Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Security

New Algorithm Could Help Predict Future ISIS Attacks (thestack.com) 120

An anonymous reader writes: Researchers have developed a new algorithm which may help law enforcement agencies predict potential terror attacks. The computer model has a particular focus on the behavioral patterns associated with Islamic State (ISIS) supporters...
For eight months in 2015, the researchers tracked 108,086 individual followers on ISIS-related social media pages, noting that sudden increases in the number of pages "preceded the onset of violence in a way that would not have been detected by looking at social media references to ISIS alone." According to The Stack, the University of Miami team "used a mathematical equation typically applied in physics and chemistry to monitor the development and growth of pro-ISIS groups. 'It was like watching crystals forming. We were able to see how people were materializing around certain social groups; they were discussing and sharing information -- all in real-time... This removes the guess work. With that road map, law enforcement can better navigate what is going on, who is doing what, while state security agencies can better monitor what might be developing,..."
Privacy

Former NSA Director: 'We Kill People Based On Metadata' 155

An anonymous reader writes "An article by David Cole at the NY Review of Books lays out why we should care as much about the collection of metadata as we do about the collection of the data itself. At a recent debate, General Michael Hayden, who formerly led both the NSA and the CIA, told Cole, 'we kill people based on metadata.' The statement is stark and descriptive: metadata isn't just part of the investigation. Sometimes it's the entire investigation. Cole talks about the USA Freedom Act, legislation that would limit the NSA's data collection powers if it passes. The bill contains several good steps in securing the privacy of citizens and restoring due process. But Cole says it 'only skims the surface.' He writes, 'It does not address, for example, the NSA's guerilla-like tactics of inserting vulnerabilities into computer software and drivers, to be exploited later to surreptitiously intercept private communications. It also focuses exclusively on reining in the NSA's direct spying on Americans. ... In the Internet era, it is increasingly common that everyone's communications cross national boundaries. That makes all of us vulnerable, for when the government collects data in bulk from people it believes are foreign nationals, it is almost certain to sweep up lots of communications in which Americans are involved.' He concludes, '[T]he biggest mistake any of us could make would be to conclude that this bill solves the problem.'"

Slashdot Top Deals

NOWPRINT. NOWPRINT. Clemclone, back to the shadows again. - The Firesign Theater

Working...