Google Chestnuts: Page as Shakespeare

February 3, 2016

I read “20 Inspirational Larry Page Quotes.” I need to be inspired. A company based on GoTo/Overture “inspiration” is equipped to offer guidance and maybe hope.

Alphabet, the new name for Google which still exists, embraces Loon balloons, the challenge of “solving death,” and the UK tax dust up. Each of these is, in its own way, inspirational.

Here are three quotes which soon may appear on AllPosters.com motivational posters store front.

On Alphabet Google’s work (which includes selling ads): “I do think there is an important artistic component in what we do. As a technology company I’ve tried to really stress that.”

On anti trust and collusion among competitors regulations: ““Big companies have always needed and cooperated in areas where it made sense.”

On corporate governance and management oversight: “We don’t have as many managers as we should, but we would rather have too few than too many.”

Words to live by.

Stephen E Arnold, February 3, 2016

The Enterprise and Online Anonymity Networks

February 3, 2016

An article entitled Tor and the enterprise 2016 – blocking malware, darknet use and rogue nodes from Computer World UK discusses the inevitable enterprise concerns related to anonymity networks. Tor, The Onion Router, has gained steam with mainstream internet users in the last five years. According to the article,

“It’s not hard to understand that Tor has plenty of perfectly legitimate uses (it is not our intention to stigmatise its use) but it also has plenty of troubling ones such as connecting to criminal sites on the ‘darknet’, as a channel for malware and as a way of bypassing network security. The anxiety for organisations is that it is impossible to tell which is which. Tor is not the only anonymity network designed with ultra-security in mind, The Invisible Internet Project (I2P) being another example. On top of this, VPNs and proxies also create similar risks although these are much easier to spot and block.”

The conclusion this article draws is that technology can only take the enterprise so far in mitigating risk. Reliance on penalties for running unauthorized applications is their suggestion, but this seems to be a short-sighted solution if popularity of anonymity networks rise.

 

Megan Feil, February 3, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Encrypted Enterprise Search

February 3, 2016

Another enterprise software distributor has taken the leap into a proprietary encrypted search engine.  Computer Technology Review informs us that “VirtualWorks Releases Its Encrypted Enterprise Search Platform ViaWorks Built On Hitachi Technology.”  VirtualWorks’s enterprise search platform is called ViaWorks and the company’s decision to release an encrypted search engine comes after there has been a rise in data security breaches as well as concern about how to prevent such attacks.  We will not even mention how organizations want to move to the cloud, but are fearful of hacking.  More organizations from shopping in person on the Internet, banking, healthcare, government, and even visiting a library use self-service portals that rely on personal information to complete tasks.  All of these portals can be hacked, so trade organizations and the government are instituting new security measures.

Everyone knows, however, that basic rules and a firewall are not enough to protect sensitive information.  That is why companies like VirtualWorks stay one step ahead of the game with a product like ViaWork built on Hitachi’s Searchable Encryption technology.  ViaWorks is a highly encrypted platform that does not sacrifice speed and accuracy for security

“ViaWorks encrypted enterprise search features are based on AES, a worldwide encryption standard established by NIST; special randomization process, making the encrypted data resistant to advanced statistical attacks; with key management and encryption APIs that store encryption keys securely and encrypt the original data.  ViaWorks provides key management and encryption APIs that store encryption keys securely and encrypt the original data, respectively. Users determine which field is encrypted, such as index files, search keyword or transaction logs.”

VirtualWorks already deployed ViaWorks in beta tests within healthcare, government, insurance, and finance.  Moving information to the cloud saves money, but it presents a security risk and slow search.  A commercial encrypted search engine paired with cloud computing limits the cyber risk.

 

Whitney Grace, February 3, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

UK Tax and Google: Cue Sinatra Singing Regrets, I Have a Few

February 2, 2016

This corporate tax thing is pretty exciting. I recall that in some of my early jobs, corporate taxes were mostly routine. Halliburton had a system, and it seemed to work in a swell way.

I read “Google Tax Deal ‘Not a Glorious Moment’, says Minister.” According to the write up:

Business secretary Sajid Javid says he shared Britons’ sense of injustice as criticism grows of agreement with tech firm.

