countering terrorism through information and privacy
play

Countering Terrorism through Information and Privacy Protection - PowerPoint PPT Presentation

Terrorism Information Technology Privacy Countering Terrorism through Information and Privacy Protection Technologies Robert Popp, John Poindexter IEEE Security & Privacy, vol. 4, no. 6, Nov.-Dec. 2006 1 / 10 Terrorism Information


  1. Terrorism Information Technology Privacy Countering Terrorism through Information and Privacy Protection Technologies Robert Popp, John Poindexter IEEE Security & Privacy, vol. 4, no. 6, Nov.-Dec. 2006 1 / 10

  2. Terrorism Information Technology Privacy Terrorism Terrorists highly adaptive, secretive networks indistinguishable from normal population use public infrastructure ruthless (kill civilians, employ WMD, . . . ) 2 / 10

  3. Terrorism Information Technology Privacy Terrorism Terrorists highly adaptive, secretive networks indistinguishable from normal population use public infrastructure ruthless (kill civilians, employ WMD, . . . ) Counterterrorism objective detect and identify terrorists assumption planning involves people, which leave traces approach pattern-based analysis of distributed data problems models, noise/amount of data, civil liberties 2 / 10

  4. Terrorism Information Technology Privacy Information Technology (Collection and) Analysis of Data modeling tools cooperation (graphical) presentation natural language and multimedia processing data mining 3 / 10

  5. Terrorism Information Technology Privacy Information Technology (Collection and) Analysis of Data modeling tools cooperation (graphical) presentation natural language and multimedia processing data mining data analysis/terrorism detection Data Mining vs. Terrorism Detection Discover models/patterns Detect (rare) patterns Independent instances Networks Sampling okay Sampling destroys connections Homogenous data Heterogenous data 3 / 10

  6. Terrorism Information Technology Privacy Example 1 – Al Qaeda’s WMD Capabilities 80 IT-enhanced 70 67 method Time expended (%) Manually driven 60 58 method (baseline) 50 40 30 26 25 20 17 10 7 0 Research Analysis Production Intelligence analysis phase 4 / 10

  7. Terrorism Information Technology Privacy Example 2 – Guantanamo Inmates Most likely a terrrorist Interrogation reports . Known ”terrorists“ (training data set) . . Entity extraction Link chart Bayesian classifier (untrained) Alias Link resolution discovery . Known ”nonterrorists“ (training data set) . Link chart . Bayesian classifier (trained) ? ? ? Most likely a nonterrrorist 5 / 10 Unknowns (don’t know whether terrorists or nonterrorists)

  8. Terrorism Information Technology Privacy Example 3 – Instability of National States Automated entire front-end processing chain from data ingest to model population/processing Raw (multilingual) data Threat assessment model Rebel Automated IT data front end activity model Rebel group Threat to (RAM) • News services capacity stability • Email messages Measuring group Self-financing Level of • Financial report self-financing capacity attack Auto-ingest capacity and Group visibility Group stated Support from . . categorize idealogy patrons Performance . . capacity • News services Weapons and Proximity to . . tactics used • Magazine articles lootable Negotiating • Reference book excerpts resources aptitude Target choice Data transforms (Hilbert, LSI, AGS, ...) • Web site HTML Diaspora Resource procurement remittances aptitude Participation in criminal • Metadata activity • Corroborating data • Technical data 6 / 10

  9. Terrorism Information Technology Privacy Privacy [...] our goal (and challenge) is to maximize security at an acceptable level of privacy. More Security Current Pre-9/11 technology Post-9/11 Less Privacy More 7 / 10

  10. Terrorism Information Technology Privacy Privacy [...] our goal (and challenge) is to maximize security at an acceptable level of privacy. More Security Current Pre-9/11 technology Post-9/11 Less Privacy More [...] for a working definition, we would argue that personal privacy is only violated if the violated party suffers some tangible loss, such as unwarranted arrest or detention, for example. 7 / 10

  11. Terrorism Information Technology Privacy Privacy Appliance Concept • Contains associative memory index (AMI) • Update in real time Privacy Data appliance source User query Cross-source Privacy Data privacy appliance source appliance Response Privacy Data appliance Government Independently source owned operated Private or agency owned • Authentication • Selective revelation • Authorization • Data transformation • Anonymization • Policy is embedded • Immutable audit trail • Create AMI • Inference checking 8 / 10

  12. Terrorism Information Technology Privacy Privacy Technologies Data Transformation blinding Anonymization pseudonymization [name (first, last), telephone (area code, exchange, line number), address (street, town, state, zip code)] ⇓ [name (first), telephone (area code), address (state), ID ] 9 / 10

  13. Terrorism Information Technology Privacy Privacy Technologies Data Transformation blinding Anonymization pseudonymization [name (first, last), telephone (area code, exchange, line number), address (street, town, state, zip code)] ⇓ [name (first), telephone (area code), address (state), ID ] Selective Revelation incremental access to data Immutable Audit audit logs kept by trusted 3rd party Self-reporting Data central authority for “truth maintenance” 9 / 10

  14. Terrorism Information Technology Privacy Privacy Policies Neutrality existing laws apply to new technology Minimize Intrusiveness anonymize/pseudonymize personal data Intermediate Not Ultimate Consequence analysts as safeguard Audits And Oversight built-in technological safeguards Accountability of the executive to the legislative Necessity of redress mechanisms for false positives People and policy oversight and penalties for abuse 10 / 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend