Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
The Internet Technology Your Rights Online

NSF-Funded "Dark Web" to Battle Terrorists 258

BuzzSkyline writes "The National Science Foundation has announced a new University of Arizona project, which they call the Dark Web, intended to monitor all terrorist activity on the Internet. The project relies on 'advanced techniques such as Web spidering, link analysis, content analysis, authorship analysis, sentiment analysis and multimedia analysis [to] find, catalog and analyze extremist activities online.' The coolest part of the project is a tool called Writeprint, which 'automatically extracts thousands of multilingual, structural, and semantic features to determine who is creating "anonymous" content' with an accuracy of 95%, according to the release."
This discussion has been archived. No new comments can be posted.

NSF-Funded "Dark Web" to Battle Terrorists

Comments Filter:
  • by akad0nric0 ( 398141 ) on Wednesday September 12, 2007 @03:16PM (#20577461)
    ...is:

    Quis custodiet, ipsos custodes
    - Juvenal
  • Re:5% (Score:3, Interesting)

    by ajs ( 35943 ) <ajs@@@ajs...com> on Wednesday September 12, 2007 @03:23PM (#20577567) Homepage Journal

    The coolest part of the project is a tool called Writeprint, which 'automatically extracts thousands of multilingual, structural, and semantic features to determine who is creating "anonymous" content' with an accuracy of 95%, according to the release."

    So when they get it wrong, and the police storm my front door instead of my neighbors, will it still be "cool"?
    5% error rate is too high to base any first-order data on. My assumption would be that they'll use this information to determine what online content to spend their time working on. For example, if the modern equivalent of Echelon tells us that a terrorist in Iraq makes frequent calls to someone who makes frequent, high-signal calls to someone in the U.S. and that person is identified as the potential author of several anonymous postings to various forums, then you spend a whole lot of time analyzing those postings to determine what information they might be passing on.

    It's actually pretty obvious, and the only thing that surprises me is that it's being developed now. My only guess that makes sense, here, is that this is a replacement for older tech they're already using.
  • "NSF-Funded" (Score:2, Interesting)

    by Basilius ( 184226 ) on Wednesday September 12, 2007 @03:23PM (#20577585)
    For those of us (like myself) that work closely with the banking industry, the phrase "NSF-Funded" produces quite a bit of cognitive dissonance.
  • Re:F or A? (Score:5, Interesting)

    by ScentCone ( 795499 ) on Wednesday September 12, 2007 @03:28PM (#20577667)
    Can someone please figure out a way to weaponize a cure for cancer?

    You mean kind of like how there are now lots more skilled laser eye surgeons in the private sector competing to give you better prices for your business because once the military decided to back providing that service to its pilots, there was a giant leap in people being trained to do the work during their rotations?

    As far as cancer: the military provides all kinds of basic medical research from which we all benefit. You'll see considerable military spending in epidemialogical studies, trauma treatment, etc. To the extent that, say, The Marine Corp is a weapon, the huge studies that can be conducted on the systematically collected health stats, DNA, etc., on a huge number of generally healthy people over several generations IS a part of all sorts of cancer (and other) studies.
  • Re:5% (Score:1, Interesting)

    by Anonymous Coward on Wednesday September 12, 2007 @03:30PM (#20577695)
    It will be if you have the firepower to fight them off, kill them by the hundreds, and fight the resulting war against the government for some length of time before you are eradicated. And, the thousands of "innocent" civilians you kill? Fuggedaboudit: they chose to participate in this "democracy" and are therefore responsible for who they collectively elect. None of this denial of responsibility by hiding behind a secret ballot or losing candidate -- they support the system.

    Why can you do this? Because your constitutional rights are violated. And the only way to effectively defend them is if everyone else is on your side. And the only way to ensure that is to make them the enemy of they are not.

    Get it?

    State violates your constitutional rights? You have the right to kill any of it's citizens that do not take your side against the state in response.

    The "rub" here, of course, is that an independent court (remember when the branches of government were truely independent and this included the judiciary?) is the only legitimate determiner of whether you acted legally or illegally, so you better make sure before you start your private war.

    But, ultimately, only the people can uphold the constitution, and sometimes they might have to do so unwillingly to save their own skins: "Kill that cop or I kill you... NOW!" does not strike me as an unreasonable way of effecting this.

    Yes, this is an apalling scenario. But, governments use force all the time to butress questionable "law", and use questionable "law" to legitimize force. So, why does not the individual (a) make a point of responding in kind, (b) associate with other like minded folk? (Remember that bit about freedom of association?)

  • "Spying" (Score:3, Interesting)

    by mosb1000 ( 710161 ) <mosb1000@mac.com> on Wednesday September 12, 2007 @03:37PM (#20577813)
    Since all this information is readily available to anyone one with internet access, I don't think it's reasonable to call it spying. Seriously, if you post information on a message board where anyone in the whole entire fucking wold can read it, maybe you should expect that government officials and corporations can look at it a well!!!
  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Wednesday September 12, 2007 @03:41PM (#20577879)
    Every TCP/IP packet has a source address and a destination address.

    So all that the government would need would be the addresses of the web sites (no matter where they are located) and taps on the pipelines. You can either try to catch the stuff going OUT of your country or going INTO their country (if you can't just tap the line of that website).

    That will tell you who, in your country, is going there.

    As long as it isn't using encryption, you'll even get what is being read/posted.

    If it is using encryption, you still should have the location of the guy reading/posting. Or you can try cracking the encryption.

    Once you have the location of the guy, you get a warrant and put a keylogger on his box or whatever.

    There's no need for all of this crap about "darkweb". Google can already tell you what is posted on what websites. If these guys are smart enough to beat the basics, they're smart enough to know NOT to use the Internet for point-to-point communications.
  • RTFA People (Score:2, Interesting)

    by db32 ( 862117 ) on Wednesday September 12, 2007 @03:45PM (#20577965) Journal
    By analyzing these certain features, it can determine with more than 95 percent accuracy if the author has produced other content in the past. How fucking hard is that to read? Seriously? Every comment right now is on some bullshit tangent about hunting people down or other such nonsense, or how its impossible to figure out who it is without blah blah fucking blah. What it DOES say is that they can take a large ammount of anonymous information and tie it together to a single player. Not that it gives the identity of that player, but that it can link all the things that player has done. So they are still an anonymous player, they just have their anonymous works attributed to them as an anonymous individual. Learn to fucking read people before jumping to insane conclusions.

    The best thing this could do would be to tie a group of anonymous sources together as coming from one source and then hope and pray you can get enough matches between that pool from the single anonymous source to a single identified source. Let's not forget computers don't give a rats ass who they work for, so the door swings both ways on this one. It can be used to catch dissenters (bad for freedom), terrorists (good for safety), and government/media misinformation agents (good for freedom).
  • by sdaemon ( 25357 ) on Wednesday September 12, 2007 @04:01PM (#20578217)
    Sure you can crawl any information source and extrapolate anything you want out of it. I'd even be willing to believe the 95% accurate analysis, whatever. That's besides the point.

    You can only extrapolate data you've read properly. The simplest of encryption and/or obfuscation schemes applied to this content would effectively protect against extrapolation. Sure, Big Brother can have software scrub the Net looking for suspicious content. But can they have software scrub the Net while applying decryption measures to everything found? While analyzing every image file for obfuscated content (or even something as simple as writing your terrorist plans on a piece of paper and scanning it in as an image)? While applying rot13 to every block of text found?

    I would say no. The problem becomes computationally impossible at that point. There are theoretically infinite ways to hide, encrypt, or obfuscate data. To have a system check first for unhidden, unencrypted, un-obfuscated data, then also for each of those, is simply not doable unless one makes radical limitations to the format of the data itself.

    I would say instead that this "Dark Web" will be invaluable in identifying characteristics of perfectly law-abiding forum posters, slashdotters, and so forth, and that the data gleaned will fetch a good price from directed marketeers, pharmaceutical companies, spammers, government bureaucracies, and other servants of the Dark Lord.

