Homeland Security 2.0, Terrorist Networks Analyzed

from the chair-of-the-math dept

Just in case the web 2.0 set ever gets bored of applying their understanding of network effects to things like MySpace clones and tagging sites, their services could be employed by the government for some weightier issues. Some believe that network theory could be a potent tool in thwarting terrorism. However, some of the early attempts sound less than stellar. One network expert drew a map showing that all of the 9/11 hijackers were strongly connected to ringleader Mohammad Atta (duh!). Other charts produced were over 20 feet long, packed with so much information, that they were useless. The problems with this technique are similar those of data mining, namely that there’s so much information, and so many red flags, that security forces can’t respond efficiently. Still, as long as security officials take their cues from the TV show Numb3rs, quantitative techniques to fighting terrorism will persist.


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Homeland Security 2.0, Terrorist Networks Analyzed”

Subscribe: RSS Leave a comment
7 Comments
Ben McNelly (user link) says:

Muhahahaha!

Just by hitting this post, you have been added to the network! Just by saying Mohammad Atta, or words like bomb, plane, knife, hijack, ect… you are adding more meat to the muddle that is online datamining inteligence. not that saying Mohammad Atta is a bad thing, or saying Mohammad Atta automaticaly suggest you have anything to do with him, just that Mohammad Atta is a know leader in the terror world.

– Now you only get about seven links to this artical before your officialy a hub point, so dont be posting in any blogs that link to this post! And dont say “praise Allah” and Mohammad Atta, in the same sentence.

Now you have to realise that (according to the artical) the N.S.A. intercepts around 650 million communications worldwide every day, and we all know GB is listening, so combine that with a bunch of geeks at the CIA trying to magicaly generate a 3d web of links that will predict the rapture and/or the next terror atack (of course involving Mohammad Atta), it seems likely that in the future, this artical should be able to get you arested or at least your phone tapped…

Jezsik says:

Read "Blink"

In “Blink : The Power of Thinking Without Thinking” Malcolm Gladwell tells the story of a general who was put in charge of the “bad guys” in a mock war. The “good guys” had an unbelievable amount of data and charts and profiles and, naturally, a whole lotta technological advantages — there was no way they could lose! No way? The general, using a minimal amount of information and instructions to his troops, cleaned their clocks! He wasn’t hampered by data overload and analysis paralysis.

giafly says:

Look amongst the Republicans

Data mining is very effective, when used with large numbers of people who don’t try to hide their true opinions. I expect the FBI can use this technique to track Islamic extremists.

But any sensible Islamacist terrorist will know this. So he will be clean-shaven and neatly dressed – no beard or turban – and will deliberately avoid the company of extremists. If questioned about politics, he may support George Bush.

For example: “The photograph of the brother in these documents should be without a beard. It is preferable that the brother’s public photograph [on these documents] be also without a beard. If he already has one [document] showing a photograph with a beard, he should replace it.” – Al Queda Manual

Data mining would show such terrorists as linked to Republicans rather than Al Queda.

Abram Gutang says:

Trip over "intelegance"

The problem is the bureaucracy of the government. The technology to translate and understand human language by machine is available a long time ago, however by the time the congress writes a legislation / the president gets interested / the house votes / the congress overturns / the president vetoes the congress / the supreme court rules in favor / etc. the hardware they are buying is outdated… if govt. wishes to get something done, the ought to be able to switch to new technology in atleast a few months. I bet CIA is still running Win3.1 on Intel DX/2

Andrew Strasser (user link) says:

I HIGHLY DOUBT THAT.

I would be more suspect of them running a machine that isn’t even on the market in their main facilities. The parts you may ever see may look like that though what they have buried deep within their walls is much more computer power than anyone on the block can get. It may have been outdated, however it was outdated classified which normally runs how many years ahead of schedule on technology?

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...