to catch a cyber-thief · 10/6/13 to catch a cyber-thief 2/8 the suspects’ vocabulary, and then...

8
10/6/13 To catch a cyber-thief www.ecnmag.com/news/2013/06/catch-cyber-thief 1/8 LOG IN REGISTER FIND MY COMPANY News ADVERTISEMENT To catch a cyber-thief Wed, 06/05/2013 - 11:20am by Concordia University Get today's electronic OEM design headlines and news - Sign up now! Benjamin Fung and Gaby Dagher Montreal, June 5, 2013 – When local police came calling with child porn allegations last January, former Saint John city councillor Donnie Snook fled his house clutching a laptop. It was clear that the computer contained damning data. Six months later, police have finally gathered enough evidence to land him in jail for a long time to come. With a case seemingly so cut and dry, why the lag time? Couldn’t the police do a simple search for the incriminating info and level charges ASAP? Easier said than done. With computing devices storing terrabytes of personal data, it can take months before enough evidence can be cobbled together from reams of documents, emails, chat logs and text messages. That’s all about to change thanks to a new technique developed by researchers at Concordia University, who have slashed the data-crunching time. What once took months now takes minutes. Gaby Dagher and Benjamin Fung, researchers with the Concordia Institute for Information Systems Engineering, will soon publish their findings in Data & Knowledge Engineering. Law enforcement officers are already putting this research to work through Concordia’s partnership with Canada’s National Cyber-Forensics and Training Alliance, in which law enforcement organizations, private companies, and academic institutions work together to share information to stop emerging cyber threats and mitigate existing ones. Thanks to Dagher and Fung, crime investigators can now extract hidden knowledge from a large volume of text. The researchers’ new methods automatically identify the criminal topics discussed in the textual conversation, show which participants are most active with respect to the identified criminal topics, and then provide a visualization of the social networks among the participants. Dagher, who is a PhD candidate supervised by Fung, explains “the huge increase in cybercrimes over the past decade boosted demand for special forensic tools that let investigators look for evidence on a suspect’s computer by analyzing stored text. Our new technique allows an investigator to cluster documents by producing overlapping groups, each corresponding to a specific subject defined by the investigator.” Fung says that, “out of all the types of available data in cybercrime investigation, text data is the most common medium used by scammers, identity thieves and child exploitation criminals. But this type of data is also the most challenging to analyze. It’s really hard make a software program automatically interpret the underlying meaning of the text.” The researchers have also developed a new search engine to help investigators identify the relevant documents from a large volume of text. Says Dagher, “In a normal search engine, a user enters some keywords and results can vary – widely. In contrast, our search engine captures NEW S ARTICLES BLOGS APPLICATIONS PRODUCTS MULTIMEDIA RESOURCES FREE SUBSCRIPTIONS

Upload: others

Post on 29-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 1/8

LOG IN REGISTERFIND MY COMPANY

News

ADVERTISEMENT

To catch a cyber-thief

Wed, 06/05/2013 - 11:20am

by Concordia University

Get today's electronic OEM design headlines and news - Sign up now!

Benjamin Fung and Gaby Dagher

Montreal, June 5, 2013 – When local police came calling with child porn allegations last

January, former Saint John city councillor Donnie Snook fled his house clutching a laptop.

It was clear that the computer contained damning data. Six months later, police have

finally gathered enough evidence to land him in jail for a long time to come.

With a case seemingly so cut and dry, why the lag time? Couldn’t the police do a simple

search for the incriminating info and level charges ASAP? Easier said than done. With

computing devices storing terrabytes of personal data, it can take months before enough

evidence can be cobbled together from reams of documents, emails, chat logs and text

messages.

That’s all about to change thanks to a new technique developed by researchers at

Concordia University, who have slashed the data-crunching time. What once took months

now takes minutes.

Gaby Dagher and Benjamin Fung, researchers with the Concordia Institute for Information

Systems Engineering, will soon publish their findings in Data & Knowledge Engineering. Law enforcement officers are already putting this

research to work through Concordia’s partnership with Canada’s National Cyber-Forensics and Training Alliance, in which law enforcement

organizations, private companies, and academic institutions work together to share information to stop emerging cyber threats and mitigate

existing ones.

Thanks to Dagher and Fung, crime investigators can now extract hidden knowledge from a large volume of text. The researchers’ new

methods automatically identify the criminal topics discussed in the textual conversation, show which participants are most active with respect

to the identified criminal topics, and then provide a visualization of the social networks among the participants.

Dagher, who is a PhD candidate supervised by Fung, explains “the huge increase in cybercrimes over the past decade boosted demand for

special forensic tools that let investigators look for evidence on a suspect’s computer by analyzing stored text. Our new technique allows an

investigator to cluster documents by producing overlapping groups, each corresponding to a specific subject defined by the investigator.”

