Last week we discussed our expanded Global Intelligence capabilities, the first of two recent enhancements to the LookingGlass Cyber Threat Center ™. Today, we will go over the second new feature, Content-based Image Retrieval (CBIR).
It’s estimated that 85 percent of images online are used without permission, so there’s a good chance your brand’s images are being shared, used, and even repurposed without your knowledge. Content-based Image Retrieval provides analysts with a tool for image monitoring for instances when an organization’s logo, photos of executives, or company buildings are posted online. CBIR matches the image itself, not the text in the metadata associated with the image, allowing you to find the image even if it has been altered.
Once an image is uploaded and the system finds a match, you can see it in your dashboard, get an email alert, or both, depending on your preferences. You can pare down results even further by creating a search for an image AND specifics like the Domain: A specified location where a set of activity or knowledge exists. For instance, an Internet domain is synonymous with a website address or URL where information can be made available. LookingGlass Cyber (n) - A fancy name for a URL or website. name on which it is found. You can also utilize the Cyber Threat Center’s geolocation tool, which can find the WHOIS information for the domain name where the image is posted.
Image Search Tools in the Workplace
Building off of our example from last week about how physical security teams can put global intelligence to use, here is another scenario that illustrates how you can use CBIR. In this fictional example, you’re the leader of the SuperDuperFuzzBuzz™ physical security team. In addition to monitoring for physical threats, you are also responsible for securing the safety of physical locations, such as factories, executive homes, and retail outlets.
With the upcoming launch of your new self-walking dog leash, FastwalkFido™, competitors have been trying to infiltrate your company’s facilities to sabotage the product’s launch. They do so by posting photos of your facilities online and offering a reward in exchange for relevant information.
You use the Cyber Threat Center’s CBIR feature to monitor for when pictures of the company’s facilities are posted, creating a custom alert that updates you on any searches from the past 24 hours. When you get a match, you use the geolocation tool to find where the website that posted the image is being hosted, and then use the WHOIS tool to find the registrant. From there, you send a cease-and-desist letter to the registrant to stop posting photos of your facilities.
Using an image search tool has saved you hours upon hours of guesswork – time you can now use on other tasks.
With 47 percent of adult Internet users reposting photos online, companies need to track when and where their brand is being represented, whether the images are used for malicious purposes or not. Image search tools, such as the CBIR capabilities in Cyveillance’s Cyber Threat Center, can make this process more efficient for you.
Author: Nicole Sroka
You May Also Be Interested In…
- [WHITE PAPER] Keys to Operationalizing Threat Intelligence
- [DATA SHEET] LookingGlass Cyber Threat Center
- [BLOG] Increasing Threat Analyst Productivity with Better Global Intelligence
- [SOLUTION] LookingGlass Threat Intelligence Management