Download Macro Trends in Counter Terrorism Technologies

Document related concepts

Nonlinear dimensionality reduction wikipedia , lookup

Transcript
Macro Trends in
Counter-Terrorism Technologies
And Thoughts on Responsible Innovation
DETECTER Project, Brussels
September 7th, 2011
Jeff Jonas, IBM Distinguished Engineer
Chief Scientist, IBM Entity Analytics
[email protected]
1
Today’s Material
 Background
 Macro Trends
 Detecting Bad Guys in Big Data
 Challenging Privacy and Civil Liberties Issues
 Privacy by Design (PbD) Considerations
 Questions and Answers
2
Background
 Early 80’s: Founded Systems Research & Development
(SRD), a custom software consultancy
 1989 – 2003: Built numerous systems for Las Vegas
casinos including a technology known as Non-Obvious
Relationship Awareness (NORA)
 2001/2003: Funded by In-Q-Tel
 2005: IBM acquires SRD
 2005: Acquired by IBM, now Chief Scientist, IBM Entity
Analytics
 Cumulatively: I have had a hand in a number of systems
with multi-billions of rows describing 100’s of millions of
entities
3
Roles
 Member, Markle Foundation Task Force on National
Security in the Information Age
 Board Member, US Geospatial Intelligence Foundation
(USGIF), the GEOINT organizing body
 Senior Associate, Center for Strategic and International
Studies (CSIS)
 Member, EPIC advisory board
 Advisor, Privacy International
4
Current Primary Area of Interest
 Making sense of information in large data sets,
across complex ecosystems with emphasis on privacy
and civil liberties protections
– 1996: Created an identity-centric customer repository based on
4,200 disparate systems … >100 million resolved identities
– 2001: Assistance in various post-9/11 data analysis programs for
public and private sector
– 2005: Missing persons project following Hurricane Katrina
resulting in re-unification of >100 loved ones
5
A Late Bloomer to Privacy
6
1980 – 2001
No clue whatsoever
2001 – 2006
Slowly waking up
2007 – 2011
Today, at best, a
student of privacy
A Journey Fraught with Reflection and Rethinking
The greater
my privacy and
civil liberties
awareness
7
The greater
the number of
imperfections
appear in my
rearview mirror
Katrina – Missing Persons Reunification Project
 Information about status of persons quickly end up
scattered across countless databases
– Over 50 such web sites/organizations were identified as having
victim related data
– Many people were registered duplicate times in the same
database
– Many people were registered duplicate times across databases
– Many people were registered as missing in one database and
found in another database
 Connecting found persons previously reported as
missing becomes nearly impossible
– Too many databases
– Constantly changing data
8
Katrina Reunification Project Statistics
 Total data sources
 Usable records
1,570,000
 Unique persons
36,815
 Total loved ones reunited
9
15
>100
Katrina – Missing Persons Reunification Project
 Privacy by Design (PbD)
– Contractually authorized to delete all the data
after the reunification office completed its work
– Hence, a few months later, all collected data and
reporting products were deleted
DESTRUCTION OF EVIDENCE!
Data Decommissioning – Destruction of Accountability
10
Macro Trends
11
Avg Age
Good News: The World is Not More Dangerous
37
1900:
Western
Europe
Today:
Global
Average
Number Dead
67
75M
~17+%
300M
~4.5%
1300’s:
“Black Death”
12
Today:
If America
sunk into ocean
and everyone dies
Prediction
Your doctor is 102
and this is not weird.
13
Complexity of Execution
Bad News: “More Death Cheaper in Future” Graph
10 Kiloton
Nuke
1918
Spanish
Influenza
Death
14
1918 Spanish Influenza Genome
15
Complexity of Execution
“More Death Cheaper in Future” Graph
= Bad
10 Kiloton
Nuke
Easier
1918
Spanish
Influenza
More Death
Death
16
Jerome Kerviel – US$7B
www.chinapost.com.tw/news_images/20080127/p1d.jpg
17
Jerome Kerviel – US$7B
Back it out
Back it in
Back it out
Analytic
Checkpoint
Analytic
Checkpoint
18
Back it in
1 Day
2050 Predictions
A single person can
kill 100M people for
<$1,000.
19
State of the Union:
Enterprise Amnesia
20
Amnesia, definition
A defect in memory, especially resulting
from brain damage.
21
US National Security Amnesia Events
9/11
Two known terrorists were admitted into the US (only discovered
after the fact).
Christmas Day Bomber
Abdulmutallab possessed a multi-entry VISA while at the same
time was on the terrorist watch list (only discovered after the
fact).
22
Computing Power Growth
Trend: Organizations Are Getting Dumber
Every two days now we create as
much information as we did from
the dawn of civilization up until
2003.”
Available
Observation
Space
~ EricContext
Schmidt, CEO Google
Enterprise
Amnesia
Sensemaking
Algorithms
Time
23
Computing Power Growth
Trend: Organizations Are Getting Dumber
Available
Observation
Space
WHY?
Context
Sensemaking
Algorithms
Time
24
Algorithms at Dead End.
You Can’t
Squeeze Knowledge
Out of a Pixel.
25
No Context
[email protected]
26
Context, definition
Better understanding
something by taking into
account the things around it.
27
Information without
context
is hardly actionable.
28
Lack of Context – Consequences
 Alert queues growing faster than the
humans address – filled mostly with false
positives
 The top item in the queue is not the most
relevant item
 Items require so much investigative
effort – they are often abandoned
prematurely
 Risk assessment becomes the risk
29
29
Information in Context … and Accumulating
[email protected]
Job
Applicant
No Fly
List
30
Most
Trusted
Source
Known
Terrorist
The Puzzle Metaphor
 Imagine an ever-growing pile of puzzle pieces of varying
sizes, shapes and colors
 What it represents is unknown – there is no picture
 Is it one puzzle, 15 puzzles, or 1,500 different puzzles?
 Some pieces are duplicates, missing, incomplete, low
quality, or have been misinterpreted
 Some pieces may even be professionally fabricated lies
 Until you take the pieces to the table and attempt
assembly, you don’t know what you are dealing with
31
32
Puzzling: 4 Puzzles, 620 Useful Pieces
270 pieces
90%
30 pieces
10%
200 pieces
66%
6 pieces
2%
150 pieces
50%
33
(duplicates)
(pure noise)
+36 Useless Pieces!
34
First Discovery
35
More Data Finds Data
36
Duplicates in Front Of Your Eyes
37
First Duplicate Found Here
38
39
40
Incremental Context – Incremental Discovery
41
6:40pm
START
22min
“Hey, this one is a duplicate!”
35min
“I think some pieces are missing.”
37min
“Looks like a bunch of hillbillies on
a porch.”
44min
“Hillbillies, playing guitars, sitting
on a porch, near a barber sign …
and a banjo!”
150 pieces
50%
42
Incremental Context – Incremental Discovery
43
47min
“We should take the sky and grass
off the table.”
2hr
“Let’s switch sides, and see if we
can make sense of this from
different perspectives.”
2hr10m
“Wait, there are three … no, four
puzzles.”
2hr17m
“We need a bigger table.”
2hr18m
“I think you threw in a few random
pieces.”
44
45
46
Trend: Big Data [in context] = New Physics
More data: better the predictions
– Lower false positives
– Lower false negatives
More data: bad data … good
– Suddenly glad your data was not perfect
More data: less compute
47
From Pixels to Pictures to Insight
Contextualization
Observations
48
Relevance Detection
Persistent
Context
Consumer
(An analyst, a system,
the sensor itself, etc.)
One Form of Context is “Expert Counting”
 Is it 5 people each with 1 account … or is it 1
person with 5 accounts?
 Is it 20 cases of H1N1 in 20 cities … or one
case reported 20 times?
 If one cannot count … one cannot estimate
vector or velocity (direction and speed).
 Without vector and velocity … prediction is
nearly impossible.
49
Skilled adversaries engage in
“channel separation.”
50
Cell Phone #1
Cell Phone #2
Bank Acct #1
Passport #1
Unknown
Unknown
Billy K.
William A.
Hence, detection requires
“channel consolidation.”
William A
aka Billy K.
• Cell Phone #1
• Cell Phone #2
• Bank Acct #1
• Passport #1
51
Expert Counting: Degrees of Difficulty
Deceit
Bob Jones Ken Wells
123455
550119
Incompatible
Features
Fuzzy
Exactly
Same
Bob Jones
123455
52
Bob Jones
123455
Bob Jones
123455
Bob Jones
123455
Robert T Jonnes
000123455
bjones@hotmail
Deceit Detection Using Context Accumulation
Feature
Accumulation
Deceit
Robert Jones
123455
POB 13452
DOB 03/12/73
Bob Jones
POB 13452
[email protected]
53
Bob Jones Ken Wells
123455
550119
Ken Wells
550119
POB 999911
DOB 03/12/73
[email protected]
[email protected]
DOB 03/12/73
Robert Jones
123455
Resolved!
Ken Wells
550119
3 Models for
Information Sharing
54
1. Bulk Transfer
 Large collections are passed along to appropriate third parties
 May be required if the recipient must commingle the data in
secret
 The recipients must have a capacity much larger than their own
native requirements
 The more copies the more difficult it is to maintain the
information currency across the ecosystem
 The more copies the more difficult to prevent of unintended
disclosure
 Useful when the number of recipients and transactional
volumes are very small
55
2. Services for Inquiry
 Owners enable third party inquiry (human or machine lookups)
 When lots of systems are integrated, federated search can be
automated to search all third party data sources based on a
single user/machine search
 Each system in the federation must be sized for all volume
 Third party systems often lack the necessary indexes
 Nearly impossible to ensure each federated systems is on-line
 Useful for periodic, on-demand, inquiry using each third party
data source like a reference system – particularly appropriate
for narrow investigative work and/or forensic analysis
 Not that useful for detect/preempt missions
56
3. Central Catalog/Index
 Parties interested in information sharing supply metadata to a
central catalog (index)
 Inquiries can discover the location of all available documents
using a single lookup
 Card catalogs provide pointers to source systems and
documents enabling efficient/scalable lookup (aka federated
fetch)
 Easier to keep the data current … than bulk transfer
 Scales massively
 Easier to secure
57
Discovery at the Library
?
Subject
58
Title
Author
Enterprise Discovery
Who
59
What
Where
When
How
The Policy Focus Becomes … “Discoverability”
If you don’t publish your meta-data (who,
what, where, when) to the enterprise
catalog …
Information is not discoverable …
Therefore, the value of your operational
system to the broad strategic interests of
the enterprise is effectively ZERO!
60
Are You Playing Well With Others?
SHARING SCORECARD(*)
DISCOVERABILITY
Organization
Records
Discoverable
%
This org
5B
2.5B
50%
That org
120B
6B
5%
The other org
3B
1B
33%
Their org
1B
750K
75%
Their other org
1B
500K
50%
(*) Any resemblance to real organizations and real number would be coincidental
61
Challenging
Privacy and Civil Liberties
Issues
62
Issue #1: Essential Secrets vs. Transparency
 To detect professionally fabricated lies,
using only data, one must either:
1. Collect observations the adversary doesn’t know you have
2. Or, be able to perform compute over your observations in a
manner the adversary cannot fathom
 The Challenge: How can organizations
catch bad guys if there is transparency
over their observational space and what
is computable?
63
Issue #2: More Data Good
 The good news: Both those in the counterterrorism business
and privacy community equally detest false positives
– The government recognizes that false positives waste government
resources
– The privacy community recognizes that false positives place the innocent
under undeserved government scrutiny
 The challenge: Two remedies for false positives
1. Change the rules to reduce the number of alerts (which increases the
false negatives)
2. Add more information such that the additional context permits greater
discrimination
 The more data, the lower the false positives and the lower
the false negatives
64
Issue #3: Necessity of Central Indexes
 Federated search is extremely limited
– Does not scale when the mission is to get “left of boom”
(detection)
 Central card catalogs (indexes) are the only
viable way forward
– Only the metadata centralized with pointers, not all the
data
 The Challenge: General reaction to central
databases, even if just an index
65
Issue #4: Lone Gunmen Surveillance
 Rare events planned by one or a small group are more difficult
to detect
 The size of the observation space needed to detect lone
gunmen planning acts of terrorism … approaches ubiquitous
surveillance
 Risk-based surveillance
– A car bomb in a public place
– A sector of national infrastructure at risk
– WMD over a major city
 The Challenge: At some point when one person can create
extraordinary damage, cheaply, without a trace … then what?
