SlideShare uma empresa Scribd logo
1 de 85
Shalin Hai-Jew
Kansas State University
Conference on Higher Education Computing in Kansas (CHECK)
May 29 – 30, 2013, Pittsburg State University, Pittsburg, Kansas
 Maltego Radium™ (v. 3.3.3; v. 1 in 2008) is a penetration testing
tool that collects public data about organizations, websites, and
identities, for awareness of social and technological presence
across the Internet. The tool’s interface is highly usable and
interactive. The tool enables a deep dive analysis into the
interrelationships online, and it extends the “knowability” of
electronic identities. This tool enables explorations of emails,
telephone numbers, websites, organizations, by offering access to
information that would often be “invisible” otherwise. The visual
outputs are interactive and include half-a-dozen visualizations in a
social network (node-link) format. The presentation will show
how to conduct “machines” and “transforms” of a target, how to
visually map the data, and how to analyze it.
Maltego Radium: Mapping NetworkTies and Identities across the Internet 2
 People at some point will have linked their pseudonyms with real-
world personally identifiable information (PII)
 People act on interests (which are expressed in some way
electronically), and their interests reveal something about the
unknown node
 People’s online relationships can identify an unknown node based
on the connections, power relationships, intercommunications,
and the external identities
 All online actions can be linked to geographical locations, and
those locations may be revealing
 Knowability of an unknown node / entity (or group) is increased
when a collective and comprehensive electronic footprint is
rendered
Maltego Radium: Mapping NetworkTies and Identities across the Internet 3
 Hi! Who are you, and what are your interests
re: the topic? Anyone ever use a “hacking”
tool? If so, what?
 Do you have an idea for a Maltego Radium™
“machine” or “transform” run that you want
us to try during this session? (I’ll ask you near
the end of the presentation.)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 4
Electronic Network Analysis:
People
Content
Technologies
Maltego Radium: Mapping NetworkTies and Identities across the Internet 5
 People often interact in homophilous (preferential selection based
on similarities with the self or the in-group; assortative mixing) or
heterophilous (preferential selection by difference; disassortative
mixing) ways
 Depending on the non-kin social context (such as work-based,
volunteer-based, romance-based, friendship-based, hobby-based, or
others)
 People find meaning and identity in ways similar to those that are
close to them (the “company you keep” assumption); yet, people’s
identities in this age are not necessarily coherent and unified but
are fragmented and multiple and experimental
 World is socially constructed in various types of hierarchies
(structurally)
 Resources and information (and inter-exchanges) move through these
hierarchies through particular social paths
Maltego Radium: Mapping NetworkTies and Identities across the Internet 6
 Electronic socio-technical spaces (STS)
somewhat mirror the real world but not 1-1
(or even close); called the “cyber-physical
confluence”
 Electronic data may be used to make some
cautious extrapolations (or informal intuitions or
“whispers”) about real-world off-line
personalities, values, and actions
 Social network analysis (SNA) data are used with
other information to set a full(er) context
Maltego Radium: Mapping NetworkTies and Identities across the Internet 7
 Electronic spaces offer empirical in vivo (in-field) relational
information (based on actual links, actual connections,
and actual relationships based on electronic
documentation) that is behavior- and action-based and
not professed only
 May include “big data” analyses of entire datasets of complete
networks
 May include cross-references between numbers of data sets
 Strength of inter-relationships is critical based on
interaction patterns
 Complex statistics and layout algorithms are used to express
relationships in social network analysis
 Radically different visualizations may be possible depending on
the layout algorithms
Maltego Radium: Mapping NetworkTies and Identities across the Internet 8
 What moves through network topologies (digital
information, resources, influence and
socialization, and memes, etc.) is also important
to understand and analyze
 Machine-analyzed computerized sentiment analysis
(through text mining) is one way to evaluate
messages moving through virtual communities
 Word frequency counts is another machine-based
way to evaluate messages
 Image analysis is another way to evaluate message
Maltego Radium: Mapping NetworkTies and Identities across the Internet 9
 Graphs built from graph metrics, which describe structural
aspects of the network (such as numbers of nodes and
links, types of connections, density or sparseness of ties,
leadership and role types, motif censuses, and other
factors)
 Graphs as 2D spaces
 Not x or y axes but about relationships between the nodes and
the links
 Can lay out the same information in multiple ways using the
same layout algorithm
 Nodes and links (node-link diagrams); vertices and edges /
arcs
 Direct and indirect ties
 Centrality-peripherality dynamic (degree centrality); closeness-
distance dynamic (paths; degrees of separation)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 10
 Fat (influential) and thin (peripheral) nodes; bridging
nodes
 Nodes are parts of multiple or many networks
 Nodes play different roles in different networks
 Dense networks vs. low-density (sparse) networks
 Networks function better with density for some group
objectives; networks function better with low-density or
sparseness for some other group objectives
 Path dynamics for percolation and flow
 In-group; out-group dynamics; social identity (node,
sub-group, network, and multi-network levels)
 Layering effects; network dependencies; network
overlap and interrelationships
Maltego Radium: Mapping NetworkTies and Identities across the Internet 11
 Multimodal elements
 Root entities
 Leaf entities
 Branching connections
 Connective events
Maltego Radium: Mapping NetworkTies and Identities across the Internet 12
 What do you know about penetration (pen)
testing?
 Any prior experiences with Maltego
Radium™?
Maltego Radium: Mapping NetworkTies and Identities across the Internet 13
Uses Java
Runs on Windows, Mac, and Linux operating systems
Applies a 2D or 3D Graphical User Interface (GUI)
Enables complex and fast crawls without need for command line
coding
Uses Maltego Radium™ (by Paterva)Transform Application
Servers for some data extractions
Maltego Radium: Mapping NetworkTies and Identities across the Internet 14
 Shows links between people; groups of people (social
networks); companies; organizations; web sites; internet
infrastructure (domain, DNS names, netblocks, IP
addresses); phrases; affiliations; documents and files
 Based on open-source (publicly available) information or
“open-source intelligence” (OSINT)
 Does not involve the breaking of network controls to access
information
 Assumes benign information in isolation may be turned
malicious in combination and / or relationship to other data (as
in “big data” analytics)
 Is a “dual use” technology with a range of applied “data
harvesting” / structure-mining / datamining and analytical
uses
Maltego Radium: Mapping NetworkTies and Identities across the Internet 15
 “Penetration”: Unauthorized access or a “break-
in” to a protected network
 Combination of attacks on hardware (device exploits),
software (malware, password cracking, keyloggers,
andTrojan Horses), and wetware (social engineering,
phishing, and spear phishing)
 Black Box, Gray Box, or Crystal Box (no knowledge of
the target network; partial knowledge of the target
network; full knowledge of the target network)
 Conceptualized and practiced in an adversarial way
Maltego Radium: Mapping NetworkTies and Identities across the Internet 16
 Risk environment modeling with adversaries
(white and gray-hat hackers; red teams)
 Offensive and defensive campaigns (pen testing part
of offensive security testing)
 Countermeasures: security awareness, self-
awareness of vulnerabilities (technological, human,
political, policy, and others), policy-setting,
surveillance / intrusion detection, firewalls, training of
staff, security networks, technologies,
communications, professional partnerships, and
others
Maltego Radium: Mapping NetworkTies and Identities across the Internet 17
 Maltego Radium™
 Enables crawls / scrapes / scans of the potential public and
private “attack vectors” of an organization or network’s
structure
 Shows what is seeable and knowable by others, so proper
protections may be put into place (as part of basic
electronic reconnaissance or surveillance of so-called
“perimeter systems”)
 May be used as part of a “red team” simulated (or actual)
attack to test defenses in pen testing
 Offers a starting point for the strategy, planning, further
probes, and other actions
▪ May be followed by more focused, targeted, and nuanced attacks
Maltego Radium: Mapping NetworkTies and Identities across the Internet 18
“DOXING” (DOCUMENTING)
ATTACKS
 “Doxing” based on
“documenting” by tracking
personally identifiable
information
 Creation of “dossiers” of
individuals or groups by
hacktivists to use in ad
hominem and other attacks
CYBER-STALKING
 Tracking individuals’
electronic presences and
relating that to real-world
presences for harassment
and other nefarious
purposes
Maltego Radium: Mapping NetworkTies and Identities across the Internet 19
INTERPERSONAL ELECTRONIC
SURVEILLANCE (IES)
 Self-surveillance
 Electronic grooming
 Sousveillance (inverse
surveillance; watchful
vigilance from below or inside
an organization or social
structure; participant
surveillance)
 Horizontal surveillance
 Vertical surveillance
ORGANIZATIONALOR GROUP
SURVEILLANCE
 Mapping one’s own organization
for public relations purposes
 Analyzing telepresences on social
media platforms through
extractions of Representational
StateTransfers or “REST”
 Perusing Internet andWeb-
based presences of
organizations
 Creating outreach and marketing
strategies for external
organizations
 Finding identities of individuals for
contact in corporations or
organizations (through the back
door)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 20
 There are legitimate reasons to pursue pseudonymity and
anonymity (such as to prevent harm)
 Eliminating pseudonymity (untraceable long-term anonymity;
exclusive use of a pseudonym over time for reputation transfer,
branding, and “authornym” use; ability to prove “holdership” of a
pseudonym) and anonymity (temporary, ephemeral, and partial
hiding) and enforcing an “inescapable identity” and non-
discretionary revelation
 Traceability means that at least a single intermediary knows actual
identity (for traceable anonymity or traceable pseudonymity)
 The problem of time involves the fact that archived electronic sites
are fixed (as big data corpuses), and may be analyzed using a variety
of future tools with increasing capabilities
 Making the Internet more of a nonymous, transparent, and
traceable space
Maltego Radium: Mapping NetworkTies and Identities across the Internet 21
 Harder to use Maltego Radium™ for actually verifying
identity and real-ness / personhood, without the
affordances of a verified real-persons database and other
checks
 May guess that a virtual online identity is faked or improperly
back-stopped
Maltego Radium: Mapping NetworkTies and Identities across the Internet 22
THE INDIVIDUAL EXPERIENCE
 De-anonymizing / re-identification: Connecting
personally identifiable information (PII) of the physical
self to aliases, pseudonyms, handles, or accounts
 Narrowing the potential “anonymity sets” for various
individuals (those to whom one may be temporally
anonymous); the protection of identity as a “layered” one
 Linking partitioned parts of an individual’s online life, and
connecting partial identities (from various contexts) to
coalesce for a fuller version of an individual
Maltego Radium: Mapping NetworkTies and Identities across the Internet 23
 Identifying hidden (inter)relationships in electronic information:
 Showing hidden connections and affiliations (for exploration and
analysis)
▪ Identifying sleeper communities of interest
▪ Identifying influential nodes (or clusters) in a network
 Revealing personal information
▪ Extrapolation of user interests and online seeking behavior
 Revelation of potentially private documents
The Human Flaw
 “All aliases initially originate from one person, with one mind, and
one personality.”
 Tal Z. Zarsky (2004, p. 1352), in “Thinking outside the Box: Considering
Transparency,Anonymity, and Pseudonymity as Overall Solutions to
the Problems of Information Privacy in the Internet Society”…
 Said another way: “Character reveals…”
 Vulnerable to “the aggregation attack” on profiles (requiring only a
few unique data points)
24Maltego Radium: Mapping NetworkTies and Identities across the Internet
…using Maltego Radium™
(likely with complementary other software, equipment, and tools)
25Maltego Radium: Mapping NetworkTies and Identities across the Internet
Maltego Radium: Mapping NetworkTies and Identities across the Internet 26
 Think breadth and depth
1. Run a Maltego Radium™ Machine (sequencing
including synchronicity of selected “transforms”
through macros)…then further select transforms on
selected nodes
2. Drag and drop from the left menu “palette” to the
work space to actualize different select searches
 Tailoring the data crawl through user filters (selecting
options at various junctures during the crawl)
 May layer further queries on former search results (in
the same session or in later sessions)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 27
 Maltego Radium™’s “machines” and “transforms” are
not invisible to the crawled or scanned networks; the
surveiller faces counter-surveillance
 Radium™ user often gives up his or her identity and other
information when conducting a data extraction or crawl
(by leaving trace data)
 Organizations and networks (their network
administrators) have it in their interests to know who is
scoping them out / possibly “prospecting”
▪ Many “attack surfaces” are honeypots (lures / traps / sentinel plots
for hackers to self-reveal); there will be purposeful obfuscation
▪ Forensic analyses post-attack may result much more about the
objectives and criminal skill sets of the attackers
Maltego Radium: Mapping NetworkTies and Identities across the Internet 28
GENERAL CRAWL
 API key (application
programming interface)
 IP Address (Internet Protocol
-- yours or the proxy one you
are using)
 The transform executed
 The time it executed
 The user ID (which gives first
name, last name and email
address)
 Paterva does not log the
questions asked or the results
ACCESSTO SOMEWEB
SERVICES
 First name
 Last name
 Email address
 Time registered
 Time first used
 How many transform you ran
 MAC address you selected
 Your operating system type
and version, but not details of
service packs etc.
 GUI version
Maltego Radium: Mapping NetworkTies and Identities across the Internet 29
 User has to allow Paterva to disclaim liabilities
before transform runs may be made
 Crawl “Damage”: Unclear what “damage” may occur
from transforms (but some crawls may be trespassing)
 Sample of a Disclaimer: “Please note this transform is
being run on the PatervaTransform Distribution Server
and has been written by the user 'Andrew MacPherson'.
This transform will be run on * and Paterva cannot be held
responsible for any damage caused by this transform, you
run this ATYOUR OWN RISK. For more information on
this transform feel free to contact…”
Maltego Radium: Mapping NetworkTies and Identities across the Internet 30
 Select machine
(a sequence of
“transforms”)
 Identify target
(phrase, name,
URL,
organization,
etc.)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 31
 Select a transform (one type of
information changed to
another type) by dragging and
dropping from left menu bar to
the work space
 Identify target by double-
clicking node
 May highlight a range of icons
to conduct transforms on
 Sub-transforms customized to
particular types of entities or
nodes
 Information resolves out from
type to type
Maltego Radium: Mapping NetworkTies and Identities across the Internet 32
 Company Stalker: Email addresses at a
company’s domain(s)
 Footprint L1: “Fast” and limited footprint of a
domain
 Footprint L2: “Mild” and semi-limited footprint
of a domain
 Footprint L3: “Intense” and fairly in-depth and
internal footprint of a domain
 Person- Email Address: Identifies a person’s
email addresses (but needs a disambiguated or
fairly uncommon name…or the data is noisy)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 33
 Prune Leaf Entities: Prunes all leaves
(entities with no outgoing links and just one
incoming link—aka pendant nodes) to clear
the screen for re-crawls (and to de-noise the
data)
 Twitter Digger: Phrase as aTwitter search
 Twitter Geo(graphical) Location: Finding a
person’s location based on multiple
information streams
Maltego Radium: Mapping NetworkTies and Identities across the Internet 34
 Twitter Monitor: MonitorsTwitter for
hashtags (#) and named entities mentioned
(@)
 AllTwitter crawls rate-limited by amounts of
information downloadable per time period by
Twitter API
 URL to Network and Domain Information:
From URL to network and domain
information
Maltego Radium: Mapping NetworkTies and Identities across the Internet 35
 Devices
 A phone, mobile device, or
other used by the individual
or connected to various
accounts or a network
 Infrastructure
 AS – Autonomous System
Number (as assigned by IANA
to RIRs)
 DNS Name – Domain Name
System (identification string)
 Domain – Internet Domain
 IPv4 Address – IP version 4
address
 Infrastructure (cont.)
 MX Record – DNS mail
exchanger record (indicator of
mail server accepting email
messages and how email
should be routed through
SMTP)
 NS Record – A DNS name
server record (with indicators
of subdomains)
 Netblock – An internet
autonomous system
 URL – An internet Uniform
Resource Locator (web
address as a character sting)
 Website – An internet website
(related web pages served
from a single domain)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 36
 Locations
 A location on Mother Earth
(to find domains and other
such information)
 Penetration (“Pen”)
Testing
 Company
 Social Network
 Facebook Object
 Twit entity
 Affiliation – Facebook
 Affiliation –Twitter
 Personal
 Alias
 Document
 Email Address
 Image (EXIF or “Exchangeable
Image File” data extraction:
geotagged data, GPS, and
general image conditions
information like digital
camera settings)
 Person
 Phone Number
 Phrase
Maltego Radium: Mapping NetworkTies and Identities across the Internet 37
 May import or export
palette contents / entities
(macros for customized
“machines” sequences /
transforms sets, or stand-
alone “transforms”)
 Assumes some ability to
create one’s own scripted
Maltego Radium™ macros
(with Maltego™ Scripting
Language or MSL) as well
 May be as simple as drag-
and-drop with existing
transforms
38
Maltego Radium: Mapping NetworkTies and Identities across the Internet 39
Maltego Radium: Mapping NetworkTies and Identities across the Internet 40
 Delinking
 User pruning of nodes that
are not interconnected or
related to the search
 User filtering or
identification of bad
domains to exclude from
the crawl
 Linking
 May link multiple nodes to
run further transforms to
identify possible
relationships
Maltego Radium: Mapping NetworkTies and Identities across the Internet 41
 Extraction of close-in
node-level multiplex
data (vs. meta-level
networks)
 Put cursor on a node
for the details in the
right pane
 May conduct more
transforms on that
node for more data
42
 May right-click to add notes on various
entities to keep written records and
annotations
 Paterva’sCase File enables even more
sophisticated human-annotated record-
keeping of information discoveries (like
research journals or investigator files)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 43
 What have your experiences been with data
visualizations? Graphs?
 What are graphs?
 How is data used to create graphs?
 How are graphs interpreted?
Maltego Radium: Mapping NetworkTies and Identities across the Internet 44
Layout (and interaction) modes:
Block
Hierarchical
Circular
Organic
Interactive organic
Maltego Radium: Mapping NetworkTies and Identities across the Internet 45
Maltego Radium: Mapping NetworkTies and Identities across the Internet 46
Maltego Radium: Mapping NetworkTies and Identities across the Internet 47
Maltego Radium: Mapping NetworkTies and Identities across the Internet 48
Maltego Radium: Mapping NetworkTies and Identities across the Internet 49
Maltego Radium: Mapping NetworkTies and Identities across the Internet 50
Maltego Radium: Mapping NetworkTies and Identities across the Internet 51
Maltego Radium: Mapping NetworkTies and Identities across the Internet 52
Maltego Radium: Mapping NetworkTies and Identities across the Internet 53
Maltego Radium: Mapping NetworkTies and Identities across the Internet 54
Maltego Radium: Mapping NetworkTies and Identities across the Internet 55
 “Company Stalker” (~ hackerish semantics)
 Person
 Affiliation (Flickr)
 EmailAddress
 Phone Number
 Document
 Phrase
 Domain
 Alias
 URL
 Website
Maltego Radium: Mapping NetworkTies and Identities across the Internet 56
Maltego Radium: Mapping NetworkTies and Identities across the Internet 57
 BubbleView
 Crawling two
persons to
see if
anything
links up
 Combining
crawls to
answer
directed
questions
Maltego Radium: Mapping NetworkTies and Identities across the Internet 58
Maltego Radium: Mapping NetworkTies and Identities across the Internet 59
 Links to an IP address
Importing:
Maltego Radium™ files
Tabular files
Saving :
.mtgx files
Exporting:
Data sets
Reports
Graphs
Maltego Radium: Mapping NetworkTies and Identities across the Internet 60
Maltego Radium™ Files
 .mtz files (for PaletteTransform entities)
 .mtgx files (for graph visualizations and
crawls)
Tabular Files
 .csv, .xlsx, and .xls (for graphs)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 61
Saving Proprietary Data Sets
 Saves as a .mtgx (Maltego Radium™ graph file)
 May encrypt as AES-128 (Advanced Encryption
Standard 128)
 Native files are not particularly large
 Saves “machine” and “transform” parameters to
re-crawl and update data sets for future runs
 Note: Datasets considered to be “unstructured”
or “loosely structured” because of the mix of
content structures among the types of captured
data
Maltego Radium: Mapping NetworkTies and Identities across the Internet 62
Exporting Reports and
Graphs
 Report file types
(complete summaries
of extracted
information): .pdf
 2D graph as image
(including zoomed-
in): .gif, .png, .bmp,
and .jpg
63
64
 May extract graph data as tables of textual
information for further analysis through “Entity
Lists” tab
APPLIED DECEPTION
 So far, what do you think is
“knowable” (linkable) using tools
like Maltego Radium™ (along
with other research tools)?
 What do you think your online
profile looks like?
 How does this knowledge of
Maltego Radium™ capabilities
change how you deceive,
project, hide, obfuscate, or
throw others off your trail
(assuming you might)? 
APPLIED ACADEMIC RESEARCH
 Is there any interest in using this
