Total Pageviews

Sunday, August 26, 2018

#IslamicState: An Analysis of Tweets in Support of ISIS After the November 2015 Attacks In Paris

"#IslamicState: An Analysis of Tweets in Support of ISIS After the November 2015 AttacksIn Paris", thesis by Amanda R. Guthrie,  Faculty of Auburn University, August 2018, 102 pages. 
This study is based on content analysis  of 16,891 Tweets posted after the 2015 Attacks in Paris. 

Saturday, August 25, 2018

China-U.S. Trade Issues - Congressional Research Service

Wayne M. Morrison, "China-U.S. Trade Issues" - Congressional Research Service, July 30, 2018, 91 pages, Washington. 
Read the chapter on Cybersecurity Issues (pp.45-49)

Friday, August 24, 2018

The internet of things: applications and challenges for the RSAF

"The internet of things: applications and challenges for the RSAF", by ME6(DR) Reuben Lim Chi Keong, MAJ Pek Wee Kian & ME5 David Bey. Pointer, Journal of the Singapore Armed Forces, Vol. 44, n°2, 2018, pp.24-34, Singapore. 

"What is this IoT? Is it just about wearable smartwatches, or does it hold more potential? More importantly, how can it be applied in a military context to the Republic of Singapore Air Force (RSAF), enabling a shift in non real-time, human-centric operations, to real-time, machine-centric operations? This essay explores how IoT will quicken and broaden the traditional Observe-Orient-Decide-Act (OODA) loop, and investigates how IoT can be applied to improve operations in a ‘smart airbase’..."

From Digital Traces to Algorithmic Projections

"From Digital Traces to Algorithmic Projections", by Thierry Berthier and Bruno Teboul, ISTE Press - Elsevier, 184 pages, October 2018. 

"From Digital Traces to Algorithmic Projections describes individual digital fingerprints in interaction with the different algorithms they encounter throughout life. Centered on the human user, this formalism makes it possible to distinguish the voluntary projections of an individual and their systemic projections (suffered, metadata), both open (public) and closed. As the global algorithmic projection of an individual is now the focus of attention (Big Data, neuromarketing, targeted advertising, sentiment analysis, cybermonitoring, etc.) and is used to define new concepts, this resource discusses the ubiquity of place and the algorithmic consent of a user."




Reading Thieves’ Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces

"Reading Thieves’ Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces", by Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington, Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA. 
"Underground communication is invaluable for understanding cybercrimes. However, it is often obfuscated by the extensive use of dark jargons, innocently-looking terms like “popcorn” that serves sinister purposes (buying/selling drug, seeking crimeware, etc.). Discovery and understanding of these jargons have so far relied on manual effort, which is error-prone and cannot catch up with the fast evolving underground ecosystem. In this paper, we present the first technique, called Cantreader, to automatically detect and understand dark jargon..."

Foreign Economic Espionage in Cyberspace - NSCS - July 2018

Foreign Economic Espionage in Cyberspace - NSCS - July 2018, 20 pages. The National Counterintelligence and Security Center (NCSC) "released its 2018 Foreign Economic Espionage in Cyberspace report, which highlights current threats and future trends in foreign intelligence efforts to steal U.S. intellectual property, trade secrets, and proprietary information via cyberspace".

Chinese Cyberespionage Originating From Tsinghua University Infrastructure

Chinese Cyberespionage Originating From Tsinghua University Infrastructure, By Sanil Chohan, Winnona DeSombre, and Justin Grosfelt, 26 pages, 2018.