Refer: HBGaryFederal-Social Engineering Attack
A part of this blog referred to detecting linguistic anomalies and profiling based on the contents.
This is an update blog entry: Concordia University Anonymous Email Profiling
Researchers from Concordia University, have now achieved anonymous email detection with around 80-90% accuracy to identify the author of the email. But, the requirement for such analysis requires access to past email conversations of the suspects, this method would prove beneficial only when complete data-set is made available.
Real-time on the fly analysis using this technique, for an email system would require immense data storage and computational resources. So as of this moment the only ones to benefit from this are the governments and law enforcement agencies. Applications are few but as of this moment this seems outrageous to my mind – detection of content written by known entities using aliases with possible impact on National Security.
4 Comments
Abram
Actually difficult to get advised persons on that matter, however you sound like you are aware of exactly what you are writing on! Appreciate it
R Sachin
Hello Abram,
Thanks.
Humans are still trying to understand the functional working of mind, the decisions it takes. A small example from real-life which is connected to this post – An Art Expert will immediately arrive at the decision about the authenticity of a painting, but will take take an awfully long time to arrive at the conscious conclusion. This example has never been a part of any published research.
Someone once told me – “conveying your thoughts to other is difficult, converting your thoughts / ideas into actions is a bit more difficult, putting them into written form is the most difficult of all”. But, when it comes to computer applications / algorithms, the additional task is to replicate the functional aspect which provides the same result, in this case – identifying the anonymous author.
Regards
Pingback: Director | Engineering | Systems | aerospace company | nuclear missile
Pingback: Anonymous : nic.in hack a different perespective | Welcome to the eScan Blog