National Geographic Sells Out 

September 30, 2015

The National Geographic Society is one of the most respected institutes in regards to science and journalism related to nature.  For 127 years, National Geographic managed itself as a non-profit organization.  Buzzfeed reports that 21st Century Fox purchased National Geographic in the article, “Rupert Murdoch Is Buying National Geographic.”  Before you start getting upset that National Geographic has “sold out” in the same manner that Sesame Street has a new partnership with HBO, be aware that 21st Century Fox already owned and operated a joint-venture partnership with the company.

The bulk of National Geographic’s properties are being turned over to 21st Century Fox, who will manage them and allow the National Geographic Society to focus on:

“The National Geographic Society said the deal will let the foundation invest more money in sponsoring explorers and scientists. ‘The value generated by this transaction, including the consistent and attractive revenue stream that National Geographic Partners will deliver, ensures that we will have greater resources for this work, which includes our grant making programs,’ said CEO Gary Knell, in a statement.”

While National Geographic is still popular, it faces stiff competition from other news outlets that generate similar if not more content.  National Geographic wants to have better, modern storytelling “so that we may all know more of the world upon which we live.”

Hopefully this will free up more monies for scientific research, endeavors to protect endangered species, educational programs, and better ways to educate people on the natural world.

 

Whitney Grace, September 30, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Many Applications of Predictive Analytics

September 29, 2015

The article on Computer World titled Technology that Predicts Your Next Security Fail confers the current explosion in predictive analytics, the application of past occurrences to predict future occurrences. The article cites the example of the Kentucky Department of Revenue (DOR), which used predictive analytics to catch fraud. By providing SAS with six years of data the DOR received a batch of new insights into fraud indicators such as similar filings from the same IP address. The article imparts words of wisdom from SANS Institute instructor Phil Hagen,

“Even the most sophisticated predictive analytics software requires human talent, though. For instance, once the Kentucky DOR tools (either the existing checklist or the SAS tool) suspect fraud, the tax return is forwarded to a human examiner for review. “Predictive analytics is only as good as the forethought you put into it and the questions you ask of it,” Hagen warns….  Also It’s imperative that data scientists, not security teams, drive the predictive analytics project.”

In addition to helping the IRS avoid major fails like the 2013 fraudulent refunds totaling $5.8 billion, predictive analytics has other applications. Perhaps most interesting is its use protecting human assets in regions where kidnappings are common by detecting unrest and alerting organizations to lock up their doors. But it is hard to see limitations for technology that so accurately reads the future.

Chelsea Kerwin, September 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Accidental and On-Purpose Insider Threats in Federal Agencies Still Raging

September 28, 2015

The article on Eweek titled Insider Threats a Major Security Issue for Federal Agencies looks at the recent results of a MeriTalk survey investigating federal response to insider threats through interviewing federal IT managers. The results are shocking, with almost 30% of agencies acknowledging data lost to an insider threat in the last year and half of respondents claiming that unauthorized personnel commonly fail to observe protocols. Even worse, most agencies have no tracking in place to recognize what a staffer may have seen or shared, making them virtually incapable of following up on risky behavior in their employees. The article says,

“The most startling finding from the survey is the fact that 45 percent of agencies say they’ve been a target of an attack – malicious or unintentional – yet 50 percent still say employees do not follow all the protocols in place,” Steve O’Keeffe, founder of MeriTalk…”There is also a lack of agreement on the best solution.  Frequent, hands-on employee training is the key to preventing these incidents, as well as accountability. However, we are all human and people make mistakes.”

O’Keefe recommends the immediate and comprehensive adoption of better encryption and two-factor authentication to address the issue. But perhaps equally important is continuously updated training, and ongoing training, to avoid the common accidental insider threats.
Chelsea Kerwin, September 28, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Help Wanted: Chief Marketing Technology Officer

September 28, 2015

A new, indispensable position for companies is the chief technology officer or the chief information officer. Their primary responsibilities are to manage the IT department, implement new ways to manage information, and/or develop software as needed. There is a new position that companies will be creating in the future and the title is chief marketing technology officer, says Live Mint in “Make Way CIOS, CMOS: Here Comes The CMTO.”

