Countering Terrorism through Information and Privacy Protection - - PowerPoint PPT Presentation

countering terrorism through information and privacy
SMART_READER_LITE
LIVE PREVIEW

Countering Terrorism through Information and Privacy Protection - - PowerPoint PPT Presentation

Terrorism Information Technology Privacy Countering Terrorism through Information and Privacy Protection Technologies Robert Popp, John Poindexter IEEE Security & Privacy, vol. 4, no. 6, Nov.-Dec. 2006 1 / 10 Terrorism Information


slide-1
SLIDE 1

Terrorism Information Technology Privacy

Countering Terrorism through Information and Privacy Protection Technologies

Robert Popp, John Poindexter

IEEE Security & Privacy, vol. 4, no. 6, Nov.-Dec. 2006

1 / 10

slide-2
SLIDE 2

Terrorism Information Technology Privacy

Terrorism

Terrorists highly adaptive, secretive networks indistinguishable from normal population use public infrastructure ruthless (kill civilians, employ WMD, . . . )

2 / 10

slide-3
SLIDE 3

Terrorism Information Technology Privacy

Terrorism

Terrorists highly adaptive, secretive networks indistinguishable from normal population use public infrastructure ruthless (kill civilians, employ WMD, . . . ) Counterterrorism

  • bjective detect and identify terrorists

assumption planning involves people, which leave traces approach pattern-based analysis of distributed data problems models, noise/amount of data, civil liberties

2 / 10

slide-4
SLIDE 4

Terrorism Information Technology Privacy

Information Technology

(Collection and) Analysis of Data modeling tools cooperation (graphical) presentation natural language and multimedia processing data mining

3 / 10

slide-5
SLIDE 5

Terrorism Information Technology Privacy

Information Technology

(Collection and) Analysis of Data modeling tools cooperation (graphical) presentation natural language and multimedia processing data mining data analysis/terrorism detection Data Mining vs. Terrorism Detection Discover models/patterns Detect (rare) patterns Independent instances Networks Sampling okay Sampling destroys connections Homogenous data Heterogenous data

3 / 10

slide-6
SLIDE 6

Terrorism Information Technology Privacy

Example 1 – Al Qaeda’s WMD Capabilities

Research Analysis 26 67 Intelligence analysis phase Production 80 70 60 50 40 30 20 10 Time expended (%) 25 58 17 7 IT-enhanced method Manually driven method (baseline)

4 / 10

slide-7
SLIDE 7

Terrorism Information Technology Privacy

Example 2 – Guantanamo Inmates

Known ”terrorists“ (training data set) Known ”nonterrorists“ (training data set) Unknowns (don’t know whether terrorists or nonterrorists) ? ? ? Interrogation reports Link chart Bayesian classifier (untrained) Link chart Bayesian classifier (trained) . . . . . . Most likely a terrrorist Most likely a nonterrrorist Alias resolution Entity extraction Link discovery 5 / 10

slide-8
SLIDE 8

Terrorism Information Technology Privacy

Example 3 – Instability of National States

. . . Threat assessment model

Rebel group capacity Self-financing capacity Performance capacity Negotiating aptitude Resource procurement aptitude Group visibility Threat to stability Level of attack Rebel activity model (RAM) Measuring group self-financing capacity Weapons and tactics used Group stated idealogy Target choice Support from patrons Proximity to lootable resources Diaspora remittances Participation in criminal activity

Automated entire front-end processing chain from data ingest to model population/processing Raw (multilingual) data Automated IT data front end

  • News services
  • Email messages
  • Financial report
  • News services
  • Magazine articles
  • Reference book excerpts
  • Web site HTML
  • Metadata
  • Corroborating data
  • Technical data

. . . Data transforms (Hilbert, LSI, AGS, ...)

Auto-ingest and categorize

6 / 10

slide-9
SLIDE 9

Terrorism Information Technology Privacy

Privacy

[...] our goal (and challenge) is to maximize security at an acceptable level of privacy.

Current technology More Security Less More Privacy Post-9/11 Pre-9/11 7 / 10

slide-10
SLIDE 10

Terrorism Information Technology Privacy

Privacy

[...] our goal (and challenge) is to maximize security at an acceptable level of privacy.

Current technology More Security Less More Privacy Post-9/11 Pre-9/11

[...] for a working definition, we would argue that personal privacy is only violated if the violated party suffers some tangible loss, such as unwarranted arrest or detention, for example.

7 / 10

slide-11
SLIDE 11

Terrorism Information Technology Privacy

Privacy Appliance Concept

Data source

Privacy appliance User query

  • Contains associative memory index (AMI)
  • Update in real time
  • Authentication
  • Authorization
  • Anonymization
  • Immutable audit trail
  • Inference checking

Data source

Privacy appliance Cross-source privacy appliance

Data source

Privacy appliance Response Government

  • wned

Independently

  • perated

Private or agency owned

  • Selective revelation
  • Data transformation
  • Policy is embedded
  • Create AMI

8 / 10

slide-12
SLIDE 12

Terrorism Information Technology Privacy

Privacy Technologies

Data Transformation blinding Anonymization pseudonymization

[name (first, last), telephone (area code, exchange, line number), address (street, town, state, zip code)]

[name (first), telephone (area code), address (state), ID]

9 / 10

slide-13
SLIDE 13

Terrorism Information Technology Privacy

Privacy Technologies

Data Transformation blinding Anonymization pseudonymization

[name (first, last), telephone (area code, exchange, line number), address (street, town, state, zip code)]

[name (first), telephone (area code), address (state), ID] Selective Revelation incremental access to data Immutable Audit audit logs kept by trusted 3rd party Self-reporting Data central authority for “truth maintenance”

9 / 10

slide-14
SLIDE 14

Terrorism Information Technology Privacy

Privacy Policies

Neutrality existing laws apply to new technology Minimize Intrusiveness anonymize/pseudonymize personal data Intermediate Not Ultimate Consequence analysts as safeguard Audits And Oversight built-in technological safeguards Accountability of the executive to the legislative Necessity of redress mechanisms for false positives People and policy oversight and penalties for abuse

10 / 10