e-limbo, e-zine de informacion y analasis de modos de vida actual
 
16.08.2017 / Sesión no Iniciada 
_Tecnología

 _enviar articulo

e-mail emisor
e-mail receptor
Ayúdanos a evitar contactos automáticos
Anti Spam
Texto
 

En estos tiempos de hipercomunicación bastaría la invitación de enviar a un amigo cualquiera de los textos que consideres interesantes algo redundante: demasiada comunicación, demasiados textos y , en general, demasiado de todo.
Es posible que estemos de acuerdo... pero cuando encuentras algo interesante en cualquier sitio, la red, la calle, tu casa, o un lugar escondido y remoto, compartirlo no sólo es un acto (acción, hecho) de amistad o altruismo, también es una manera de ahorrar tiempo a los demás (y de que te lo ahorren a ti (si eres afortunado) a costa del tiempo que tu has podido derrochar (emplear) y el gustazo de mostrar que estuviste ahí (o donde fuera ) un poco antes (el tiempo ya no es más el que era).
Comparte con tus conocidos aquello que encuentras, es evolución.
Why Data Mining Won't Stop Terror
10-03-06 Suggested by: Jack of all Trades 

 
Security Matters
In the post-9/11 world, there's much focus on connecting the dots. Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots. But even in the most wildly optimistic projections, data mining isn't tenable for that purpose. We're not trading privacy for security; we're giving up privacy and getting no security in return.
Most people first learned about data mining in November 2002, when news broke about a massive government data mining program called Total Information Awareness. The basic idea was as audacious as it was repellent: suck up as much data as possible about everyone, sift through it with massive computers, and investigate patterns that might indicate terrorist plots.


Americans across the political spectrum denounced the program, and in September 2003, Congress eliminated its funding and closed its offices.

But TIA didn't die. According to The National Journal, it just changed its name and moved inside the Defense Department.

This shouldn't be a surprise. In May 2004, the General Accounting Office published a report (.pdf) listing 122 different federal government data-mining programs that used people's personal information. This list didn't include classified programs, like the NSA's eavesdropping effort or state-run programs like MATRIX.

The promise of data mining is compelling, and convinces many. But it's wrong. We're not going to find terrorist plots through systems like this, and we're going to waste valuable resources chasing down false alarms. To understand why, we have to look at the economics of the system.

Security is always a trade-off, and for a system to be worthwhile, the advantages have to be greater than the disadvantages. A national security data-mining program is going to find some percentage of real attacks and some percentage of false alarms. If the benefits of finding and stopping those attacks outweigh the cost -- in money, liberties, etc. -- then the system is a good one. If not, you'd be better off spending that capital elsewhere.

Data mining works best when you're searching for a well-defined profile, a reasonable number of attacks per year and a low cost of false alarms. Credit-card fraud is one of data mining's success stories: all credit-card companies mine their transaction databases for data for spending patterns that indicate a stolen card.

Many credit-card thieves share a pattern -- purchase expensive luxury goods, purchase things that can be easily fenced, etc. -- and data mining systems can minimize the losses in many cases by shutting down the card. In addition, the cost of false alarms is only a phone call to the cardholder asking him to verify a couple of purchases. The cardholders don't even resent these phone calls -- as long as they're infrequent -- so the cost is just a few minutes of operator time.

Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data-mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.

All data-mining systems fail in two different ways: false positives and false negatives. A false positive is when the system identifies a terrorist plot that really isn't one. A false negative is when the system misses an actual terrorist plot. Depending on how you "tune" your detection algorithms, you can err on one side or the other: you can increase the number of false positives to ensure you are less likely to miss an actual terrorist plot, or you can reduce the number of false positives at the expense of missing terrorist plots.

To reduce both those numbers, you need a well-defined profile. And that's a problem when it comes to terrorism. In hindsight, it was really easy to connect the 9/11 dots and point to the warning signs, but it's much harder before the fact. Certainly, many terrorist plots share common warning signs, but each is unique, as well. The better you can define what you're looking for, the better your results will be. Data mining for terrorist plots will be sloppy, and it'll be hard to find anything useful.

Data mining is like searching for a needle in a haystack. There are 900 million credit cards in circulation in the United States. According to the FTC September 2003 Identity Theft Survey Report, about 1 percent (10 million) cards are stolen and fraudulently used each year.

When it comes to terrorism, however, trillions of connections exist between people and events -- things that the data-mining system will have to "look at" -- and very few plots. This rarity makes even accurate identification systems useless.

Let's look at some numbers. We'll be optimistic -- we'll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that's about 10 events -- e-mails, phone calls, purchases, web destinations, whatever -- per person in the United States per day. Also assume that 10 of them are actually terrorists plotting.

This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots.

This isn't anything new. In statistics, it's called the "base rate fallacy," and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any "test" is going to result in an endless stream of false alarms.

This is exactly the sort of thing we saw with the NSA's eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm.

And the cost was enormous -- not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties. The fundamental freedoms that make our country the envy of the world are valuable, and not something that we should throw away lightly.

Data mining can work. It helps Visa keep the costs of fraud down, just as it helps Amazon alert me to books I might want to buy and Google show me advertising I'm more likely to be interested in. But these are all instances where the cost of false positives is low (a phone call from a Visa operator or an uninteresting ad) in systems that have value even if there is a high number of false negatives.

Finding terrorism plots is not a problem that lends itself to data mining. It's a needle-in-a-haystack problem, and throwing more hay on the pile doesn't make that problem any easier. We'd be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated.

---

Bruce Schneier is the CTO of Counterpane Internet Security and the author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World.





Publiccado originalmente en www.wired.com

   
 

Rating: 4 - 1 voto(s).

   
_COMENTARIOS
No existen comentarios.
Comentario / Comment:
  atención: para realizar comentarios tienes que ser usuario registrado.
        

_HistÓrico_Tecnología

10-05-15_Cassette tapes are the future of big data storage
22-10-12_ Linus Torvalds Compares Hard Disks to Satan
21-10-12_ Doing with Icons makes Symbols; or, Jailbreaking the Perfect User Interface
30-09-12_ Web 3.0/NanoWar. The Afterimage of the Surveillance State
01-01-11_ El espacio público en la época de la presencia virtual
01-06-10_ How to Keep the Internet Free from Censorship (a call for programmers)
03-05-10_ Dennis Hong: Mis siete especies de robots.
12-07-10_ Collaborative Futures
28-02-10_ CLOUD CULTURE: THE PROMISE AND THE THREAT
29-03-09_ Me llamo Rubén y estoy embarazado
06-09-08_ No hay libertad sin SOFTWARE LIBRE
21-06-08_ Chris Jordan * Picturing excess
27-05-08_ WEB movil * retos por venir
16-04-08_ ¿El colapso de Windows?
02-04-08_ Sobran las EULAS
03-04-08_ Interview with Alessandro Ludovico (Neural Magazine)
20-02-08_ El "hacker" más famoso vuelve a la carga
04-02-08_ En la sala de control
24-03-08_ TOR... el anonimato de la cebolla
22-09-08_ Lev Manovich * Understanding Meta-Media
02-12-07_ Let There Be Lights: Meet Lichtfaktor, the New Illuminati
02-12-07_ Una enciclopedia práctica (es cierto)
27-11-07_ A guide to success
15-11-07_ GOOGLE presenta ANDROID
13-09-07_ Unlock your iPhone... just... right now
02-09-07_ Código abierto, código indefenso
28-08-07_ Photospace
25-08-07_ Iphone liberado
03-08-07_ Manipulación de imágenes ;-)
16-07-07_ Omemo + que un disco duro virtual
08-07-07_ Interview * Christine Hill
29-06-07_ Cultura y el cuarto principio del software libre
07-06-07_ M I T  e-news  * June 2007
19-06-07_ Ajax para todos
01-06-07_ The Pirate Bay... ahora vídeo streaming
01-06-07_ Mobile Music Workshop
16-05-07_ Think . Make . Think
13-05-07_ Los cuatro mandamientos de los programas libres
02-07-07_ The author's algorithm
03-05-07_ 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
19-04-07_ Pirates of the Multiplex
15-04-07_UN Zoco para la creación
05-04-07_ Technology retrieves sounds in the wall
22-02-08_ David Cuartielles * Entrevista
22-02-08_ David Cuartielles [ARDUINO] * Entrevista
18-03-07_ La video instalación y el retorno a la obra única
08-03-07_ Piracy Documentary: On Piracy & the Future of Media
06-03-07_TAGallery | THE ART Gallery
03-03-07_ Magic weed * History of Marijuana
22-02-07_ Angelo Vermeulen * Interview
04-02-07_ Probar diseños en diferentes navegadores
02-02-07_ Linux is not Windows
29-01-07_ How to Find Fake Torrents Uploaded by the MPAA and RIAA
29-01-07_ Adam Greenfield * Interview
19-01-07_ Los niños prodigio de Pierre Jaquet-Droz
18-01-07_ PURE:DYNE aka XP->XtendedPanic Fucker
13-01-07_ How to do research
19-01-07_ Sealand Won't be Sold to Pirates
07-01-07_ Internet Explorer fue inseguro 284 días de 2006, Firefox sólo 9
02-01-07_ Douglas Rushkoff Interview
01-01-07_ 23C3: On Free, and the Differences between Culture and Code
26-12-06_ RoundedCornr: generador online de cajas con esquinas redondeadas
25-12-06_ Virtual Art: From Illusion to Immersion By Oliver Grau (E-Book)
17-12-06_ Apple copia a Postal Service?
15-12-06_ Bill Gates on the future of DRM
31-05-07_ Hypervirus: a clinical report
05-12-06_ BitTorrent Video Store to be Infected with Windows DRM
01-12-06_ Quick Embed Code to Add Comments To Any Site
17-11-06_ Zune Deconstructed... Can Run Linux
17-11-06_ Alexitimia * VIDA 9.0
16-11-06_ Bittorrent Movie Download Chart (wk45)
15-11-06_ Quad Core... en 5 años 80 nucleos faenando ¡!
03-11-06_Transmission 0.7 Beta. Redefining BitTorrent on the Mac
01-11-06_Interview with Ubermorgen
28-10-06_Debian: jugando se aprende
25-10-06_The best of BITTORRENT
22-10-06_La revolución digital
20-10-06_Los científicos demuestran que es posible hacer invisible un objeto
17-10-06_Interview With The Pirate King * Ashwin Navin Of BitTorrent
17-10-06_Reuters en Second life
08-10-06_La historia de Apple, según Steve Wozniak
08-10-06_La televisión no lo filma
27-09-06_Interview of John Klima
29-09-06_Entrevista * Toni Abad
19-09-06_Mapa del torrente de datos (BitTorrent) ;-)
18-09-06_John Updike * El final de la autoría
18-09-06_What News Corp doesn't want you to know about MySpace
12-09-06_Book: Design Noir
06-09-06_Ingeniería filosófica para la red
