Ermittlungen im Umfeld der organisierten Kriminalität sind komplex und zeitaufwändig. Kriminelle Aktivitäten und Verflechtungen erstrecken sich oft über Landes- und Staatsgrenzen hinweg. Damit steigt die Zahl der Datenquellen und der Aufwand, die Vielzahl unterschiedlicher Daten zu sichten und die relevanten Informationen in einen Zusammenhang zu setzen. Ermittler müssen oftmals Chatverläufe oder sichergestellte Geräte wie Pc oder Handys mühsam von Hand durchsuchen. Dabei passiert es leicht, dass Verbindungen zwischen Personen, Orten oder Ereignissen übersehen werden, weil sich die teilweise komplexen Zusammenhänge dem Betrachter auf den ersten Blick nicht sofort offenbaren.
Abbildung 1: Im Zentrum stehen Daten und deren Verbindungen
Die gute Nachricht ist, viele Daten können auch viele Informationen enthalten. Werden sie gefunden, steigen die Chancen, erfolgreich gegen organisierte Kriminalität vorgehen zu können. Weil die personelle Ausstattung der Ermittlungseinheiten nicht im selben Maße steigt wie das Datenvolumen, müssen andere Wege beschritten werden.
Erfolgversprechende Unterstützung durch den Einsatz künstlicher Intelligenz
Im ersten Schritt unterstützen Verfahren aus dem Bereich der künstlichen Intelligenz (KI), indem sie Daten und Informationen aus unterschiedlichen Datenquellen zu geeigneten Informationen für eine Ermittlung zusammenführen. Diesen Prozess nennt man Entity Decision. Eine Particular person taucht beispielsweise in verschiedenen Datenquellen auf. Teilweise stimmen die Schreibweisen nicht überein, teilweise sind die Personendaten unvollständig. KI-Algorithmen durchforsten dann in kürzester Zeit riesige Datenmengen und führen die zu einer Particular person gehörenden Daten zusammen. Dabei ist es unerheblich, ob die Daten strukturiert aus einem Polizeisystem oder unstrukturiert aus einem Chatverlauf stammen. Bei unstrukturierten Daten wie Texten kommen Verfahren der Textual content Analyse zum Einsatz, bei Bildern und Movies Verfahren des Pc Imaginative and prescient.
Abbildung 2: Entity Decision wandelt Daten in handhabbare Informationen
Im nächsten Schritt werden mögliche Beziehungen zwischen den zuvor erstellten Datenobjekten identifiziert. Das ist die Paradedisziplin der Netzwerkanalyse. Personen, Objekte, Lokationen und Ereignisse werden auf Zusammenhänge untersucht. Taucht beispielsweise in einem Texteintrag eines Fallmanagementsystems der Identify eines Verdächtigen auf, durchsucht die Textual content Analyse den Eintrag auf weitere Informationen, wie Lokationen oder weitere Personen. Das Ergebnis dieser Analysen wird in Kind eines Netzwerkes der Ermittlung zur Verfügung gestellt.
Künstliche Intelligenz unterstützt, macht nicht überflüssig
Übernimmt damit künstliche Intelligenz den gesamten Ermittlungsprozess? Nein, im Gegenteil, sie unterstützt die Ermittlungen, indem sie aus einer riesigen Menge unterschiedlichster Daten nutzbare Informationen selektiert und in Relation setzt. Das können intelligente IT-Systeme deutlich schneller als der Mensch. Der wiederum kann sich, befreit von ermüdenden Routinetätigkeiten, voll auf die eigentliche Ermittlungsarbeit konzentrieren. Letztendlich ergänzen sich Mensch und Maschine.
Abbildung 3: Die Summe der Teile ist mehr als das Ganze
Voraussetzung aber ist, dass die Werkzeuge und Oberflächen exakt auf die Rolle des jeweiligen Nutzers zugeschnitten sind und in jeder Section unterstützen und nicht überfordern.
Der Einsatz künstlicher Intelligenz im Kampf gegen organisierte Kriminalität entlastet und unterstützt, mit dem Effekt, dass wieder mehr Zeit für Kreativität und Instinct zur Verfügung steht.
A cyberattack on a software program firm has disrupted unemployment advantages and job looking for help for hundreds of individuals in a number of states.
In Tennessee, the web site for unemployment advantages remained down Thursday morning after the seller, Geographic Options Inc., advised the state Sunday that service can be interrupted. Some 12,000 Tennesseans depend on the unemployment program, and for now, they don’t seem to be getting their funds.
The corporate stated that it expects Tennessee’s system to be again on-line earlier than July 4.
“With a recession looming, it’s unacceptable that Tennesseans can’t obtain the unemployment advantages they deserve,” stated state Republican Sen. Paul Bailey, commerce and labor committee chairman.
In an announcement dated Wednesday night, Geographic Options’ president stated preliminary investigation findings point out that no private knowledge was accessed and no knowledge was faraway from its community operations middle.
The president, Paul Toomey, stated his firm recognized “anomalous exercise” on its community and instantly took the Tennessee system offline to halt the exercise.
“With the assistance of third-party specialists, we’re conducting a full investigation to find out the trigger and scope of the incident,” Toomey stated. “That investigation continues to be ongoing, and we’re taking steps to assist stop this from taking place once more.”
Unemployment web sites in a number of different states have been affected too. In Louisiana, folks looking for to file unemployment on-line are directed as an alternative to make use of a name middle as an alternative. The web site to file claims in Nebraska was taken offline and the state stated it didn’t have an actual timeline for when it could be again up.
“People can’t file for unemployment till the system is again on-line,” Nebraska Division of Labor spokeswoman Grace Johnson stated in an e-mail.
It is nonetheless unclear if it was a ransomware assault or another sort of cyber incident that affected Geographic Options. Nor it’s clear what number of states are affected.
Geographic Options’ web site was not working Thursday morning and telephone messages looking for remark from the corporate weren’t instantly returned. The Florida-based firm has stated its shoppers embrace greater than 35 states and territories.
Some state-run job looking for websites have been additionally taken offline due to the assault, together with Tennessee’s. Florida stated it was quickly waiving a job search requirement for these receiving unemployment funds. Texas created a brand new web site for its job seekers with hyperlinks to common work search websites similar to LinkedIn.
Nebraska stated Geographic Options indicated that no person’s private knowledge was compromised. Florida stated there have been no indications any of its state techniques have been breached.
Bailey, the Tennessee lawmaker, stated the state’s labor division wants a back-up plan, “so they don’t seem to be fully depending on a system confirmed to be unreliable.” He stated the state ought to do “no matter it takes” to get folks their unemployment advantages now and streamline the method to replace the system with cash put aside by state lawmakers.
The size of the potential outage is unknown. Texas stated it anticipates its job-search websites to stay offline till early subsequent week.
State governments, in addition to their contractors, are sometimes targets of cyber criminals. Nigerian on-line rip-off artists have been significantly lively in stealing elevated unemployment aide on the peak of the coronavirus pandemic.
Ransomware assaults, through which criminals encrypt victims’ knowledge and demand fee to return them to regular, proceed to trigger havoc on digital techniques that present important authorities companies. A current ransomware assault on Costa Rica’s government caused lecturers to go unpaid and prompted chaos within the nation’s well being care system.
Final 12 months, cybercriminals launched ransomware assaults within the U.S. that compelled the shutdown of an oil pipeline that provides the East Coast, halted manufacturing of the world’s largest meat-processing firm and compromised a significant software program firm that has hundreds of consumers world wide.
Regardless of prioritizing the issue, the U.S. authorities has had little luck holding main ransomware actors accountable. Many function in or close to Russia with impunity.
Allan Liska, an intelligence analyst on the cybersecurity agency Recorded Future, stated an assault affecting those that have misplaced their jobs from acquiring unemployment advantages is a stark reminder of the large results cybercrime can have.
“The individuals who will probably be most adversely damage by this are these with the fewest assets,” he stated.
Cyberattack disrupts unemployment advantages in some states (2022, June 30)
retrieved 30 June 2022
This doc is topic to copyright. Aside from any truthful dealing for the aim of personal research or analysis, no
half could also be reproduced with out the written permission. The content material is offered for data functions solely.
The artwork of concealing or misrepresenting one’s identification within the bodily world has lengthy been practiced by spies engaged in espionage. In response, intelligence businesses designed strategies and applied sciences to determine folks making an attempt to cover behind aliases.
Now, following the U.S. Supreme Court docket ruling overturning Roe v Wade, girls in america in search of help with undesirable pregnancies have joined the ranks of spies.
The ruling has resulted in a number of set off legal guidelines coming into impact in conservative states to outlaw abortions in these states. These legal guidelines, coupled with teams focusing on girls’s reproductive rights protests, have raised worry amongst girls of all ages about their knowledge getting used in opposition to them.
Hundreds have engaged with on-line posts calling on girls to delete their period tracking apps, on the premise that knowledge fed to those apps may very well be used to prosecute them in states the place abortion is prohibited. On the identical time, abortion clinics in New Mexico (the place abortion stays authorized) are reportedly bracing for an inflow of girls from U.S. states.
As somebody who has served as a particular agent for america Military and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the U.S. Protection Intelligence Company, I can let you know deleting interval monitoring apps is probably not sufficient for susceptible girls now.
However there are some instruments girls can use to hide their identities, ought to this be needed—the identical instruments as soon as reserved for skilled spies.
Menstrual monitoring app Stardust is one in all Apple’s prime three most-downloaded free apps proper now. It is also one in all few apps that has mentioned it’ll voluntarily—with out being legally required to—adjust to regulation enforcement if it is requested to share consumer knowledge. https://t.co/sJ17VAiLvp
Other than espionage, the emergence of the web created a brand new impetus for widespread knowledge assortment by knowledge aggregators and entrepreneurs. The fashionable surveillance economic system grew out of a need to focus on services and products to us as successfully as attainable.
Immediately, huge swathes of private info are extracted from customers, 24/7—making it more and more troublesome to stay unmasked.
Knowledge aggregation is used to evaluate our buying habits, observe our actions, discover our favourite areas and procure detailed demographic details about us, our households, our co-workers and buddies.
Current occasions have demonstrated how tenuous our privateness is. Protests in Hong Kong have seen Chinese language authorities use cameras to determine and arrest protesters, whereas police within the U.S. deployed numerous applied sciences to determine Black Lives Matter protesters.
Articles appeared in Australian media outlets with recommendation on how one can keep away from being surveilled. And folks have been directed to web sites, such because the Electronic Frontier Foundation, devoted to informing readers about how one can keep away from surveillance and private knowledge assortment.
What we have discovered from each spy historical past and newer occasions is that knowledge assortment isn’t all the time overt and apparent; it is typically unseen and opaque. Surveillance could come within the type of cameras, drones, automated quantity plate readers (ANPR/ALPR), toll payment devices, acoustic collectors and naturally any internet-connected machine.
In some instances when your fellow protesters add pictures or movies, crowd-sourced intelligence turns into your enemy.
Knowledge deleted, not destroyed
Lately, lots of the main target has been on telephones and apps. However deleting mobile apps is not going to stop the identification of a person, nor will turning off location providers.
Regulation enforcement and even business corporations have the power to entry or observe sure metrics together with:
worldwide cellular subscriber identification (IMSI), which is expounded to a consumer’s cellular quantity and related to their SIM card
worldwide cellular tools identification (IMEI), which is straight associated to their machine itself.
Advert servers may exploit machine areas. Non-public corporations can create commercials focusing on gadgets which are particular to a location, reminiscent of a girls’s well being clinic. And such “geofenced” advert servers can determine a consumer’s location no matter whether or not their location settings are disabled.
Additional, anonymised telephone observe knowledge (like name indicators pinging off close by towers) could be bought from telecommunications suppliers and de-anonymised.
Regulation enforcement can use this knowledge to hint paths from, say, a fertility clinic to an individual’s dwelling or “mattress down” location (the spy time period for somebody’s residence).
The underside line is your telephone is a marker for you. A brief cellular phone with an abroad SIM card has been the selection for some folks wishing to keep away from such monitoring.
Including to that, we not too long ago noticed headlines about facial recognition expertise being utilized in Australian retail shops—and America isn’t any totally different. For anybody making an attempt to evade detection, it is higher to swap financial institution playing cards for money, stored-value playing cards or present playing cards when making purchases.
And utilizing public transport paid with money or a ride-share service offers higher anonymity than utilizing a private automobile, or perhaps a rental.
Within the spy world, listening to one’s gown is crucial. Spies change up their look, utilizing what they name “polish,” with the assistance of reversible clothes, hats, totally different types of glasses, scarves and even masks (that are ideally not conspicuous lately). In excessive instances, they might even use “home equipment” to alter their facial characteristics.
Then once more, whereas these measures assist in the bodily world, they do little to cease on-line detection.
On-line, the usage of a digital non-public community (VPN) and/or the onion browser, Tor, will assist enhance anonymity, together with from web service suppliers.
On-line you’ll be able to create and use a number of personas, every with a unique e mail deal with and “private knowledge” linked to it. Aliases could be additional coupled with software program that removes cookies and browser historical past, which can assist conceal one’s on-line identification.
One instance is CCleaner. This program removes privacy-violating cookies and web historical past out of your machine, whereas bettering your machine’s privateness.
There are additionally loads of on-line purposes that enable the usage of short-term e mail addresses and telephone numbers, and even short-term lodging addresses for package deal deliveries.
To some, these could look like excessive privateness measures. Nevertheless, given the widespread assortment of identification knowledge by business corporations and governments—and the resultant collaboration between the 2—there’s purpose to be involved for anybody eager to fly below the radar.
And for girls in search of abortions within the U.S., these measures could also be essential to keep away from prosecution.
After Roe v Wade, this is how girls might undertake ‘spycraft’ to keep away from monitoring and prosecution (2022, June 30)
retrieved 30 June 2022
This doc is topic to copyright. Other than any truthful dealing for the aim of personal examine or analysis, no
half could also be reproduced with out the written permission. The content material is supplied for info functions solely.
A cyberattack briefly knocked out private and non-private web sites in Norway previously 24 hours, Norwegian authorities stated Wednesday.
Norwegian Prime Minister Jonas Gahr Støre stated that to his data the assault “has not induced any vital injury.”
The distributed-denial-of-service (DDOS) assault focused a safe nationwide information community forcing the non permanent suspension of on-line providers for a number of hours, the Norwegian Nationwide Safety Authority stated.
A felony pro-Russian group appears to be behind the assaults, NSM head Sofie Nystrøm stated. She added that the assaults “give the impression that we’re a bit within the present political scenario in Europe.”
Norwegian media reported that the nation’s ambassador to Moscow was summoned to the International Ministry Wednesday for a grievance over Russian provides being prevented from transiting by way of Norway to an Arctic Russian coal-mining settlement.
The Barentsburg settlement is within the Svalbard archipelago, greater than 800 kilometers (500 miles) north of the Norwegian mainland. The European Union has slapped sanctions on a number of Russian items as a result of struggle in Ukraine. Norway shouldn’t be a member of the EU however mirrors its line on most matters. Beneath a 1920 treaty, Norway has sovereignty over the Svalbard archipelago, however different signatory international locations have rights to take advantage of its pure sources.
Wednesday’s cyberattack on Norway got here two days after an identical assault briefly knocked out private and non-private web sites in Lithuania with a pro-Moscow hacker group reportedly claiming duty.
That incident got here per week after Russian officers threatened to retaliate as a result of Lithuania restricted the transit of metal and ferrous metals sanctioned by the EU by its territory to Russia’s exclave of Kaliningrad.
Cyberattack hits Norway, pro-Russian hacker group fingered (2022, June 29)
retrieved 29 June 2022
This doc is topic to copyright. Other than any honest dealing for the aim of personal research or analysis, no
half could also be reproduced with out the written permission. The content material is offered for info functions solely.