How to Search the Ashley-Madison Data and Discover If You Had an Affair Too
August 26, 2015
If you haven’t heard about the affair-promoting website Ashley Madison’s data breach, you might want to crawl out from under that rock and learn about the millions of email addresses exposed by hackers to be linked to the infidelity site. In spite of claims by parent company Avid Life Media that users’ discretion was secure, and that the servers were “kind of untouchable,” as many as 37 million customers have been exposed. Perhaps unsurprisingly, a huge number of government and military personnel have been found on the list. The article on Reuters titled Hacker’s Ashley Madison Data Dump Threatens Marriages, Reputations also mentions that the dump has divorce lawyers clicking their heels with glee at their good luck. As for the motivation of the hackers? The article explains,
“The hackers’ move to identify members of the marital cheating website appeared aimed at maximum damage to the company, which also runs websites such as Cougarlife.com andEstablishedMen.com, causing public embarrassment to its members, rather than financial gain. “Find yourself in here?,” said the group, which calls itself the Impact Team, in a statement alongside the data dump. “It was [Avid Life Media] that failed you and lied to you. Prosecute them and claim damages. Then move on with your life. Learn your lesson and make amends. Embarrassing now, but you’ll get over it.”
If you would like to “find yourself” or at least check to see if any of your email addresses are part of the data dump, you are able to do so. The original data was put on the dark web, which is not easily accessible for most people. But the website Trustify lets people search for themselves and their partners to see if they were part of the scandal. The website states,
“Many people will face embarrassment, professional problems, and even divorce when their private details were exposed. Enter your email address (or the email address of your spouse) to see if your sexual preferences and other information was exposed on Ashley Madison or Adult Friend Finder. Please note that an email will be sent to this address.”
It’s also important to keep in mind that many of the email accounts registered to Ashley Madison seem to be stolen. However, the ability to search the data has already yielded some embarrassment for public officials and, of course, “family values” activist Josh Duggar. The article on the Daily Mail titled Names of 37 Million Cheating Spouses Are Leaked Online: Hackers Dump Huge Data File Revealing Clients of Adultery Website Ashley Madison- Including Bankers, UN and Vatican Staff goes into great detail about the company, the owners (married couple Noel and Amanda Biderman) and how hackers took it upon themselves to be the moral police of the internet. But the article also mentions,
“Ashley Madison’s sign-up process does not require verification of an email address to set up an account. This means addresses might have been used by others, and doesn’t prove that person used the site themselves.”
Some people are already claiming that they had never heard of Ashley Madison in spite of their emails being included in the data dump. Meanwhile, the Errata Security Blog entry titled Notes on the Ashley-Madison Dump defends the cybersecurity of Ashley Madison. The article says,
“They tokenized credit card transactions and didn’t store full credit card numbers. They hashed passwords correctly with bcrypt. They stored email addresses and passwords in separate tables, to make grabbing them (slightly) harder. Thus, this hasn’t become a massive breach of passwords and credit-card numbers that other large breaches have lead to. They deserve praise for this.”
Praise for this, if for nothing else. The impact of this data breach is still only beginning, with millions of marriages and reputations in the most immediate trouble, and the public perception of the cloud and cybersecurity close behind.
Chelsea Kerwin, August 26, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Geofeedias Political Action
August 20, 2015
The presidential election is a little over a year away and potential presidential candidates are starting on their campaign trails. The Republican and Democratic parties are heating up with the GOP debates and voters are engaging with the candidates and each other via social media. The information posted on social media is a gold mine for the political candidates to learn about the voters’ opinions and track their approval rating. While Twitter and Facebook data is easy to come by with Google Analytics and other software, visual mapping of the social media data is a little hard to find.
To demonstrate its product capabilities, Geofeedia took social media Instagram, fed it into its data platform, and shared the visual results in the blog post, “Instagram Map: Republican Presidential Debate.” Geofeedia noted that while business mogul Donald Trump did not fare well during the debate nor is he in the news, he is dominating the social media feeds:
“Of all social content coming out of the Quicken Loans Center, 93% of posts were positive in sentiment. The top keywords were GOP, debate, and first, which was to be expected. Although there was no decided winner, Donald Trump scored the most headlines for a few of his memorable comments. He was, however, the winner of the social sphere. His name was mentioned in social content more than any other candidate.”
One amazing thing is that social media allows political candidates to gauge the voters’ attitudes in real time! They can alter their answers to debate questions instantaneous to sway approval in their favor. Another interesting thing Geofeedia’s visual data models showed is a heat map where the most social media activity took place, which happened to be centered in the major US metropolises. The 2016 election might be the one that harnesses social media to help elect the next president. Also Geofeedia also has excellent visual mapping tools.
Whitney Grace, August 20, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
What Watson Can Do For Your Department
July 6, 2015
The story of Justin Chen, a Finance Manager, is one of many “Stories by Role” now displayed on IBM. Each character has a different job, such as Liza Hay from Marketing, Donny Cruz from IT and Anisa Mirza from HR. Each job comes with a problem for which Watson, IBM’s supercomputer, has just the solution. Justin, the article relates, is having trouble deciding which payments to follow. Watson provides solutions,
“With IBM® Watson™ Analytics, Justin can ask which customers are least likely to pay, who is most likely to pay and why. He can analyze this information… [and] collect more payments more efficiently… With Watson Analytics, Justin can ask which customers are likely to leave and which are likely to stay and why. He can use the answers for analysis of customer attrition and retention, predict the effect on revenue and determine which customer investments will lead to more profitable growth.”
It seems that the now world-famous Watson has been converted from search to a basket containing any number of IBM software solutions. It isn’t stated in the article, but we can probably assume that the revenue from each solution counts toward Watson’s soon to be reported billions in revenue.
Chelsea Kerwin, July 6, 2014
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
CSC Attracts Buyer And Fraud Penalties
July 1, 2015
According to the Reuters article “Exclusive: CACI, Booz Allen, Leidos Eyes CSC’s Government Unit-Sources,” CACI International, Leidos Holdings, and Booz Allen Hamilton Holdings
have expressed interest in Computer Sciences Corp’s public sector division. There are not a lot of details about the possible transaction as it is still in the early stages, so everything is still hush-hush.
The possible acquisition came after the news that CSC will split into two divisions: one that serves US public sector clients and the other dedicated to global commercial and non-government clients. CSC has an estimated $4.1 billion in revenues and worth $9.6 billion, but CACI International, Leidos Holdings, and Booz Allen Hamilton might reconsider the sale or getting the price lowered after hearing this news: “Computer Sciences (CSC) To Pay $190M Penalty; SEC Charges Company And Former Executives With Accounting Fraud” from Street Insider. The Securities and Exchange Commission are charging CSC and former executives with a $190 million penalty for hiding financial information and problems resulting from the contract they had with their biggest client. CSC and the executives, of course, are contesting the charges.
“The SEC alleges that CSC’s accounting and disclosure fraud began after the company learned it would lose money on the NHS contract because it was unable to meet certain deadlines. To avoid the large hit to its earnings that CSC was required to record, Sutcliffe allegedly added items to CSC’s accounting models that artificially increased its profits but had no basis in reality. CSC, with Laphen’s approval, then continued to avoid the financial impact of its delays by basing its models on contract amendments it was proposing to the NHS rather than the actual contract. In reality, NHS officials repeatedly rejected CSC’s requests that the NHS pay the company higher prices for less work. By basing its models on the flailing proposals, CSC artificially avoided recording significant reductions in its earnings in 2010 and 2011.”
Oh boy! Is it a wise decision to buy a company that has a history of stealing money and hiding information? If the company’s root products and services are decent, the buyers might get it for a cheap price and recondition the company. Or it could lead to another disaster like HP and Autonomy.
Whitney Grace, July 1, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Google’s Corporate Sovereignty Is Not Confined to US
June 1, 2015
The article on The Daily Dot titled The United States of Google reacts to the information that Google now spends more on lobbying than any other company. This may not come as a huge surprise, but it does carry heavy implications about the power and affluence of the country- er, company. This explains a great deal of the tension that Google faces in Europe, where competition is more favorable than monopoly. The article refers to the event in 2010 of Google leaving its partnership with China after controversy over censorship. The article explains,
In one sense, this was a righteous step for Google, demonstrating that they knew how to put its foot down in the face of toxic regimes. But in another sense, it was a scary moment, too. After all, do we really want Google to be more effective than the U.S. itself when it comes to dealing with tyrants?… “Does Google have more direct impact on human rights and freedoms in China than the Obama Administration?”
The article goes on to discuss what “Googlestan” might look like in a very lighthearted yet ominous tone. The ubiquity of Google is at the center of the concern- who can get through a day without relying on some aspect of Google’s services, from Gmail to Chrome to search? By becoming so dependent on a company as individuals, a nation and perhaps even a world, have we created a monster?
