24 research outputs found

    PROACTIVE BIOMETRIC-ENABLED FORENSIC IMPRINTING SYSTEM

    Get PDF
    Insider threats are a significant security issue. The last decade has witnessed countless instances of data loss and exposure in which leaked data have become publicly available and easily accessible. Losing or disclosing sensitive data or confidential information may cause substantial financial and reputational damage to a company. Therefore, preventing or responding to such incidents has become a challenging task. Whilst more recent research has focused explicitly on the problem of insider misuse, it has tended to concentrate on the information itself—either through its protection or approaches to detecting leakage. Although digital forensics has become a de facto standard in the investigation of criminal activities, a fundamental problem is not being able to associate a specific person with particular electronic evidence, especially when stolen credentials and the Trojan defence are two commonly cited arguments. Thus, it is apparent that there is an urgent requirement to develop a more innovative and robust technique that can more inextricably link the use of information (e.g., images and documents) to the users who access and use them. Therefore, this research project investigates the role that transparent and multimodal biometrics could play in providing this link by leveraging individuals’ biometric information for the attribution of insider misuse identification. This thesis examines the existing literature in the domain of data loss prevention, detection, and proactive digital forensics, which includes traceability techniques. The aim is to develop the current state of the art, having identified a gap in the literature, which this research has attempted to investigate and provide a possible solution. Although most of the existing methods and tools used by investigators to conduct examinations of digital crime help significantly in collecting, analysing and presenting digital evidence, essential to this process is that investigators establish a link between the notable/stolen digital object and the identity of the individual who used it; as opposed to merely using an electronic record or a log that indicates that the user interacted with the object in question (evidence). Therefore, the proposed approach in this study seeks to provide a novel technique that enables capturing individual’s biometric identifiers/signals (e.g. face or keystroke dynamics) and embedding them into the digital objects users are interacting with. This is achieved by developing two modes—a centralised or decentralised manner. The centralised approach stores the mapped information alongside digital object identifiers in a centralised storage repository; the decentralised approach seeks to overcome the need for centralised storage by embedding all the necessary information within the digital object itself. Moreover, no explicit biometric information is stored, as only the correlation that points to those locations within the imprinted object is preserved. Comprehensive experiments conducted to assess the proposed approach show that it is highly possible to establish this correlation even when the original version of the examined object has undergone significant modification. In many scenarios, such as changing or removing part of an image or document, including words and sentences, it was possible to extract and reconstruct the correlated biometric information from a modified object with a high success rate. A reconstruction of the feature vector from unmodified images was possible using the generated imprints with 100% accuracy. This was achieved easily by reversing the imprinting processes. Under a modification attack, in which the imprinted object is manipulated, at least one imprinted feature vector was successfully retrieved from an average of 97 out of 100 images, even when the modification percentage was as high as 80%. For the decentralised approach, the initial experimental results showed that it was possible to retrieve the embedded biometric signals successfully, even when the file (i.e., image) had had 75% of its original status modified. The research has proposed and validated a number of approaches to the embedding of biometric data within digital objects to enable successful user attribution of information leakage attacks.Embassy of Saudi Arabia in Londo

    Florida Historical Quarterly, Vol. 38, Issue 1

    Get PDF
    Table of Content

    Florida Historical Quarterly, Vol. 38, Issue 1

    Get PDF
    Table of Content

    Play Among Books

    Get PDF
    How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books

    Renseignement et contre-espionnage entre Dublin, Londres et Edimbourg de 1845 Ă  1945

    Get PDF
    This dissertation illustrates to what extent the use of secret agents allows London to conceal her weaknesses more specifically in her conflicts with Scotland and Ireland. In fact, Scottish and Irish rebel movements question the very founding of the United Kingdom when they want to repel their acts of Union with London. The central power relies on the effectiveness and power of British secret agents to help the army. Since the 15th century, English kings, fond of spying games and manipulation, have sent spies to France. In the 19th century, London installs police forces in Dublin, Edinburgh and London which warn the British government of every single plot raising owing to many detectives infiltrated in rebel organizations like Clan na Gael. This operating is very efficient and permits the central government to stifle the rebellions in spite of the alliance between Ireland and Scotland. Yet, Michael Collins forces the British government to negotiate thanks to the intelligence war (1919-1921) in which his squads target the British agents in Dublin using their methods and developing a large very efficient network of spies and informants. At the beginning of the Second World War, Éamon De Valera’s declaration of Eire’s neutrality urges London to play a very dangerous game of cooperation, espionage and political manipulation with Ireland in which diplomatic relations play a key role and the Irish collaboration with the Allies turns out to be very precious. This thesis tries to demonstrate that when fighting against Scottish and Irish rebels, London must reassert its power by developing and professionalizing its intelligence services which end up with a worldwide reputation.Cette thĂšse dĂ©montre dans quelles mesures le recours aux agents secrets permet Ă  Londres de dissimuler ses faiblesses notamment dans ses conflits avec l’Ecosse et l’Irlande. En effet, les mouvements dissidents Ă©cossais et irlandais mettent en pĂ©ril le fondement mĂȘme du Royaume-Uni en remettant en cause leurs actes d’Union signĂ©s avec Londres. Le pouvoir central se base donc sur l’efficacitĂ© et la puissance de ses agents secrets pour soutenir ses forces armĂ©es. DĂšs le XVĂšme siĂšcle, les monarques anglais, avides de subterfuges, envoient beaucoup d’espions en France. Par la suite, Londres instaure des forces de police Ă  Dublin, Edimbourg et Londres, qui lui rendent compte des moindres complots grĂące Ă  l’infiltration de dĂ©tectives dans des organisations rebelles comme le Clan na Gael, un fonctionnement qui lui permet de mater les rĂ©bellions malgrĂ© l'alliance irlando-Ă©cossaise. Toutefois, Michael Collins amĂšne Londres Ă  nĂ©gocier grĂące Ă  la guerre d’espions (1919-1921) dans laquelle il cible les agents britanniques en imitant leurs mĂ©thodes et en dĂ©veloppant un rĂ©seau de contre-espionnage performant. A l’aube de la Seconde Guerre mondiale, la neutralitĂ© de l’Eire proclamĂ©e par Éamon De Valera prĂ©cipite Londres dans un jeu trĂšs dangereux de coopĂ©ration, d’espionnage et de manipulation politique de l’Irlande dans lequel les relations diplomatiques jouent un rĂŽle clĂ©, mais oĂč la collaboration irlandaise auprĂšs des AlliĂ©es s’avĂšre prĂ©cieuse. Cette thĂšse essaie de dĂ©montrer que les conflits opposant Dublin et Edimbourg au pouvoir central poussent ce dernier Ă  s’affirmer, Ă  dĂ©velopper et professionnaliser ses services de renseignement qui, de fait, gagnent une renommĂ©e mondiale

    Uneven Encounters

    Get PDF
    In Uneven Encounters, Micol Seigel chronicles the exchange of popular culture between Brazil and the United States in the years between the World Wars, and demonstrates how that exchange affected ideas of race and nation in both countries. From Americans interpreting advertisements for Brazilian coffee or dancing the Brazilian maxixe, to Rio musicians embracing the “foreign” qualities of jazz, Seigel traces a lively, cultural back and forth. Along the way, she shows how race and nation for both elites and non-elites are constructed together, and driven by global cultural and intellectual currents as well as local, regional, and national ones. Seigel explores the circulation of images of Brazilian coffee and of maxixe in the United States during the period just after the imperial expansions of the early twentieth century. Exoticist interpretations structured North Americans’ paradoxical sense of themselves as productive “consumer citizens.” Some people, however, could not simply assume the privileges of citizenship. In their struggles against racism, Afro-descended citizens living in Rio de Janeiro, São Paulo, New York, and Chicago encountered images and notions of each other, and found them useful. Seigel introduces readers to cosmopolitan Afro-Brazilians and African Americans who rarely traveled far from home but who nonetheless absorbed ideas from abroad. She suggests that studies comparing U.S. and Brazilian racial identities as two distinct constructions are misconceived. Racial formation transcends national borders; attempts to understand it must do the same

    THE WRITING ON THE SCREEN: IMAGES OF TEXT IN THE GERMAN CINEMA FROM 1920 TO 1949

    Get PDF
    By establishing a crucial figural relation between image and text in the cinema, this dissertation offers a detailed analysis of the uses of writing through select canonical works of a significant period in the history of the German cinema. Drawing on Walter Benjamin's theory of allegory and Gilles Deleuze's conceptions of the cinematic image, as well as a Derridean definition of writing, I argue that instances of written text in images of the German cinema are social hieroglyphs rendered as allegorical gestures, which inscribe questions of authority in the form of grammatological constellations within the movement of images. These hieroglyphic configurations, spelled out as writing on the screen, stand in reference to specific modalities which affirm the presence of a larger organizational regime of truth. Instances of writing thus constitute the inscriptions through which such structures of power acquire legibility and, conversely, become visible. Ultimately, this figural regime delineates questions of the political constitution of the state because the struggle for authority and its legitimacy as an organizational system become embodied in allegorical forms of writing that inscribe the body politic into filmic texts as subject positions. This approach is predicated on a subjunctive dimension that redefines the intrinsic relation of the text to its "outside." Chapters discuss the figure of authority in "The Cabinet of Dr. Caligari" and "Kameradschaft," circularity in Fritz Lang's "M" and his "Mabuse" films, titles and writing in early Weimar film censorship decisions, the star figure of Emil Jannings in the Nazi film "Ohm KrĂŒger," and the postwar films "Die Mörder Sind Unter Uns" and "Rotation." An epilogue investigates the reconfigurations of writing on the screen in R.W. Fassbinder's "Die Dritte Generation" (1979) and the 1998 hacker film "23". In all of these case studies, I contend that writing in film remains significant when the image as such must be augmented by gestures toward a figural language

    Rendering Houses in Ladakh

    Get PDF
    Sophie Day explores the houses that are imagined, built, repurposed, and dismantled among different communities in Ladakh, drawing attention to the ways in which houses are like and unlike people.A handful of in-depth ‘house portraits’ are selected for the insight they provide into major regional developments, based on the author’s extended engagement since 1981. Most of these houses are Buddhist and associated with the town of Leh. Drawing on both image and text, collaborative methods for assembling material show the intricate relationships between people and places over the life course. Innovative methods for recording and archiving such as ‘storyboards’ are developed to frame different views of the house. This approach raises analytical questions about the composition of life within and beyond storyboards, offering new ways to understand a region that intrigues specialists and non-specialists alike

    Thatcher's thrillers: British television thriller serials of the 1980s

    Get PDF
    Thatcher's Thrillers is a cultural-materialist account of the development of a television drama genre in Britain during the 1980s. The thesis initially addresses the fast-changing legislative context of television broadcasting during the Thatcher era and outlines developments in drama formats and programming during this period. It then explores the defining characteristics of the thriller genre as evidenced in a range of texts from different media (short stories, novels, films and television dramas), in order to identify 'abstract' elements of the genre. Centrally, the thesis examines the 1980s and early-1990s thliller serials themselves, arguing that these constitute one of the most significant forms of television drama during the period. The pre-eminence of a number of these programmes was recognised by the television industry: Edge of Darkness (1985), A Very British Coup (1987), Traffik (1989) and Prime Suspect (1991) all won the BAFTA award for Best Drama Series/Serial for their respective year of transmission. These and a number of other serials constitute an identifiable genre addressing issues of public concern (such as the power of the hidden British establishment, the growth of the nuclear threat and conflicts between large business corporations and ordinary citizens) and contemporary formations of subjecthood (through protagonists whose experiences profoundly alter their sense of personal identity). Individual chapters of the thesis are devoted to the most noteworthy of these programmes, exploring their aesthetic characteristics and cultural resonances. The thesis also examines the contributions of key individuals, including writers such as Troy Kennedy Martin, Alan Bleasdale, Lynda La Plante and Dennis Potter, who in different ways challenged conventional representations and redefined the form of television drama. The thesis addresses in conclusion the relationship between narrative and ideology in contemporary thriller serials, arguing that there emerges a set of responses critical of the new imperatives of Thatcherism

    Bowdoin Orient v.55, no.1-30 (1925-1926)

    Get PDF
    https://digitalcommons.bowdoin.edu/bowdoinorient-1920s/1007/thumbnail.jp
    corecore