Homeland Security 2.0, Terrorist Networks Analyzed
from the chair-of-the-math dept
Just in case the web 2.0 set ever gets bored of applying their understanding of network effects to things like MySpace clones and tagging sites, their services could be employed by the government for some weightier issues. Some believe that network theory could be a potent tool in thwarting terrorism. However, some of the early attempts sound less than stellar. One network expert drew a map showing that all of the 9/11 hijackers were strongly connected to ringleader Mohammad Atta (duh!). Other charts produced were over 20 feet long, packed with so much information, that they were useless. The problems with this technique are similar those of data mining, namely that there's so much information, and so many red flags, that security forces can't respond efficiently. Still, as long as security officials take their cues from the TV show Numb3rs, quantitative techniques to fighting terrorism will persist.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
And what have we gained?
[ link to this | view in chronology ]
Muhahahaha!
- Now you only get about seven links to this artical before your officialy a hub point, so dont be posting in any blogs that link to this post! And dont say "praise Allah" and Mohammad Atta, in the same sentence.
Now you have to realise that (according to the artical) the N.S.A. intercepts around 650 million communications worldwide every day, and we all know GB is listening, so combine that with a bunch of geeks at the CIA trying to magicaly generate a 3d web of links that will predict the rapture and/or the next terror atack (of course involving Mohammad Atta), it seems likely that in the future, this artical should be able to get you arested or at least your phone tapped...
[ link to this | view in chronology ]
Read "Blink"
[ link to this | view in chronology ]
Look amongst the Republicans
But any sensible Islamacist terrorist will know this. So he will be clean-shaven and neatly dressed - no beard or turban - and will deliberately avoid the company of extremists. If questioned about politics, he may support George Bush.
For example: "The photograph of the brother in these documents should be without a beard. It is preferable that the brother's public photograph [on these documents] be also without a beard. If he already has one [document] showing a photograph with a beard, he should replace it." - Al Queda Manual
Data mining would show such terrorists as linked to Republicans rather than Al Queda.
[ link to this | view in chronology ]
Trip over "intelegance"
[ link to this | view in chronology ]
I HIGHLY DOUBT THAT.
[ link to this | view in chronology ]
I Highly doubt that also
[ link to this | view in chronology ]