tool for academic research
applications? If so, what sorts of
research applications are you
considering?
 What may be asserted about the
data? How is this data bounded
or limited?
 How can this high-
dimensionality data be used in
an “inference attack”? How
accurate or inaccurate would
such attacks be? How can the
accuracy of such attacks be
improved?
Maltego Radium: Mapping NetworkTies and Identities across the Internet 65
…through data-mining, structure mining
…through syntactic and semantic stylometry (with writing style as an
“invariant,” with discernible “tells” for obfuscated and imitated writing) for
authorship recognition
…through electronic “tells” and sufficiently detailed individual profiles
…through cross-referencing information from multiple databases (“big data”
analysis, especially statistical correlations)
…through computational research
…through human analytics and logic
Maltego Radium: Mapping NetworkTies and Identities across the Internet 66
 A data crawl as a starting point…
 Interactions with the data
▪ Logical deductions and inferences (e.g. Internet “traffic
analysis”—where people go online—based on linkability
structures)
▪ Ties to physical locations from multiple related accounts
 Pruning of leaf entities to disambiguate the findings
 Additional data extractions and crawls or
computational research
▪ Supplementary research with other complementary or even
overlapping software tools
 Further hypothesizing and testing
 Real-world explorations
Maltego Radium: Mapping NetworkTies and Identities across the Internet 67
SCALE: DATA SET SIZES
 Giant (macro) data sets
 Forever crawls for the L3
footprints (if one filters
unwisely by being too inclusive;
otherwise, blisteringly fast)
 Total domain searches
(including whole-country
domain searches) but at a high
level
 Huge depth that is time-
consuming to explore
(demanding on researchers)
 Micro data sets as well (to the
level of the individual ego
node)
TIME
 May be a slice-in-time,
sequential, or continuously
dynamic (for real-time
dynamic network analysis or
“DNA”; focus on changes over
time or trendline data)
temporal data
 Continuous dynamic for an
“intel dashboard” or “data
feed” for situational
awareness
 May be used to link space and
time dimensions
68
SPATIO-TEMPORAL
 A fast-changing electronic environment
 Need to update and review data extractions regularly
 Need to be aware of the existence of private channels
 Need to work within an evolving legal ecosystem
 Costs: time, computational expense, attention
 Binding up time (even with blinding speeds of
millisecond crawls) and computational expense on
even high-end consumer machines
 Premature crawl stoppages, incomplete crawls, or
over-data (excessive data)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 69
 User / analyst strengths and limitations
 Need to wield the tool intelligently and not over-claim or
under-claim results
 Could use tool for initial discovery, pattern recognition,
and anomaly detection
 Engage a fairly high learning curve
 Apply complementary data for informed interpretation
 Avoid conflating popularity with influence, thin node
peripheral positions with powerlessness, and other
challenges
 Avoid under-sampling (collecting too little information)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 70
 Newness of computational research in some
academic / research / professional fields and
analytical applications
 Challenges to research rigor and generalizability
 Challenges to domain field acceptability
 Openness in terms of methodologies
 The “primitiveness” of network science in various
practical (research, analysis, decision-making, and
other) applications
Maltego Radium: Mapping NetworkTies and Identities across the Internet 71
 May not be able to generalize far with only a partial
data extraction or crawl (social media platform API
limits, software limits), which provides descriptive
data about networks
 Even relatively “complete” crawls have to be properly
analyzed and documented
▪ Particular “branches” may be analyzed to understand particular ego
neighborhoods or focal nodes
▪ Crawls may include long-closed accounts (such as for emails)
▪ Other branches need to be pruned to de-noise the data
 Analysis requires the making of inferences from what may
be seen structurally
 May only assert within legal bounds (no hackerish
techniques to access information—of course)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 72
 Social media platform accounts may be human, ‘bots, or
cyborgs
 Various socio-technical systems (STS) may be gamed
▪ People engage in impression management and spin; they engage in
obfuscation (they are strategic about information); identities may be
back-stopped electronically with various hoaxed accounts
 Electronic systems may all be hoaxed (like honeypots or black
holes, accounts, online email systems, digital contents, and
websites)
 Accounts may have some “light leakage” or “data exhaust”
(unintended revelations that may be observed, analyzed,
inferred, deduced, or extracted by practiced researchers) or
“behavior leakage” (oblique indicators that may be observed
from accounts), but these are often subtle and observed
through machine learning and statistical analyses
Maltego Radium: Mapping NetworkTies and Identities across the Internet 73
 Maltego Radium™ only captures some information. It
cannot…
 “see” what’s not connected to the Internet andWWW or
capture what is happening non-electronically in the real or
physical or non-cyber world (it cannot bridge the cyber-
physical confluence)
 “go back in time” to map sites that are no longer online (in
some form)
 “see” what is labeled “private” in social media platforms
 “see” how users navigate the electronic network
 “see” what the characteristics are for particular entities /
nodes / sub-graphs or sub-groups (identify or describe
node “biases” in social network-speak)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 74
 It cannot…
 “see” what is in the Deep Web or Invisible Web (dynamically
created pages or those requiring registration), only what’s on
the publicly indexable “static” Web
 explicitly indicate to researchers which nodes or links to explore
in more depth
 maintain a continuous crawl for more dynamic data likeTwitter
Digger on background (unless the machine is kept running)
 (currently) trace and extract what information is moving
through networks (content diffusion or percolation)
 create an invisible or stealth crawl (you will be seen skulking
about)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 75
 Multimodal data extractions may be done to
understand…
 Network ties (social, technological, and content)
 Spatiality and geo-location
 Technological structures
 Human and organizational identity (PII) (through cross-
referenced information)
 Device usage online (~ to what Shodan computer search
engine reveals)
 Available contact information
 “Not knowing” / being unaware is a “dominated
strategy,” an inherently “losing” or subordinated
approach (in game theory)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 76
 Maltego Radium™ brings together various
functionalities that may be done separately with
separate customized programs, Google Search,
Network Solutions’WHOIS, DNS, NodeXL social
media platform data extractions, and then data
visualization tools… but not as efficiently or as
elegantly (especially for high-scale analyses and link
analysis) …and not continuously over time
 Maltego Radium™’s capabilities may be tested by
conducting “machines” and “transforms” on known
targets with known answers initially
 Maltego Radium™ is styled in a sophisticated way,
with cool visuals and sound effects
Maltego Radium: Mapping NetworkTies and Identities across the Internet 77
MALTEGO RADIUM™ AS A
SOFTWARETOOL
 What are some other possible
practical and “feral” applications
of Maltego Radium™ (adapted
“unintended use” applications)?
 Computational journalism?
Outreach and marketing?
Academic research?
 Predictivity? Is it possible to
predict group dynamics based on
electronic network structures?
Traffic? Contents?
 What are some new
functionalities that would
enhance this tool?
MALTEGO RADIUM™ AS A
PENETRATIONTESTINGTOOL
 In terms of its pen testing
applications, what are some
complementary software
programs that may be used to
 Test network defenses?
 Surface hidden information?
 Identify and exploit vulnerabilities?
Maltego Radium: Mapping NetworkTies and Identities across the Internet 78
Paterva’s Maltego Radium™
 Paterva
 Maltego Radium
 CaseFile
 MaltegoTungsten (for collaborative data
extractions)*
 Maltego Radium Blog
 MaltegoTutorials:The Complete and Official Set
(onYouTube)
 Maltego Scripting Language (1.1) Guide (2012)
 Maltego Radium Release (2012)
 MaltegoVersion 3 User Guide (2011)
Maltego Radium: Mapping NetworkTies and Identities across the Internet 79
COMMUNITYVERSION
 Free limited “community”
version available for non-
commercial use
 API keys expire every few
days
 Runs in private or public mode
on community servers (slower
crawls); latter collects back-
end statistics to benefit the
community
 User information collected
 Lag in features already in the
professional version
COMMERCIALVERSION
 Annual subscriptions to the
software license available
(with a 10% educational
discount)
 Initial higher cost ($650 first
year; $350 for consecutive
years thereafter—or 365 days)
 Includes access to crawls
using Paterva servers
80
 Semantics
 Tool functions
 Processes
 Practical
applications
 Worldviews and
mindsets
Maltego Radium: Mapping NetworkTies and Identities across the Internet 81
Drat! No Ctrl + Z “Undo” FunctionYet
Maltego Radium™ on
Social Media
Paterva onTwitter
(@Paterva)
Maltego on Facebook
Paterva / Maltego on
YouTube
RSS Feed
Maltego Radium: Mapping NetworkTies and Identities across the Internet 82
Who is Paterva?
Development Team for
Maltego Radium: 5
individuals based out of
Gauteng, S. Africa
RoelofTemmingh
44B Nelmapius Road Irene
Pretoria, Gauteng 0157
ZA
Phone: +27.27834486996
Email:
roelof.temmingh@gmail.c
om
@roeloftemmingh on
Twitter
A “company stalker” crawl
of www.Paterva.com (to
the right)
Making the company
“drink its own
champagne” :P
Maltego Radium: Mapping NetworkTies and Identities across the Internet 83
 “A Brief Overview of Social Network Analysis and NodeXL”
 Thanks to Dr. Rebecca Gould, who encouraged my learning of
Maltego Radium™ for (totally white-hat) higher education-based
research.
 Thanks to Phyllis Epps, who gave me permission to crawl her
identity @peppslugs onTwitter, for this presentation.
 Thanks to Anibal Pacheco, who gave me permission to crawl his
electronic social networks for this demo. He asked me to share
the following:
 Site: www.anibalpacheco.net
 Account: @anibalpachecoIT onTwitter
 YouTube channel: http://bit.ly/TM8CHP (MegabyteWizards)
 Thanks to CHECK for accepting this presentation and to the
supportive audience!
 The presenter has no tie to nor interests in Paterva.
Maltego Radium: Mapping NetworkTies and Identities across the Internet 84
 Dr. Shalin Hai-Jew
 Instructional Designer, iTAC
 212 Hale Library
 Kansas State University
 785-532-5262
 shalin@k-state.edu
Practically Speaking: No Anonymity
“We may not acknowledge that in an electronic medium, levels
and kinds of anonymity mean, in an important sense, no
anonymity. If there are domains in which we can be anonymous
but those domains are part of a global communication
infrastructure in which there is no anonymity at the entry point,
then it will always be possible to trace someone’s identity.”
 Deborah G. Johnson and Keith Miller’s “Anonymity, Pseudonymity, or Inescapable
Identity on the Net” (1998), Computers andSociety
Maltego Radium: Mapping NetworkTies and Identities across the Internet 85

Mais conteúdo relacionado

Mais procurados

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...Shalin Hai-Jew
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python37point2
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringChris Gates
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Maltego Magic Workshop - BSides London 2015
Maltego Magic Workshop - BSides London 2015Maltego Magic Workshop - BSides London 2015
Maltego Magic Workshop - BSides London 2015Adam Maxwell
 
Eavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging SiteEavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging SiteShalin Hai-Jew
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligencePhilippe Lin
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plugKamal Rathaur
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations Damir Delija
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow Mike Kujawski
 
Osint skills
Osint skillsOsint skills
Osint skillsFelixK4
 

Mais procurados (20)

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Osint
OsintOsint
Osint
 
Maltego Magic Workshop - BSides London 2015
Maltego Magic Workshop - BSides London 2015Maltego Magic Workshop - BSides London 2015
Maltego Magic Workshop - BSides London 2015
 
Eavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging SiteEavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging Site
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow
 
Osint skills
Osint skillsOsint skills
Osint skills
 

Destaque

451 Research Report on Avalon Big Data Capabilities - 2017
451 Research Report on Avalon Big Data Capabilities - 2017451 Research Report on Avalon Big Data Capabilities - 2017
451 Research Report on Avalon Big Data Capabilities - 2017Tom Reidy
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Rishabh Upadhyay
 
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
Kali Linux, Introduction to Ethical Hacking and Penetration ToolsKali Linux, Introduction to Ethical Hacking and Penetration Tools
Kali Linux, Introduction to Ethical Hacking and Penetration ToolsRassoul Ghaznavi Zadeh
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Alphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancéAlphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancéAlphorm
 

Destaque (10)

Sploitego
SploitegoSploitego
Sploitego
 
451 Research Report on Avalon Big Data Capabilities - 2017
451 Research Report on Avalon Big Data Capabilities - 2017451 Research Report on Avalon Big Data Capabilities - 2017
451 Research Report on Avalon Big Data Capabilities - 2017
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
 
Web hackingtools cf-summit2014
Web hackingtools cf-summit2014Web hackingtools cf-summit2014
Web hackingtools cf-summit2014
 
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
Kali Linux, Introduction to Ethical Hacking and Penetration ToolsKali Linux, Introduction to Ethical Hacking and Penetration Tools
Kali Linux, Introduction to Ethical Hacking and Penetration Tools
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Sizma testi bilgi toplama
Sizma testi bilgi toplamaSizma testi bilgi toplama
Sizma testi bilgi toplama
 
Alphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancéAlphorm.com Formation Hacking et Sécurité , avancé
Alphorm.com Formation Hacking et Sécurité , avancé
 

Semelhante a Maltego Radium Mapping Network Ties and Identities across the Internet

Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Shalin Hai-Jew
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACwebuploader
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Bernhard Rieder
 
Sharma social networks
Sharma social networksSharma social networks
Sharma social networkskeuvoh7883
 
Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)Tin180 VietNam
 
Sharma social crear red
Sharma social crear redSharma social crear red
Sharma social crear redkeuvoh7883
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic WaveKaniska Mandal
 
Integrating and publishing public safety data using semantic technologies
Integrating and publishing public safety data using semantic technologiesIntegrating and publishing public safety data using semantic technologies
Integrating and publishing public safety data using semantic technologiesAlvaro Graves
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...IEEEFINALYEARPROJECTS
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
Poster Abstracts
Poster AbstractsPoster Abstracts
Poster Abstractsbutest
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...JPINFOTECH JAYAPRAKASH
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Bernhard Rieder
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...Tin180 VietNam
 

Semelhante a Maltego Radium Mapping Network Ties and Identities across the Internet (20)

Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SAC
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
 
Sharma social networks
Sharma social networksSharma social networks
Sharma social networks
 
Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)
 
Sharma social crear red
Sharma social crear redSharma social crear red
Sharma social crear red
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic Wave
 
17
1717
17
 
Integrating and publishing public safety data using semantic technologies
Integrating and publishing public safety data using semantic technologiesIntegrating and publishing public safety data using semantic technologies
Integrating and publishing public safety data using semantic technologies
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
Poster Abstracts
Poster AbstractsPoster Abstracts
Poster Abstracts
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
 

Mais de Shalin Hai-Jew

Writing a Long Non-Fiction Chapter......
Writing a Long Non-Fiction Chapter......Writing a Long Non-Fiction Chapter......
Writing a Long Non-Fiction Chapter......Shalin Hai-Jew
 
Overcoming Reluctance to Pursuing Grant Funds in Academia
Overcoming Reluctance to Pursuing Grant Funds in AcademiaOvercoming Reluctance to Pursuing Grant Funds in Academia
Overcoming Reluctance to Pursuing Grant Funds in AcademiaShalin Hai-Jew
 
Pursuing Grants in Higher Ed
Pursuing Grants in Higher EdPursuing Grants in Higher Ed
Pursuing Grants in Higher EdShalin Hai-Jew
 
Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...
Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...
Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...Shalin Hai-Jew
 
Creating Seeding Visuals to Prompt Art-Making Generative AIs
Creating Seeding Visuals to Prompt Art-Making Generative AIsCreating Seeding Visuals to Prompt Art-Making Generative AIs
Creating Seeding Visuals to Prompt Art-Making Generative AIsShalin Hai-Jew
 
Poster: Multimodal "Art"-Making Generative AIs
Poster:  Multimodal "Art"-Making Generative AIsPoster:  Multimodal "Art"-Making Generative AIs
Poster: Multimodal "Art"-Making Generative AIsShalin Hai-Jew
 
Poster: Digital Templating
Poster:  Digital TemplatingPoster:  Digital Templating
Poster: Digital TemplatingShalin Hai-Jew
 
Poster: Digital Qualitative Codebook
Poster:  Digital Qualitative CodebookPoster:  Digital Qualitative Codebook
Poster: Digital Qualitative CodebookShalin Hai-Jew
 
Common Neophyte Academic Book Manuscript Reviewer Mistakes
Common Neophyte Academic Book Manuscript Reviewer MistakesCommon Neophyte Academic Book Manuscript Reviewer Mistakes
Common Neophyte Academic Book Manuscript Reviewer MistakesShalin Hai-Jew
 
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AIFashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AIShalin Hai-Jew
 
Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...
Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...
Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...Shalin Hai-Jew
 
Introduction to Adobe Aero 2023
Introduction to Adobe Aero 2023Introduction to Adobe Aero 2023
Introduction to Adobe Aero 2023Shalin Hai-Jew
 
Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...
Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...
Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...Shalin Hai-Jew
 
Exploring the Deep Dream Generator (an Art-Making Generative AI)
Exploring the Deep Dream Generator (an Art-Making Generative AI)  Exploring the Deep Dream Generator (an Art-Making Generative AI)
Exploring the Deep Dream Generator (an Art-Making Generative AI) Shalin Hai-Jew
 
Augmented Reality for Learning and Accessibility
Augmented Reality for Learning and AccessibilityAugmented Reality for Learning and Accessibility
Augmented Reality for Learning and AccessibilityShalin Hai-Jew
 
Art-Making Generative AI and Instructional Design Work: An Early Brainstorm
Art-Making Generative AI and Instructional Design Work:  An Early BrainstormArt-Making Generative AI and Instructional Design Work:  An Early Brainstorm
Art-Making Generative AI and Instructional Design Work: An Early BrainstormShalin Hai-Jew
 
Engaging Pixabay as an open-source contributor to hone digital image editing,...
Engaging Pixabay as an open-source contributor to hone digital image editing,...Engaging Pixabay as an open-source contributor to hone digital image editing,...
Engaging Pixabay as an open-source contributor to hone digital image editing,...Shalin Hai-Jew
 
Publishing about Educational Technology
Publishing about Educational TechnologyPublishing about Educational Technology
Publishing about Educational TechnologyShalin Hai-Jew
 
Human-Machine Collaboration: Using art-making AI (CrAIyon) as cited work, o...
Human-Machine Collaboration:  Using art-making AI (CrAIyon) as  cited work, o...Human-Machine Collaboration:  Using art-making AI (CrAIyon) as  cited work, o...
Human-Machine Collaboration: Using art-making AI (CrAIyon) as cited work, o...Shalin Hai-Jew
 
Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...
Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...
Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...Shalin Hai-Jew
 

Mais de Shalin Hai-Jew (20)

Writing a Long Non-Fiction Chapter......
Writing a Long Non-Fiction Chapter......Writing a Long Non-Fiction Chapter......
Writing a Long Non-Fiction Chapter......
 
Overcoming Reluctance to Pursuing Grant Funds in Academia
Overcoming Reluctance to Pursuing Grant Funds in AcademiaOvercoming Reluctance to Pursuing Grant Funds in Academia
Overcoming Reluctance to Pursuing Grant Funds in Academia
 
Pursuing Grants in Higher Ed
Pursuing Grants in Higher EdPursuing Grants in Higher Ed
Pursuing Grants in Higher Ed
 
Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...
Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...
Contrasting My Beginner Folk Art vs. Machine Co-Created Folk Art with an Art-...
 
Creating Seeding Visuals to Prompt Art-Making Generative AIs
Creating Seeding Visuals to Prompt Art-Making Generative AIsCreating Seeding Visuals to Prompt Art-Making Generative AIs
Creating Seeding Visuals to Prompt Art-Making Generative AIs
 
Poster: Multimodal "Art"-Making Generative AIs
Poster:  Multimodal "Art"-Making Generative AIsPoster:  Multimodal "Art"-Making Generative AIs
Poster: Multimodal "Art"-Making Generative AIs
 
Poster: Digital Templating
Poster:  Digital TemplatingPoster:  Digital Templating
Poster: Digital Templating
 
Poster: Digital Qualitative Codebook
Poster:  Digital Qualitative CodebookPoster:  Digital Qualitative Codebook
Poster: Digital Qualitative Codebook
 
Common Neophyte Academic Book Manuscript Reviewer Mistakes
Common Neophyte Academic Book Manuscript Reviewer MistakesCommon Neophyte Academic Book Manuscript Reviewer Mistakes
Common Neophyte Academic Book Manuscript Reviewer Mistakes
 
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AIFashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
 
Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...
Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...
Augmented Reality in Multi-Dimensionality: Design for Space, Motion, Multiple...
 
Introduction to Adobe Aero 2023
Introduction to Adobe Aero 2023Introduction to Adobe Aero 2023
Introduction to Adobe Aero 2023
 
Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...
Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...
Some Ways to Conduct SoTL Research in Augmented Reality (AR) for Teaching and...
 
Exploring the Deep Dream Generator (an Art-Making Generative AI)
Exploring the Deep Dream Generator (an Art-Making Generative AI)  Exploring the Deep Dream Generator (an Art-Making Generative AI)
Exploring the Deep Dream Generator (an Art-Making Generative AI)
 
Augmented Reality for Learning and Accessibility
Augmented Reality for Learning and AccessibilityAugmented Reality for Learning and Accessibility
Augmented Reality for Learning and Accessibility
 
Art-Making Generative AI and Instructional Design Work: An Early Brainstorm
Art-Making Generative AI and Instructional Design Work:  An Early BrainstormArt-Making Generative AI and Instructional Design Work:  An Early Brainstorm
Art-Making Generative AI and Instructional Design Work: An Early Brainstorm
 
Engaging Pixabay as an open-source contributor to hone digital image editing,...
Engaging Pixabay as an open-source contributor to hone digital image editing,...Engaging Pixabay as an open-source contributor to hone digital image editing,...
Engaging Pixabay as an open-source contributor to hone digital image editing,...
 
Publishing about Educational Technology
Publishing about Educational TechnologyPublishing about Educational Technology
Publishing about Educational Technology
 
Human-Machine Collaboration: Using art-making AI (CrAIyon) as cited work, o...
Human-Machine Collaboration:  Using art-making AI (CrAIyon) as  cited work, o...Human-Machine Collaboration:  Using art-making AI (CrAIyon) as  cited work, o...
Human-Machine Collaboration: Using art-making AI (CrAIyon) as cited work, o...
 
Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...
Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...
Getting Started with Augmented Reality (AR) in Online Teaching and Learning i...
 

Último

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Último (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Maltego Radium Mapping Network Ties and Identities across the Internet

  • 1. Shalin Hai-Jew Kansas State University Conference on Higher Education Computing in Kansas (CHECK) May 29 – 30, 2013, Pittsburg State University, Pittsburg, Kansas
  • 2.  Maltego Radium™ (v. 3.3.3; v. 1 in 2008) is a penetration testing tool that collects public data about organizations, websites, and identities, for awareness of social and technological presence across the Internet. The tool’s interface is highly usable and interactive. The tool enables a deep dive analysis into the interrelationships online, and it extends the “knowability” of electronic identities. This tool enables explorations of emails, telephone numbers, websites, organizations, by offering access to information that would often be “invisible” otherwise. The visual outputs are interactive and include half-a-dozen visualizations in a social network (node-link) format. The presentation will show how to conduct “machines” and “transforms” of a target, how to visually map the data, and how to analyze it. Maltego Radium: Mapping NetworkTies and Identities across the Internet 2
  • 3.  People at some point will have linked their pseudonyms with real- world personally identifiable information (PII)  People act on interests (which are expressed in some way electronically), and their interests reveal something about the unknown node  People’s online relationships can identify an unknown node based on the connections, power relationships, intercommunications, and the external identities  All online actions can be linked to geographical locations, and those locations may be revealing  Knowability of an unknown node / entity (or group) is increased when a collective and comprehensive electronic footprint is rendered Maltego Radium: Mapping NetworkTies and Identities across the Internet 3
  • 4.  Hi! Who are you, and what are your interests re: the topic? Anyone ever use a “hacking” tool? If so, what?  Do you have an idea for a Maltego Radium™ “machine” or “transform” run that you want us to try during this session? (I’ll ask you near the end of the presentation.) Maltego Radium: Mapping NetworkTies and Identities across the Internet 4
  • 5. Electronic Network Analysis: People Content Technologies Maltego Radium: Mapping NetworkTies and Identities across the Internet 5
  • 6.  People often interact in homophilous (preferential selection based on similarities with the self or the in-group; assortative mixing) or heterophilous (preferential selection by difference; disassortative mixing) ways  Depending on the non-kin social context (such as work-based, volunteer-based, romance-based, friendship-based, hobby-based, or others)  People find meaning and identity in ways similar to those that are close to them (the “company you keep” assumption); yet, people’s identities in this age are not necessarily coherent and unified but are fragmented and multiple and experimental  World is socially constructed in various types of hierarchies (structurally)  Resources and information (and inter-exchanges) move through these hierarchies through particular social paths Maltego Radium: Mapping NetworkTies and Identities across the Internet 6
  • 7.  Electronic socio-technical spaces (STS) somewhat mirror the real world but not 1-1 (or even close); called the “cyber-physical confluence”  Electronic data may be used to make some cautious extrapolations (or informal intuitions or “whispers”) about real-world off-line personalities, values, and actions  Social network analysis (SNA) data are used with other information to set a full(er) context Maltego Radium: Mapping NetworkTies and Identities across the Internet 7
  • 8.  Electronic spaces offer empirical in vivo (in-field) relational information (based on actual links, actual connections, and actual relationships based on electronic documentation) that is behavior- and action-based and not professed only  May include “big data” analyses of entire datasets of complete networks  May include cross-references between numbers of data sets  Strength of inter-relationships is critical based on interaction patterns  Complex statistics and layout algorithms are used to express relationships in social network analysis  Radically different visualizations may be possible depending on the layout algorithms Maltego Radium: Mapping NetworkTies and Identities across the Internet 8
  • 9.  What moves through network topologies (digital information, resources, influence and socialization, and memes, etc.) is also important to understand and analyze  Machine-analyzed computerized sentiment analysis (through text mining) is one way to evaluate messages moving through virtual communities  Word frequency counts is another machine-based way to evaluate messages  Image analysis is another way to evaluate message Maltego Radium: Mapping NetworkTies and Identities across the Internet 9
  • 10.  Graphs built from graph metrics, which describe structural aspects of the network (such as numbers of nodes and links, types of connections, density or sparseness of ties, leadership and role types, motif censuses, and other factors)  Graphs as 2D spaces  Not x or y axes but about relationships between the nodes and the links  Can lay out the same information in multiple ways using the same layout algorithm  Nodes and links (node-link diagrams); vertices and edges / arcs  Direct and indirect ties  Centrality-peripherality dynamic (degree centrality); closeness- distance dynamic (paths; degrees of separation) Maltego Radium: Mapping NetworkTies and Identities across the Internet 10
  • 11.  Fat (influential) and thin (peripheral) nodes; bridging nodes  Nodes are parts of multiple or many networks  Nodes play different roles in different networks  Dense networks vs. low-density (sparse) networks  Networks function better with density for some group objectives; networks function better with low-density or sparseness for some other group objectives  Path dynamics for percolation and flow  In-group; out-group dynamics; social identity (node, sub-group, network, and multi-network levels)  Layering effects; network dependencies; network overlap and interrelationships Maltego Radium: Mapping NetworkTies and Identities across the Internet 11
  • 12.  Multimodal elements  Root entities  Leaf entities  Branching connections  Connective events Maltego Radium: Mapping NetworkTies and Identities across the Internet 12
  • 13.  What do you know about penetration (pen) testing?  Any prior experiences with Maltego Radium™? Maltego Radium: Mapping NetworkTies and Identities across the Internet 13
  • 14. Uses Java Runs on Windows, Mac, and Linux operating systems Applies a 2D or 3D Graphical User Interface (GUI) Enables complex and fast crawls without need for command line coding Uses Maltego Radium™ (by Paterva)Transform Application Servers for some data extractions Maltego Radium: Mapping NetworkTies and Identities across the Internet 14
  • 15.  Shows links between people; groups of people (social networks); companies; organizations; web sites; internet infrastructure (domain, DNS names, netblocks, IP addresses); phrases; affiliations; documents and files  Based on open-source (publicly available) information or “open-source intelligence” (OSINT)  Does not involve the breaking of network controls to access information  Assumes benign information in isolation may be turned malicious in combination and / or relationship to other data (as in “big data” analytics)  Is a “dual use” technology with a range of applied “data harvesting” / structure-mining / datamining and analytical uses Maltego Radium: Mapping NetworkTies and Identities across the Internet 15
  • 16.  “Penetration”: Unauthorized access or a “break- in” to a protected network  Combination of attacks on hardware (device exploits), software (malware, password cracking, keyloggers, andTrojan Horses), and wetware (social engineering, phishing, and spear phishing)  Black Box, Gray Box, or Crystal Box (no knowledge of the target network; partial knowledge of the target network; full knowledge of the target network)  Conceptualized and practiced in an adversarial way Maltego Radium: Mapping NetworkTies and Identities across the Internet 16
  • 17.  Risk environment modeling with adversaries (white and gray-hat hackers; red teams)  Offensive and defensive campaigns (pen testing part of offensive security testing)  Countermeasures: security awareness, self- awareness of vulnerabilities (technological, human, political, policy, and others), policy-setting, surveillance / intrusion detection, firewalls, training of staff, security networks, technologies, communications, professional partnerships, and others Maltego Radium: Mapping NetworkTies and Identities across the Internet 17
  • 18.  Maltego Radium™  Enables crawls / scrapes / scans of the potential public and private “attack vectors” of an organization or network’s structure  Shows what is seeable and knowable by others, so proper protections may be put into place (as part of basic electronic reconnaissance or surveillance of so-called “perimeter systems”)  May be used as part of a “red team” simulated (or actual) attack to test defenses in pen testing  Offers a starting point for the strategy, planning, further probes, and other actions ▪ May be followed by more focused, targeted, and nuanced attacks Maltego Radium: Mapping NetworkTies and Identities across the Internet 18
  • 19. “DOXING” (DOCUMENTING) ATTACKS  “Doxing” based on “documenting” by tracking personally identifiable information  Creation of “dossiers” of individuals or groups by hacktivists to use in ad hominem and other attacks CYBER-STALKING  Tracking individuals’ electronic presences and relating that to real-world presences for harassment and other nefarious purposes Maltego Radium: Mapping NetworkTies and Identities across the Internet 19
  • 20. INTERPERSONAL ELECTRONIC SURVEILLANCE (IES)  Self-surveillance  Electronic grooming  Sousveillance (inverse surveillance; watchful vigilance from below or inside an organization or social structure; participant surveillance)  Horizontal surveillance  Vertical surveillance ORGANIZATIONALOR GROUP SURVEILLANCE  Mapping one’s own organization for public relations purposes  Analyzing telepresences on social media platforms through extractions of Representational StateTransfers or “REST”  Perusing Internet andWeb- based presences of organizations  Creating outreach and marketing strategies for external organizations  Finding identities of individuals for contact in corporations or organizations (through the back door) Maltego Radium: Mapping NetworkTies and Identities across the Internet 20
  • 21.  There are legitimate reasons to pursue pseudonymity and anonymity (such as to prevent harm)  Eliminating pseudonymity (untraceable long-term anonymity; exclusive use of a pseudonym over time for reputation transfer, branding, and “authornym” use; ability to prove “holdership” of a pseudonym) and anonymity (temporary, ephemeral, and partial hiding) and enforcing an “inescapable identity” and non- discretionary revelation  Traceability means that at least a single intermediary knows actual identity (for traceable anonymity or traceable pseudonymity)  The problem of time involves the fact that archived electronic sites are fixed (as big data corpuses), and may be analyzed using a variety of future tools with increasing capabilities  Making the Internet more of a nonymous, transparent, and traceable space Maltego Radium: Mapping NetworkTies and Identities across the Internet 21
  • 22.  Harder to use Maltego Radium™ for actually verifying identity and real-ness / personhood, without the affordances of a verified real-persons database and other checks  May guess that a virtual online identity is faked or improperly back-stopped Maltego Radium: Mapping NetworkTies and Identities across the Internet 22
  • 23. THE INDIVIDUAL EXPERIENCE  De-anonymizing / re-identification: Connecting personally identifiable information (PII) of the physical self to aliases, pseudonyms, handles, or accounts  Narrowing the potential “anonymity sets” for various individuals (those to whom one may be temporally anonymous); the protection of identity as a “layered” one  Linking partitioned parts of an individual’s online life, and connecting partial identities (from various contexts) to coalesce for a fuller version of an individual Maltego Radium: Mapping NetworkTies and Identities across the Internet 23
  • 24.  Identifying hidden (inter)relationships in electronic information:  Showing hidden connections and affiliations (for exploration and analysis) ▪ Identifying sleeper communities of interest ▪ Identifying influential nodes (or clusters) in a network  Revealing personal information ▪ Extrapolation of user interests and online seeking behavior  Revelation of potentially private documents The Human Flaw  “All aliases initially originate from one person, with one mind, and one personality.”  Tal Z. Zarsky (2004, p. 1352), in “Thinking outside the Box: Considering Transparency,Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society”…  Said another way: “Character reveals…”  Vulnerable to “the aggregation attack” on profiles (requiring only a few unique data points) 24Maltego Radium: Mapping NetworkTies and Identities across the Internet
  • 25. …using Maltego Radium™ (likely with complementary other software, equipment, and tools) 25Maltego Radium: Mapping NetworkTies and Identities across the Internet
  • 26. Maltego Radium: Mapping NetworkTies and Identities across the Internet 26
  • 27.  Think breadth and depth 1. Run a Maltego Radium™ Machine (sequencing including synchronicity of selected “transforms” through macros)…then further select transforms on selected nodes 2. Drag and drop from the left menu “palette” to the work space to actualize different select searches  Tailoring the data crawl through user filters (selecting options at various junctures during the crawl)  May layer further queries on former search results (in the same session or in later sessions) Maltego Radium: Mapping NetworkTies and Identities across the Internet 27
  • 28.  Maltego Radium™’s “machines” and “transforms” are not invisible to the crawled or scanned networks; the surveiller faces counter-surveillance  Radium™ user often gives up his or her identity and other information when conducting a data extraction or crawl (by leaving trace data)  Organizations and networks (their network administrators) have it in their interests to know who is scoping them out / possibly “prospecting” ▪ Many “attack surfaces” are honeypots (lures / traps / sentinel plots for hackers to self-reveal); there will be purposeful obfuscation ▪ Forensic analyses post-attack may result much more about the objectives and criminal skill sets of the attackers Maltego Radium: Mapping NetworkTies and Identities across the Internet 28
  • 29. GENERAL CRAWL  API key (application programming interface)  IP Address (Internet Protocol -- yours or the proxy one you are using)  The transform executed  The time it executed  The user ID (which gives first name, last name and email address)  Paterva does not log the questions asked or the results ACCESSTO SOMEWEB SERVICES  First name  Last name  Email address  Time registered  Time first used  How many transform you ran  MAC address you selected  Your operating system type and version, but not details of service packs etc.  GUI version Maltego Radium: Mapping NetworkTies and Identities across the Internet 29
  • 30.  User has to allow Paterva to disclaim liabilities before transform runs may be made  Crawl “Damage”: Unclear what “damage” may occur from transforms (but some crawls may be trespassing)  Sample of a Disclaimer: “Please note this transform is being run on the PatervaTransform Distribution Server and has been written by the user 'Andrew MacPherson'. This transform will be run on * and Paterva cannot be held responsible for any damage caused by this transform, you run this ATYOUR OWN RISK. For more information on this transform feel free to contact…” Maltego Radium: Mapping NetworkTies and Identities across the Internet 30
  • 31.  Select machine (a sequence of “transforms”)  Identify target (phrase, name, URL, organization, etc.) Maltego Radium: Mapping NetworkTies and Identities across the Internet 31
  • 32.  Select a transform (one type of information changed to another type) by dragging and dropping from left menu bar to the work space  Identify target by double- clicking node  May highlight a range of icons to conduct transforms on  Sub-transforms customized to particular types of entities or nodes  Information resolves out from type to type Maltego Radium: Mapping NetworkTies and Identities across the Internet 32
  • 33.  Company Stalker: Email addresses at a company’s domain(s)  Footprint L1: “Fast” and limited footprint of a domain  Footprint L2: “Mild” and semi-limited footprint of a domain  Footprint L3: “Intense” and fairly in-depth and internal footprint of a domain  Person- Email Address: Identifies a person’s email addresses (but needs a disambiguated or fairly uncommon name…or the data is noisy) Maltego Radium: Mapping NetworkTies and Identities across the Internet 33
  • 34.  Prune Leaf Entities: Prunes all leaves (entities with no outgoing links and just one incoming link—aka pendant nodes) to clear the screen for re-crawls (and to de-noise the data)  Twitter Digger: Phrase as aTwitter search  Twitter Geo(graphical) Location: Finding a person’s location based on multiple information streams Maltego Radium: Mapping NetworkTies and Identities across the Internet 34
  • 35.  Twitter Monitor: MonitorsTwitter for hashtags (#) and named entities mentioned (@)  AllTwitter crawls rate-limited by amounts of information downloadable per time period by Twitter API  URL to Network and Domain Information: From URL to network and domain information Maltego Radium: Mapping NetworkTies and Identities across the Internet 35
  • 36.  Devices  A phone, mobile device, or other used by the individual or connected to various accounts or a network  Infrastructure  AS – Autonomous System Number (as assigned by IANA to RIRs)  DNS Name – Domain Name System (identification string)  Domain – Internet Domain  IPv4 Address – IP version 4 address  Infrastructure (cont.)  MX Record – DNS mail exchanger record (indicator of mail server accepting email messages and how email should be routed through SMTP)  NS Record – A DNS name server record (with indicators of subdomains)  Netblock – An internet autonomous system  URL – An internet Uniform Resource Locator (web address as a character sting)  Website – An internet website (related web pages served from a single domain) Maltego Radium: Mapping NetworkTies and Identities across the Internet 36
  • 37.  Locations  A location on Mother Earth (to find domains and other such information)  Penetration (“Pen”) Testing  Company  Social Network  Facebook Object  Twit entity  Affiliation – Facebook  Affiliation –Twitter  Personal  Alias  Document  Email Address  Image (EXIF or “Exchangeable Image File” data extraction: geotagged data, GPS, and general image conditions information like digital camera settings)  Person  Phone Number  Phrase Maltego Radium: Mapping NetworkTies and Identities across the Internet 37
  • 38.  May import or export palette contents / entities (macros for customized “machines” sequences / transforms sets, or stand- alone “transforms”)  Assumes some ability to create one’s own scripted Maltego Radium™ macros (with Maltego™ Scripting Language or MSL) as well  May be as simple as drag- and-drop with existing transforms 38
  • 39. Maltego Radium: Mapping NetworkTies and Identities across the Internet 39
  • 40. Maltego Radium: Mapping NetworkTies and Identities across the Internet 40
  • 41.  Delinking  User pruning of nodes that are not interconnected or related to the search  User filtering or identification of bad domains to exclude from the crawl  Linking  May link multiple nodes to run further transforms to identify possible relationships Maltego Radium: Mapping NetworkTies and Identities across the Internet 41
  • 42.  Extraction of close-in node-level multiplex data (vs. meta-level networks)  Put cursor on a node for the details in the right pane  May conduct more transforms on that node for more data 42
  • 43.  May right-click to add notes on various entities to keep written records and annotations  Paterva’sCase File enables even more sophisticated human-annotated record- keeping of information discoveries (like research journals or investigator files) Maltego Radium: Mapping NetworkTies and Identities across the Internet 43
  • 44.  What have your experiences been with data visualizations? Graphs?  What are graphs?  How is data used to create graphs?  How are graphs interpreted? Maltego Radium: Mapping NetworkTies and Identities across the Internet 44
  • 45. Layout (and interaction) modes: Block Hierarchical Circular Organic Interactive organic Maltego Radium: Mapping NetworkTies and Identities across the Internet 45
  • 46. Maltego Radium: Mapping NetworkTies and Identities across the Internet 46
  • 47. Maltego Radium: Mapping NetworkTies and Identities across the Internet 47
  • 48. Maltego Radium: Mapping NetworkTies and Identities across the Internet 48
  • 49. Maltego Radium: Mapping NetworkTies and Identities across the Internet 49
  • 50. Maltego Radium: Mapping NetworkTies and Identities across the Internet 50
  • 51. Maltego Radium: Mapping NetworkTies and Identities across the Internet 51
  • 52. Maltego Radium: Mapping NetworkTies and Identities across the Internet 52
  • 53. Maltego Radium: Mapping NetworkTies and Identities across the Internet 53
  • 54. Maltego Radium: Mapping NetworkTies and Identities across the Internet 54
  • 55. Maltego Radium: Mapping NetworkTies and Identities across the Internet 55  “Company Stalker” (~ hackerish semantics)
  • 56.  Person  Affiliation (Flickr)  EmailAddress  Phone Number  Document  Phrase  Domain  Alias  URL  Website Maltego Radium: Mapping NetworkTies and Identities across the Internet 56
  • 57. Maltego Radium: Mapping NetworkTies and Identities across the Internet 57  BubbleView
  • 58.  Crawling two persons to see if anything links up  Combining crawls to answer directed questions Maltego Radium: Mapping NetworkTies and Identities across the Internet 58
  • 59. Maltego Radium: Mapping NetworkTies and Identities across the Internet 59  Links to an IP address
  • 60. Importing: Maltego Radium™ files Tabular files Saving : .mtgx files Exporting: Data sets Reports Graphs Maltego Radium: Mapping NetworkTies and Identities across the Internet 60
  • 61. Maltego Radium™ Files  .mtz files (for PaletteTransform entities)  .mtgx files (for graph visualizations and crawls) Tabular Files  .csv, .xlsx, and .xls (for graphs) Maltego Radium: Mapping NetworkTies and Identities across the Internet 61
  • 62. Saving Proprietary Data Sets  Saves as a .mtgx (Maltego Radium™ graph file)  May encrypt as AES-128 (Advanced Encryption Standard 128)  Native files are not particularly large  Saves “machine” and “transform” parameters to re-crawl and update data sets for future runs  Note: Datasets considered to be “unstructured” or “loosely structured” because of the mix of content structures among the types of captured data Maltego Radium: Mapping NetworkTies and Identities across the Internet 62
  • 63. Exporting Reports and Graphs  Report file types (complete summaries of extracted information): .pdf  2D graph as image (including zoomed- in): .gif, .png, .bmp, and .jpg 63
  • 64. 64  May extract graph data as tables of textual information for further analysis through “Entity Lists” tab
  • 65. APPLIED DECEPTION  So far, what do you think is “knowable” (linkable) using tools like Maltego Radium™ (along with other research tools)?  What do you think your online profile looks like?  How does this knowledge of Maltego Radium™ capabilities change how you deceive, project, hide, obfuscate, or throw others off your trail (assuming you might)?  APPLIED ACADEMIC RESEARCH  Is there any interest in using this tool for academic research applications? If so, what sorts of research applications are you considering?  What may be asserted about the data? How is this data bounded or limited?  How can this high- dimensionality data be used in an “inference attack”? How accurate or inaccurate would such attacks be? How can the accuracy of such attacks be improved? Maltego Radium: Mapping NetworkTies and Identities across the Internet 65
  • 66. …through data-mining, structure mining …through syntactic and semantic stylometry (with writing style as an “invariant,” with discernible “tells” for obfuscated and imitated writing) for authorship recognition …through electronic “tells” and sufficiently detailed individual profiles …through cross-referencing information from multiple databases (“big data” analysis, especially statistical correlations) …through computational research …through human analytics and logic Maltego Radium: Mapping NetworkTies and Identities across the Internet 66
  • 67.  A data crawl as a starting point…  Interactions with the data ▪ Logical deductions and inferences (e.g. Internet “traffic analysis”—where people go online—based on linkability structures) ▪ Ties to physical locations from multiple related accounts  Pruning of leaf entities to disambiguate the findings  Additional data extractions and crawls or computational research ▪ Supplementary research with other complementary or even overlapping software tools  Further hypothesizing and testing  Real-world explorations Maltego Radium: Mapping NetworkTies and Identities across the Internet 67
  • 68. SCALE: DATA SET SIZES  Giant (macro) data sets  Forever crawls for the L3 footprints (if one filters unwisely by being too inclusive; otherwise, blisteringly fast)  Total domain searches (including whole-country domain searches) but at a high level  Huge depth that is time- consuming to explore (demanding on researchers)  Micro data sets as well (to the level of the individual ego node) TIME  May be a slice-in-time, sequential, or continuously dynamic (for real-time dynamic network analysis or “DNA”; focus on changes over time or trendline data) temporal data  Continuous dynamic for an “intel dashboard” or “data feed” for situational awareness  May be used to link space and time dimensions 68 SPATIO-TEMPORAL
  • 69.  A fast-changing electronic environment  Need to update and review data extractions regularly  Need to be aware of the existence of private channels  Need to work within an evolving legal ecosystem  Costs: time, computational expense, attention  Binding up time (even with blinding speeds of millisecond crawls) and computational expense on even high-end consumer machines  Premature crawl stoppages, incomplete crawls, or over-data (excessive data) Maltego Radium: Mapping NetworkTies and Identities across the Internet 69
  • 70.  User / analyst strengths and limitations  Need to wield the tool intelligently and not over-claim or under-claim results  Could use tool for initial discovery, pattern recognition, and anomaly detection  Engage a fairly high learning curve  Apply complementary data for informed interpretation  Avoid conflating popularity with influence, thin node peripheral positions with powerlessness, and other challenges  Avoid under-sampling (collecting too little information) Maltego Radium: Mapping NetworkTies and Identities across the Internet 70
  • 71.  Newness of computational research in some academic / research / professional fields and analytical applications  Challenges to research rigor and generalizability  Challenges to domain field acceptability  Openness in terms of methodologies  The “primitiveness” of network science in various practical (research, analysis, decision-making, and other) applications Maltego Radium: Mapping NetworkTies and Identities across the Internet 71
  • 72.  May not be able to generalize far with only a partial data extraction or crawl (social media platform API limits, software limits), which provides descriptive data about networks  Even relatively “complete” crawls have to be properly analyzed and documented ▪ Particular “branches” may be analyzed to understand particular ego neighborhoods or focal nodes ▪ Crawls may include long-closed accounts (such as for emails) ▪ Other branches need to be pruned to de-noise the data  Analysis requires the making of inferences from what may be seen structurally  May only assert within legal bounds (no hackerish techniques to access information—of course) Maltego Radium: Mapping NetworkTies and Identities across the Internet 72
  • 73.  Social media platform accounts may be human, ‘bots, or cyborgs  Various socio-technical systems (STS) may be gamed ▪ People engage in impression management and spin; they engage in obfuscation (they are strategic about information); identities may be back-stopped electronically with various hoaxed accounts  Electronic systems may all be hoaxed (like honeypots or black holes, accounts, online email systems, digital contents, and websites)  Accounts may have some “light leakage” or “data exhaust” (unintended revelations that may be observed, analyzed, inferred, deduced, or extracted by practiced researchers) or “behavior leakage” (oblique indicators that may be observed from accounts), but these are often subtle and observed through machine learning and statistical analyses Maltego Radium: Mapping NetworkTies and Identities across the Internet 73
  • 74.  Maltego Radium™ only captures some information. It cannot…  “see” what’s not connected to the Internet andWWW or capture what is happening non-electronically in the real or physical or non-cyber world (it cannot bridge the cyber- physical confluence)  “go back in time” to map sites that are no longer online (in some form)  “see” what is labeled “private” in social media platforms  “see” how users navigate the electronic network  “see” what the characteristics are for particular entities / nodes / sub-graphs or sub-groups (identify or describe node “biases” in social network-speak) Maltego Radium: Mapping NetworkTies and Identities across the Internet 74
  • 75.  It cannot…  “see” what is in the Deep Web or Invisible Web (dynamically created pages or those requiring registration), only what’s on the publicly indexable “static” Web  explicitly indicate to researchers which nodes or links to explore in more depth  maintain a continuous crawl for more dynamic data likeTwitter Digger on background (unless the machine is kept running)  (currently) trace and extract what information is moving through networks (content diffusion or percolation)  create an invisible or stealth crawl (you will be seen skulking about) Maltego Radium: Mapping NetworkTies and Identities across the Internet 75
  • 76.  Multimodal data extractions may be done to understand…  Network ties (social, technological, and content)  Spatiality and geo-location  Technological structures  Human and organizational identity (PII) (through cross- referenced information)  Device usage online (~ to what Shodan computer search engine reveals)  Available contact information  “Not knowing” / being unaware is a “dominated strategy,” an inherently “losing” or subordinated approach (in game theory) Maltego Radium: Mapping NetworkTies and Identities across the Internet 76
  • 77.  Maltego Radium™ brings together various functionalities that may be done separately with separate customized programs, Google Search, Network Solutions’WHOIS, DNS, NodeXL social media platform data extractions, and then data visualization tools… but not as efficiently or as elegantly (especially for high-scale analyses and link analysis) …and not continuously over time  Maltego Radium™’s capabilities may be tested by conducting “machines” and “transforms” on known targets with known answers initially  Maltego Radium™ is styled in a sophisticated way, with cool visuals and sound effects Maltego Radium: Mapping NetworkTies and Identities across the Internet 77
  • 78. MALTEGO RADIUM™ AS A SOFTWARETOOL  What are some other possible practical and “feral” applications of Maltego Radium™ (adapted “unintended use” applications)?  Computational journalism? Outreach and marketing? Academic research?  Predictivity? Is it possible to predict group dynamics based on electronic network structures? Traffic? Contents?  What are some new functionalities that would enhance this tool? MALTEGO RADIUM™ AS A PENETRATIONTESTINGTOOL  In terms of its pen testing applications, what are some complementary software programs that may be used to  Test network defenses?  Surface hidden information?  Identify and exploit vulnerabilities? Maltego Radium: Mapping NetworkTies and Identities across the Internet 78
  • 79. Paterva’s Maltego Radium™  Paterva  Maltego Radium  CaseFile  MaltegoTungsten (for collaborative data extractions)*  Maltego Radium Blog  MaltegoTutorials:The Complete and Official Set (onYouTube)  Maltego Scripting Language (1.1) Guide (2012)  Maltego Radium Release (2012)  MaltegoVersion 3 User Guide (2011) Maltego Radium: Mapping NetworkTies and Identities across the Internet 79
  • 80. COMMUNITYVERSION  Free limited “community” version available for non- commercial use  API keys expire every few days  Runs in private or public mode on community servers (slower crawls); latter collects back- end statistics to benefit the community  User information collected  Lag in features already in the professional version COMMERCIALVERSION  Annual subscriptions to the software license available (with a 10% educational discount)  Initial higher cost ($650 first year; $350 for consecutive years thereafter—or 365 days)  Includes access to crawls using Paterva servers 80
  • 81.  Semantics  Tool functions  Processes  Practical applications  Worldviews and mindsets Maltego Radium: Mapping NetworkTies and Identities across the Internet 81 Drat! No Ctrl + Z “Undo” FunctionYet
  • 82. Maltego Radium™ on Social Media Paterva onTwitter (@Paterva) Maltego on Facebook Paterva / Maltego on YouTube RSS Feed Maltego Radium: Mapping NetworkTies and Identities across the Internet 82
  • 83. Who is Paterva? Development Team for Maltego Radium: 5 individuals based out of Gauteng, S. Africa RoelofTemmingh 44B Nelmapius Road Irene Pretoria, Gauteng 0157 ZA Phone: +27.27834486996 Email: roelof.temmingh@gmail.c om @roeloftemmingh on Twitter A “company stalker” crawl of www.Paterva.com (to the right) Making the company “drink its own champagne” :P Maltego Radium: Mapping NetworkTies and Identities across the Internet 83
  • 84.  “A Brief Overview of Social Network Analysis and NodeXL”  Thanks to Dr. Rebecca Gould, who encouraged my learning of Maltego Radium™ for (totally white-hat) higher education-based research.  Thanks to Phyllis Epps, who gave me permission to crawl her identity @peppslugs onTwitter, for this presentation.  Thanks to Anibal Pacheco, who gave me permission to crawl his electronic social networks for this demo. He asked me to share the following:  Site: www.anibalpacheco.net  Account: @anibalpachecoIT onTwitter  YouTube channel: http://bit.ly/TM8CHP (MegabyteWizards)  Thanks to CHECK for accepting this presentation and to the supportive audience!  The presenter has no tie to nor interests in Paterva. Maltego Radium: Mapping NetworkTies and Identities across the Internet 84
  • 85.  Dr. Shalin Hai-Jew  Instructional Designer, iTAC  212 Hale Library  Kansas State University  785-532-5262  shalin@k-state.edu Practically Speaking: No Anonymity “We may not acknowledge that in an electronic medium, levels and kinds of anonymity mean, in an important sense, no anonymity. If there are domains in which we can be anonymous but those domains are part of a global communication infrastructure in which there is no anonymity at the entry point, then it will always be possible to trace someone’s identity.”  Deborah G. Johnson and Keith Miller’s “Anonymity, Pseudonymity, or Inescapable Identity on the Net” (1998), Computers andSociety Maltego Radium: Mapping NetworkTies and Identities across the Internet 85

Notas do Editor

  1. NASA Twitter Geolocation crawl depicted
  2. Note: Legal authorities can lift all walls of anonymity or pseudonymity if there are indicators of potential law-breaking by appealing to the third-party service providers; this issue is not addressed here.
  3. Uniform Resource Locator
  4. About Applied Deception (bullet 3): What about single-use transactional pseudonyms? What about anonymization tools like TOR? What about using totally clean machines for very dedicated purposes? What about sheltering within another person’s identity? What about living quietly? (How does one avoid self-deception at the same time?)