Chelsea Kerwin, June 1, 2014
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Study Find Millennials Willing to Pay for News to a Point
March 26, 2015
The article titled Millennials Say Keeping Up With the News Is Important To Them—But Good Luck Getting Them To Pay For It on NiemanLab explores the findings of a recent study by the Media Insight Project in partnership with the American Press Institute. A great deal of respondents get their news from Facebook, although the majority (88%) said it was only occasionally. Twitter and Reddit also made the list. Interestingly, millennials claimed multiple access methods to news categories across the board. The article states,
“The survey asked respondents how they accessed 24 different news topics, from national politics and government to style, beauty, and fashion. Facebook was either the number one or two source of information for 20 of the 24 topics, and in nine of those topics it was the only source cited by a majority of respondents. Search was the second most popular source of information, ranking first or second in 13 of the 24 news topics.”
In spite of the title of the article, most millennials in the study were willing to pay for at least one subscription, either digital or print. The article doesn’t mention the number of people involved in the study, but deeper interviews were held with 23 millennials, which is the basis for the assumptions about broader unwillingness to pay for the news, whether out of entitlement or a belief that access to free news is a fundamental pillar of democracy.
Chelsea Kerwin, March 26, 2015
Stephen E Arnold, Publisher of CyberOSINT at www.xenky.com
Free Statistics Text from Computer Science TA
February 11, 2014
The Probability and Statistics Cookbook from Matthias Vallentin is a free statistics text. The creator, Vallentin, is a doctoral student at UC Berkeley who works with Vern Paxson in his studies of computer science. While there Vallentin has worked as a teaching assistant in undergraduate computer security course. Vallentin also works for the International Computer Science Institute. His research in network intrusion and network forensics began in his undergraduate career in Germany. The “cookbook” is explained in the article,
“The cookbook aims to be language agnostic and factors out its textual elements into a separate dictionary. It is thus possible to translate the entire cookbook without needing to change the core LaTeX source and simply providing a new dictionary file. Please see the github repository for details. The current translation setup is heavily geared to Roman languages, as this was the easiest way to begin with. Feel free to make the necessary changes to the LaTeX source to relax this constraint.”
The overview provides screenshots that make it clear the cookbook is more interested in the mathematical crux rather than elaborate clarifications. The author is open to pull requests in order to lengthen the cookbook, but in the meanwhile the LaTeX source code can be found on github.
Chelsea Kerwin, February 11, 2014
Sponsored by ArnoldIT.com, developer of Augmentext
Release of 2nd Edition of the Elements of Statistical Learning
January 2, 2014
The release of the 2nd edition of The Elements of Statistical Learning is now available through the Stanford Statistics Department. The book was created in response to the massive leaps in computer and information technology in the last ten years by authors Trevor Hastie, Robert Tibshirani and Jerome Friedman. All are professors of statistics at Stanford, and the book does take a statistical approach but is concept-centered rather than focusing on mathematics.
The article summarizes the content:
“Many examples are given, with a liberal use of color graphics. It should be a valuable resource for statisticians and anyone interested in data mining in science or industry. The book’s coverage is broad, from supervised learning (prediction) to unsupervised learning. The many topics include neural networks, support vector machines, classification trees and boosting–the first comprehensive treatment of this topic in any book.”
Sounds like another goody for the artificial intelligence fan. The book is aimed at data analysts or theory junkies and is absent of code. In a review, D.J. Hand calls it “a beautiful book” in both presentation and content. His only criticism that if the book were to be used for an undergrad or grad level course it should be supplemented with more practical approach utilizing S-PLUS or R language, if that can be called a criticism when paired with his praise of the authors and their work.
Chelsea Kerwin, January 02, 2014
Sponsored by ArnoldIT.com, developer of Augmentext
Arm Yourself with Statistics Knowledge
November 14, 2013
So many of the world’s big decisions are based on statistics, yet the discipline remains mysterious or misunderstood by many. Alex Reinhart, a statistics PhD student at Carnegie Mellon, aims to rectify that situation with “Statistics Done Wrong: the Woefully Complete Guide.” Hey, everyone needs more math. Well, except search engine optimization experts. They are all set.
The description reads:
“Statistics Done Wrong is a guide to the most popular statistical errors and slip-ups committed by scientists every day, in the lab and in peer-reviewed journals. Many of the errors are prevalent in vast swathes of the published literature, casting doubt on the findings of thousands of papers. Statistics Done Wrong assumes no prior knowledge of statistics, so you can read it before your first statistics course or after thirty years of scientific practice. Dive in: the whole guide is available online!”
Yep, go to the link above to access this helpful text—the clickable table of contents is right there on that page. Reinhart notes that this work is constantly being improved, and you can sign up for updates through a box on the right of the page. The guide is licensed under a Creative Commons Attribution 3.0 Unported License. Check it out, and be ahead of the crowd when statistics rears its unwieldy head.
Cynthia Murrell, November 14, 2013
Sponsored by ArnoldIT.com, developer of Augmentext