14,149 research outputs found

    Adversarial behaviours knowledge area

    Full text link
    The technological advancements witnessed by our society in recent decades have brought improvements in our quality of life, but they have also created a number of opportunities for attackers to cause harm. Before the Internet revolution, most crime and malicious activity generally required a victim and a perpetrator to come into physical contact, and this limited the reach that malicious parties had. Technology has removed the need for physical contact to perform many types of crime, and now attackers can reach victims anywhere in the world, as long as they are connected to the Internet. This has revolutionised the characteristics of crime and warfare, allowing operations that would not have been possible before. In this document, we provide an overview of the malicious operations that are happening on the Internet today. We first provide a taxonomy of malicious activities based on the attacker’s motivations and capabilities, and then move on to the technological and human elements that adversaries require to run a successful operation. We then discuss a number of frameworks that have been proposed to model malicious operations. Since adversarial behaviours are not a purely technical topic, we draw from research in a number of fields (computer science, criminology, war studies). While doing this, we discuss how these frameworks can be used by researchers and practitioners to develop effective mitigations against malicious online operations.Published versio

    Multilingual Cross-domain Perspectives on Online Hate Speech

    Full text link
    In this report, we present a study of eight corpora of online hate speech, by demonstrating the NLP techniques that we used to collect and analyze the jihadist, extremist, racist, and sexist content. Analysis of the multilingual corpora shows that the different contexts share certain characteristics in their hateful rhetoric. To expose the main features, we have focused on text classification, text profiling, keyword and collocation extraction, along with manual annotation and qualitative study.Comment: 24 page

    2003-2007 Report on Hate Crimes and Discrimination Against Arab Americans

    Get PDF
    Analyzes rates, patterns, and sources of anti-Arab-American hate crimes and discrimination, including detainee abuse, delays in naturalization, and threats; civil liberties concerns; bias in schools; and defamation in the media. Includes case summaries

    A systematic survey of online data mining technology intended for law enforcement

    Get PDF
    As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. With manual inspections becoming increasingly infeasible, law enforcement bodies are optimising online investigations through data-mining technologies. Such technologies must be well designed and rigorously grounded, yet no survey of the online data-mining literature exists which examines their techniques, applications and rigour. This article remedies this gap through a systematic mapping study describing online data-mining literature which visibly targets law enforcement applications, using evidence-based practices in survey making to produce a replicable analysis which can be methodologically examined for deficiencies

    An Contemplated Approach for Criminality Data using Mining Algorithm

    Get PDF
    We propose an approach for the arrangement and execution of bad behavior area and criminal recognizing confirmation for Indian urban groups using data mining frameworks. Our approach is parceled into six modules, to be particular�information extraction (DE), information preprocessing (DP), grouping, Google outline, characterization and WEKA� execution. To begin with module, DE expels the unstructured wrongdoing dataset from various wrongdoing Web sources, in the midst of the season of 2000� 2018. Second module, DP cleans, facilitates and diminishes the removed wrongdoing data into sorted out 5,038 wrongdoing events. We address these events using 35 predefined wrongdoing attributes. Secure measures are taken for the wrongdoing database accessibility. Rest four modules are useful for bad behavior acknowledgment, criminal recognizing evidence and desire, and bad behavior affirmation, independently. Wrongdoing acknowledgment is explored using k-suggests gathering, which iteratively makes two wrongdoing bundles that rely upon equivalent wrongdoing properties. Google portray observation to k-infers. Criminal conspicuous verification and estimate is dismembered using KNN portrayal. Bad behavior check of our results is done using WEKA�. WEKA� checks an exactness of 93.62 and 93.99 % in the course of action of two bad behavior clusters using picked bad behavior attributes. Our approach contributes in the change of the overall population by helping the looking at workplaces in bad behavior area and guilty parties' recognizing confirmation, and in this way decreasing the bad behavior rates. Wrongdoings are a social unsettling influence and cost the overall population to an awesome degree from various perspectives. Any examination that can help in separating and comprehending wrongdoing speedier pays for itself. Crime data mining has the capacity of extricating helpful data and concealed examples from the substantial wrongdoing informational indexes. The crime data mining challenges are getting to be fortifying open doors for the coming years. Since the writing of crime information mining has expanded energetically as of late, it winds up obligatory to build up a diagram of the cutting edge. This orderly survey centers around crime data mining procedures and innovations utilized as a part of past investigations. The current work is grouped into various classifications and is introduced utilizing perceptions. This paper additionally demonstrates a few difficulties identified with crime data research