  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Wednesday September 12, 2007 @04:13PM (#20578407)
    Back around 1776 there were a large number (about 20% of our population) of "Loyalists" who opposed our Independence.

    If you had polled England at the time, and those Loyalists, you'd understand that the "terrorists" had control of the "colonies".

    If England had won, every one of those "terrorists" who had signed their little "Declaration" would have been hanged. And their would have been rejoicing in the streets of the colonies.
  • Web Pages? (Score:2, Interesting)

    by stoicio ( 710327 ) on Wednesday September 12, 2007 @04:16PM (#20578445) Journal
    I doubt that any self respecting terrorist is going to
    expend resources making a web page that spiders can crawl.

    Here's a hint:

    Terrorist #1 sets up a WIFI home network with
    limited external access and **no connection** to the
    internet.

    Non of the terrorists really want to know each other
    since that would make them easier to find if one got caught.

    All the other terrorists require is a GPS location relatively
    close to the hot-spot. Not even the street address.

    They park, or slow down,the car at the GPS coordinates, get some instructions
    via WIFI ssh, and drive on.

    How's a web spider going to find that?

    The authorities would be better off looking for *extra powerful*
    WIFI hot-spots.

    Here's another hint:

    Facsimile over dual channel FRS radio. Same as above
    except the interchange is FAX.

    Go get em boys!!!
  • by icepick72 ( 834363 ) on Wednesday September 12, 2007 @04:17PM (#20578453)
    This Dark Web description sounds good, it even uses "semantic" technology but stop and think how little progress Google has made into the semantic web compared to what they want to do, contrasted with the talent they have hired. Considder the description of this NSF tool again. I predict there will be another /. posting in just over a year talking about how the project didn't quite work out as expected.
  • by Fantastic Lad ( 198284 ) on Wednesday September 12, 2007 @04:20PM (#20578503)
    They don't need expensive Dark Web nonsense.

    They just need to pull up their own employee roster to see who's largely responsible for world terrorism.

    Of course, the young recruits are probably still too busy puffing their chests smartly while humming the "Alias" theme music while quietly wishing that the NSA was the one which received the big Hollywood PR/propaganda effort to notice such sticky details as who was responsible for what. But what are a few sticky details? M's and W's all look the same.


    -FL

  • Re:5% +++++ (Score:2, Interesting)

    by davidsyes ( 765062 ) on Wednesday September 12, 2007 @05:26PM (#20579443) Homepage Journal
    SOME of the other 5% will come from (or, alternatively, maybe the FIRST 95% comes from) use of Visual Analytics:

    http://www.visualanalytics.com/ [visualanalytics.com]

    Hell, just see:

    http://www.google.com/search?q=visual+analytics&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a [google.com]

    The thing is, I wonder if that NY Times (I think it was NYT) reporter/columnist under bushwhack/assault for "divulging" sensitive collection techniques to the "ter'rists" knew of Visual Analytics and could have shielded himself from uncouth assault.

    I am SURE that universities and various stealthy government entities have comparable capabilities or enhanced code, and some probably even work WITH Visual Analytics. It's a POWERFUL and kinda neat tool. So long as it's not abused.
  • by ShieldW0lf ( 601553 ) on Wednesday September 12, 2007 @10:29PM (#20582511) Journal
    Terrorism is about creating fear in a population by attacking targets that have no military significance. When the IRA blows up a grocery store, that's terrorism.

    The US wasn't attacked by terrorists. They were attacked by a tight knit military group that went after their critical infrastructure. The world trade center, the center of their economy. The pentagon, center of their military. And the commander in chief.

    There have been no grocery stores blown up, no shopping malls, no attacks with Nuclear, Chemical or Biological agents, not even drive by shootings.

    So basically, any time you hear the word "Terrorist" used to describe attacks on the US, you're listening to spin and lies, because it's never happened.

After an instrument has been assembled, extra components will be found on the bench.

Working...