Fung says that, “out of all the types of available data in cybercrime investigation, text data is the most common medium used by scammers,

identity thieves and child exploitation criminals. But this type of data is also the most challenging to analyze. It’s really hard make a software

program automatically interpret the underlying meaning of the text.”

The researchers have also developed a new search engine to help investigators identify the relevant documents from a large volume of text.

Says Dagher, “In a normal search engine, a user enters some keywords and results can vary – widely. In contrast, our search engine captures

NEWS ARTICLES BLOGS APPLICATIONS PRODUCTS MULTIMEDIA RESOURCES FREE SUBSCRIPTIONS

Page 2: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 2/8

the suspects’ vocabulary, and then uses it to improve the accuracy of the search results. Just like some cultures are said to have over 50

words for snow, criminals might have 50 words for… snow of a different kind! This search engine allows investigators to pick up on those

nuances and quickly identify the incriminating documents.”

“Experiments using real-life criminal data already suggest that our approach is much more effective than the traditional methods,” says

Dagher. This new method of quickly sifting through huge amounts of text to zero in on the evidence could soon be used by law enforcement

agencies around the world, meaning future cybercriminals can go to trial much more quickly, saving time for the police – as well as money for

tax-payers.

Source: http://www.concordia.ca/now/media-relations/news-releases/20130605/to-catch-a-cyber-thief.php

0

SHARE THIS STORY

Tweet 0 Share Like 0 Send

RELATED CONTENT

Philips says police investigating its cyber attack

FCC fines Google $25,000 over Street View probe

In modern scandal, an e-mail is forever

COMMENTS

Page 3: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 3/8

0 comments

WHAT 'S T HIS?ALSO ON ECN MAGAZINE

California Internet “erase” button for teens faces not-so-minor hurdles7 comments • 6 days ago

chuck. . . — This bill is an unfortunate illustration of how out of

touch with reality California politics has become. It is no …

Watch a sniper ri fle obli terate an iPhone 5S8 comments • 10 days ago

Jason Lomberg — How is this right wing-leaning? Seems like just

a harmless, silly video to me.

Tesla says car fire began in battery after crash3 comments • 3 days ago

brhans — Looks to me that firefighters may need to be trained in

the differences for handling fires caused by the batteries of …

Warming lull haunts authors of key climate report28 comments • 16 days ago

wagnert inat lanta — Ed -- You're right, the religion has taken

hold. The climate priesthood, having had a taste of power, …

Leave a message...

Best Community ⚙ ⤤Share

No one has commented yet.

Subs cribe✉ Add Dis qus to your s i ted

0★

Search ECNmag

Page 4: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 4/8

New Products

COM Express Modules feature Intel Core i7/i5 4th-Gen CPUs and removable memory

October 4, 2013 1:35 pm

Embedded Video Engine features 3-in-1 functionality for graphical user interface development

October 4, 2013 12:35 pm

Software includes expanded electro-acoustic capability

October 4, 2013 12:29 pm

Gain block covers the frequency range from 50 to 4,000MHz

October 4, 2013 11:12 am

View More Product Releases »

Page 5: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 5/8

Video of the Day

Trending

Photos of the Day: Stop being so stupid, voters tweet to Congress

14 comments · 1 day ago

Forget global warming: Has global cooling begun?

125 comments · 1 week ago

Photos of the Day: What 95% certainty of warming means to scientists

30 comments · 3 days ago

Can software save Moore's Law?

2 comments · 15 hours ago

How the DEA gets its cell phone data fix

4 comments · 1 day ago

Page 7: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 7/8

ECN MAGAZINE

About Us

Advertising Info

Contact Us

Directory FAQs

Subscriptions

Privacy Policy

Terms & Conditions

RESOURCES

Articles

Blogs

Digital Editions

Events Calendar

News

Videos

White Papers

TOPICS

Automotive

Computing

Consumer

Industrial

Medical

Mil/Aero

Power

CONNECT WITH US

Facebook

Twitter

YouTube

RSS

NEWSLETTERS

Page 8: To catch a cyber-thief · 10/6/13 To catch a cyber-thief  2/8 the suspects’ vocabulary, and then uses it to improve the accuracy of the search

10/6/13 To catch a cyber-thief

www.ecnmag.com/news/2013/06/catch-cyber-thief 8/8

First Name Last Name

Email Address

Company Name

All fields are required.

The ECN Daily

News, features, analysis, emerging products, and

more for electronic OEM design engineers.

ECN Latewire

End of day updates on the Electronic OEM

market.

The ECN Europe Daily

Focus on the European electronic OEM market.

SUBSCRIBE

OUR PARTNER SITES

Advantage Business Media © Copyright 2013 Advantage Business Media