background preloader

Publique

Facebook Twitter

Out of Sight, Out of Mind: A visualization of drone strikes in Pakistan since 2004. Pattern Of Life. Previously we used Recorded Future’s temporal analytics to examine the short term evolution of information on a newly revealed security threat in our series on Faisal Shahzad, also know as the Times Square Bomber (or would-be bomber). In this post we’ll show how we were able to utilize Recorded Future’s data extraction and visualizations for open source intelligence to quickly develop a pattern of life analysis for an American-born terrorist.

Recorded Future paints a broad landscape spanning nearly 40 years depicting the transformation of Omar Hammami from an Alabama-born honor student to an Islamic Extremist indicted on terrorism charges. Searching the full time range of Recorded Future’s index for the entity Omar Hammami, we find recognizable expressions of time back to Hammami’s parents first moving to Mobile, Alabama from Syria in 1972. This initial, extended timeline allows us to see upon cursory glance the dramatic increase in relevant data as we move toward the current date.

Pattern of Life and Temporal Signals of Hacker Organizations. Observing an organization or person by their activities using web intelligence can provide interesting clues about who and where they actually are. These clues can include targets, methods, tools, language, etc. This is true in both the physical and cyber world. In this post we’ll look at the temporal signature of activities by hacker groups and use those to discern their pattern of life – basically their work week – for matching with national work weeks/schedules. Top level conclusion? Different groups have different temporal signatures that could potentially be used to differentiate between those on very regular schedules – i.e. working a desk job (nation state?) – and those on nights/weekend schedules – independent hackers? Temporal analysis has long played a part in cyber defense. This was just one of many other factors that pointed to Russian involvement, but it helped orient analysts.

“Hacker teams regularly began work, for the most part, at 8 a.m. Work Week Calendar Conclusion. Théorie du drone : de la fabrique des automates politiques. Le livre de Grégoire Chamayou, Théorie du drone, est passionnant. Bien sûr, il est passionnant pour son implacable analyse du drone armé et de la façon dont cet « instrument d’homicide mécanisé » transforme la conduite de la guerre. Mais pour ma part, je n’ai pas lu ce livre comme un ouvrage sur les questions éthiques, psychologiques, sociales, juridiques et politiques que posent cette nouvelle arme de guerre, mais bien comme un livre sur les nouvelles technologies et ce qu’elles transforment. Et cette lecture-là en change radicalement la portée. Car derrière la fabrique des « robots léthaux autonomes », cette chasse à l’homme moderne, on peut comprendre les transformations qu’induisent la fabrique des automates de notre monde moderne.

La police des schémas : l’activité, alternative à l’identité Grégoire Chamayou ouvre son livre par des extraits d’échanges entre pilotes de drones, comme l’a raconté l’ancien pilote Brandon Bryant. . « Tout un chacun a une forme ou un motif de vie. Mayormcginn : This "predictive policing"... Why the collision of big data and privacy will require a new realpolitik. When it comes to protecting privacy in the digital age, anonymization is a terrifically important concept. In the context of the location data collected by so many mobile apps these days, it generally refers to the decoupling of the location data from identifiers such as the user’s name or phone number. Used in this way, anonymization is supposed to allow the collection of huge amounts of information for business purposes while minimizing the risks if, for example, someone were to hack the developer’s database.

Except, according to research published in Scientific Reports on Monday, people’s day-to-day movement is usually so predictable that even anonymized location data can be linked to individuals with relative ease if correlated with a piece of outside information. Why? The paper, entitled Unique in the Crowd: The privacy bounds of human mobility, took an anonymized dataset from an unidentified mobile operator containing call information for around 1.5 million users over 14 months. The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level. Photo: Name Withheld; Digital Manipulation: Jesse Lenz The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west.

It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives. Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever. Jusqu'où ira la vidéosurveillance ?, Analyses. Hadopi 3 pourrait avoir la peau du streaming et du direct download. Hadopi livre son rapport sur la lutte contre le streaming et le « direct download » avec plus d’un an de retard.

Le document a de quoi angoisser les irréductibles « pirates » : il dessine ce que pourrait être la prochaine législation contre le téléchargement illégal. En attendant les conclusions de la mission Lescure en avril. Avec ce rapport, la Hadopi signe l’aveu d’un échec : responsabiliser directement les internautes français par la prévention et la punition n’a pas suffi à faire disparaître le piratage.

Mais le flic du Net dévoile sa nouvelle arme inspirée du procès du site Allostreaming, qui a dû fermer l’année dernière : s’en prendre directement aux hébergeurs de contenus et sites référençant des liens vers des contenus illégaux (Streamiz par exemple). Voici les principales grandes mesures proposées dans le rapport. Etendre l’amendement Vivendi-Universal Riposte graduée en 3 étapes La Haute autorité préconise dans un premier temps des mesures de filtrage proactives.