Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
Type 'S' for Suspicious: DARPA's far-out, high-tech plan to catch the next Edward Snowden
http://www.foreignpolicy.com/articles/2013/06/12/how_to_catch_a_leaker_high_tech_tools_darpa?page=0,0Government-funded trolls. Decoy documents. Software that identifies you by how you type. Those are just a few of the methods the Pentagon has pursued in order to find the next Edward Snowden before he leaks. The small problem, military-backed researchers tell Foreign Policy, is that every spot-the-leaker solution creates almost as many headaches as it's supposed to resolve.
With more than 1.4 million Americans holding top-secret clearance throughout a complex network of military, government, and private agencies, rooting out the next Snowden or Bradley Manning is a daunting task. But even before last week's National Security Agency (NSA) revelations, the government was funding research to see whether there are telltale signs in the mountains of data that can help detect internal threats in advance.
In the months following the WikiLeaks revelations, the Defense Advanced Research Projects Agency (DARPA) -- the U.S. military's far-out tech arm -- put out a number of requests for research on methods to detect suspicious behavior in large datasets as a way to root out rogue actors like Manning (or in more extreme cases, ones like Fort Hood shooter Nidal Malik Hasan.)
The most ambitious of these is known as Anomaly Detection at Multiple Scales (ADAMS), a program that as an October 2010 research request put it, is meant "to create, adapt and apply technology to the problem of anomaly characterization and detection in massive data sets." The hope is that ADAMS would develop computers that could analyze a large set of user-generated data -- the emails and data requests passing through an NSA office in Honolulu for instance -- and learn to detect abnormal behavior in the system.
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
2 replies, 1017 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (5)
ReplyReply to this post
2 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
Type 'S' for Suspicious: DARPA's far-out, high-tech plan to catch the next Edward Snowden (Original Post)
steve2470
Jun 2013
OP
Pholus
(4,062 posts)1. And here it comes -- learn to live like the statistical median, kids.
And you were wondering why that data collection was bad?
IT WILL GET USED FOR NEW THINGS!
orpupilofnature57
(15,472 posts)2. They care more about leaks than Real information about
guy's that want to learn to take off in commercial jets, with no concern for landing, orr the umpteen warnings about the ' Boston bomber ' . We need a " High Tech Plan " to make the multitudes of Agencies accoutable .