Terrorism Information Technology Privacy
Countering Terrorism through Information and Privacy Protection Technologies
Robert Popp, John Poindexter
IEEE Security & Privacy, vol. 4, no. 6, Nov.-Dec. 2006
1 / 10
Countering Terrorism through Information and Privacy Protection - - PowerPoint PPT Presentation
Terrorism Information Technology Privacy Countering Terrorism through Information and Privacy Protection Technologies Robert Popp, John Poindexter IEEE Security & Privacy, vol. 4, no. 6, Nov.-Dec. 2006 1 / 10 Terrorism Information
Terrorism Information Technology Privacy
1 / 10
Terrorism Information Technology Privacy
2 / 10
Terrorism Information Technology Privacy
2 / 10
Terrorism Information Technology Privacy
3 / 10
Terrorism Information Technology Privacy
3 / 10
Terrorism Information Technology Privacy
4 / 10
Terrorism Information Technology Privacy
Known ”terrorists“ (training data set) Known ”nonterrorists“ (training data set) Unknowns (don’t know whether terrorists or nonterrorists) ? ? ? Interrogation reports Link chart Bayesian classifier (untrained) Link chart Bayesian classifier (trained) . . . . . . Most likely a terrrorist Most likely a nonterrrorist Alias resolution Entity extraction Link discovery 5 / 10
Terrorism Information Technology Privacy
. . . Threat assessment model
Rebel group capacity Self-financing capacity Performance capacity Negotiating aptitude Resource procurement aptitude Group visibility Threat to stability Level of attack Rebel activity model (RAM) Measuring group self-financing capacity Weapons and tactics used Group stated idealogy Target choice Support from patrons Proximity to lootable resources Diaspora remittances Participation in criminal activity
Automated entire front-end processing chain from data ingest to model population/processing Raw (multilingual) data Automated IT data front end
. . . Data transforms (Hilbert, LSI, AGS, ...)
Auto-ingest and categorize
6 / 10
Terrorism Information Technology Privacy
Current technology More Security Less More Privacy Post-9/11 Pre-9/11 7 / 10
Terrorism Information Technology Privacy
Current technology More Security Less More Privacy Post-9/11 Pre-9/11
7 / 10
Terrorism Information Technology Privacy
Data source
Privacy appliance User query
Data source
Privacy appliance Cross-source privacy appliance
Data source
Privacy appliance Response Government
Independently
Private or agency owned
8 / 10
Terrorism Information Technology Privacy
9 / 10
Terrorism Information Technology Privacy
9 / 10
Terrorism Information Technology Privacy
10 / 10