mirror of
https://github.com/frankwxu/digital-forensics-lab.git
synced 2026-02-20 13:40:40 +00:00
add political insight analysis using llms
This commit is contained in:
20
README.md
20
README.md
@@ -83,6 +83,8 @@ or in BibTeX
|
||||
- [Illegal Possession of Images](/STIX_for_digital_forensics/Illegal_Possession_Images)
|
||||
- AI for Forensics
|
||||
- [Identifying IP Addresses using a Fine-tuned AI Model](/AI4Forensics/IP_Identifier_Fine_Tuning/IP_Identifer_Fine_Tuning.pptx)
|
||||
- [Profiling Suspects Leveraging LLMs (Browser History)](/AI4Forensics/CKIM2024/Takeout/browser_analysis.ipynb)
|
||||
- [Political Insight Analysis Leveraging LLMs (Email)](#political-insight-analysis-leveraging-llms)
|
||||
|
||||
## Tool Installation
|
||||
|
||||
@@ -329,7 +331,7 @@ The image is created by Joshua Hickman and hosted by [digitalcorpora](https://di
|
||||
|
||||
### Investigating Drone DJI
|
||||
|
||||
The dataset includes logical files extracted from a DJI controller (mobile device) and a SD card image used by the device. The Drone dataset is created by [VTO Labs](https://www.vtolabs.com/drone-forensics). The lab covers GPS investigation and cached image retrieval. Note that it is a draft. We will improve the lab later.
|
||||
The dataset includes logical files extracted from a DJI controller (mobile device) and an SD card image used by the device. The Drone dataset is created by [VTO Labs](https://www.vtolabs.com/drone-forensics). The lab covers GPS investigation and cached image retrieval. Note that it is a draft. We will improve the lab later.
|
||||
|
||||
| Labs | Topics Covered | Size of PPTs |
|
||||
| ----- | ----------------------------------------------------------------------------------------------- | ------------ |
|
||||
@@ -339,6 +341,22 @@ The dataset includes logical files extracted from a DJI controller (mobile devic
|
||||
|
||||
---
|
||||
|
||||
### Political Insight Analysis Leveraging LLMs
|
||||
|
||||
The case study demonstrates how to Leverage Large Language Models to gain political insight based on an email dataset. The dataset we have used in the case study is a set of leaked [emails](https://github.com/benhamner/hillary-clinton-emails?tab=readme-ov-file) obtained from Hillary Clinton's private email server.
|
||||
|
||||
The background of the leaked emails is a significant chapter in recent U.S. political history, involving questions of transparency, security, and the handling of sensitive information. During Hillary's tenure as U.S. Secretary of State from 2009 to 2013, Hillary Clinton used a private email server for her official communications instead of the official State Department email system. She stated that this was done for convenience, allowing her to use a single device for both personal and official emails.
|
||||
|
||||
The leaked email dataset from Hillary Clinton's private email server is a comprehensive collection of communications covering her entire tenure as Secretary of State from 2009 to 2013. It includes approximately 30,000 emails with a wide range of topics from official diplomatic communications to personal correspondences. The release and subsequent analysis of these emails have played a crucial role in political debates, legal inquiries, and public discussions about transparency and security in government communications.
|
||||
|
||||
Our dataset: [a set of email summaries](/AI4Forensics/CKIM2024/HillaryEmails/results_email_summary.txt). Each email summary is a summarization of an email generated by Gemini from an original email in the original leaked email dataset [emails](https://github.com/benhamner/hillary-clinton-emails?tab=readme-ov-file). We are only interested in emails containing the keyword "israel".
|
||||
|
||||
Our results: [Code in Jupyter Notebook](/AI4Forensics/CKIM2024/HillaryEmails/email_analysis_political_insight.ipynb).
|
||||
|
||||
Screenshot: <img src="/AI4Forensics/CKIM2024/HillaryEmails/political_insight_2024-05-31_10-29-52.jpg" width="150">
|
||||
|
||||
---
|
||||
|
||||
### Tools
|
||||
|
||||
| Name | Command | Repository | Installation Method |
|
||||
|
||||
Reference in New Issue
Block a user