Confused? I am. The “real” news story revealed:

The admission by the business secretary, Sajid Javid, came as a senior executive from Google claimed he could not say how much UK profit has been generated by the technology firm in the past decade, or how many meetings had been held between the company’s executives and ministers. It follows the announcement nine days ago that the government came to an agreement with Google in which £130m will be paid in back taxes covering the past decade.

I thought that Googlers used Google’s cloud services for calendaring, spreadsheets, and the like. I thought that it was easy for Google services users to check out who met whom and when. I thought is was pretty easy to set up an updating spreadsheet which calculated the tax owed on certain revenue items.

I obviously was wrong. That happens a lot.

The British government which strives to appear organized is apparently confused. I learned:

Peter Barron, head of communications at Google across Europe, told the Andrew Marr Show he could not answer questions about Google’s profits over the past decade despite reports that it had made £7.2bn and therefore is paying less than 3% in corporation tax on its UK profits.

The sums strike me as trivial. For example, I learned:

Google is expected to announce on Monday that it has amassed £30bn of profits from non-US sales in Bermuda, where companies are not liable to pay corporation tax. The UK is Google’s largest non-US market, accounting for 11% of its global revenues, according to documents filed in America. The Observer revealed that the UK government has been privately lobbying the EU to remove Bermuda from an official blacklist. Barron said the arrangement in Bermuda had no impact on the amount of tax it pays in the UK. “It’s very, very important to make it clear that the Bermuda arrangement has absolutely no bearing on the amount of tax that we pay in the UK. No bearing whatsoever,” he said. When asked how much of the £30bn may have come from the UK, he said: “I don’t know the answer, I haven’t got the answer [at] my fingertips, except I would say that about 10% of global revenues come from the UK.”

Like Google’s position regarding the alleged problems with its self driving cars, humans are making problems. I believe it. Troublesome humans. Use algorithms.

Stephen E Arnold, February 2, 2016

Bing Rings the Cash Register

February 2, 2016

I read a fascinating story about Bing, Microsoft’s search system which does not include the Fast Search & Transfer goodies in SharePoint Search. Yeah, I know it is confusing.

The write up “Microsoft Corporation Makes Big Bucks with Bing: Cloud Is the Future.” Web search has been, as far as I know, a cloud service for more than a decade. Set that aside.

The important point is:

Microsoft Bing search engine grew by 21% in 2QFY16, emerges as a potent threat to Google.

Poor Google. First, it was the presence of Qwant (what? you don’t remember Qwant?) now it is Bing. Doom looms it seems.

The write up reports in “real” journalistic rhetoric:

Microsoft’s search engine advertising revenues excluding traffic acquisitions cost increased by 21% in the second quarter of fiscal year 2016 (2QFY16). … The software giant is expected to continue its growth in the coming quarters, although what is more important is that Bing will continue to remain profitable and gain shares in the foreseeable future.

I like that “is expected.” Is this a Bing prediction?

I noted this passage:

The software giant is making recognizable efforts to evolve from a Windows-dependent organization to a “cloud-first, mobile-first” company. Microsoft seems to be doing well with its cloud business and making a profit from its Office 365, as well. Users of Windows 10 are also on the rise. Interestingly enough, for these users, Bing-driven Cortana is a very important feature which helps the service generate significant revenue growth to bolster the slipping Windows revenues.

But the kicker for me was the statement:

… Popular speculation suggests that Bing is just a minor detail once you take into account Microsoft’s prospects regarding its position in the upcoming cloud business which it has invested heavily in; and rightly so as the cloud services segment has added indefinite value to the company’s stock.

But isn’t Bing a cloud service? I am confused but the Bing/Fast Search set up is a baffler as well.

Yep, the new Microsoft. And Windows phone? Hmmm.

Stephen E Arnold, February 2, 2016

Watson, Whither Weather?

February 2, 2016

i read “IBM Closes Weather Co. Purchase, Names David Kenny New Head of Watson Platform.” Big news. Watson is a platform and there is a new big rainmaker in charge of the alleged $10 billion revenue machine based on Lucene, acquired technology, home brew scripts, and weather data.

