Cognitive Hacking

  • Paul Thompson
  • George Cybenko
  • Annarita Giani
Part of the Advances in Information Security book series (ADIS, volume 12)

Keywords

Information Retrieval Recommender System Information Security Collaborative Filter Exchange Commission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abel, S. (1998).“Trademark issues in cyberspace: The brave new frontier” http://library.lp.findlaw.com/scripts/getfile.pl?file=/firms/fenwick/fw000023.html
  2. Agre, P. (2001).“The market logic of information”. Knowledge,Technology, and Policy vol. 13, no. 1, p. 67–77.Google Scholar
  3. Anderson, R. (2002). Personal CommunicationGoogle Scholar
  4. Anderson, R. H., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M. and Wyk, K. Van. (2000). Research on Mitigating the Insider Threat to Information Systems-#2:Proceedings of a Workshop Held August 2000. RAND Technical Report CF163, Santa Monica, CA: RAND.Google Scholar
  5. Anderson, R. and Khattak, A. (1998). “The Use of Information Retrieval Techniques for Intrusion Detection” First International Workshop on Recent Advances in Intrusion Detection (RAID)Google Scholar
  6. Atallah, M, J., McDonough, C. J., Raskin, V.,and Nirenburg, S. (2001). “Natural Language Processing for Information Assurance and Security: An Overview and Implementations” Proceedings of the 2000 Workshop on New Security Paradigms.Google Scholar
  7. BBC News Online. (2001). “ Hamas hit by porn attack” http://news.bbc.co.uk/low/english/world/middle_east/newsid_1207000/1207551.stm
  8. BBC News Online. (2001). “Sharon’ s website hacked” http://news.bbc.co.uk/low/english/world/middle_east/newsid_1146000/1146436.stm
  9. Biber, D. (1995). “Dimensions of Register Variation: A Cross-Linguistic Comparison” Cambridge University Press. Cambridge, EnglandGoogle Scholar
  10. Biber, D. (1986). “Spoken and written textual dimensions in English: Resolving the contradictory findings” Language vol. 62, no. 2, p. 384–413.Google Scholar
  11. Buchanan, Ingersoll, P.C. (2001). “Avoiding web site liability—Online and oh the hook?” http://library.lp.findlaw.com/scripts/getfile.pl?file=/articles/bipc/bipc000056.html.
  12. Buller, D. B. and Burgoon, J. K. (1996). “Interpersonal deception theory” Communication Theory vol. 6 no. 3, p. 203–242Google Scholar
  13. Burgoon, J. K., Blair, J.P., Qin, T and Nunamaker, J.F. (2003). “Detecting Deception through Linguistic Analysis” NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 91–101.Google Scholar
  14. Burrows, J.F. 1987. “Word Patterns and Story Shapes: The Statistical Analysis of Narrative Style” Literary and Linguistic Computing, vol. 2, p. 61–70.CrossRefGoogle Scholar
  15. Cao, J, Crews, J. M., Lin, M., Burgoon, J. K. and Nunamaker, J. F. (2003). “Designing Agent99 Trainer: A Learner-Centered,Web-Based Training System for Deception Detection” NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 358–365.Google Scholar
  16. Chandy, K. M. and Misra, J. (1988). Parallel Program Design: A Foundation. Addison Wesley.Google Scholar
  17. Chen, H., Zeng, D.D., Schroeder, J., Miranda, R., Demchak, C. and Madhusudan, T. (eds.). (2003). Intelligence and Security Informatics: First NSF/NIJ Symposium ISI 2003 Tucson, AZ, USA, June 2003 Proceedings, Berlin: Springer-Verlag.Google Scholar
  18. Chez.com. (1997). “Disinformation on the Internet.”http://www.chez.com/loran/art_danger/art_danger_on_internet.htm
  19. Cignoli, R.L.O., D’Ottaviano, I.M.L. and Mundici, D. (1999). Algebraic Foundations of Many-Valued Reasoning Boston: Kluwer AcademicGoogle Scholar
  20. Combs, J. E. and Nimmo, D. (1993). The new propaganda: The dictatorship of palaver in contemporary politics. New York: Longman.Google Scholar
  21. Cooper, W. S. and Maron, M.E. “Foundations of Probabilistic and Utility-Theoretic Indexing”. Journal of the Association for Computing Machinery vol. 25, no. 1, 1978, p. 67–80.MathSciNetGoogle Scholar
  22. Cornetto, K. M. (2001). “Identity and Illusion on the Internet: Interpersonal deception and detection in interactive Internet environments” Ph.D.Thesis. University of Texas at Austin.Google Scholar
  23. Cover, T. A. and Thomas, J. A. (1991). Elements of Information Theory. New York: WileyGoogle Scholar
  24. Cybenko, G., Giani, A. and Thompson, P. “Cognitive Hacking: A Battle for the Mind” IEEE Computer, 35(8), 2002, 50–56.Google Scholar
  25. Cybenko, G., Giani, A., Heckman, C. and Thompson, P. “Cognitive Hacking: Technological and Legal Issues”, Law Tech 2002 November 7–9, 2002.Google Scholar
  26. Daniels, P., Brooks, H.M. and Belkin, N.J. (1997). “Using problem structures for driving human-computer dialogues” In Sparck Jones, Karen and Willett, Peter (eds.) Readings in Information Retrieval San Francisco: Morgan Kaufmann, p. 135–142, reprinted from RIAO-85 Actes: Recherche d’Informations Assistee par Ordinateur, Grenoble, France: IMAG, p. 645–660.Google Scholar
  27. Dellarocas, C. (2001). “Building trust on-line: The design of reliable reputation reporting mechanisms for online trading communities” Center for eBusiness@MIT paper 101.Google Scholar
  28. Denning, D. (1999). Information warfare and security. Reading, Mass.: Addison-Wesley.Google Scholar
  29. Denning, D. (1999). “The limits of formal security models”. National Computer Systems Security Award Acceptance Speech.Google Scholar
  30. Doob, L. (1935). Propaganda, Its psychology and technique New York: Holt.Google Scholar
  31. Drineas, P., Kerendis, I. and Raghavan, P. Competitive recommendation systems STOC’02, May 19–21 2002.Google Scholar
  32. Ebay Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058 (N. D. Cal., 2000)Google Scholar
  33. Ellul, J. (1966). Propaganda translated from the French by Konrad Kellen and Jean Lerner New York: Knopf.Google Scholar
  34. Farahat, A., Nunberg, G. and Chen, F. (2002). “AuGEAS (Authoritativeness Grading, Estimation, and Sorting)” Proceedings of the International Conference on Knowledge Management CIKM’02 4–9 November, McLean, Virginia.Google Scholar
  35. Fawcett, T. and Provost, F. in W. Kloesgen and J. Zytkow (eds.). (2002) Handbook of Data Mining and Knowledge Discovery, Oxford University Press.Google Scholar
  36. Felton, E. W., Balfanz, D., Dean, D., and Wallach, D. (1997). “Web spoofing: An Internet con game”. Technical Report 54–96 (revised) Department of Computer Science, Princeton University.Google Scholar
  37. George, J., Biros, D. P., Burgoon, J. K. and Nunamaker, J. F. Jr. (2003). “Training Professionals to Detect Deception”. NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 366–370.Google Scholar
  38. Gertz v. Robert Welch, Inc., 428 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).Google Scholar
  39. Google News beta. (2003). http://news.google.com/.
  40. Grant, Tim. 2004. Ph. D. thesis, Forensic Section, School of Psychology University of Leicester (upcoming publication).Google Scholar
  41. Hacktivist, The. (2001). “Fluffi Bunni hacker declares Jihad” http://thehacktivist.com/article.php?sid=40
  42. Heckman, C. and J. Wobbrock, J. (2000) “Put Your Best Face Forward: Anthropomorphic Agents, E-Commerce Consumers, and the Law”. Fourth International Conference on Autonomous Agents, June 3–7, Barcelona, Spain.Google Scholar
  43. Herlocker, J. (ed.). (2001). “Recommender Systems: Papers and Notes from the 2001 Workshop” In conjunction with the ACM SIGIR Conference on Research and Development in Information Retrieval. New Orleans.Google Scholar
  44. Hofmann, T. (2001). “What People (Don’t)Want”. European Conference on Machine Learning (ECML).Google Scholar
  45. Hunt, A. (2001). “Web defacement analysis”. ISTS.Google Scholar
  46. Huynh, D., Karger, D. and Quan, D. (2003). “Haystack: A Platform for Creating, Organizing and Visualizing Information using RDF”. Intelligent User Interfaces (IUI)Google Scholar
  47. Information Warfare Site. (2001). http://www.iwar.org.uk/psyops/index.htm
  48. Johansson, P. (2002). “User Modeling in Dialog Systems”. St. Anna Report SAR 02-2.Google Scholar
  49. Karlgren, J. and Cutting, D. (1994). “Recognizing text genres with simple metrics using discriminant analysis”Google Scholar
  50. Kessler, B., Nunberg, G. and Schütze, H. (1997). “Automatic Detection of Genre” Proceedings of the Thirty-Fifth Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational LinguisticsGoogle Scholar
  51. Krebs, B. (2001). “E-Mail Scam Sought To Defraud PayPal Customers” Newsbytes 19 December, http://www.newsbytes.com/news/01/173120.html
  52. Lafferty, J. and Chengxiang, Z. (2001) Document language models, query models, and risk minimization for information retrieval. 2001 ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR).Google Scholar
  53. Lafferty, J. and Chengxiang, Z. (2001). “Probabilistic relevance models based on document and query generation” Proceedings of the Workshop on Language Modeling and Information Retrieval, Carnegie Mellon University.(Kluwer volume to appear PT reviewing).Google Scholar
  54. Landwehr, C. E. (1984). “A security model for military message systems” ACM Transactions on Computer Systems. vol. 9, no. 3.Google Scholar
  55. Landwehr, C. E. (1981). “Formal models of computer security”. Computing Surveys, vol. 13, no. 3.Google Scholar
  56. Latimes.com. (2001). “‘Hacktivists’, caught in web of hate, deface Afghan sites” http://www.latimes.com/technology/la-000077258sep27.story?coll=la%2Dheadlines%2Dtechnology
  57. Lebed.biz (2004). http://www.lebed.biz/
  58. Lewis, M. “Jonathan Lebed: Stock Manipulator”, S.E.C. Nemesis-and 15 New York Times Magazine 25 February 2001Google Scholar
  59. Lewis, M. (2001). Next: The Future Just Happened New York: W. W. Norton p. 35–36.Google Scholar
  60. Libicki, M. (1994). “The mesh and the Net: Speculations on armed conflict in an age of free silicon”. National Defense University McNair Paper 28 http://www.ndu.edu/ndu/inss/macnair/mcnair28/m028cont.html
  61. Love, Harold. 2002. Attributing Authorship: An Introduction Cambridge, UK: Cambridge University Press.Google Scholar
  62. Lynch, C. (2001). “When Documents Deceive: Trust and Provenance as New Factors for Information Retrieval in a Tangled Web” Journal of the American Society for Information Science & Technology, vol. 52, no. 1, p. 12–17.Google Scholar
  63. McMenamin, Gerald R. and Choi, Dongdoo (eds.). 2002. Forensic Linguistics: dvances in Forensic Stylistics Boca Raton, Florida: CRC.Google Scholar
  64. Mann, B. (2000). “Emulex fraud hurts all”. The Motley Fool. http://www.fool.com/news/foolplate/2000/foolplate000828.htm
  65. Maron, M.E. and Kuhns, J.L. “On relevance, probabilistic indexing and information retrieval”. Journal of the ACM vol. 7 no. 3, 1960, p. 216–244.CrossRefGoogle Scholar
  66. Mateescu, G.; Sosonkina, M.; and Thompson, P. “A New Model for Probabilistic Information Retrieval on the Web” Second SIAM International Conference on Data Mining (SDM 2002) Workshop on Web AnalyticGoogle Scholar
  67. Matthew Bender and Company. (2001). Title 15. Commerce and Trade. Chapter 22. Trademarks General Provisions. United States Code Service, http://web.lexis-nexis.com/congcomp/document?_m=46a301efb7693acc36c35058bee8e97d&_docnum=l&wchp=dGLStS-lSlAA&_md5=5929f8114ela7b40bbeOa7a7ca9d7dea
  68. Mensik, M. and Fresen, G. (1996). “Vulnerabilities of the Internet: An introduction to the basic legal issues that impact your organization” http://library.lp.findlaw.com/scripts/getfile.pl?file=/firms/bm/bm000007.html
  69. Mosteller, F. and Wallace, D.L. 1964. Inference and Disputed Author-ship: The Federalist Reading, MA: Addison-Wesley.Google Scholar
  70. MSNBC. (2001). “Hacker alters news stories on Yahoo” http://stacks.msnbc.com/news/631231.asp.
  71. Mundici, D. and Trombetta, A. (1997). “Optimal Comparison Strategies in Ulam’s Searching Game with Two Errors”, Theoretical Computer Science, vol. 182, nos 1–2, 15 August.Google Scholar
  72. Munson, J. C. and Wimer, S. “Watcher: the Missing Piece of the Security Puzzle” 17th Annual Computer Security Applications Conference (ACSAC’01). December 10–14, 2001 New Orleans, LouisianaGoogle Scholar
  73. National Center for Digital Government. (2003). Integrating Information and Government John F.Kennedy School of Government Harvard University. http://www.ksg.harvard.edu/digitalcenter/
  74. National Center for Digital Government: Integrating Information and Government “Identity: The Digital Government Civic Scenario Work-shop” Cambridge, MA 28–29 April 2003 John F. Kennedy School of Government Harvard University. http://www.ksg.harvard.edu/digitalcenter/conference/
  75. Network World Fusion. (2001). “Clever fake of WTO web site harvests e-mail addresses” http://www.nwfusion.com/news/2001/1031wto.htm
  76. Newsbytes. (2001). “Pop singer’ s death a hoax a top story at CNN” http://www.newsbytes.com/cgi-bin/udt/im.display.printable?client.id=newsbytes&story.id=170973
  77. Pratkanis, A. R. and Aronson, E. (1992). Age of propaganda: The everyday use and abuse of persuasion New York: Freeman.Google Scholar
  78. Rao, J.R. and Rohatgi, P. (2000). “Can pseudonymity really guarantee privacy?” Proceedings of the 9th USENIX Security Symposium Denver, Colorado August 14–17.Google Scholar
  79. Register, The. (2001). “Intel hacker talks to The Reg” http://www.theregister.co.uk/content/archive/17000.html
  80. Register, The. (2001). “New York Times web site sm0ked” http://www.theregister.co.uk/content/6/16964.html
  81. Rich, E. (1983). “Users are individuals: individualizing user models” International Journal of Man-Machine Studies vol. 18 no. 3, p. 199–214.Google Scholar
  82. Rieber, Robert W. and Stewart, William A. (eds.) 1990. The Language Scientist as Expert in the Legal Setting, Annals of the New York Academy of Sciences vol. 606, New York: The New York Academy of Sciences.Google Scholar
  83. Rijsbergen, C.J van. Information Retrieval 2d. edition, London: Buttersworth, 1979.Google Scholar
  84. Salton, G. and McGill, M. (1983). Introduction to Modern Information Retrieval New York: McGraw-Hill.Google Scholar
  85. Sarwar, B., Karypis, G., Konstan, J. and Reidl, J.”Item-based collaborative filtering recommendation algorithms.” WWW10 May 1–5, 2001 Hong Kong.Google Scholar
  86. Schneier, B. (2000). “Semantic attacks: The third wave of network attacks” Crypto-gram Newsletter October 15, 2000. http://www.counterpane.com/crypto-gram-0010.html.
  87. Securities and Exchange Commission. (1999). Litigation Release No. 16391. http://www.sec.gov/litigation/litreleases/lr16391.htm.
  88. Securities and Exchange Commission. (2000). Litigation Release No. 16620. http://www.sec.gov/litigation/litreleases/lrl6620.htm.
  89. Securities and Exchange Commission. (2001). Litigation Release No. 16867. http://www.sec.gov/litigation/litreleases/lr16867.htm.
  90. Securities and Exchange Commission. (2003). Litigation Release No. 18043. http://www.sec.gov/litigation/litreleases/lr18043.htm
  91. Shuy, Roger W. 1998. The Language of Confession, Interrogation, and Deception Thousand Oaks, California: SAGE Publications.Google Scholar
  92. Smith, A.K. “Trading in False Tips Exacts a Price”, U.S. News & World Report, February 5, 2001, p. 40Google Scholar
  93. Smith, S. (2001). Personal communication.Google Scholar
  94. Stockspot.com (2004). http://www.stockspot.com
  95. Thompson, P. “Semantic Hacking and Intelligence and Security Informatics” NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003.Google Scholar
  96. Thornton, J. (2001). “Collaborative Filtering Research Papers”. http://jamesthornton.com/cf/.
  97. Ulam, S.M. (1991). Adventures of a Mathematician Berkeley, CA: University of California Press.Google Scholar
  98. Varian, H. R. (1996). “Resources on collaborative filtering” http://www.sims.berkeley.edu/resources/collab/
  99. Varian, H. R. and Resnik, P. eds. CACM Special issue on recommender systems, CACM vol. 40, no. 3, 1997.Google Scholar
  100. WallStreetNewscast.com. (2004). “You’ve Made Your Lebed,Now Sleep in It” http://www.wallstreetnewscast.net/news/01172004.html
  101. Washtech.com. (2001). “FTC shuts down thousands of deceptive web sites” http://www.washtech.com/news/regulation/12829-1.html
  102. Wing, J. M. (1998). “A Symbiotic Relationship Between Formal Methods and Security” Proceedings from Workshops on Computer Security, Fault Tolerance, and Software Assurance.Google Scholar
  103. Yahalom, R., Klein, B., and Beth, Th. (1993). “Trust relationships in secure systems-A distributed authentication perspective.. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland.Google Scholar
  104. Yuan, Y.; Ye, E.Z.; and Smith, S. (2001). “Web spoofing 2001” Department of Computer Science/Institute for Security Technology Studies Technical Report TR2001-409Google Scholar
  105. Zhou, L., Burgoon, J. K. and Twitchell, D. P. (2003). “A Longitudinal Analysis of Language Behavior of Deception in E-mail”. NSF / NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, Berlin: Springer-Verlag, June 1–3, 2003, Tucson, Arizona, 2003, p. 102–110Google Scholar
  106. Zhou, L., Twitchell, D.P., Qin, T., Burgoon, J. K. and Nunamaker, J.F. (2003). “An exploratory study into deception in text-based computer-mediated communications” Proceedings of the 36th Hawaii International Conference on Systems ScienceGoogle Scholar

Copyright information

© Springer Science + Business Media, Inc. 2004

Authors and Affiliations

  • Paul Thompson
    • 1
  • George Cybenko
    • 1
  • Annarita Giani
    • 1
  1. 1.Dartmouth CollegeCanada

Personalised recommendations