Formerly the marketing and IT departments never mixed, except for the occasional social media collaboration. Marketers are increasing their reliance on technology to understand their customers and it goes far beyond social media. Marketers need to be aware of the growing trends in mobile shopping and search, digital analytics, gamification, online communities, and the power of user-generated content.

“The CMO’s role will graduate to CMTO, a marketer with considerable knowledge of technology. The CMTO, according to Nasscom, will not only conceptualize but also build solutions and lay down the technical and commercial specifications while working alongside the IT team on vendor selection.”

It is not enough to know how to market a product or promote an organization. Marketers need to be able to engage with technology and understand how to implement to attract modern customers and increase sales. In other words, evolving the current marketing position with a new buzzword.

Whitney Grace, September 28, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Play Serves as Make Up Letter from Google to China

September 18, 2015

The article titled Google’s Return to China Won’t Be Easy on VentureBeat discusses Google’s ambitions to revisit China with the help of Google Play, its Android mobile operating system app store. If you don’t remember, about five years ago Google refused to self-censor search results and pulled its services from China to boot. But Google can’t help looking longingly over its shoulder at the world’s largest Internet market. The article explains,

“Apple Inc complies with local laws and made $13.2 billion last quarter in Greater China…, making it its second-biggest market. Some in the industry doubt whether Google can use the Play store to help get its other services into China as domestic rivals are now well established and Google would have to comply with Chinese law. That would mean storing all data in China, and meeting information access and censorship requests, a thorny issue, particularly if the U.S. government gets involved.”

Obviously, China did not heed Google’s advice on reforming its approach to business and government oversight. Some argue that the focus on Google Play may make the movement toward China less threatening to Chinese regulators than their other services like search and Gmail. The article suggests the possibility that the lapse in Google’s presence in the market may be fatal to them there. The niche market has been working just fine, thank you very much, many mobile players believe. At any rate, Google’s hopes are a long shot unless they are willing to do it the Chinese way.

Chelsea Kerwin, September 18, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Brand-New Watson Health Unit Has Boston Buzzing

September 17, 2015

The article titled IBM Watson Health Unit Begins to Take Shape on TechCrunch investigates the work being done to initiate the new healthcare unit in Boston and surrounding community that IBM hopes to use to address major issues in healthcare. Already this year IBM has purchased and partnered with numerous companies in the field. Recently, Boston Children’s Hospital joined the list as well as Apple and Johnson & Johnson. The article states,

“As part of today’s broad announcement, IBM indicated that it would be working with Sage Bionetworks’ Open Biomedical Research Platform around the first Apple projects. Sage will be collecting information from Apple Devices using ResearchKit developer tools, initially with breast cancer and Parkinson’s patients. It will be aggregating storing, curating and analyzing the information coming in from the Apple Devices. IBM will be providing the underlying technology with its IBM Watson Health Cloud platform.”

Additionally, IBM Watson Health Cloud for Life Science Compliance was also announced, as the cherry built on top of IBM Softlayer. It is designed to aid companies in the life science industry with a fully compliant cloud solution capable of meeting the demands of the heavily regulated field. Not mentioned in the article is any mention of what the revenues are for this Health Unit initiative, as if they are entirely irrelevant.

Chelsea Kerwin, September 17, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Europol and FireEye Are Fighting Digital Crime

September 15, 2015

The Internet is a hotbed for crime and its perpetrators and Europol is one of the main organizations that fights it head on.  One the problems that Europol faces is the lack of communication between law enforcement agencies and private industry.  In a landmark agreement that will most likely be followed by others, The Inquirer reports “Europol and FireEye Have Aligned To Fight The International Cyber Menace.”

