Deliver Your News to the World

DarkCyber for August 6, 2019, Now Available

DarkCyber (August 6, 2019) focuses on alleged secrets disclosed to the public; Kazakhstan implements some China-style surveillance methods; a new online service allows a person to see some personal data collected by apps; and modern cyber criminals use old-fashioned identify verification methods.


Louisville, Kentucky, US – WEBWIRE
DarkCyber and DarkCyber Annex provide information about trends, tools, and vendors providing policeware, investigative tools, and services for law enforcement, cyber security, and intelligence professionals.
DarkCyber and DarkCyber Annex provide information about trends, tools, and vendors providing policeware, investigative tools, and services for law enforcement, cyber security, and intelligence professionals.

Stephen E Arnold, author of CyberOSINT: Next Generation Information Access, said, “The coverage of data leaks, theft of secret information, and security breaches continues to increase. Unfortunately, many reports may be little more than attempts to get publicity, political revenge, or point out the management shortcomings of a company. The secrets are less important than the motive.”

DarkCyber for August 6, 2019, is now available at www.arnoldit.com/wordpress and on Vimeo at https://www.vimeo.com/351872293. The program is a production of Stephen E Arnold. It is the only weekly video news shows focusing on the Dark Web, cybercrime, and lesser known Internet services.

DarkCyber (August 6, 2019) explores reports about four high-profile leaks of confidential or secret information. Each “leak” has unique attributes, and some leaks may be nothing more than attempts to generate publicity, cause embarrassment to a firm, or a clever repurposing of publicly available but little known information. Lockheed Martin made available in a blog about automobiles data related to its innovative propulsion system. The fusion approach is better suited to military applications. The audience for the “leak” may be US government officials. The second leak explains that the breach of a Russian contractor providing technical services to the Russian government may be politically-motivated. The information could be part of an effort to criticize Vladimir Putin. The third example is the disclosure of “secret” Palantir Technologies’ documents. This information may create friction for the rumored Palantir INITIAL PUBLIC OFFERING. The final secret is the startling but unverified assertion that the NSO Group, an Israeli cyber security firm, can compromise the security of major cloud providers like Amazon and Apple, among others. The DarkCyber conclusion from this spate of “leak” stories is that the motivations for each leak are different. In short, leaking secrets may be political, personal, or just marketing. Stephen E Arnold, author of CyberOSINT: Next Generation Information Access, said, “The coverage of data leaks, theft of secret information, and security breaches continues to increase. Unfortunately, many reports may be little more than attempts to get publicity, political revenge, or point out the management shortcomings of a company. The secrets are less important than the motive.”

Other stories in this week’s DarkCyber include:

A report about Kazakhstan stepped up surveillance activities. Monitoring of mobile devices in underway in the capital city. DarkCyber reports that the system may be deployed to other Kazakh cities. The approach appears to be influenced by China’s methods; namely, installing malware on mobile devices and manipulating Internet routing.

DarkCyber explains that F Secure offers a free service to individuals who want to know about their personal information. The Data Discovery Portal makes it possible for a person to plug in an email. The system will then display some of the personal information major online services have in their database about that person.

DarkCyber’s final story points out that online drug merchants are using old-school identity verification methods. With postal services intercepting a larger number of drug packages sent via the mail, physical hand offs of the contraband are necessary. The method used relies on the serial number on currency. When the recipient provides the number, the “drug mule” verifies that number on a printed bank note.

DarkCyber videos appears each week through the September 30, 2019. A new series of videos will begin on November 1, 2019. Programs are available on Vimeo.com and YouTube.com.

About Stephen E Arnold

Stephen E Arnold is the author of “Dark Web Notebook” and “CyberOSINT: Next Generation Information Access.” This book describes some of the technologies used by GSR and Cambridge Analytica to acquire and analyze Facebook user data. He has been named as a technology adviser to the UK based Judicial Commission of Inquiry into Human Trafficking and Child Sex Abuse.” Mr. Arnold also lectures to law enforcement and intelligence professionals who will be attending major law enforcement and intelligence conferences and training programs. In recent months, he has shared his research with law enforcement and intelligence professionals in the US and Europe. His most recent lectures focus on the impact of the Dark Web on the “regular” Internet and its users. Other topics include innovations in smart software for law enforcement and intelligence applications. He will be appearing at the TechnoSecurity & Digital Forensics Conference in San Antonio, Texas, and at other venues in the United States. He publishes the free Web log “Dark Cyber Annex” (formerly Beyond Search) available at www.arnoldit.com/wordpress.


( Press Release Image: https://photos.webwire.com/prmedia/45623/244615/244615-1.png )


WebWireID244615




 
 Dark Web
 Cyber Crime
 Law Enforcement
 Security Breach
 Darkcyber


This news content may be integrated into any legitimate news gathering and publishing effort. Linking is permitted.

News Release Distribution and Press Release Distribution Services Provided by WebWire.