Jana Shakarian

  • Citations Per Year
Learn More
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an(More)
Along with the USA and Russia, China is often considered one of the leading cyberpowers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990’s, influenced their cyber-operations in the early 2000’s. In particular, we examine the ideas of Unrestricted Warfare and Active Offense and discuss how they can permit for the(More)
We hear it all too often in the media: an organization is attacked, its data, often containing personally identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the wider context of how they occurred. We(More)
This paper explores the process of collective crisis problem-solving in the darkweb. We conducted a preliminary study on one of the Tor-based darkweb forums, during the shutdown of two marketplaces. Content analysis suggests that distrust permeated the forum during the marketplace shutdowns. We analyzed the debates concerned with suspicious claims and(More)
This paper is the fourth of a series of “thought papers” addressing social capital published by the Network Science Center at West Point. As our research teams conduct their analyses, certain findings and insights arise that may not be directly related to the research question at hand but, we believe, are important to both the academic and policy(More)
  • 1