FireEye and Eurpol have signed a Memorandum of Understanding (MoU) where they will exchange information, so law enforcement agencies and private industry will be able to share information in an effort to fight the growing prevalence of cyber crime.  Europol is usually the only organization that disseminates information across law enforcement agencies.  FireEye is eager to help open the communication channels.

” ‘The threat landscape is changing every day and organizations need to stay one step ahead of the attackers,’ said Richard Turner, president for EMEA at FireEye.  ‘Working with Europol means that, as well as granting early access to FireEye’s threat intelligence, FireEye will be able to respond to requests for assistance around threats or technical indicators of compromise in order to assist Europol in combating the ever increasing threat from cyber criminals.’ ”

The MoU will allow for exchange of information about cyber crime to aid each other in prevention and analyze attach methods.  The Inquirer, however, suspects that information will only be shared one way.  It does not explain which direction, though.  The MoU is going to be a standard between Big Data companies and law enforcement agencies.  Law enforcement agencies are notorious for being outdated and understaffed; relying on information and software from private industry will increase cyber crime prevention.

Whitney Grace, September 15, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Content Matching Helps Police Bust Dark Web Sex Trafficking Ring

September 4, 2015

The Dark Web is not only used to buy and sell illegal drugs, but it is also used to perpetuate sex trafficking, especially of children.  The work of law enforcement agencies working to prevent the abuse of sex trafficking victims is detailed in a report by the Australia Broadcasting Corporation called “Secret ‘Dark Net’ Operation Saves Scores Of Children From Abuse; Ringleader Shannon McCoole Behind Bars After Police Take Over Child Porn Site.”  For ten months, Argos, the Queensland, police anti-pedophile taskforce tracked usage on an Internet bulletin board with 45,000 members that viewed and uploaded child pornography.

The Dark Web is notorious for encrypting user information and that is one of the main draws, because users can conduct business or other illegal activities, such as view child pornography, without fear of retribution.  Even the Dark Web, however, leaves a digital trail and Argos was able to track down the Web site’s administrator.  It turned out the administrator was an Australian childcare worker who had been sentenced to 35 years in jail for sexually abusing seven children in his care and sharing child pornography.

Argos was able to catch the perpetrator by noticing patterns in his language usage in posts he made to the bulletin board (he used the greeting “hiya”). Using advanced search techniques, the police sifted through results and narrowed them down to a Facebook page and a photograph.  From the Facebook page, they got the administrator’s name and made an arrest.

After arresting the ringleader, Argos took over the community and started to track down the rest of the users.

” ‘Phase two was to take over the network, assume control of the network, try to identify as many of the key administrators as we could and remove them,’ Detective Inspector Jon Rouse said.  ‘Ultimately, you had a child sex offender network that was being administered by police.’ ”

When they took over the network, the police were required to work in real-time to interact with the users and gather information to make arrests.

Even though the Queensland police were able to end one Dark Web child pornography ring and save many children from abuse, there are still many Dark Web sites centered on child sex trafficking.

 

Whitney Grace, September 4, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

 

Dark Web Drug Trade Unfazed by Law Enforcement Crackdowns

September 3, 2015

When Silk Road was taken down in 2013, the Dark Web took a big hit, but it was only a few months before black marketers found alternate means to sell their wares, including illegal drugs.  The Dark Web provides an anonymous and often secure means to purchase everything from heroin to prescription narcotics with, apparently, few worries about the threat of prosecution.  Wired explains that “Crackdowns Haven’t Stopped The Dark Web’s $100M Yearly Drug Sale,” proving that if there is a demand, the Internet will provide a means for illegal sales.

In an effort to determine if the Dark Web have grown to declined, Carnegie Mellon researchers Nicolas Cristin and Kyle Soska studied thirty-five Dark Web markets from 2013 to January 2015.  They discovered that the Dark Web markets are no longer explosively growing, but the market has remained stable fluctuating from $100 million to $180 million a year.