Weather is important. I agree. If I cannot look out the window, I am flummoxed.

image

The write up reveals:

As part of the deal, IBM is making some changes: First, the Weather Company’s cloud platform will now run on IBM’s Cloud data centers (recall that it once was a big client of AWS). That platform will now power all of IBM’s wider push into data services and Watson’s Internet of Things business. This will bring a massively bigger amount of data into the mix, covering what IBM describes as billions of IoT sensors. IBM will also use its weight to scale the Weather Company’s business: the company plans to expand weather.com into five more markets including China, India and Brazil “immediately”, as well as integrate it into IBM’s 45 global cloud centers.

I think this means that IBM is going to embrace an acquired company’s cloud platform. That’s okay. Does this suggest that IBM’s cloud platform is not very good? I will have to noodle on this a moment.

Okay, done. Yes, IBM’s cloud technology is less efficacious that the Weather Co.’s.

Next, I learned from the write up:

The Weather Channel — perhaps the Weather Company’s most mainstream product — is not included. But as part of the sale, under a long-term contract, it will license weather data forecasts and analytics now owned by IBM.

Er, okay. So it was the technology and fellow David Kenny.

Who is he?

A quick check revealed these items about the rainmaker:

  • LinkedIn says he is a general manager, not a rainmaker. Good to know.
  • He’s been a director of Best Buy and Yahoo. Okay, those are two firms which have made financial lightning.
  • He was the president of Akamai for 15 months. That’s helpful, but I wonder is Akamai is the foundation of his cloud method and if there may be intellectual property issues. Nah, probably not.
  • He worked at a PR firm. This is good. I want to see more of the Watson recipe and game show information.
  • He was a Bainie. This is helpful background.

In my view, the Watson platform will be able to sidestep the issues raised in “The Truth about Bain.”

Will the Weather thing make Watson the perfect storm in IBM revenues? I am no weather person, but it looks as if it is cloudy with a chance for drizzle, then steadily falling temperatures, and a possibility of icy roads for tomorrow’s morning drive.

Fill your tank and take an energy bar. Delays are likely.

Stephen E Arnold, February 2, 2016

IBM Sells Technology Platform with a Throwback to Big Datas Mysteries

February 2, 2016

The infographic on the IBM Big Data & Analytics Hub titled Extracting Business Value From the 4 V’s of Big Data involves quantifying Volume (scale of data), Velocity (speed of data), Veracity (certainty of data), and Variety (diversity of data). In a time when big data may have been largely demystified, IBM makes an argument for its current relevance and import, not to mention its mystique, with reminders of the tremendous amounts of data being created and consumed on a daily basis. Ultimately the graphic is an ad for the IBM Analytics Technology Platform. The infographic also references a “fifth “V”,

“Big data = the ability to achieve greater Value through insights from superior analytics. Case Study: A US-based aircraft engine manufacturer now uses analytics to predict engine events that lead to costly airline disruptions, with 97% accuracy. If this prediction capability had ben available in the previous year, it would have saved $63 million.”
IBM struggles for revenue. But, obviously from this infographic, IBM knows how to create Value with a capital “V”, if not revenue. The IBM Analytics Technology Platform promises speedier insights and actionable information from trustworthy sources. The infographic reminds us that poor quality in data leads to sad executives, and that data is growing exponentially, with 90% of all data forged in only the last two years.

 

Chelsea Kerwin, February 2, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Metadata Could Play Integral Role in Data Security

February 2, 2016

A friend recently told me how they can go months avoiding suspicious emails, spyware, and Web sites on her computer, but the moment she hands her laptop over to her father he downloads a virus within an hour.  Despite the technology gap existing between generations, the story goes to show how easy it is to deceive and steal information these days.  ExpertClick thinks that metadata might hold the future means for cyber security in “What Metadata And Data Analytics Mean For Data Security-And Beyond.”

The article uses biological analogy to explain metadata’s importance: “One of my favorite analogies is that of data as proteins or molecules, coursing through the corporate body and sustaining its interrelated functions. This analogy has a special relevance to the topic of using metadata to detect data leakage and minimize information risk — but more about that in a minute.”

This plays into new companies like, Ayasdi, using data to reveal new correlations using different methods than the standard statistical ones.  The article compares this to getting to the data atomic level, where data scientists will be able to separate data into different elements and increase the analysis complexity.

