rapid-fire support to hospital staffers when it comes to patient records and diagnosis. Perhaps if IBM put all of their efforts into Watson’s projects instead of creating inane web content to promote him as some sort of missionary, he could have already cured cancer. Or not.

 

Chelsea Kerwin, February 29, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Intersection of the Criminal, Law Enforcement and Technology Industries

February 26, 2016

A ZDNet article covers Arrests made over Bitcoin laundering scheme, Dark Web drug deals

Dutch police made several arrests related to laundering of criminal profits orchestrated through an unindexed section of the web called the Dark Web. The article says suspects allegedly laundered up to 20 million euros from online drug deals. With the information originating from Reuters, this article summarizes the arrests made by Dutch Fiscal Information and Investigation Service and public prosecution department:

“According to the publication, some of the men arrested are traders, while others are “Bitcoin cashers” — traders of Bitcoin online who cash these funds then withdraw money from ATMs. It is possible to find cashers online who run shadow services which exchange “dirty” coins for clean currency. Law enforcement in the United States, Australia, Lithuania and Morocco also participated in the raid.”

Just as criminal offenses are taking place increasingly online, so too must the law enforcement industry have turn to technology to aid its efforts. As the case unfolds, it will be interesting to uncover how these suspects were identified. Perhaps something innovative will be at the source.

 

Megan Feil, February 26, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Startup Semantic Machines Scores Funding

February 26, 2016

A semantic startup looks poised for success with experienced  executives and a hefty investment, we learn from “Artificial Intelligence Startup Semantic Machines Raises $12.3 Million” at VentureBeat. Backed by investors from Bain Capital Ventures and General Catalyst Partners, the enterprise focuses on deep learning and improved speech recognition. The write-up reveals:

“Last year, Semantic Machines named Larry Gillick as its chief technology officer. Gillick was previously chief speech scientist for Siri at Apple. Now Semantic Machines is looking to go further than Siri and other personal digital assistants currently on the market. ‘Semantic Machines is developing technology that goes beyond understanding commands, to understanding conversations,’ the startup says on its website. ‘Our Conversational AI represents a powerful new paradigm, enabling computers to communicate, collaborate, understand our goals, and accomplish tasks.’ The startup is building tools that third-party developers will be able to use.”

Launched in 2014, Semantic Machines is based in Newton, Massachusetts, with offices in Berkeley and Boston. The startup is also seeking to hire a few researchers and engineers, in case anyone is interested.

 

Cynthia Murrell, February 26, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta