IT to Fight Terrorism
Will it work, or will it backfire?
Computerworld - David Holtzman says that since Sept. 11, 2001, the U.S. government has come to view IT as a key weapon in its war on terrorism. "The administration is currently at work planning a new information system -- one capable of anticipating terrorist acts using artificial intelligence, or 'data profiling' technologies," he says. Some elements of the system would be beneficial, but some go too far and wouldn't be effective in any case, Holtzman argues. Building the system would require these actions, he says:
1. Connecting government databases containing information from customs, immigration, law enforcement, military and tax files, state and local records, political contribution lists, and education and voting records. Building software that bridges government and commercial databases.
2. Linking government and commercial databases, using Social Security numbers. Eventually mandating that all commercial databases have a field for Social Security numbers.
3. Connecting the system to millions of real-time sensors for up-to-the-minute threat assessment. Sensors include chemical and radiation detectors and cameras in public places such as storefronts, highways and airports.
4. Requiring that everyone carry a national ID card, and tying it into a database of biometric information such as fingerprints, retinal scans, face measurements, blood type and DNA.
5. Tracking phone calls, e-mails and the like and generating diagrams of social groupings using "traffic analysis" tools. Predicting behavior based on social interactions and "networks" of individuals who communicate with one another within a group.
6. Building technology that will "guess" what people are thinking and what they might do, using rules-based analyses similar to those used by credit scoring systems.
7. Giving people a secret "threat score" or "loyalty rating" using technology similar to that used by credit card companies.
Holtzman talked with Computerworld about the role of IT in fighting terrorism:
Can IT make a difference in the war on terrorism? What IT is really good at is picking up an information trail for prosecution. Intelligence agencies were able to piece together a lot of the terrorists' comings and goings a day or two after 9/11 by using IT. But I can't imagine what could have been done through IT to stop 9/11.
Yet you say the government is planning a major deployment of IT in the war against terrorism. Is it on the right track? Deploying sensors? Absolutely - radiation detection, biological warfare detection. It seems reasonable that public places and public transportation hubs would be under surveillance. In a few years, solid-state cameras will cost $1 or so, GPS devices will be on a chip, and surveillance will be affordable by anyone. Collecting sensor data
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts