24 research outputs found
PROACTIVE BIOMETRIC-ENABLED FORENSIC IMPRINTING SYSTEM
Insider threats are a significant security issue. The last decade has witnessed countless instances of data loss and exposure in which leaked data have become publicly available and easily accessible. Losing or disclosing sensitive data or confidential information may cause substantial financial and reputational damage to a company. Therefore, preventing or responding to such incidents has become a challenging task. Whilst more recent research has focused explicitly on the problem of insider misuse, it has tended to concentrate on the information itselfâeither through its protection or approaches to detecting leakage. Although digital forensics has become a de facto standard in the investigation of criminal activities, a fundamental problem is not being able to associate a specific person with particular electronic evidence, especially when stolen credentials and the Trojan defence are two commonly cited arguments. Thus, it is apparent that there is an urgent requirement to develop a more innovative and robust technique that can more inextricably link the use of information (e.g., images and documents) to the users who access and use them. Therefore, this research project investigates the role that transparent and multimodal biometrics could play in providing this link by leveraging individualsâ biometric information for the attribution of insider misuse identification. This thesis examines the existing literature in the domain of data loss prevention, detection, and proactive digital forensics, which includes traceability techniques. The aim is to develop the current state of the art, having identified a gap in the literature, which this research has attempted to investigate and provide a possible solution. Although most of the existing methods and tools used by investigators to conduct examinations of digital crime help significantly in collecting, analysing and presenting digital evidence, essential to this process is that investigators establish a link between the notable/stolen digital object and the identity of the individual who used it; as opposed to merely using an electronic record or a log that indicates that the user interacted with the object in question (evidence). Therefore, the proposed approach in this study seeks to provide a novel technique that enables capturing individualâs biometric identifiers/signals (e.g. face or keystroke dynamics) and embedding them into the digital objects users are interacting with. This is achieved by developing two modesâa centralised or decentralised manner. The centralised approach stores the mapped information alongside digital object identifiers in a centralised storage repository; the decentralised approach seeks to overcome the need for centralised storage by embedding all the necessary information within the digital object itself. Moreover, no explicit biometric information is stored, as only the correlation that points to those locations within the imprinted object is preserved. Comprehensive experiments conducted to assess the proposed approach show that it is highly possible to establish this correlation even when the original version of the examined object has undergone significant modification. In many scenarios, such as changing or removing part of an image or document, including words and sentences, it was possible to extract and reconstruct the correlated biometric information from a modified object with a high success rate. A reconstruction of the feature vector from unmodified images was possible using the generated imprints with 100% accuracy. This was achieved easily by reversing the imprinting processes. Under a modification attack, in which the imprinted object is manipulated, at least one imprinted feature vector was successfully retrieved from an average of 97 out of 100 images, even when the modification percentage was as high as 80%. For the decentralised approach, the initial experimental results showed that it was possible to retrieve the embedded biometric signals successfully, even when the file (i.e., image) had had 75% of its original status modified. The research has proposed and validated a number of approaches to the embedding of biometric data within digital objects to enable successful user attribution of information leakage attacks.Embassy of Saudi Arabia in Londo
Florida Historical Quarterly, Vol. 38, Issue 1
Table of Content
Florida Historical Quarterly, Vol. 38, Issue 1
Table of Content
Play Among Books
How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an âinfinite flowâ of real books
Renseignement et contre-espionnage entre Dublin, Londres et Edimbourg de 1845 Ă 1945
This dissertation illustrates to what extent the use of secret agents allows London to conceal her weaknesses more specifically in her conflicts with Scotland and Ireland. In fact, Scottish and Irish rebel movements question the very founding of the United Kingdom when they want to repel their acts of Union with London. The central power relies on the effectiveness and power of British secret agents to help the army. Since the 15th century, English kings, fond of spying games and manipulation, have sent spies to France. In the 19th century, London installs police forces in Dublin, Edinburgh and London which warn the British government of every single plot raising owing to many detectives infiltrated in rebel organizations like Clan na Gael. This operating is very efficient and permits the central government to stifle the rebellions in spite of the alliance between Ireland and Scotland. Yet, Michael Collins forces the British government to negotiate thanks to the intelligence war (1919-1921) in which his squads target the British agents in Dublin using their methods and developing a large very efficient network of spies and informants. At the beginning of the Second World War, Ăamon De Valeraâs declaration of Eireâs neutrality urges London to play a very dangerous game of cooperation, espionage and political manipulation with Ireland in which diplomatic relations play a key role and the Irish collaboration with the Allies turns out to be very precious. This thesis tries to demonstrate that when fighting against Scottish and Irish rebels, London must reassert its power by developing and professionalizing its intelligence services which end up with a worldwide reputation.Cette thĂšse dĂ©montre dans quelles mesures le recours aux agents secrets permet Ă Londres de dissimuler ses faiblesses notamment dans ses conflits avec lâEcosse et lâIrlande. En effet, les mouvements dissidents Ă©cossais et irlandais mettent en pĂ©ril le fondement mĂȘme du Royaume-Uni en remettant en cause leurs actes dâUnion signĂ©s avec Londres. Le pouvoir central se base donc sur lâefficacitĂ© et la puissance de ses agents secrets pour soutenir ses forces armĂ©es. DĂšs le XVĂšme siĂšcle, les monarques anglais, avides de subterfuges, envoient beaucoup dâespions en France. Par la suite, Londres instaure des forces de police Ă Dublin, Edimbourg et Londres, qui lui rendent compte des moindres complots grĂące Ă lâinfiltration de dĂ©tectives dans des organisations rebelles comme le Clan na Gael, un fonctionnement qui lui permet de mater les rĂ©bellions malgrĂ© l'alliance irlando-Ă©cossaise. Toutefois, Michael Collins amĂšne Londres Ă nĂ©gocier grĂące Ă la guerre dâespions (1919-1921) dans laquelle il cible les agents britanniques en imitant leurs mĂ©thodes et en dĂ©veloppant un rĂ©seau de contre-espionnage performant. A lâaube de la Seconde Guerre mondiale, la neutralitĂ© de lâEire proclamĂ©e par Ăamon De Valera prĂ©cipite Londres dans un jeu trĂšs dangereux de coopĂ©ration, dâespionnage et de manipulation politique de lâIrlande dans lequel les relations diplomatiques jouent un rĂŽle clĂ©, mais oĂč la collaboration irlandaise auprĂšs des AlliĂ©es sâavĂšre prĂ©cieuse. Cette thĂšse essaie de dĂ©montrer que les conflits opposant Dublin et Edimbourg au pouvoir central poussent ce dernier Ă sâaffirmer, Ă dĂ©velopper et professionnaliser ses services de renseignement qui, de fait, gagnent une renommĂ©e mondiale
Uneven Encounters
In Uneven Encounters, Micol Seigel chronicles the exchange of popular culture between Brazil and the United States in the years between the World Wars, and demonstrates how that exchange affected ideas of race and nation in both countries. From Americans interpreting advertisements for Brazilian coffee or dancing the Brazilian maxixe, to Rio musicians embracing the âforeignâ qualities of jazz, Seigel traces a lively, cultural back and forth. Along the way, she shows how race and nation for both elites and non-elites are constructed together, and driven by global cultural and intellectual currents as well as local, regional, and national ones.
Seigel explores the circulation of images of Brazilian coffee and of maxixe in the United States during the period just after the imperial expansions of the early twentieth century. Exoticist interpretations structured North Americansâ paradoxical sense of themselves as productive âconsumer citizens.â Some people, however, could not simply assume the privileges of citizenship. In their struggles against racism, Afro-descended citizens living in Rio de Janeiro, SĂŁo Paulo, New York, and Chicago encountered images and notions of each other, and found them useful. Seigel introduces readers to cosmopolitan Afro-Brazilians and African Americans who rarely traveled far from home but who nonetheless absorbed ideas from abroad. She suggests that studies comparing U.S. and Brazilian racial identities as two distinct constructions are misconceived. Racial formation transcends national borders; attempts to understand it must do the same
THE WRITING ON THE SCREEN: IMAGES OF TEXT IN THE GERMAN CINEMA FROM 1920 TO 1949
By establishing a crucial figural relation between image and text in the cinema, this dissertation offers a detailed analysis of the uses of writing through select canonical works of a significant period in the history of the German cinema. Drawing on Walter Benjamin's theory of allegory and Gilles Deleuze's conceptions of the cinematic image, as well as a Derridean definition of writing, I argue that instances of written text in images of the German cinema are social hieroglyphs rendered as allegorical gestures, which inscribe questions of authority in the form of grammatological constellations within the movement of images. These hieroglyphic configurations, spelled out as writing on the screen, stand in reference to specific modalities which affirm the presence of a larger organizational regime of truth. Instances of writing thus constitute the inscriptions through which such structures of power acquire legibility and, conversely, become visible. Ultimately, this figural regime delineates questions of the political constitution of the state because the struggle for authority and its legitimacy as an organizational system become embodied in allegorical forms of writing that inscribe the body politic into filmic texts as subject positions. This approach is predicated on a subjunctive dimension that redefines the intrinsic relation of the text to its "outside." Chapters discuss the figure of authority in "The Cabinet of Dr. Caligari" and "Kameradschaft," circularity in Fritz Lang's "M" and his "Mabuse" films, titles and writing in early Weimar film censorship decisions, the star figure of Emil Jannings in the Nazi film "Ohm KrĂŒger," and the postwar films "Die Mörder Sind Unter Uns" and "Rotation." An epilogue investigates the reconfigurations of writing on the screen in R.W. Fassbinder's "Die Dritte Generation" (1979) and the 1998 hacker film "23". In all of these case studies, I contend that writing in film remains significant when the image as such must be augmented by gestures toward a figural language
Rendering Houses in Ladakh
Sophie Day explores the houses that are imagined, built, repurposed, and dismantled among different communities in Ladakh, drawing attention to the ways in which houses are like and unlike people.A handful of in-depth âhouse portraitsâ are selected for the insight they provide into major regional developments, based on the authorâs extended engagement since 1981. Most of these houses are Buddhist and associated with the town of Leh. Drawing on both image and text, collaborative methods for assembling material show the intricate relationships between people and places over the life course. Innovative methods for recording and archiving such as âstoryboardsâ are developed to frame different views of the house. This approach raises analytical questions about the composition of life within and beyond storyboards, offering new ways to understand a region that intrigues specialists and non-specialists alike
Thatcher's thrillers: British television thriller serials of the 1980s
Thatcher's Thrillers is a cultural-materialist account of the development of a television drama genre in Britain during the 1980s. The thesis initially addresses the fast-changing legislative context of television broadcasting during the Thatcher era and outlines developments in drama formats and programming during this period. It then explores the defining characteristics of the thriller genre as evidenced in a range of texts from different media (short stories, novels, films and television dramas), in order to identify 'abstract' elements of the genre. Centrally, the thesis examines the 1980s and early-1990s thliller serials themselves, arguing that these constitute one of the most significant forms of television drama during the period. The pre-eminence of a number of these programmes was recognised by the television industry: Edge of Darkness (1985), A Very British Coup (1987), Traffik (1989) and Prime Suspect (1991) all won the BAFTA award for Best Drama Series/Serial for their respective year of transmission. These and a number of other serials constitute an identifiable genre addressing issues of public concern (such as the power of the hidden British establishment, the growth of the nuclear threat and conflicts between large business corporations and ordinary citizens) and contemporary formations of subjecthood (through protagonists whose experiences profoundly alter their sense of personal identity). Individual chapters of the thesis are devoted to the most noteworthy of these programmes, exploring their aesthetic characteristics and cultural resonances. The thesis also examines the contributions of key individuals, including writers such as Troy Kennedy Martin, Alan Bleasdale, Lynda La Plante and Dennis Potter, who in different ways challenged conventional representations and redefined the form of television drama. The thesis addresses in conclusion the relationship between narrative and ideology in contemporary thriller serials, arguing that there emerges a set of responses critical of the new imperatives of Thatcherism
Bowdoin Orient v.55, no.1-30 (1925-1926)
https://digitalcommons.bowdoin.edu/bowdoinorient-1920s/1007/thumbnail.jp