SlideShare a Scribd company logo
1 of 6
Automatic Scoring for Detecting and Identifying individual threats
Immigration departments face daily challenges as thousands cross their
borders that must be protected from dangerous entries. It is the
responsibility of immigration department to identify known or potential
suspects as they enter the country.To do this effectively, border control
personnel must be able to process mass amounts of data on individuals
and spot out those that appear questionable, and may need to be
investigated. It is difficult to identify suspicious individuals without
knowledge of their history or awareness of their online activity.
With social media becoming an integral part of society, people without
social media accounts are a minority. Sorting through many social media
profiles can be hugely time-consuming, along with understanding who
the actual person is behind the online profiles. Understanding a social
profile and processing its data to make full sense of it is tedious work.
When analyzing a profile, it is important to frequently inspect the words
used and understand their context and sentiment. Our solutions combine
basic text analysis with deep syntactic-semantic analysis with the
objective to expose relations between screened individuals and others.
Cobwebs’ solutions offer an automated profiling system that analyzes
profiles and provides personality scores based on several parameters – all
entirely automated.
The company was able to identify the source of the information and
ensure its removal.While the information was posted on social media, its
quick identification and proceeding actions allowed the company to
mitigate the impact of the release of data and the compliance risks at
hand.Over and above this, the company changed and improved its social
media posting policies for increased prevention of concerns.
Cobwebs’ solutions were created to handle big data while using artificial
intelligence to recognize patterns of threats, and discover hidden
associations of suspicious individuals.The solutions provide alerts of
divergent incidents, threats, or disruptions as they happen.Our
automated technology performs ongoing batch processing for individual
profiling and scoring, supporting mass amounts of data for immigration
departments.The border control solution can unveil affiliations to
blacklisted organizations or political groups, alerting users of suspicious
individuals in real time.
For Additional information visit: https://www.cobwebs.com/study-
case/threat_actors_identification

More Related Content

What's hot

US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is RealChristos Beretas
 
Phishing technology by chitta
Phishing technology by chittaPhishing technology by chitta
Phishing technology by chittaChittaranjan Das
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 
Ethical hacking for computer science
Ethical hacking for computer scienceEthical hacking for computer science
Ethical hacking for computer sciencesarath kumar
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkSetareh Sarachi, MSc.
 
Cyber warfare finger-pointing places strain on the crown capital management i...
Cyber warfare finger-pointing places strain on the crown capital management i...Cyber warfare finger-pointing places strain on the crown capital management i...
Cyber warfare finger-pointing places strain on the crown capital management i...kahlilburkens
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
Digital divide final ppt
Digital divide final pptDigital divide final ppt
Digital divide final pptRowshan begum
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation policeAshley Raymond
 

What's hot (19)

US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
 
Phishing technology by chitta
Phishing technology by chittaPhishing technology by chitta
Phishing technology by chitta
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Ethical hacking for computer science
Ethical hacking for computer scienceEthical hacking for computer science
Ethical hacking for computer science
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social Network
 
Cyber warfare finger-pointing places strain on the crown capital management i...
Cyber warfare finger-pointing places strain on the crown capital management i...Cyber warfare finger-pointing places strain on the crown capital management i...
Cyber warfare finger-pointing places strain on the crown capital management i...
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Digital divide final ppt
Digital divide final pptDigital divide final ppt
Digital divide final ppt
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
Phishing
PhishingPhishing
Phishing
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 

Similar to Threat actors identification

Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigationData Source
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019Martin Cerny
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...
Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...
Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...Milind Agarwal
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in GovernmentNeo4j
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacyRohitBisht345647
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About MeNextNet Partners
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
The Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and DisinformationThe Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and DisinformationObjectways Technologies
 

Similar to Threat actors identification (20)

Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigation
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Cogniware 2019
Cogniware 2019Cogniware 2019
Cogniware 2019
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
sun editorial
sun editorialsun editorial
sun editorial
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...
Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...
Leveraging the Expertise of a Social Media Fraud Analyst to Safeguard Brand R...
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
The Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and DisinformationThe Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and Disinformation
 

Threat actors identification

  • 1. Automatic Scoring for Detecting and Identifying individual threats
  • 2. Immigration departments face daily challenges as thousands cross their borders that must be protected from dangerous entries. It is the responsibility of immigration department to identify known or potential suspects as they enter the country.To do this effectively, border control personnel must be able to process mass amounts of data on individuals and spot out those that appear questionable, and may need to be investigated. It is difficult to identify suspicious individuals without knowledge of their history or awareness of their online activity.
  • 3. With social media becoming an integral part of society, people without social media accounts are a minority. Sorting through many social media profiles can be hugely time-consuming, along with understanding who the actual person is behind the online profiles. Understanding a social profile and processing its data to make full sense of it is tedious work. When analyzing a profile, it is important to frequently inspect the words used and understand their context and sentiment. Our solutions combine basic text analysis with deep syntactic-semantic analysis with the objective to expose relations between screened individuals and others.
  • 4. Cobwebs’ solutions offer an automated profiling system that analyzes profiles and provides personality scores based on several parameters – all entirely automated. The company was able to identify the source of the information and ensure its removal.While the information was posted on social media, its quick identification and proceeding actions allowed the company to mitigate the impact of the release of data and the compliance risks at hand.Over and above this, the company changed and improved its social media posting policies for increased prevention of concerns.
  • 5. Cobwebs’ solutions were created to handle big data while using artificial intelligence to recognize patterns of threats, and discover hidden associations of suspicious individuals.The solutions provide alerts of divergent incidents, threats, or disruptions as they happen.Our automated technology performs ongoing batch processing for individual profiling and scoring, supporting mass amounts of data for immigration departments.The border control solution can unveil affiliations to blacklisted organizations or political groups, alerting users of suspicious individuals in real time.
  • 6. For Additional information visit: https://www.cobwebs.com/study- case/threat_actors_identification