“The truly exciting news is that this concept is ripe for being developed to enable an even deeper type of data analytics. By taking the ‘Shape of Data’ concept and applying to a single character of data, and then capturing that shape as metadata, one could gain the ability to analyze data at an atomic level, revealing a new and unexplored frontier. Doing so could bring advanced predictive analytics to cyber security, data valuation, and counter- and anti-terrorism efforts — but I see this area of data analytics as having enormous implications in other areas as well.”

There are more devices connected to the Internet than ever before and 2016 could be the year we see a significant rise in cyber attacks.  New ways to interpret data will leverage predictive and proactive analytics to create new ways to fight security breaches.

Whitney Grace, February 2, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Stealing Data on the Dark Web Just Became Easier

February 1, 2016

“Underground Black Market: Thriving Trade in Stolen Data, Malware, and Attack Services” assumes that the reader knows the basics of the Dark Web. Let’s stake a step back.

Before we talk about stealing data on the Dark Web we must first define what we mean by the Dark Web. Most internet uses never go beyond the surface web, that part of the Web that consists of static Web sites such as Google, Facebook, and YouTube. What makes the Dark Web so interesting is that is it not entirely dark.

In fact, many Dark Web sites and their content are visible to the public. What is not visible is the server addresses which block most people from seeing who is running the sites.

In the article, Candid Wueest talks about a new paradigm for stealing and moving stolen data on the Dark Web. I noted that crimeware-as-a-service lets:

Attackers can easily rent the entire infrastructure needed to run a botnet or any other online scams. This makes cybercrime easily accessible for budding criminals who do not have the technical skills to run an attack campaign on their own. A drive-by download web toolkit, which includes updates and 24/7 support, can be rented for between $100 and $700 per week.

That means that it is becoming increasing easier for criminals to find, access, and sell data. Now you know. Now, anyone, including your local bad actor or your 11 year old, can access and steal data.

Here’s a troubling factoid from “The Tangled World of Stolen Data,” which we assume is spot on: It takes about 205 days for a company detect a data breach,  more than enough time for a cybercriminal to sell the data and get it distributed on the Dark Web.

So what can law enforcement agencies do? New advances in Dark Web access, such as I2P, are making it more difficult for these agencies to identify and react to data crimes. What this means is that the law security companies and law enforcement agencies will need to be creative. The FBI ran an offensive image site to get a grip on alleged wrong doers.

Perhaps the Dark Web is not as dark as many assume.

Martin A. Matisoff, MSc, February 1, 2016

A Road Map to the Dark Suburb of i2p Content

February 1, 2016

According to the I2P Web site, the Invisible Internet Project (I2P)  is an

anonymous overlay network … that is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs and … is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers.

Users who wanted information on I2P had two options for obtaining information about I2P and I2P services: search the web and create your own guide over time, or visit the I2P website https://geti2p.net/en/docs which provides a useful index to I2P.

rubiks-cube-logo

A more rich i2p resource is one you may want to explore. A fascinating Baedeker for the Dark Web is available on a pastesite, which is an anonymous publishing service.

The Guide to I2P and I2P Services Version 1 puts a Cliff’s Notes to sources of products, services, and information about weapons, controlled substances, and stolen Uber accounts. There are descriptions of the best ways for users to configure their computers so they can access .i2p sites and what you need to do once connected to these hidden services.

The guides offers a plethora of links to some of the most requested I2P sites, including image boards, such as Anch , a site for and by anarchists; file sharing sites such as Document Heaven  financial sites such as VEscudero’s Service, Darknet Products,  and social sites such as id3nt  and Visibility. Investigators may understand Facebook and Twitter, but the Dark Web is, for many, a digital Rubik’s cube.

In addition, the guide will offer tutorials and other topics including links to sites for users who speak different languages such as Russian, German, and Spanish.

The Guide to I2P and I2P Services not only provides numerous links to I2P sites, but it addresses concerns about the dangers of relaying encrypted traffic and Java vulnerabilities. Furthermore, it tells you how to connect to I2P IRC servers that are not part of IRC2p. The guide can help you map dark net maze.

How can investigators, analysts, and intelligence professionals get a working understanding of i2p? Easy. Contact benkent2020 at yahoo.com and inquire about our on site or online webinars about the Dark Web.

Martin A. Matisoff, MSc, February 1, 2016

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta