Sunday, June 30, 2024

The Role of AI in Detecting and Preventing Internet Fraud


By Cesar Ortiz 

June 30 2024

Title: The Role of AI in Detecting and Preventing Internet Fraud



In the digital era, technology has transformed the way we live, work, and communicate. However, as advancements in technology continue to grow, so does the risk of internet fraud. As more transactions and interactions occur online, criminals are finding new ways to exploit these systems for their gain. This is where artificial intelligence (AI) steps in to play a crucial role in detecting and preventing fraudulent internet usage.


AI technologies have revolutionized the field of cybersecurity by providing powerful tools that can analyze vast amounts of data in real-time. This capability enables AI systems to identify patterns and anomalies that may indicate fraudulent activities. By using machine learning algorithms, AI applications can learn from past incidents and continuously improve their ability to detect suspicious behavior.


One common use of AI in combating internet fraud is through the use of anomaly detection algorithms. These algorithms can monitor user behavior, transaction patterns, network traffic, and other data points to identify deviations from normal activity. For example, if an AI system detects a sudden spike in transactions from a specific account or location that is inconsistent with previous behavior, it can raise an alert for further investigation.


Furthermore, AI-powered fraud detection systems can also help prevent unauthorized access by implementing advanced authentication methods such as biometric recognition or behavioral analysis. These additional layers of security make it more difficult for cybercriminals to gain access to sensitive information or conduct fraudulent activities.


Additionally, AI can be used to analyze text-based data such as emails or chat messages to detect phishing attempts or social engineering schemes. By scanning for specific keywords or linguistic patterns commonly used in fraudulent communications, AI systems can identify potential threats before they cause harm.


Overall, the use of AI for combating internet fraud is essential in today's digital landscape. By leveraging advanced technologies like machine learning and anomaly detection algorithms, organizations can enhance their cybersecurity defenses and protect their assets from malicious actors. As cyber threats continue to evolve, AI will play an increasingly critical role in securing our online environment and ensuring a safe digital future.


In conclusion, while internet fraud poses a significant challenge in today's interconnected world, AI provides innovative solutions that empower organizations to stay ahead of cyber threats. By harnessing the power of artificial intelligence for fraud detection and prevention efforts, we can create a more secure online ecosystem for all users.


References:


1. https://www.ibm.com/cloud/learn/anomaly-detection-ai

2. https://www.mckinsey.com/business-functions/risk/our-insights/global-threats-to-global-threat-detection

3. https://www.forbes.com/sites/forbestechcouncil/2020/07/10/how-ai-can-help-combat-cybersecurity-breaches-in-the-age-of-covid-19/?sh=494969623427

4. Created using Chat GPT



Saturday, January 8, 2022

Smartphones with GPS can tag your pictures with the exact PIC location


Article Re Published By Popular Demand 
Originally Published January 20 2012 in Yahoo News

Author's comment:
Due to recent 2021 court cases, both criminal and civil, this subject is more relevant than ever. Follow the instructions given in the article and you will be able to edit the picture metadata. I just checked the Exif Tag Remover link in the article and is alive and working, January 2022.

By Cesar Ortiz

Smartphones GPS chips can tag your shared pictures with the precise location where your picture was taken. Most of the features comes as default "active" on smartphpones and digital cameras. This also applies to pictures taken with modern digital cameras who have GPS features built in. On older digital cameras, geotagging, as it is called, is also used but will provide mostly details of the camera who took the picture, information about the picture name assigned in your PC and date and time the photo was taken. Do you want to share that information with others?  If not, use one of the free geotagg or metadata  viewing software available to see what your camera is tagging in hidden form., I use the one from "Jeffrey's".

If you don't like the hidden information in the picture, remove the metadata or geotagg function from your digital stand alone camera by checking your user manual or vendor.On digital photos already taken, you can edit your picture using a Windows or Mac built in photo editor and remove the metada by hand or buy any of the many #metadata removing tools available in the web.  I use the EXIF Tag Remover Free Trial,  if you decide to buy is $19.95. Your pretty picture taken in your home and posted  in Twitter, Facebook and other social media may be telling the world where do you exactly live. Always assume that a picture you are "sharing" with friends can be intercepted and compromised by posting it somewhere by your friend.

Sadly, there are bad people that look for that type of information. If you comment the photo with "I will be away for such and such days" you are providing an invitation for a burglary. Please notice that disabling Location Services will affect any application that uses GPS. Personally, I don't disable the "Location" option in my devices, I just edit the pictures taken and remove the Geotagg info inserted by Location Services. To remove the  geotagging option or function, (to prevent the device from inserting the info in your picture at all times), on smart phones follow the steps below:
On the Iphone= Go to Settings, General, Location Service and turn off Geotagging.
On Android= Go to Options, Device, Location Settings, Location Services, select "Location Off".

On other smart phones the instructions to remove the geotagging function permanently are similar. Check with your phone provider.
(c) Cesar Ortiz


Monday, November 25, 2019


Technical Details in The MLB Baseball Players Signals Hacking 




By Cesar Ortiz (c)

November 24, 2019


The Mayor League Baseball (MLB) organization is updating the ongoing investigative effort on the  2017 baseball games signal hacking issue. The Houston Astros organization is leading the pack of baseball teams under the investigative radar. Astros front-office employees, on-field staff and the Astros manager, AJ Hinch have already been interviewed. Other players allegedly involved are the current Boston Red Sox manager Alex Cora and the New York Mets manager Carlos Beltran. 


The SNY TV Network on November 14, 2019, is quick to state that the MLB has no evidence yet for imposing sanctions to Cora and Beltran,  further stating, “ The league does not have either accusations or evidence that would point to severe discipline for either”.

For years, stealing signals from players was considered an art. It is not illegal, but officials become wary when they find reports of the activity when it is done using banned technology. 


The use of technology to intercept or relay the signals is forbidden. The New York Times reported in 2017 the use of an Apple watch as a means to electronically relay signals to the Red Sox team partners by a Red Sox trainer. The Apple watch use was revealed in a detailed official complaint filed by Brian Cushman, the New York Yankees general manager. Among the exhibits in the complaint was a video shot of the Reds Sox dugout in Boston during the 2017 three-games series. The Red Sox team was fined by the MLB.

Recently, USA Today ran an article explaining how Manny Machado was caught stealing and relaying signals in game two of the 2018 World Series. In the Machado event, there was no violation of any rules because all the signal intelligence was acquired and relayed by Machado using manual signaling skills. No mechanical or electronic devices where used.


 The Athletic ran an article detailing how the Astros in 2017 ran a hacking operation using a video camera and drum beats to relay signals from the catchers to everyone in the stadium, only the hacking partners knew the meaning of the beats and how to decode them.

 Some suspected means of stealing baseball signals are:


 (1) The use of a realistic-looking medical bandage-like device worn by the player at bat that receives a buzzing signal with a  predetermined pattern, for example, one buzz for a fastball. 

(2) Hidden catcher aimed mini cameras that feed data of catchers signals and sends out information on the type of pitch. 

(3) Extended range antennas for radio devices to hear the pitcher-catcher-manager conferences at the mound. 

(4) Lips reading text interpreters for conferences between players (that is the reason players cover their mouth with the gloves when they speak to each other). 

(5) Monitoring of the live video broadcast of the game (MLB mandated a delay in the video monitors that are used in the dugouts and nearby areas). 

Most of the suspected technical equipment techniques used are detectable by specialized equipment and manual signaling stealing can be detected by a trained eye. 

The fact that we may find such hacking practice, even when they can be detected, tends to show the high amounts of monetary rewards involved, that in the eyes of the perpetrators, warrant the risk of detection. So far, no one has been charged with any criminal or civil offense. MLB is offering leniency to those who speak up on the subject and, as of this date,  all technical equipment use events are related to the 2017 year. 


The MLB hacking using information technology techniques and equipment brings to the field a new form of platform to think about, perhaps some Silicon Valley entrepreneurs will design custom hardware and software to detect the hacking devices.