blog trackingRealtime Web Statistics Posts Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘posts’

CIA is investing in firms that specialize in sifting through social media posts

57102a2bc46188fc418b45de

The Central Intelligence Agency’s venture capital arm is investing in companies that develop artificial intelligence to sift through enormous numbers of social media postings and decipher patterns, according to a report.
A document obtained by The Intercept indicates that In-Q-Tel, the CIA’s venture capital firm, has made unpublicized investments in 38 companies, many of which are startups specializing in analyzing and extracting useful patterns from large amounts of data from social media.
Social media offers a trove of valuable information for intelligence agencies, but separating the signal from the noise is a monumental task.

“ISIL’s tweets and other social media messages publicizing their activities often produce information that, especially in the aggregate, provides real intelligence value,” CIA second-in-command David Cohen said in a speech at Cornell University in September.

Dataminr, PATHAR and Geofeedia and are among the startups listed in the report, and the products that all three of the companies provide are tools that help peer through an otherwise unwieldy volume of data.

Dataminr’s specialty is picking out trends on Twitter by using a stream of data it gets from the social media platform’s API, or application program interface. News organizations, law enforcement agencies and hedge funds are examples of clients who use the service to stay in the loop about relevant events in real time.

PATHAR’s flagship service, Dunami, is used to by clients, including the FBI, to map out networks of relations between people on social media such as Facebook, Twitter and Instagram to find centers of influence.

Geofeedia automatically monitors geotagged social media posts for the purpose of monitoring breaking news events, and even markets its services to help law enforcement predict violent protests.

“During the Baltimore riots, or Ferguson, you could see a drop [in sentiment],” Lee Guthman, head of business development at Geofeedia, told Inverse, adding that a drop in sentiment on social media could reliably predict the violent riots those events.

All of these firms already have deals with the federal government, and the contracts are publicly viewable, thanks to transparency laws. Dataminr’s $254,990 contract was awarded by the Department of Homeland Security, Geofeedia has earned $126,800 from the Department of Justice, and PATHAR has deals totaling $410,118 from both of those agencies.
Source:https://www.rt.com/usa/339671-cia-investing-social-analytics/

Related Post

The post CIA is investing in firms that specialize in sifting through social media posts appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

WikiLeaks posts CIA chief’s hacked emails

Source: National Cyber Security – Produced By Gregory Evans

WikiLeaks posts CIA chief’s hacked emails

WikiLeaks began posting what it claims are the contents of CIA Director John Brennan’s private email account on Wednesday, days after a teenager claimed to have hacked into his account. The six initial emails posted by the anti-secrecy organization date from 2007 and 2008, and include personal information as well as draft versions of advice and policy positions. Additional documents will be posted “over the coming days,” WikiLeaks said, while claiming that Brennan used the account “occasionally for several intelligence related projects.” In a statement, CIA spokesman Dean Boyd did not dispute the authenticity of the leaked emails. “The hacking of the Brennan family account is a crime and the Brennan family is the victim,” Boyd said. “The private electronic holdings of the Brennan family were plundered with malicious intent and are now being distributed across the web. This attack is something that could happen to anyone and should be condemned, not promoted. “There is no indication that any the documents released thus far are classified,” Boyd added. “In fact, they appear to be documents that a private citizen with national security interests and expertise would be expected to possess.” Among the released documents is a draft version of Brennan’s security clearance […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post WikiLeaks posts CIA chief’s hacked emails appeared first on National Cyber Security.

View full post on National Cyber Security

Snapdragon 620-powered Samsung phone posts neat result on GeekBench – is it the Galaxy A9?

Those keeping watch on Samsung will be excited to learn about an interesting new smartphone of its that’s apparently in the works. And no, we’re not talking about the Galaxy S7, or any weird flip/slider phones whose indisputable retro charm does look out of place in 2015. Rather, we’re talking of a purported Galaxy A9, powered by the Snapdragon 620 SoC, a representative of Qualcomm’s next-gen processor line-up.