The researchers concluded that the Dark Web market is able to survive any “economic” shifts, including law enforcement crackdowns:

“More surprising, perhaps, is that the Dark Web economy roughly maintains that sales volume even after major disasters like thefts, scams, takedowns, and arrests. According to the Carnegie Mellon data, the market quickly recovered after the Silk Road 2 market lost millions of dollars of users’ bitcoins in an apparent hack or theft. Even law enforcement operations that remove entire marketplaces, as in last year’s purge of half a dozen sites in the Europol/FBI investigation known as Operation Onymous, haven’t dropped the market under $100 million in sales per year.”

Cristin and Soska’s study is the most comprehensive to measure the size and trajectory of the Dark Web’s drug market.  Their study ended prematurely, because two Web sites grew so big that the researchers’ software wasn’t able to track the content.  Their study showed that most Dark Web vendors are using more encryption tools, they make profits less $1000, and they are mostly selling MDMA and marijuana.

Soska and Cristin also argue that the Dark Web drug trade decreases violence in the retail drug trade, i.e. it keeps the transactions digital than having there be more violence on the streets.  They urge law enforcement officials to rethink shutting down the Dark Web markets, because it does not seem to have any effect.

Whitney Grace, September 3, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Does This Autonomous Nerf Gun Herald the Age of Killer Robots?

September 3, 2015

Well here’s something interesting that has arisen from HP’s “disastrous” $11 billion acquisition of Autonomy: check out this three-minute YouTube video: “See What You Can Create with HP IDOL OnDemand.” The fascinating footage reveals the product of developer Martin Zerbib’s “little project,” made possible with IDOL OnDemand and a Nerf gun. Watch as the system targets a specific individual, a greedy pizza grabber, a napping worker, and a thief. It seems like harmless fun, until you realize how gruesome this footage would be if this were a real gun.

It is my opinion that it is the wielders of weapons who should be held directly responsible for their misuse, not the inventors. Still, commenter “Dazed Confused” has a point when he rhetorically asks “What could possibly go wrong?” and links to an article in Bulletin of the Atomic Scientists, “Stopping Killer Robots and Other Future Threats.” That piece describes an agreement being hammered out that proposes to ban the development of fully autonomous weapons. Writer Seth Baum explains there is precedent for such an agreement: The Saint Petersburg Declaration of 1868 banned exploding bullets, and 105 countries have now ratified the 1995 Protocol on Blinding Laser Weapons. (Such laser weapons could inflict permanent blindness on soldiers, it is reasoned.) After conceding that auto-weaponry would have certain advantages, the article points out:

“But the potential downsides are significant. Militaries might kill more if no individual has to bear the emotional burden of strike decisions. Governments might wage more wars if the cost to their soldiers were lower. Oppressive tyrants could turn fully autonomous weapons on their own people when human soldiers refused to obey. And the machines could malfunction—as all machines sometimes do—killing friend and foe alike.

“Robots, moreover, could struggle to recognize unacceptable targets such as civilians and wounded combatants. The sort of advanced pattern recognition required to distinguish one person from another is relatively easy for humans, but difficult to program in a machine. Computers have outperformed humans in things like multiplication for a very long time, but despite great effort, their capacity for face and voice recognition remains crude. Technology would have to overcome this problem in order for robots to avoid killing the wrong people.”

Baum goes on to note that organizers base their call for a ban on existing international humanitarian law, which prohibits weapons that would strike civilians. Such reasoning has already been employed to achieve bans against landmines and cluster munitions, and is being leveraged in an attempt to ban nuclear weapons.

Will killer robots be banned before they’re a reality? It seems the agreement would have to move much faster than bureaucracy usually does; given the public example of Zerbib’s “little project,” I suspect it is already way too late for that.

Cynthia Murrell, September 3, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta