True or False: AI Algorithms Are Neutral Little Puppies
August 11, 2020
The answer, according to CanIndia News, is false. (I think some people believe this.) “Google IBM, Microsoft AI Models Fail to Curb Gender Bias” reports:
new research has claimed that Google AI datasets identified most women wearing masks as if their mouths were covered by duct tapes. Not just Google. When put to work, artificial intelligence-powered IBM Watson virtual assistant was not far behind on gender bias. In 23 per cent of cases, Watson saw a woman wearing a gag while in another 23 per cent, it was sure the woman was “wearing a restraint or chains”.
Before warming up the tar and chasing geese for feathers, you may want to note that the sample was 265 men and 265 females. Note: The subjects were wearing covid masks or personal protective equipment.
Out of the 265 images of men in masks, Google correctly identified 36 per cent as containing PPE. It also mistook 27 per cent of images as depicting facial hair.
The researchers learned that 15 per cent of images were misclassified as duct tape.
The write up highlights this finding:
Overall, for 40 per cent of images of women, Microsoft Azure Cognitive Services identified the mask as a fashion accessory compared to only 13 per cent of images of men.
Surprised? DarkCyber is curious about:
- Sample size. DarkCyber’s recollection is that the sample should have been in the neighborhood of 2,000 or so with 1,000 possible women and 1,000 possible men
- Training. How were the models trained. Were “masks” represented in the training set? What percentage of training images had masks?
- Image quality. What steps were taken to ensure that the “images” were of consistent quality; that is, focus, resolution, color, etc.
DarkCyber is interested in the “bias” allegation. But DarkCyber may be biased with regard to studies which make it possible to question sample size, training, and data quality/consistency. The models may have flaws, but the bias thing? Maybe, maybe not.
Stephen E Arnold, August 11, 2020
The Child Protection System Catches Pedophiles
August 11, 2020
Child pornography plagues the Internet’s underbelly, the Dark Web, per-to-per sharing networks, and even simple Google search. Law enforcement officials want to protect children and stop the spread of child pornography, so a new software called Child Protection System was created. NBC News shares details in the article, “Inside the Surveillance Software Tracking Child Porn Offenders Across the Globe.”
The Child Protection System was designed by the Florida nonprofit Child Rescue Coalition. It is a forensic tool that scans file sharing networks and chatrooms to locate computers that download child pornography. It is programmed to search for over two hundred terms related to child sex abuse. These scans are then used as probable cause to gain search warrants. Child Protection System’s scans were used to arrest over 12,000 people. The software can search down to the county level and it also looks for images of children deemed twelve and under. It saves a lot of investigation time:
“ ‘The Child Protection System “has had a bigger effect for us than any tool anyone has ever created. It’s been huge,’ said Dennis Nicewander, assistant state attorney in Broward County, Florida, who has used the software to prosecute about 200 cases over the last decade. ‘They have made it so automated and simple that the guys are just sitting there waiting to be arrested.’ The Child Rescue Coalition gives its technology for free to law enforcement agencies, and it is used by about 8,500 investigators in all 50 states. It’s used in 95 other countries, including Canada, the U.K. and Brazil. Since 2010, the nonprofit has trained about 12,000 law enforcement investigators globally.”
The Child Rescue Coalition wants to partner with social media platforms, schools, and more in order to discover who is downloading child pornography. These platforms often contain information of people discussing suspicious behavior, but does not indicate criminal activities. If data from the Child Protection System and these platforms were cross-matched it might indicate possible bad actors.
Some assert that surveillance software is that it is breaking privacy laws. Handing over all this surveillance power to governments requires safeguards to protect individuals’ privacy.
Whitney Grace, August 11, 2020
Spear Fishing: The Key to the Garmin Ransomware Attack
August 11, 2020
DarkCyber is not too keen on widely disseminated explanations of criminal procedures. “How to’s” may provide the equivalent of a jail house education to some. The article “Crypto-Ransomware in Action: A Closer Look at the WastedLocker Hijack of Garmin” explains the attack on the an outfit specializing geo-technology. Think GPS in consumer gizmos, aircraft, and vehicle. The write up quotes Kaspersky, a security outfit with some interesting allegations clinging to its shirt tails, as noting:
“This incident only highlights that there is a growing trend of targeted crypto-ransomware attacks against large corporations—in contrast to the more widespread and popular ransomware campaigns of the past, like WannaCry and NotPetya. While there are fewer victims, these targeted attacks are typically more sophisticated and destructive. And there is no evidence to suggest that they will decline in the near future. Therefore, it’s critical that organizations stay on alert and take steps to protect themselves.” [Fedor Sinitsyn, security expert at Kaspersky]
Additional details on the attack are available in the technical analysis on the Kaspersky Web site at this link. The write up includes screenshots and code samples. The details include this statement:
It uses a “classic” AES+RSA cryptographic scheme which is strong and properly implemented, and therefore the files encrypted by this sample cannot be decrypted without the threat actors’ private RSA key. The Garmin incident is the next in a series of targeted attacks on large organizations involving crypto-ransomware. Unfortunately, there is no reason to believe that this trend will decline in the near future.
DarkCyber agrees. Jail house learning?
Stephen E Arnold, August 11, 2020
DarkCyber for August 11, 2020, Now Available
August 11, 2020
DarkCyber is a video news program about the Dark Web, cyber crime, and lesser known Internet services. The program for August 11, 2020, covers four stories. This week’s program is available on YouTube at this link. [Note below]
Stephen E Arnold, the producer of DarkCyber, illustrates how to jam Alexa’s surveillance components. When a white noise is not enough, Arnold points to a Web site which sells a wide array of jamming equipment. The video features a diagram of how a jamming device can disrupt mobile signals, Wi-Fi, and Bluetooth from a vehicle. If a basic mobile jammer is not suitable, Arnold provides information about a military-grade detection and jamming device with a comprehensive kill chain subsystem. Arnold reminds the viewer that use of some jamming devices can have unexpected consequences.
The second story addresses the TikTok dust up between the US and China. Arnold focuses on the trivializing of the TikTok threat by pundits. These individuals, in Arnold’s opinion, are not assessing the social engineering risks posed by a TikTok-type service. Data from a consumer app can pinpoint an individual who may be susceptible to cash inducements or threats to compromise the security of a workplace. TikTok videos may be silly, but the operators of the services are unlikely to be blind to the value of the data and its utility.
The third story considers iPhone hacking. Software, available via the regular Web, promises to hack an iPhone. If that approach does not work, there are hackers advertising iPhone hacking on the regular Internet. But what if the hack requires more aggressiveness? Arnold provides a link to a Dark Web site which makes clear that its operator will do anything for money. Can the iPhone be hacked? That depends on one’s willingness to believe information published on the Internet.
The final story focuses on the August 2020 Interpol report about cyber crime in the time of Covid. The report is available without charge, and its findings echo those of speakers at the 2020 National Cyber Crime Conference, held in July 2020. Arnold provides the url from which the new report can be downloaded without charge.
I wanted to point out that we will no longer post a copy of the video on Vimeo. That company sent an email demanding that Stephen E Arnold upgrade to a Pro account. Instead of saying, “We are raising prices,” Vimeo threatened Arnold with termination of his account because the free DarkCyber video is a commercial enterprise. Arnold wrote Vimeo twice pointing out that he retired in 2013, produces the video without financial support or sponsorship, and makes the content available to anyone interested in the Dark Web, cybercrime, and lesser known Internet services. Arnold told me,
“Millennial marketers at Vimeo thinks it is doing its job by making false accusations and then ignoring respectful questions about the fee change. Cancel culture to Vimeo, ‘You are history. This is your termination notice.’
We will give Facebook a whirl and include that url if the service allows easy access with a minimum of invasive surveillance, pop ups, and targeted advertising for WhatsApp.
Kenny Toth, August 11, 2020
Apples and Pears: Definitely Tasty Fruit
August 10, 2020
Here is a test from an outfit called PreKinders.com. Circle the object that does not belong:
I circled the watermelon. What did you circle? Do you think the sun does not belong? Is the sun a fruit? Can you eat the sun? Does the fruit emit radiation which allows life?
According to my understanding of “Apple Takes Legal Action Against This Small Company’s Pear Logo,” the pear does not belong. I learned:
Prepear is a meal planner and grocery list app that helps people discover recipes and more. It’s a spin off from the founders of Super Healthy Kids and right now they saying its logo is under legal attack from Apple.
Are you confused by the similarity of these two logos?
Do you know what this is?
This is alcohol. Is it possible Apple has been imbibing Massenez Poire-Williams Pear Brandy? Confusing fruit may be a signal for impaired reasoning. But monopolies like the App Store are never confused in our modern, zip zip, lawyer infused world. Take another look at the picture from Pre Kinder. Do you want to change your answer? Maybe the apple does not belong?
Stephen E Arnold, August 10, 2020
Cognitive Data What? More Off-the-Wall Research Report Marketing
August 10, 2020
Endlessly floundering, endlessly annoying is this report: “Cognitive Data Management Market Outlook and Deep Study of Top Key Players are Veritas, Wipro, Datum, Reltio, Talend, HPE, Oracle, Saksoft, Snaplogic, Strongbox Data Solutions, Immuta, Attivio, Sparkcognition, Expert System.” If you are looking to buy the info equivalent of the Brooklyn Bridge, contact Data Bridge Market Research at this link. What’s in this gem? For one thing, there is the line up of companies which are not exactly in the same businesses. I suppose one can make a case that Hewlett Packard Enterprise is in the Cognitive Data Management market, but I think HPE had a bit of trouble with the Autonomy acquisition. Since then, HPE has been in court, not in cognitive data management unrelated to the billion dollar misstep. Expert System? Doesn’t that outfit do Made-in-Italy semantic technology? And Attivio? That’s a search company which dabbles in other sectors in order to generate revenue. Not exactly an Oracle in DarkCyber’s opinion.
The report states:
Cognitive Data Management Market was valued at USD 524.8 million in and is expected to reach USD 1,643.2 million in, growing at a healthy CAGR of 30.1% for the forecast period of 2020 to 2025. Global Cognitive Data Management Market, By Component (Solutions and Service), Business Function (Operations, Sales & Marketing, Finance, Legal, Human Resource), Deployment Type (On-Premises, Cloud), Vertical (BFSI, Healthcare & Pharmaceuticals, Manufacturing, Telecom, IT, Media, Government & Legal Services, Others), Geography (North America, South America, Europe, Asia-Pacific, Middle East and Africa)– Industry Trends and Forecast to 2025.
In the world of SEO, this is a form of keyword stuffing. Maybe one will work, so this outfit stops the crazy marketing. One wishes and hopes, doesn’t one?
The most interesting facet of the write up is the list of companies with which the firms listed above compete:
- Cognizant
- IBM
- Informatica
- Infosys
- Microsoft
- Salesforce
- SAP SE
- SAS
If these are competitors, why aren’t these outfits analyzed in the report?
DarkCyber enjoyed this sentence:
An absolute way to forecast what future holds is to comprehend the trend today! Data Bridge set forth itself as an unconventional and neoteric Market research and consulting firm with unparalleled level of resilience and integrated approaches.
Sounds good, particularly “neoteric”, which if I remember my Latin means “new”, maybe “innovative.” Colloquially, I interpret the word to mean horse feathers, baloney, or crapola. But, hey, I live in rural Kentucky.
DarkCyber finds these “absolute way” market reports quite amusing. No, we are not purchasing a copy. I don’t know what a cognitive data management market is. But I do know loose nuts and bolts in a 1955 Oldsmobile Super 88.
Stephen E Arnold, August 8, 2020
NetDocuments Employs BA Insight Tech for Enterprise Search
August 10, 2020
For a secure, cloud-based data solution, many law firms, legal departments, and compliance teams turn to NetDocuments. Now the platform has adopted technology from a familiar name to simplify its clients’ access to information. A post at PRWeb reveals, “NetDocuments Introduces NetKnowledge Enterprise Search Powered by BA Insight.” We find it interesting that the 16-year-old BA Insight is licensing its askable-knowledge system to create the new tool, NetKnowledge. The press release describes the system’s advantages:
“Eliminate Downloading and Indexing Data for Search: No longer does content within NetDocuments need to be downloaded and indexed to be part of an organization’s enterprise search. Simply search within the NetDocuments platform, and NetKnowledge will find relevant data–along with information from other sources —and present it to users.
“Enforce Access Controls on Sensitive Information: Sensitive information may need to be restricted to certain individuals, but that data also needs to be available to others via enterprise search. NetKnowledge respects data restriction policies at the source and will only present data to individuals with proper access rights.
“Manage Large and Disparate Data Sets Across the Organization: NetKnowledge helps organizations bring all its data together to form a single source of truth, so users do not have to perform multiple searches in different places to get the information they need.”
Founded in 2004, BA Insight is based in Boston, Massachusetts. The company is dedicated to making information easier to find for organizations of all stripes. NetDocuments is headquartered in Lehi, Utah. The company was founded in 1999 and acquired by Clearlake Capital Group in 2017.
Cynthia Murrell, August 10, 2020
Search Engines: Plumbing Becomes a Thing Again
August 10, 2020
Two search related items.
The first is Hndex. If you want to locate articles posted to HackerNews, a tech-oriented headline aggregation site, you have an option. This is an example of what might be labeled a “site specific search” solution: One site, search it. Navigate to https://hndex.org and plug in a search term. We entered a query for “enterprise search” and retrieved on point results. The comments are available; however, these are not indexed. Click the “cached” button, and you can view the original article. Click the “comments” button and you can view the comments. HackerNews provides its own search service, which is weirdly located at the bottom of the page. DarkCyber will reserve further comments until we have experimented with the system for a few days.
The second is Infinity Search, another metasearch engine positioned as a free Web search system. DarkCyber finds metasearch engines interesting, but these often pretend to be running their own crawlers. To Infinity Search’s credit the company states:
When you search for something on our site, we take the results from other search engines and our own indexes, organize it, and display it directly to you without logging any information about you.
