Against Data-Mining Uses

Download Report

Transcript Against Data-Mining Uses

Against Data-Mining Uses
Team 10
Ben Jabara
Jesse Lentz
Ben Heller
Background
 Uses data warehouses comprised of large
amounts of data to find trends
 Increased usage after terrorist attacks (Dept. of
Homeland Security)
 Data Mining Uses
–
–
–
–
–
improving service or performance
detecting fraud, waste, and abuse
analyzing scientific and research information
detecting criminal activities or patterns
analyzing intelligence and detecting terrorist activities
Sources of Data
 Directly from individuals
– Surveys
 Web Crawlers
– Indexing Services like search engines
 Government Agencies
– National Oceanic and Atmospheric Administration
 Private Sector Sources
– Credit Card Companies
– Banks and other Financial Institutions
GAO Study of Data Mining
 Government agencies required to provide notice to
individual respondents explaining why the information is
being collected
– Only 2 of 5 agencies in GAO study provided this notice
– Agency compliance with key security requirements was
inconsistent
 122 of 199 data mining efforts used personal information
–
–
–
–
student loan application data
bank account numbers
credit card information
taxpayer identification numbers
 Results: “Until agencies fully comply with these
requirements, they lack assurance that individual privacy
rights are being appropriately protected”
Inherent Data Mining Issues
 Can reveal patterns and relationships but
doesn’t tell the value or significance of these
patterns
 Can identify connections between behaviors
and/or variables
 DOES NOT necessarily identify a causal
relationship
– Leads to false positives and incorrect
conclusions
Data Mining Ineffectiveness
The New York Times confirmed that point, with its report that
the NSA has sent the FBI a "flood" of tips generated by
mass domestic eavesdropping and data mining, virtually all
of which led to dead ends that wasted the FBI's resources.
"We'd chase a number, find it's a schoolteacher with no
indication they've ever been involved in international
terrorism," one former FBI agent told the Times. "After you
get a thousand numbers and not one is turning up
anything, you get some frustration.”
ACLU.org - Eavesdropping 101: What Can The NSA Do?
Data Mining Ineffectiveness
1) Detect: Terrorists Enjoy Driving El Caminos
2) Classify: El Camino lovers classifies person as potential
terrorist
3) ID: John Bagby internet queries reveals El Camino
interests
4) Track: Bagby tracked searching for El Camino availability
at www.autotrader.com
5) Understand: Bagby works for a university that does
research for sensitive government projects
6) Preempt: Bagby’s door kicked down by government
agents
Privacy Violations
 Pentagon’s Total Information Awareness
System
– Violation of 4th Amendment rights because
warrants needed to search a particular place as
opposed to blanket searches
– Right of people to be secure…in their papers
 Data mining and warehousing efforts hastily
implemented after 9/11
– Few privacy considerations
Further Problems
 Compromise of personal data by hackers or
data misuse
– Many data warehousing efforts performed by
private businesses