66
Issue #5: Less Secrets Lead to Chilling Effects?
 It is becoming harder and harder to
have secrets
 Will this chill behavior?
– Will population behavior gravitate towards the
center of the bell curve?
– Or, will mankind become more tolerant of
diversity?
67
Privacy by Design (PbD)
Considerations
68
Universal Declaration of Human Rights
 Article 9
No one shall be subjected to arbitrary arrest, detention or exile.
 Article 12
No one shall be subjected to arbitrary interference with his privacy,
family, home or correspondence, nor to attacks upon his honor and
reputation. Everyone has the right to the protection of the law
against such interference or attacks.
 Article 15
(1) Everyone has the right to a nationality.
(2) No one shall be arbitrarily deprived of his nationality nor denied
the right to change his nationality.
 Article 17
(1) Everyone has the right to own property alone as well as in
association with others.
(2) No one shall be arbitrarily deprived of his property.
69
PbD: Information Attribution
 Avoid the receipt of any data that does not come with an
ability to track its pedigree/attribution.
 When passing your data into secondary systems, pass the data
pedigree/attribution along to the recipient (even if that means
only a pointer to your copy).
 If the ‘chain of where data came from’ is not maintained in the
information sharing ecosystem – there is no hope of keeping it
current and very difficult to reconcile cross-system
consistency.
More here:
Full Attribution, Don’t Leave Home Without It
Out-bound Record-level Accountability in Information Sharing Systems
70
PbD: Data Destruction
 When the data is no longer needed or there is a mandate …
purge it.
 For example, at the close of a special information analysis
project; consider decommissioning the data sets in proportion
to the consequences of unintended disclosure or misuse.
 If there is a legal requirement to retain data, or long term
accountability is necessary, consider pushing the data to forms
of retrieval useful only in the context of
forensic/investigatory purposes.
More here:
Decommissioning Data: Destruction of Accountability
71
PbD: Limit Data Transfers
 If you don’t have to move the entire record: don’t.
 Using information sharing systems as an example, it is best not
to send all the data to each (and every) information sharing
partner. Better to create a central index with prescribed
fields. The index then points to the original data holder – and
getting access to the original record requires permission at
that time, from the original data holder. This ensures a degree
of transparency.
More here:
Discoverability: The First Information Sharing Principle
72
PbD: Data Tethering
 When data is moved from systems of record out into
secondary systems, as the source data changes (adds, changes
and deletes) these secondary systems should be notified.
 If the secondary systems have themselves forwarded the data
to tertiary systems, these same changes should be passed
through the entire food chain.
More here:
Data Tethering: Managing the Echo
73
PbD: Obfuscate Data
 For every copy there is a increasing risk of unintended
disclosure.
 When there is an opportunity to perform data masking,
anonymization, encryption … do it.
 Techniques now exist whereby data can be first obfuscated
(e.g., encrypted, anonymized, masked, etc.) before information
transfer ... while still maintaining a capability of performing
deep analytics (e.g., data matching) post obfuscation.
More here:
To Anonymize or Not Anonymize, That is the Question
74
Maximizing Discovery - Minimizing Disclosure
Persistent
Context
!
FEATURES:
Cd5dced41028cb7ea51
00c9782a552a2d09b1b
7f2b6e48ea7d042bbe8
75
Observations
Cd5dced41028cb …
00c9782a552a2 …
7f2b6e48ea7d0 …
…
Record #A-701
Sensors
Employee
Database
0d06b31faa7c…
B5e341a4b0c…
00c9782a552…
…
Record #B-9103
Fraud
Database
Maximizing Discovery - Minimizing Disclosure
Observations
Mark Randy Smith
DOB: 06/07/74
123 Main Street
713 731 5577
Record #A-701
Sensors
Policy Controls
Discovery
Employee
Database
M. Randal Smith
DOB: 06/07/74
713 731 5577
Record #B-9103
76
Record #A-701
Matches
Record #B-9103
Policy Controls
Fraud
Database
PbD: Build Accountability into Systems
 Opt for the use of tamper-resistant audit logs. The greater
the lack of transparency, the greater the need for immutable
logs: mandated or not.
More here:
Immutable Audit Logs (IAL’s)
Found: An Immutable Audit Log
77
Comments on: Data Mining
 Data mining is not bad. There are setting where data mining is
very valuable and saves lives
 Predictive Data Mining – Limited efficacy without volumes of
training data
 Predicate Triage Data – Used to organize data sets containing
only “subjects of interest”
More here:
Effective Counter-Terrorism and the Limited Role of Predictive Data Mining
Data Mining, Predicate Triage and NSA Domestic Surveillance
78
Data Mining Defined
(humorous)
“Torturing the data until it confesses …
and if you torture it enough, you can
get it to confess to anything.”
ACM SIGKDD Conference, Philadelphia 2006
79
Comments on: Link Analysis
 Link analysis is very powerful, when used in a narrow fashion.
Inspection of “subjects of interest” outward.
 Predicate-based link analysis: Big social maps are not useful
unless one has an entrance point.
 Link analysis: prune early
More here:
Hunting Bad Guys, Phone Records and a Few Good Dead Men
Predicate-based Link Analysis: A Post 9/11 Analysis (1+1= 13)
Sometimes a Big Picture is Worth a 1,000 False Positives
80
Comments on: Watch Listing and False Positives
 Difference between wrongly named and wrongly matched
 Low fidelity watch lists are the single biggest cause of false
positives - solving this ambiguity involves additional data
 Minimize collection, maximize consumer participation and
election
 Provide a redress process
More here:
Precision in TSA’s Terrorist Watch List
Comments on the TSA No-Fly and Selectee Watch List Process
81
Closing Thoughts
82
”The data must find the
data … and the relevance
must find the user.”
83
In Closing
 There is going to be more sensors, more data
 This data will be commingled for greater accuracy to serve
consumers and protecting countries
 What data is collected/observed and when … will be the debate
 Chief privacy principle: Avoid consumer surprise
 If it has been collected, the holder has the obligation to make
sense of it
 Organizations must harness data to be smart, efficient, and
survive … but how smart do they need to be and do we trust
them?
 Hence the tension
84
Related Papers
Heritage Foundation: Paul Rosenzweig/Jeff Jonas
Correcting False Positives: Redress and the Watch List Conundrum
Cato Foundation: Jeff Jonas/Jim Harper
Effective Counterterrorism and the Limited Role of Predictive Data Mining
Steptoe & Johnson: Stewart Baker
Anonymization, Data-Matching and Privacy: A Case Study
IEEE Security and Privacy: Jeff Jonas
Threat and Fraud Intelligence: Las Vegas Style
Giannino Bassetti Foundation: Jeff Ubios
Transparency, Privacy and Responsibility: An Interview with Jeff Jonas
Markle Foundation
Nation At Risk: Policy Makers Need Better Information to Protect the Country
85
Related Blog Posts
Algorithms At Dead-End: Cannot Squeeze Knowledge Out Of A Pixel
Puzzling: How Observations Are Accumulated Into Context
When Risk Assessment is the Risk
Big Data. New Physics.
The Christmas Day Intelligence Failure – Part II: Jeff Jonas’ Christmas Wish List
Decommissioning Data: Destruction of Accountability
Source Attribution, Don’t Leave Home Without It
Data Tethering: Managing the Echo
Out-bound Record-level Accountability in Information Sharing Systems
To Anonymize or Not Anonymize, That is the Question
Immutable Audit Logs (IAL’s)
The Information Sharing Paradox
Discoverability: The First Information Sharing Principle
When Federated Search Bites
Using Transparency As A Mask
86
Macro Trends in
Counter-Terrorism Technologies
And Thoughts on Responsible Innovation
DETECTER Project, Brussels
September 7th, 2011
Jeff Jonas, IBM Distinguished Engineer
Chief Scientist, IBM Entity Analytics
[email protected]
87