Metasearch systems have to deduplicate results lists and find a way to remain in the good graces of companies running primary Web crawlers. Disclaimer: My son worked for Vivisimo (now the heart and soul of one of IBM’s marketing confections. He has moved to other adventures, but I remember our talks about the issues metasearch presents. For example, latency, screwed up query interpolation, and wonky deduplication which deduplicates useful results out of the results list. I think Vivisimo lives on in Yippy.com, but I am not a fan of metasearch systems which recycle others’ indexes and remain vulnerable to partners who pull out of deals, thus putting a dent in results.
Stephen E Arnold, August 10, 2020
After 20 Plus Years, Whoa! Surveillance by Big Tech
August 10, 2020
DarkCyber has noted a flurry of write ups expressing surprise, rage, indignation, and blusterification at the idea of a commercial company collecting data. Hello, services are free for a basic reason: Making money. Part of making money is to have something that other companies and organizations will purchase. A good example is personal information about users of free services. The way big companies work is that there is a constant pressure to find new ways to generate money. Thus, there are data sucking apps; there are advertisements and more advertisements; there are subscriptions which lock in revenue while providing an Amazon-style we know a lot about those who shop on Amazon; and there are many ornaments on these methods.
I got a kick out of “Silicon Valley’s Vast Data Collection Should Worry You More Than TikTok.” We know the story well. Commercial firms in the US gather data and license it, often to marketing firms and to other organizations. After two decades of blissful ignorance a devoted band of “real” journalists are now probing the core business model of many technology centric companies.
Give me a break. We are talking decades of business processes designed to generate useful reports from flows of actions by individuals. In some countries, the government performs this task. In others, commercial enterprises do the work and license the normalized data to governments.
This passage from the write up tickled my funny bone:
And none of this is unreasonable. We should be worried about private companies and governments potentially collecting data on millions of unsuspecting people and censoring content they don’t like. But those based in China represent just a sliver of that threat.
Yep, the old “woulda, coulda, shoulda” ploy. May I remind you, gentle reader, that we are decades into the automation of data about the actions of individuals. These are the happy and often ignorant humanoids who download apps, run queries, click on videos, and send personal message while leaving a data trail a foot deep and a mile wide.
And now the need for something?
And data collection is not a technical and economic issue. Nope. Data collection is politics; for example:
TikTok’s critics might point to the increasingly scary behavior of China’s government as to why Chinese control of information is particularly alarming. They’re right about the behavior, but they curiously ignore the fact that the United States itself is currently governed by a far-right demagogue with his own concentration camps and authoritarian repression, and that the party behind him, which aligns entirely with his politics, reliably cycles into power at least once every eight years.
What’s the fix? Well, “oppose it all.”
Where were the regulators, the users, and the competitors 20 years ago? Probably in grade school, blissfully unaware that those handheld gadgets would become more important than other activities. Okay, adult thumbtypers, your outrage is interesting. Step back, and perhaps you can see why the howls of outrage, the references to evil forms of government, and the horrors of toting around a device that usually provides real time documentation of one’s actions as a bad thing.
But after 20 years, is it surprising that personal data actions are captured, analyzed, and used to provide more data “stuff” to consume? As I said, its been 20 years with no lessening of the processes. Complain to your parents. Maybe they dropped the ball? Commercial enterprises and governments are like beavers. And beavers do what beavers do.
Stephen E Arnold, August 10, 2020
Kiddie Computer Supports: Not Online But Related to Online
August 9, 2020
DarkCyber spotted “Best Affordable Desk Chair for Kids in 2020.” The write up presents mini commercials for eight desk chairs for the young WFH’er. Among the models are these remarkable solutions to lying on the floor, standing while shift one’s weight from leg to leg, and using a computing device at a kitchen table.
The wobble stool wobbles and teaches kids how to learn correct posture. I slump, and I don’t think the wobble stool would have been right for me.
A kids’ ball balance chair. This is a visual delight.
And the third chair I want to highlight is the classic desk chair. Yep, it looks like a standard desk chair with levers, wheels, and a flashy two tone color scheme, just smaller.
Observations:
- None of the chairs has a cup holder for essentials like Vitamin Water, a plastic animal filled with faux juice, or a frosty can of Mountain Dew.
- None of the chairs offers a snack shelf. Computing means eating junk food, right? Am I right?
- No Twitch or Zoom centric features like a built in mouse pad, brackets for connecting a mobile phone at eye level, or a connector for a ring light
- No semi recline mode, an essential posture for some would be professional streamers and gamers. I just call this slump mode.
We do love that green ball thing, however. That may turn a kid into a couch potato in less time than it takes a youthful computer user to level up.
Stephen E Arnold, August 9, 2020