    Hate Speech Detection in a mix of English and Hindi-English (Code-Mixed) Tweets

    Get PDF
    With the increasing usage of social networking platforms seen over recent years, there has been an extensive rise in hate speech usage between the users. Hence, Government and social media platforms face lots of responsibility and challenges to control, detect and eliminate massively growing hateful content as early as possible to prevent future criminal acts such as cyber violence and real-life hate crimes. Since Twitter is used globally by people from various backgrounds and nationalities, the platform contains tweets posted in different languages, including code-mixed language, namely Hindi-English. Due to the informal format of tweets with variations in spelling and grammar, hate speech detection is challenging, especially in code-mixed text containing a mixture of different languages. In this paper, we tackle the critical issue of hate speech on social media, with a focus on a mix of English and Hindi-English (code-mixed) text messages (tweets) on Twitter. We perform hate speech classification using the benefits of character-level embedding representations of tweets and Deep Neural Networks (DNN). We built two architectures, namely Convolutional Neural Network (CNN) and a combination of CNN and Long Short-Term Memory (LSTM) algorithms with character-level embedding as an improvement over Elouali et al. (2020)’s work. Both the models were trained using an imbalanced (original) as well as oversampled (balanced) version of the training dataset and were evaluated on the test set. Extensive experimental analysis was performed by tuning the hyperparameters of our models and evaluating their performance in terms of accuracy, efficiency (runtime) and scalability in detecting whether a tweet is hate speech or non-hate. The performance of our proposed models is compared with Elouali et al. (2020)’s model, and it is observed that our method has an improved accuracy and a significantly improved runtime and is scalable. Among our best performing models, CNN-LSTM performed slightly better than CNN with an accuracy of 88.97%

    No. 21: Cross-Border Raiding and Community Conflict in the Lesotho-South African Border Zone

    Get PDF
    Movement backwards and forwards across borders for work is often considered to be the primary form of unauthorized movement in Southern Africa. In southern Lesotho, a new and particularly dangerous form of two-way cross-border movement has become entrenched. This situation warrants the label “crisis”; a crisis which is devastating parts of the countryside in both Lesotho and the northern Eastern Cape Province of South Africa. Media and official attention has focused on the extreme violence which accompanies cross-border stock raiding. This paper seeks to understand the social and economic roots and impacts of cross-border stock theft. Such an analysis is a vital first-step towards the resolution of the conflict since it shows not only why the violence occurs but who stands to benefit from its perpetuation. The analysis is also helpful to understanding the extent to which the existence of an international border is implicated in the cycle and counter-cycle of violence. This paper concludes with an assessment of official reaction, or inaction, on the crisis. The findings are based upon wide-ranging interviews with 147 respondents in 10 villages in southern Lesotho. A complementary study is now recommended on the South African side of the border. The stock theft epidemic is characterized by the following features: Although stock theft is not new to this border zone, it became more widespread, organized and violent in the 1990s. Some 71% of the Basotho stockowners reported having had stock stolen since 1990, many more than once. Over 40% of nonstockowners say they are without animals because of stock theft. Since 1990, 85% of stockowners in the border villages have lost animals to thieves as compared with 49% from non-border villages. Shepherds from border villages also report a higher rate of victimisation (83%) than those further removed from the border (50%). Most cattle and sheep are stolen from cattle posts where they are guarded only by shepherds. Stock is also taken from village kraals and, on occasion, whole villages have been attacked and all the stock driven off. Villagers in all ten villages rate stock theft as a serious problem. Stock thieves come from within Lesotho as well as across the border in South Africa. Basotho stock thieves also carry out raids in South Africa and vice-versa. Gun use is widespread, although South African raiders seem to have greater access to arms. Much of the theft appears to be coordinated by well-organised criminal gangs but reliable information on their composition and organization is difficult to access. Criminal networks in Lesotho and South Africa also cooperate to dispose of stolen animals in the lowlands of Lesotho and as far afield as Port Elizabeth, Durban and Welkom The upsurge in stock theft is clearly related to growing poverty in the region. On both sides of the border, mine retrenchments have hit hard, sending experienced miners home and denying young men access to wage employment. Not only has this exacerbated household and community poverty, but it has provided willing foot-soldiers for stock thieves. Stock raiding produces further impoverishment, insecurity and suspicion, fuelling the escalating cycle of theft and counter-theft. Though not itself in dispute or a source of conflict per se, the Lesotho-South African border plays an essential role in the organization and impact of stock theft. There are significant differences in vulnerability and impact between villages close to the border and those further inland. The international border leads to a distinctive pattern of stock theft. In the simplest scenario, raiders from one side steal from border villages on the other and vice-versa and drive the stock back over the border. The situation becomes more problematic when Basotho stock thieves use the border as a refuge, stealing from Basotho and driving the animals across the border into South Africa to sell or exchange with South African thieves. Cross-border counter-raids to retrieve lost stock and revenge attacks are also common on both sides of the border. South African victims then target Basotho border villages for revenge raids, resulting in great tension and friction between ordinary Basotho and South Africans. The only Lesotho village reporting harmonious cross-border relations borders a white South African farming area. However, white border farmers are not aloof from the conflict. Lesotho police and villagers are adamant that some white South African farmers are implicated in cross-border theft. Stock raiding has major negative impacts on households, communities and cross-border interaction. The impacts also extend to the national economy. In Qacha’s Nek and Quthing districts, production of wool and mohair has fallen significantly in the last 5 years. Livestock holdings have dropped and the numbers of stockless households has increased. Farmers are reluctant to invest in breeding cattle as households debate the merits of getting rid of their cattle. One prominent stock-owner recently lost M200,000 of stock. Stock theft has also had a deleterious effect on agriculture, reducing the availability of oxen for ploughing fields. No one is immune from small-scale and organized raiding. Stock theft, coupled with decreasing agricultural production and increasing unemployment, deepens poverty and desperation. At the household and community level, the research found the following: Nearly 90% of respondents state their household economies have been negatively affected by stock theft. A household’s entire wealth and livelihood can be wiped out in one attack. Escalating stock theft and related violence have profound social consequences, bringing fear and insecurity to ordinary people. People are abandoning their villages and migrating to town and to South Africa to look for work. Community relations have become fraught with tension and suspicion. Nearly half of all stockowners interviewed suspect specific individuals within their own village are involved in the theft of animals – acting either as informants or actual thieves. Invariably it is the poor who are fingered and stigmatised. Communal cooperation such as livestock loaning for ploughing and mafisa (sharing of products) is in steep decline, as are cultural activities and celebrations which involve the slaughter of animals. Cross-border cooperation, activities and initiatives have collapsed and there is considerable animosity and hatred between the communities on either side of the border. Even casual visiting and shopping have all but ceased. Prevention efforts have involved some cross-border cooperation between villages to apprehend thieves and return cattle but these efforts are sporadic and make little dent on the problem. They often also lead to vicious reprisals from stock-theft syndicates. Vigilantism is on the rise in the face of widespread perceptions that the police and the courts on both sides of the border are either ineffectual or corrupt. This paper examines the inadequacies of the policing of the crisis, highlighting the low rates of arrest and prosecution. The difficulties of geography and inadequate resources which hamper effective policing are highlighted. Only in areas where the army is stationed or soldiers patrol the border has there been any marked decrease in theft. The situation is bound to deteriorate further unless there is effective national-level attention and intervention. The low-level civil war in the nearby Tsolo district of South Africa in 1997 was fuelled by a potent mix of poverty, mine retrenchments and stock theft. This conflict could well pale in comparison with the volatile situation building in the southern Lesotho border zone. Here, the same combination of factors are compounded by ethnic and national difference, and the strategic manipulation of borders by stock thieves on both sides. Both governments need to recognize that this local crisis could escalate into a major conflagration and intervene to defuse the situation, calm tensions and work towards effective policing and a political solution. Within Lesotho, the passage of a new Stock Theft Act promises heavy penalties for the shadowy figures involved in organized raiding, provided they can be caught. The institution of a national stock register also seems a step in the right direction though its likely effectiveness is debated. Both the Lesotho and South African governments should acknowledge that a crisis situation exists and that this is a regional problem. Only when national governments, working together with local stakeholders, take the problem seriously and begin cooperating can workable initiatives to halt this devastating social and economic plague be implemented

    Refugees Welcome? Online Hate Speech and Sentiments in Twitter in Spain during the Reception of the Boat Aquarius

    Get PDF
    High-profile events can trigger expressions of hate speech online, which in turn modifies attitudes and offline behavior towards stigmatized groups. This paper addresses the first path of this process using manual and computational methods to analyze the stream of Twitter messages in Spanish around the boat Aquarius (n = 24,254) before and after the announcement of the Spanish government to welcome the boat in June 2018, a milestone for asylum seekers acceptance in the EU and an event that was highly covered by media. It was observed that most of the messages were related to a few topics and had a generally positive sentiment, although a significant part of messages expressed rejection or hate—often supported by stereotypes and lies—towards refugees and migrants and towards politicians. These expressions grew after the announcement of hosting the boat, although the general sentiment of the messages became more positive. We discuss the theoretical, practical, and methodological implications of the study, and acknowledge limitations referred to the examined timeframe and to the preliminary condition of the conclusions

    Cyberbullying in Text Content Detection: An Analytical Review

    Full text link
    Technological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying. While most of these approaches have brought great success in cyberbullying research, data availability needed to develop model detection remains a challenge in the research space. This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.Comment: 8 pages. Under revie
    • …
    corecore