Data Management // Big Data Analytics
07:10 PM
Connect Directly
Core System Testing: How to Achieve Success
Oct 06, 2016
Property and Casualty Insurers have been investing in modernizing their core systems to provide fl ...Read More>>

Why Prism Is The Right Investment

Let's not get distracted as a nation from the real problem: our sorry state of analytics.

Prism doesn't scare me.

On 9/11, my office was on the 39th floor of One World Trade. I was one of the many nameless people you saw on the news running from the towers as they collapsed.

But the experience didn't turn me into a hawk. In fact, I despise the talking heads who frame Prism as the price we pay for safety. And not just because they're fear-mongering demagogues.

I hate them because I'm a technologist and they're giving technology a bad name.

Let's start with the basics.

[ Meet IBM's "Engagement Advisor," a computer that can take customer complaints. Read Watson Gets Call Center Job. ]

What is Prism? If you're the vendor that sold it to the National Security Agency, Prism is a proprietary black box that applies state-of-the-art predictive analytics to big data to infer relationships between known terrorists and their social networks. That's marketing jargon, so let's break it down.

Note that the only thing proprietary in that last paragraph is the vendor's hokey sales pitch. Everything mentioned there can be built with open-source tools, specifically a scalable distributed graph such as Neo4j and some natural language processing (NLP) libraries from Stanford University. So if you're in government IT or purchasing, don't buy the vendor BS.

First, the graph ...

In theory, every person in the world can be a node on a graph. And every communication between two people is just a relationship between those two unique nodes. So if you were able to compel Verizon and every carrier in the world to give you their complete call records, you could create the world's largest game of Six Degrees of Kevin Bacon.

Supplement those phone records (as the thing that connects two people) with emails, instant messages, known aliases and financial transactions, and your ability to infer relationships dramatically improves.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our online community and information resource for CIOs operating in the global economy.

That, by the way, is the same kind of inference engine that companies such as Amazon use to figure out which products to suggest you buy. It's a more sophisticated way of asking if you want fries with that. Only in this case, instead of advancing commercialism, law enforcement gets to quickly determine the social networks of known terrorists.

This isn't some dystopian Minority Reports-like future. This is good old-fashioned policing supplemented by technology. Instead of manually sifting through phone records and drawing lines on a whiteboard between grainy pictures of suspects (a la every serial killer movie you've ever seen), the NSA is using a graphing engine.

And for the best reason possible: to speed up the narrowing of the search.

Next, the NLP ...

So now you know who's communicating with whom. How can you make sense of content: the billions of hours of real-time voice and email exchanges between people? You certainly don't want to hire tens of millions of analysts to listen, translate and raise their hands whenever someone that's two degrees away from some blind sheikh uses the word jihad.

1 of 3
Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
<<   <   Page 3 / 3
User Rank: Apprentice
7/19/2013 | 11:43:27 AM
re: Why Prism Is The Right Investment
Did you vote for it? No? Then there is a problem.

Of course saying `I'm not special' is the ultimate naivety, right up there with ostriches and sand - it doesn't stop the fact that there will be false positives as well as false negatives.
User Rank: Strategist
7/19/2013 | 5:21:01 PM
re: Why Prism Is The Right Investment
The technology in question isn't particularly sophisticated right now. The column was meant to question the commonly-held fallacy that a system (any system) can figure out who's a terrorist. It can't. The best it can do with today's state-of-the-art is to narrow the research that a limited resource pool (intelligence or law enforcement) needs to drill down on. And yes, civil liberties come into play. And now that its in the open, we-- the architects and hackers-- should figure out how to help AND respect civil liberties.
User Rank: Apprentice
7/25/2013 | 4:28:57 PM
re: Why Prism Is The Right Investment
"The people working at the NSA don't care about your dumb life or your stupid fetish. ... They care about stopping bad guys. And quickly."

The author is (willfully?) naive. This data can be used to undercut economic competition (by just enough that the preferred company gets the contract), to suppress political dissenters, and to keep undesired individuals from attaining positions of power.

Just because most of us aren't important enough to get this data used against us doesn't mean it is never used against anyone.
<<   <   Page 3 / 3
6 Tools to Protect Big Data
6 Tools to Protect Big Data
Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.