06-09-06_Notas sobre la Simplicidad
30-08-06_El futuro fue ayer
30-08-06_Interview * Adam Somlai-Fischer
20-08-06_Deleuze * Leibniz
15-08-06_Mission Eternity
23-07-07_ Free culture & the internet: a new semiotic democracy
10-08-06_Open Wi-Fi: The Best RIAA Defense?
04-08-06_Juguetes para el Verano
04-08-06_Art and design raise awareness about biotechnology
31-07-06_Arthur Clarke Cybercast Hal's Birthday [Reloaded >)
28-07-06_Media Link Dump * YouTube for 07-25-06
24-07-06_I make $1.45 a week and I love it
24-07-06_Pensar en paralelo
20-07-06_Interview of W. James Au AKA Hamlet Au
20-07-06_La Tierra en la luna de Saturno (recuerda la odisea... )
06-07-06_Rewired brain' revives patient after 19 years
30-06-06_The Wired 40
28-06-06_Con sólo diez llamadas puedes asaltar una empresa
21-06-06_Llega el nuevo Opera
17-06-06_¿Adiós a la regla?
16-06-06_What is Alky?
14-06-06_The power of Ten
12-06-06_Las nuevas tecnologías pueden levantar nuevas barreras
07-06-06_Pirate Bay Bloodied but Unbowed
01-06-06_Lo que Google sabe de mí
05-06-06_Music Phones Want to Be Free
23-05-06_DIY: construyendo un transmisor de Televisión
05-06-06_A Guide to the Online Video Explosion
05-06-06_Interview of Marc Boehlen
15-05-06_iAy caramba! MacBook is hot
11-05-06_¿Se rompe Internet?
06-06-06_The samba and the sauna
07-06-06_A Grand Unified Theory of YouTube and MySpace
07-06-06_Who Needs the DJ?
04-05-06_Hattori Hanzo
04-05-06_Su operación está siendo procesada
23-04-06_Nueve veces virgen
19-04-06_Origen y Sedimento
05-04-06_What Gaming can Learn from Installation Art
01-04-06_Nagakura: ¿No construido?
24-03-06_Dream Machines
13-03-07_ Descargas ilegales
13-03-07_ Teléfono gratuito del 11888
23-03-06_Los trucos del 11888
16-03-06_Jazztel, Just tell!
15-03-06_Life, the Universe, and Everything
10-03-06_Why Data Mining Won't Stop Terror
02-03-06_The Problem With Music
27-02-06_Historia de un sueño
25-02-06_Mutant Algae Is Hydrogen Factory
18-02-06_Compartir es Yomango
19-02-06_Por primera vez una sentencia judicial española cita el 'copyleft'
11-02-06_Vida sintética en ARCO
07-02-06_Arte en la era digital
03-02-06_Nev Hyman’s Next Big Thing
03-02-06_Endesa y su PLC (Power Line Comunication)
29-01-06_The New Boom
29-01-06_Sharon, el arquitecto de las ruinas
23-01-06_The 50 Best Robots Ever
20-01-06_Universo de Blogs
17-01-06_DEAACS.COM
18-01-06_Sharing Broadband to Increase Speed
16-01-06_The Translator's Blues
16-01-06_La radio que «aprende» de nuestros gustos
16-01-06_Network Babel in the Living Room
13-01-06_El pan gracias al circo: la economía del juego en línea
11-01-06_Behind the magic curtain
06-01-06_`Decálogo de seguridad’ ante la compra de nuevos ordenadores
04-01-06_Pete Tong: Apple's Gone Wrong?
03-01-06_SonyBMG ofrece dinero y discos...
24-12-05_Un nuevo intento de avanzar hacia Internet
19-12-05_El Oculista
05-01-06_Óptica recreativa
23-11-05_Primer troyano que aprovecha el rootkit de Sony
13-11-05_Sony utiliza un rootkit que pone en riesgo la seguridad de sus clientes
11-11-05_Sony: polémico sistema contra la piratería
29-10-05_Arte digital / Arte contemporaneo
07-08-06_Primer.

_ORBITAL_Tecnología

_Servicios

test
Regístrate y disfruta de utilidades de administración y gestión de los contenidos de e-limbo*
Recibe las novedades en tu correo electronico.
El futuro está escrito en las estrellas... Horóscopo creado por J.G. Ballard y dedicado a todos vosotros.
Aplicaciones y herramientas necesarias para navegar y utilizar los contenidos del limbo electrónico e internet (www).
Artículos de e-limbo* en formato PDF preparados para viajar y aportar información allá donde estés. (y seguir salvando árboles)

_e-limbo * apoya

test

_Multimedia

_AUDIO >
Mais uma edição do podcast Música Livre para o Archivo Vivo, do Centro Cultural da Espanha/AECID. ...
_PODCAST >
Ante preguntas de oyentes y amigos, puedo responder ahora que Vía Límite continuará en Radio ...
_VIDEO >
SORPRESA¡!¡! An unreleased version of Talking Heads' "Psycho Killer" with Arthur Russell on cello
Optimizado: Firefox, Safari, Mozilla, Netscape, Konqueror, Explorer. Resolución óptima: 1024x768
ISSN: 1885-5229    Aviso Legal e-limbo.org*