Did you know that the unique little errors and style you have in writing can pinpoint you like a fingerprint, even in your anonymous online posts?  Join us as we discuss this exciting topic with Sadia Afroz. April 13, 2015

Download

Ep. 068 – Finding the Needle in the Haystack: Identification through Writing Style

The SECTF Webinar in still in the RESOURCES PAGE

Got a great idea for an upcoming podcast? Send an email to contribute -@- social-engineer.org

If you want to see something really unique – check out our buddies at Exploitable Labs

View on iTunes

Get Involved

Got a great idea for an upcoming podcast? Send us a quick message on the contact form!

Enjoy the Outtro Music? Thanks to Clutch for allowing us to use Emily Dickinson as our new SEPodcast Theme Music

And check out a schedule for all our training at Social-Engineer, LLC.

Check out the Innocent Lives Foundation to help unmask online child predators.

Show Notes

Ep. 068

Did you know that the unique little errors and style you have in writing can pinpoint you like a fingerprint, even in your anonymous online posts?  

Join us as we discuss this exciting topic with Sadia Afroz. 

  • Can you discuss the different methods to detect these deceptions by analyzing writing style?
    • Is it possible to detect multiple identities from a single email?
    • Would it be possible to do this with just a single email or would you need multiple?

 

  • I know you have done a lot of work in stylometry.   Your publication “Doppelgänger Finder: Taking Stylometry To The Underground” was quite popular amongst InfoSec news publications.
    • Can you briefly introduce the concept of stylometry and discuss how stylometry applies to information security?
  • So, analysis of underground forums can provide key information about who controls a given bot network or sells a service, and the size and scope of the cybercrime underworld.
    • Can you talk about some of the most prevalent findings here?
    • Does this apply specifically to web presence or can this also apply to  phishing campaigns?

 

  • In your article “Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization” Your framework defines the steps necessary to anonymize documents. Can you explain how this works?
    • What about for phishing emails where there are multiple authors? Is this something you are able to determine?
  • Can you speak about how you’ve found security and privacy to intersect with machine learning and the implications this has for the human element?

 

Also check out her BIO PAGE

The freeware writing recognition tool

AND

Her favorite book

 

BACK TO PODCASTS

Need an Event Speaker?

Get in touch today to schedule one of our staff to speak at your event

Get In Touch

Social Engineering Training

Visit our corporate site to get information on the world’s only practical, scientific, and certified social engineering courses.

Find Out More

Join the Newsletter


Join the Newsletter