The device appeared in GeekBench’s score database, presented as “Samsung msm8976fhdlte-eur-open”. The “msm8976” part of its name is a dead giveaway for the Snapdragon 620’s presence. …

View full post on PhoneArena

A Samsung ‘Lucky-LTE’ device crops up with an Exynos 8890 and 4GB RAM, posts great score

Samsung’s decision to ditch Qualcomm in favor of its own Exynos chips, who had leapfrogged the San Diego-based silicon slinger’s offerings and moved to a superior, 14nm process, was met with complete surprise. Yes, it makes sense for a company that makes its own chips to use them in their phones, but until very recently, Samsung’s semiconductor unit was lagging behind, so Qualcomm was an obvious partner for its super high-ends. If a new benchmark run through GeekBench’s suite of tests is any indication, this isn’t about to change: a new, mysterious device was spotted supposedly running an unknown …

View full post on PhoneArena

Contest confirms Samsung Galaxy S6 Edge Plus name, Middle East store posts specs


There are always the skeptics out there who won’t believe anything you tell them. Just in case there are some skeptics out there who aren’t convinced that Samsung is about to deliver a device called the Samsung Galaxy S6 Edge Plus, here is the proof directly from the company. It seems that Samsung Netherlands is running a contest with the winner getting a chance to see a local version of the manufacturer’s Unpacked event. During the Unpacked event in New York City on August 13th, Samsung is expected to unveil both the Samsung Galaxy S6 Edge Plus and the Samsung Galaxy Note 5.

On the …

View full post on PhoneArena

‘Come at me Aussie police’: Hacker behind posts of hundreds of pictures of naked Queensland women taunts authorities and vows to keep uploading them

Source: National Cyber Security – Produced By Gregory Evans

A hacker responsible for sharing nude images of up to 700 Brisbane women on a New Zealand-based file-sharing service online, has taunted police after they ordered for the photos to be removed. The freely available images, which showed ‘girls from Brisbane and surrounding areas’ in various states of undress, first emerged on a forum on Friday before being removed on Monday morning and reappearing again later that night, Fairfax reports. A police request led to their removal for a second time on Tuesday, which was followed by the hacker vowing to upload the photos again, posting: ‘come at me Aussie police’. The uploader allegedly named the women in the photos and even shared some of their locations. However, officers are limited in their ability to investigate the cybercrime due to a lack of complaints. ‘The thing is, we don’t have a complaint and the focus has to be on harm minimisation to try and get these things down so people’s lives aren’t ruined,’ Detective Superintendent Brian Hay told Faifax. ‘When you’ve got a complaint then you’ve got an offence.’ The news comes just days after hackers stole and posted scantily clad photos of up to 500 Adelaide women on a […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Come at me Aussie police’: Hacker behind posts of hundreds of pictures of naked Queensland women taunts authorities and vows to keep uploading them appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker posts client e-mails from Swiss bank BCGE

Hacker posts client e-mails from Swiss bank BCGE

ZURICH/GENEVA:  A hacker claiming to be behind a cyber attack on Banque Cantonale de Geneve divulged confidential client information after the Swiss bank failed to meet demands for payment. In the latest case of a breach of customer information at a financial firm, an anonymous person or group using the Twitter moniker Rex Mundi said […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Chief data and security posts vacant by Victorian government

The new cyber security plan will be imposed by the Victorian governmental and for that, they are looking to appoint the new Cyber Security personnel. This plan will begin from the upcoming month. The security plan is built up on the structure of the Commonwealth Attorney — General and Australian Signal Directorate. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Chief data and security posts vacant by Victorian government appeared first on National Cyber Security.

View full post on National Cyber Security

How The Washington Post’s New Owner Aided the CIA, Blocked WikiLeaks & Decimated Book Industry 2/2


http://www.democracynow.org – The Washington Post announced on Monday the paper had been sold to Amazon.com founder and CEO Jeff Bezos for $250 million. Bezo…

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Chinese Communist Party Media Posts Execution Photos Actually Came From Fetish Porn Site

Read More….

View full post on The Cyber Wars

Page 1 of 512345»

My Twitter

  • RT @GregoryDEvans: Website/IP https://t.co/EsJOSPQxmg may be hackable #hacked, #WGH, #CAD, #hackerproof https://t.co/6MMAnZm7Iv
    about 39 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/EsJOSPQxmg may be hackable #hacked, #WGH, #CAD, #hackerproof https://t.co/6MMAnZm7Iv #security #…
    about 39 mins ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP https://t.co/uplD3ZibyN may be hackable #hacked, #WGH, #UK, #hackerproof https://t.…
    about 54 mins ago
  • RT @GregoryDEvans: Website/IP https://t.co/uplD3Z0Aad may be hackable #hacked, #WGH, #UK, #hackerproof https://t.co/mqvZ0yo6sM
    about 2 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/uplD3Z0Aad may be hackable #hacked, #WGH, #UK, #hackerproof https://t.co/mqvZ0yo6sM #security #h…
    about 2 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans