Friday, January 20, 2017

Constructing a Google for the Deep, darkish internet


deep web internet
Google for the Deep

In contemporary information-rich international, groups, governments and people want to investigate something and the whole thing they are able to get their palms on – and the sector huge web has masses of records. At gift, the maximum without problems listed material from the net is text. however as much as 89 to 96 percent of the content material at the net is clearly something else – snap shots, video, audio, in all hundreds of different forms of nontextual records kinds.

further, the considerable majority of online content material isn't always to be had in a shape it truly is without difficulty listed through digital archiving systems like Google's. as a substitute, it requires a person to log in, or it is provided dynamically via a application running whilst a person visits the page. If we're going to catalog on-line human know-how, we need to make certain we will get to and understand it all, and that we are able to do so robotically.
How are we able to train computers to understand, index and search all of the different types of material this is to be had online? way to federal efforts within the worldwide combat against human trafficking and weapons dealing, my research forms the premise for a brand new tool which can help with this effort.

knowledge what is deep

The "deep net" and the "dark internet" are frequently mentioned within the context of frightening news or movies like "Deep web," in which younger and sensible criminals are becoming away with illicit sports which include drug dealing and human trafficking – or even worse. but what do these terms mean?

The "deep web" has existed ever in view that agencies and corporations, which includes universities, put big databases on line in ways people could not at once view. in preference to permitting every person to get students' phone numbers and e mail addresses, as an example, many universities require people to log in as members of the campus community earlier than searching on-line directories for touch statistics. on line offerings inclusive of Dropbox and Gmail are publicly on hand and a part of the sector extensive internet – however indexing a user's documents and emails on these sites does require an character login, which our undertaking does not get involved with.

The "surface net" is the net international we will see – buying sites, agencies' information pages, information agencies and so forth. The "deep internet" is carefully related, however much less seen, to human users and – in some ways extra importantly – to search engines like google and yahoo exploring the web to catalog it. I tend to describe the "deep net" as those parts of the public net that:

1.Require a consumer to first fill out a login shape,
2.involve dynamic content material like AJAX or Javascript, or
3.present pix, video and different records in approaches that aren't normally listed nicely by means of search services.

What is dark?

The "darkish web," by evaluation, are pages – a number of which may additionally have "deep web" elements – which are hosted by means of net servers the usage of the anonymous net protocol called Tor. at first advanced by using U.S. protection branch researchers to comfy touchy facts, Tor become released into the public domain in 2004.

Like many comfy structures which include the WhatsApp messaging app, its authentic purpose turned into for excellent, however has also been used by criminals hiding behind the machine's anonymity. some human beings run Tor web sites handling illicit activity, which include drug trafficking, guns and human trafficking and even murder for lease.

The U.S. government has been inquisitive about looking for ways to use cutting-edge statistics generation and computer technology to fight these criminal activities. In 2014, the protection superior research initiatives business enterprise (more generally referred to as DARPA), a part of the defense department, launched a application referred to as Memex to combat human trafficking with these tools.

specifically, Memex desired to create a seek index that might assist regulation enforcement pick out human trafficking operations online – mainly by way of mining the deep and dark web. one of the key structures utilized by the task's teams of scholars, authorities workers and industry specialists become one I helped expand, referred to as Apache Tika.

The ‘digital Babel fish'

Tika is frequently referred to as the "digital Babel fish," a play on a creature referred to as the "Babel fish" in the "Hitchhiker's guide to the Galaxy" book collection. as soon as inserted into someone's ear, the Babel fish allowed her to understand any language spoken. Tika lets customers understand any report and the data contained within it.

while Tika examines a report, it robotically identifies what type of file it's miles – which includes a photo, video or audio. It does this with a curated taxonomy of information about files: their call, their extension, a kind of "digital fingerprint. whilst it encounters a report whose name ends in ".MP4," as an example, Tika assumes it's a video report stored in the MPEG-4 layout. with the aid of without delay studying the statistics in the report, Tika can verify or refute that assumption – all video, audio, photograph and different files must start with specific codes announcing what format their facts is saved in.

as soon as a file's type is recognized, Tika makes use of specific equipment to extract its content material such as Apache PDFBox for PDF files, or Tesseract for taking pictures text from images. in addition to content, other forensic facts or "metadata" is captured together with the document's creation date, who edited it closing, and what language the record is authored in.

From there, Tika makes use of superior techniques like Named Entity reputation (NER) to similarly analyze the text. NER identifies proper nouns and sentence shape, after which suits this facts to databases of humans, places and matters, figuring out no longer just whom the textual content is talking about, however where, and why they're doing it. This technique helped Tika to mechanically become aware of offshore shell groups (the things); wherein they had been placed; and who (humans) become storing their money in them as part of the Panama Papers scandal that uncovered financial corruption among worldwide political, societal and technical leaders.

Identifying illegal pastime

upgrades to Tika at some point of the Memex project made it even better at coping with multimedia and different content material discovered on the deep and darkish net. Now Tika can procedure and identify images with common human trafficking topics. for instance, it can automatically method and examine textual content in photos – a victim alias or an indication about a way to touch them – and sure types of photograph properties – consisting of digicam lights. In a few images and motion pictures, Tika can perceive the human beings, places and matters that seem.

extra software program can help Tika find automatic guns and become aware of a weapon's serial quantity. that could help to track down whether or not it's miles stolen or not.

using Tika to reveal the deep and darkish internet continuously should assist become aware of human- and guns-trafficking situations rapidly after the photographs are posted on line. that might prevent a crime from happening and store lives.

Memex isn't but powerful sufficient to handle all the content it's available, nor to comprehensively help regulation enforcement, make a contribution to humanitarian efforts to stop human trafficking and even have interaction with commercial search engines.

it's going to take greater paintings, however we are making it easier to gain those desires. Tika and related software programs are a part of an open source software library available on DARPA's Open Catalog to anyone – in law enforcement, the intelligence community or the general public at massive – who desires to shine a light into the deep and the darkish.



Christian Mattmann, Director, statistics Retrieval and records science institution and Adjunct companion Professor, USC and important records Scientist, NASA

Friday, September 2, 2016

Egyptian Mummy's Face Recreated with 3D Printing

An Egyptian mummy's head and face are reconstructed with rhetorical science and 3D printing, providing scientists.

The mummified head was discovered by chance within the collections of the University of Melbourne in Australia. A repository conservator happened upon the remains throughout associate degree audit and, involved concerning the state of the specimen, sent it for a computed tomography(CT) scan.

"Turns out, [the skull] is truly quite intact; it's got bandages and appears well on the within," same Varsha Pilbrow, a biological social scientist within the University of Melbourne's Department of Anatomy and neurobiology. "Of course, that then allowed America to suppose what to try and do next." [In Photos: Egypt's Oldest Mummy Wrappings]

With the assistance of associate degree imaging specialist, Pilbrow and her team used the scans to make a 3D-printed reproduction of the mummy's os.  options, equivalent to the dimensions and angle of the jaw and characteristics of the attention sockets, to work out that the top belonged to a feminine. The researchers area unit job the specimen Meritamun. they are saying she was in all probability no more than twenty five years previous at the time of her death and was vital enough to be mummified.

"It is kind of fascinating that we tend to did all of this while not destroying the specimen in any means, which is vital from a repository custodian purpose of read," Pilbrow same.

The true origins of the mummified head area unit still unknown, though. Scientists suppose it belonged within the collections of Frederic Wood Jones, a academic United Nations agency conducted archeologic add Egypt before connexion because the head of anatomy at the University of Melbourne in 1930. From the distinctive kind of the linen medical aid and embalming of the specimen, the researchers suppose Meritamun was mummified in Egypt which she could have lived a minimum of two,000 years past. they'll currently use geological dating up to now the specimen additional exactly, the scientists same.

Meanwhile, the CT scans and 3D-printed reproduction of the os area unit revealing different details concerning Meritamun, as well as her dental abnormalities and diseases she might need had.

"We noticed  that the highest of her os is incredibly skinny. it's very porous," Pilbrow told Live Science. "It suggests that she would have suffered from severe anemia."

A deficiency of haemoglobin and atomic number 8 would have light-emitting diode to the swelling of bone marrow — because it tried to supply additional red blood cells — and dilution of the os bone, Pilbrow same.

 Egyptian populations," Pilbrow same.This provides only 1 attainable clue concerning however Meritamun died, however Pilbrow and her co-workers area unit continued to probe different factors that will have price the missy her life.

The analysis has however to be revealed in an exceedingly peer-reviewed journal.

Friday, June 24, 2016

Dubai Presents The World’s first 3D-Printed Office

Dubai presents the world’s 1st practical business 3D-Printed workplace, that has just one floor, in conjunction with the house of 250 meter sq.. Hence, the printer that created the workplace is half-dozen meters high, twelve meters wide and thirty six meters long, in keeping with the government. the development was completed in mere seventeen days and costed $ one hundred forty,000, associate degree investment of public administration in partnership with metropolis Future Foundation.

The government of metropolis same that it had opened on Tuesday twenty four, the world’s 1st workplace that was made of 3D printing as a part of an area effort to extend the touristry and develop cheaper technologies. Printers that was utilized in each industrially and in an exceedingly smaller scale to form plastic objects that area unit digitally designed in 3 dimensions. However, haven't been used for construction.
With the 250 meter sq. floor, the model building was created with a special kind of cement. The printer that created the workplace is half-dozen meters high, twelve meters wide and thirty six meters long, in keeping with the government. Construction was completed in mere seventeen days and costed $140,000, associate degree investment of public administration in partnership with workplace within the world: it's not simply a building however  of the United Arab Emirates, Mohamed Al Gergawi.

The workplace are used as temporary headquarters of the corporate. in keeping with the minister of internal affairs of the United  technique will scale back the time of construction comes like this up to seventieth, and cut eightieth of paying than the normal technique would need.


According to the minister Al Gergawi, the calculable studies shows that the 3D printing technique will scale back the development time from five hundredth to seventieth, and may conjointly cut personnel expenses by the eightieth as we tend to mentioned earlier. Moreover, the strategy of metropolis is to possess a minimum of twenty fifth of the emirate’s buildings engineered by the 3D-printing technology by 2030, same the representative of the government.

“Dr. Web” Detected Another Trojan In Google Play Apps

Google Play remains thought of to be the foremost reliable and secure golem app store. But, the Antivirus company “Dr.  on the market on Google Play Store.


As we tend to all understand that the Google Play Store is that the official app store for the golem OS, permitting users to browse and transfer applications and also the Google Play remains thought of to be the foremost reliable and secure golem app store, however from time to time, attackers invariably try and destroy its security and also the name by spreading their ill-disposed and malicious programs and applications.
Hence, of the Trojan applications on the market on Google Play Store. The malware is distributed beneath the semblance of easy games and repair applications and is outlined because  “Dr. Web”.

However, this Trojan is meant to distribute malware as we tend to mentioned earlier, that were utilized by the attackers to draw in users to subscribe many guilty services, for creating cash on victims.



Currently, the subsequent applications on the Google Play Store square measure from  were infected by the Trojan:-

Battery Booster
Power Booster
Blue Color Puzzle
Blue And White
Battery Checker
Hard Jump – converted 3D
According to the shop statistics, these applications square measure put in on fifteen thousand units. Once it put in on the system, the malware connects to a C&C server and receives a link to a malicious web site. the most goal of the Trojan is to understand the victim signaling and sign the user on paid services. Hence, the Trojan may also transfer and install a spread of applications derived from the C & C JavaScript-script exploitation the WebView server.



As we tend to mentioned earlier that these applications are downloaded over fifteen,500 users. moreover, the Antivirus  downloads of those applications were done when they gained access to the Trojan’s C&C server.


Moreover, the Antivirus  specialists have already enlightened the technical school big Google concerning this occurrence”.

Xiaomi’s Newest Gadget is a Foldable Electric Bicycle

Although our market is thought for smartphones and tablets. Recently the Chinese company Xiaomi that  is headquartered in capital of Red China launched Xiaomi QiCycle which for a worth of simply Rs thirty,000.

The bike is formed of carbon fiber, therefore the corporate managed to depart QiCycle fourteen.5 kilograms, that is basically spectacular for  ride on 2 wheels. It’s our sensible bike with a companion app that offers you time period information on each ride you take” aforementioned  Xiaomi.


The engine is 250W and  to get adequate help. metal batteries – 20×2.900mAh – puts Panasonic, and that they carry a similar technology that Tesla employed in their electrical cars. Xiaomi claims that the motor will provide 45km of vary on one charge.



Xiaomi Qicycle is connected to a mobile application, that Provides time period stats: speed, distance, power, dynamic power, calories consumed. A telephony is also paired to the bike via an infatuated app.

Xiaomi has conjointly taken few steps to include electric battery Management System (BMS) that keeps track of the state of the bike’s battery and to make sure that it’s operational at intervals safety limits, as we tend to told earlier Qicycle can take you 45km on one charge.

QiCYCLE Highlights:

Companion smartphone app displays in-depth info: bike standing, GPS navigation, ride stats
250W, 36V high-speed motor
Panasonic 18650 twenty x 2900mAh lithium-ion battery cells (same battery employed by Tesla) with self-developed Battery Management System (BMS) that helps you to go 45km on one charge
Provides time period stats: speed, distance, power, dynamic power, calories consumed
RMB2,999
Shimano Nexus 3-speed hub
Foldable and succinctly lean at fourteen.5 kg
It is not nonetheless proclaimed that whether or not Xiaomi can retail the bike outside China. However, Qicycle is certainly a Brobdingnagian attraction. therefore we tend to may expect this bike to be offered in India presently.

Mark Zuckerberg Uses Tape to Defeat Hackers

Facebook’s business executive Mark Zuckerberg is noticed victimization tape to hide up his camera and electro-acoustic transducer of his MacBook to avoid obtaining hacked.We recently detected a lot of news of hacks, security breaches, and plenty of spying makes an attempt. Therefore, the largest question is however does one keep yourself guarded? we have a tendency to fairly often hunt to some specialists or specialists of the technical school business to follow their footsteps. Recently Mark Zuckerberg was noticed victimization tape to obscure the digital camera and electro-acoustic transducer of his MacBook.

It feels like the new height of panaroid as a result of Facebook’s business executive Mark Zuckerberg was noticed victimization tape on his portable computer camera to avoid being hacked. we have a tendency to had  hacked due to employing a straightforward word “dadada”

Mark Zuckerberg recently announce a picture on Facebook nowadays celebrating Instagram’s five hundred million monthly user milestone. Zuckerberg is seen sitting at his table with Associate in Nursing Instagram frame placard thanking users for the support. On his table lie his MacBook and different things.
Facebook's business executive Mark Zuckerberg Uses Tape to Defeat Hackers

If we have a tendency to take a solid investigate the image then it's  camera in addition on the electro-acoustic transducer. Actually, this observe isn't stunning, Hackers will management your hardware devices in addition. Hackers will merely activate the camera while not the user permission.

It is traditional that one among the foremost powerful individuals within the world fears being watched. Recently the founding father of Facebook in brief lost management of his accounts on Twitter, Pinterest and LinkedIn when the hacker cluster OurMine Team managed to access them.

According to Federal your digital camera is a superb precaution, do you have to worry that somebody may hack into your portable computer.”