Posts

Ghost in the Shell - What it can tell us about Cybersecurity

Introduction

Unless you are familiar with anime and manga the title "Ghost in the Shell" (GitS) the title won't mean much so first a brief explanation. GitS is a media franchise which originally started as a serialised manga before being made in to an anime movie which led to it becoming known worldwide. It exits within the genre of science fiction and specially cyberpunk. The themes the series has touched include robotics, sentient Artificial Intelligence (AI), human augmentation, transferring human consciousness to a machine, an individuals identify and more. So what the question within GitS what relates to cybersecurity throughout the series you have the hacking of technically augmented humans, systems, along with themes of information manipulation and surveillance.

Lessons we can learn from GitS about Cybersecurity:


Tools can be turned against you: One premises of the GitS franchise is a super powerful intelligent combat robot or AI that was effective against any enemy,…

Applying Anthropology to Online Communities

Introduction

This post is the last one in this on applying anthropology series. When it comes to tacking online issues and problems there is a need to understand the types of people who carry out these acts. This requires intelligence of the threats to be collected and because it is about gathering this information from people anthropology based methods can aid in this endeavour. By being able to understand online communities it enables companies, NGOs and law enforcement to tackle crime (cyber/online), hate-groups and extremists/terrorists. 

Platforms
TheInternet has facilitated the online interactions of dispersed groups of people with shared interests. These online groups exhibit a wide range of characteristics and serve a variety of purposes, from small groups engaged in tightly focused discussions of specific topics, to complex created worlds with hundreds of simultaneous participants, to millions of users linked by an interest in markets or exchange networks for goods and informat…

Smart devices Use Cases and cybersecurity

Introduction

The number of all ways on and internet connected number of smart devices is growing year on year. Though while we have slowly begun to tackle the issue of cybersecurity around smart devices the potential problems and concerns regarding smart devices continue to emerge. Some of these problems  have come about due to increasing number of devices that are on the market along with the need to comply with ew regulation such as GDPR and the upcoming EU ePrivacy Regulation. This post will aim to highlight some of the use cases of smart devices and how these led to cybersecurity, data protection and privacy concerns. 

Use Cases



Home based Smart Appliances: The new wave of connected appliances has made it possible, to provide a cost effective path to meaningful functionality for end customers, along with remote diagnostics, management and analytics for manufacturers. Connectivity will enable better user experience, proactive alerts and even safety notifications. Manufacturers will le…

Applying Anthropology to the field of Artificial Intelligence (AI)

Applying anthropology to the field of AI may seem like a strange choice since anthropology largely is about people and human behaviour while AI is a complex piece of technology. But there are key areas in the field of AI where the anthropologist can play a useful and supportive role. 
The definition of AI is the capability of devices or mechanisms and machinery to perform functions usually associated with human intelligence, including scientific systems, reasoning, optimization through experience, and automated motor systems. The why, what and how anthropology can be used in the field of AI include understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines, and can aid in increasing public understanding of artificial intelligence, improve the teaching and training of AI practitioners, and provide guidance for research planners and funders concerning the importance and potential of current AI developments and future directions.
Studying t…

8 Cybersecurity Stories a Review of 2018

Introduction

This blog post gives a brief overview of 2018's Cybersecurity News Stories. These eight chosen news stories are listed in no particular older.



 Cybersecurity Trends 2019: Privacy and intrusion in the global village (https://www.welivesecurity.com/2018/12/18/cybersecurity-trends-2019-privacy-intrusion-global-village/) An article that summarizes the events and developments in Cybersecurity over 2018 and discusses the potential trends that may happen in 2019.  Czech Cyber Security Agency Warns Against Use of Huawei (https://www.nytimes.com/aponline/2018/12/17/business/ap-eu-czech-huawei.html) The Czech Republic's cybersecurity watchdog is warning against the use of products by Chinese electronics giant Huawei and another Chinese telecommunications company, ZTE. This is the latest devolvement in the backlash against Huawei in supplying key infrastructure for telecoms. Following Huawei being blocked in the USA, Canada, Australia, New Zealand and other countries. Austral…

Applying Anthropology to Cybersecurity

Introduction

This second post in the Anthropology series is about  how anthropology can be applied to cybersecurity. Applied anthropology refers to the application of the method and theory of anthropology to the analysis and solution of practical problems. When applied to the discipline of cybersecurity the methods of data collecting that are used in anthropology with the aim to help solve problems with the field of study. The primary methods used in applied anthropology are work shadowing, contextual interviews and semi-structured interviews. These can also be supported by literature reviews and surveys of relevant groups of people. These are done to gather qualitative and quantitative data in order for the anthropologist to provide recommendations or guidelines. 

Where and How Anthropology can be applied to Cybersecurity

The categories of cybersecurity that applied anthropology can be applied to include:

Human Factorssecurity trainingsecurity culturecommunication of security issuesOrga…

Examples of reports of Human Skeletal Analysis studies

Follow up to introduction Anthropology blog post. 

As part of my Applied Sciences by Research MSc I had undertake an Extended Dissertation along with supporting modules. I conducted research on a collection of Roman human remains as part of the MSc. When search as part of a dissertation based on human skeletal remains you are expected to bethorough and extract as much information about the individuals as possible. I had a whole year for my research I was told to study a minimum of twenty aiming for twenty-five skeletons. In the end I analysed twenty-seven individuals made up of twenty four adults and three infants. With at least two days per individual to carry out  the human skeletal analysis. Also, four of the individuals I arranged to be loaned temporally to the university from the museum I was carrying out the research at to conduct a nice detailed analysis on the remains due the native of their burials. Primarily for the examination of cut-marks. It should be noted that under cert…