SlideShare ist ein Scribd-Unternehmen logo
1 von 7
BIG DATA ANALYSIS AND TERRORISM 1
BIG DATA ANALYSIS AND TERRORISM
Amanda Laura Fanshawe Tapp
Wicked Problems: Society, Culture and Economy
Professor Leenknegt
December 09, 2015
BIG DATA ANALYSIS AND TERRORISM 2
Topic: To what extent is it acceptable from an ethical point of view for governments to
use big data analysis in order to identify possible terrorist threats? Which factors
determine this?
“Is it alright to cast one Christian to the lions, if it will provide considerable pleasure
to many Romans?” (Etzioni 1991, 587)
In today’s society, knowledge is power. In the “network society” we are in now, in which
key social structures and activities are organized around electronically processed
information networks, big data analysis could essentially control everything (Castelles
2005, 218). Since 9/11, there has been a change. The fear of terrorism has changed
society: we are now in an era of information feudalism, where there is an increasing
concentration of ownership of information. When information and knowledge is power, it
is important to look at the ethical aspect of big data analysis and how far it should go in
terms of its use in countering terrorist attacks by governments and other organizations.
Big data analysis, as all things, may be used to cause human suffering but also to prevent
human suffering. Factors including manipulation, biased analysis, and incorrect data
causing dire consequences and fraud, all help determine to what extent it is ethical for
governments to use big data analysis to counter terrorism. More attention needs to be
given to risk-management in order for big data analysis to continue protecting people
from terror, and also helping increase research for disease and other humanitarian goals.
According to Bathla and Midha, big data analysis may be defined as such: “The
collection of large and complex data sets that are difficult to process using conventional
data processing tools [
] coming from social networking sites, scientific experiments,
mobile conversations, sensor networks and various other sources” (Bathla and Midha
2015, 1). Big data analysis has been used in multiple ways for the greater good of society
in terms of helping with terrorist attacks. By “greater good” I mean by helping protect the
citizens, and maintain peace for the overall population. One example of this is the
Facebook Safety Check feature. It was activated by using large amounts of data about its
users for a humanitarian goal and was able to identify people close to accidents of
terrorism or natural disasters (Astel 2015, 4). It was able to “reduce the burden of
communications by offering a fast and simple way to reassure large numbers of people at
the same time” (Astel 2015, 9).
Big Data Analysis and the Fight Against Terrorism
Big data analysis helps fight the war against terrorism in multiple ways, as it is
using the terrorist’s own weapon against them, thus promoting peace and in other words,
being used ethically. For example, big data and data analytics are used widely by Israeli
military and intelligence agencies to track down enemies of the Israeli State (Engelen
2015, 1). Former head of the Israeli Security Agency’s IT unit Ronen Horowitz agrees,
saying that the “flood of unstructured data in the form of video, images, text and
speeches” had been “utilized to the Israeli military to track down and kill enemies”
(Engelen 2015, 2). He also said: “quite a few dead terrorists are looking at us from the
sky owing to Big Data capabilities” (Engelen 2015, 4). The police force now analyze
BIG DATA ANALYSIS AND TERRORISM 3
Twitter and text messages as part of their activities, which is called predictive policing.
This has been proven to decrease incidences of terrorism but only if we can “minimize
the risk of misuse and undesired side effects” (Engelen 2015, 4). This shows how big
data analysis can be used towards terrorism by governments in an ethical sense.
By “ethical” I refer to a definition many government-run programs, including the
National Science Foundation and the NIH Ethics Program, use. Many government
organisations have a similar set of principles of codes and policies for research that they
follow. Professor Resnik in the US department of Health and Human Services listed them
as such: Honesty, Objectivity, Carefulness, Openness (sharing data), Responsible
mentoring and publication, and Human Subjects Protection (Resnik 2011, 2). Factors
such as saving lives, deterrence of terrorism and fear, damages of the economy as well as
invasion of privacy, betrayal of trust, manipulation of data, fraud, and the possible
illegality of the act of collecting the data itself each affect the ethical extent to which big
data analysis helps in countering terrorism.
Unethical Uses of Big Data Analysis in Relation to Terrorism
On the contrary, big data analysis may easily be used unethically unintentionally or
intentionally. It could also be seen as an infiltration into personal privacy and can be
easily manipulated (Tene and Polonetsky 2013, 270). “Like any other type of research,
data analytics can cross the threshold of unethical behaviour” in the “surveillance
society” we are in today where no one is exempt from scrutiny (Tene and Polonetsky
2013, 256). As Watchdog’s Big Brother UK Warning put it, we are in a “psychologically
oppressive world in which individuals are cowed to conforming behavior by the state’s
potential panoptic gaze” (BBC 2004). Raw data might not be equal to sensitive data, just
as “inaccurate, manipulative or discriminatory conclusions” may be drawn from
“perfectly innocuous, accurate data” (Tene and Polonetsky 2013, 270). For example,
these are merely possible terrorist attacks, thus the government might be incurring the
possibility of multiple costs with the probability of it being a false alarm. Big data
analysis is an interpretive process, and it is also subject to error, as the observer may also
affect the results in multiple ways. The analytics’ bias and perspective creates bias and
may affect results. Perhaps if there is more data given to finding data percentages to the
times big data analysis had a success rate and managed to stop potential terrorist attacks
in comparison to false terrorist attacks, and then focusing on improving these statistics,
this could also be another factor that determines to what extent it is ethical for
governments to use big data analysis to identify possible terrorist threats. Ultimately the
goal to use big data analysis in the most ethical way is to put more efforts into increasing
the effectiveness of big data analysis while minimizing the costs of the process.
Due to the variety of possible consequences big data analysis may lead to, more
attention needs to be given to the prevention of these costs. Tene and Polonetsky outline
the moral argument for the costs of big data analysis. They argue that the fundamental
question is: Who has the right to access big data sets, for what purposes, in what contexts,
and with what constraints (Tene and Polonetsky 2013, 272). Without answering these
questions properly, there will be and already are irreversible consequences. As all things,
there are benefits and costs to big data analysis. We mustn’t just weigh them in
comparison to each other, but look at where the line could be drawn. After all, what if it
BIG DATA ANALYSIS AND TERRORISM 4
becomes two Christians cast to the lion for the pleasure of many Romans, or three
Christians, or more? At what point is it not OK? Who decides? And what if it was for the
safety of the Romans (not just for their pleasure), as it is today- for the security of the
people from the threat of the Islamic State?
The Line Between Ethical and Unethical
Without big data analysis, organizations such as Anonymous would not be able to
fight against ISIS and the Islamic State. The hacktivist group declared war on ISIS and
uses big data analysis to counter terrorism. Their biggest operation is currently OpISIS,
which began after the Charlie Hebdo attacks. Within seventy-two hours after the Paris
attacks, it was reported they took down thousands of ISIS-related Twitter accounts
(Muller 2015, 1). According to their Facebook page We Are Anonymous, “In the age of
information, ignorance is a choice.” They also tweeted that they took down 5,500 Twitter
accounts of #ISIS on the 17th of November. Destroying the terrorists main form of
communication which they also use to convince more people to join is a clear example of
big data analysis being used for the good of humanity: to protect people from terror. If
governments were to use big data analysis in the same way to identify possible terrorist
threats by also looking at twitter accounts and so on, it would be using big data analysis
in an ethical way no matter to what extent. However, once they go further- once they
begin infiltrating other parts of people’s personal lives beyond to counter terrorism or
they manipulate or create bias information (unintentionally or not), this is when it is no
longer acceptable, from an ethical point of view, to use big data analysis to identify
possible terrorist threats.
Minimizing Consequences of Big Data Analysis
Despite the possible consequences of big data analysis, it is undeniable that “every
society needs information” (Rahman and Ramos 2013, 114). Governments using big data
analysis to protect its citizens is a means to protect the public, not individuals.
Researchers are committed to finding information for social desires, for society’s
interests, but we must not ignore its misuses. As we are in an information era and society
is reliant on big data analysis, we must focus only on how to minimize the costs it can
cause. Costs include denying access to smaller/less wealthy users, selling data to other
companies and adopting vague privacy agreements (Rahman and Ramos 2013, 114). As
long as there is more attention given to minimizing the misuses of big data analysis, it is
ethical to use big data analysis to counter terrorism. The general lack of transparency
towards supervisory authorities prevents individuals from exercising control over their
data (Cuijpers 2015). Facebook states that it is “free and always will be”. This is false, as
individuals pay with personal information unknowingly which Facebook then sells
(Smith 2013, 2). The General rule in the DDPA is that “data may only be processed fair
and lawful” (Cuijpers 2015). Here we must question when is it “fair” and when is it
“lawful”? Who decides? These questions must be asked and given more attention to
when dealing with the ethical dilemma of big data analysis in terms of countering
terrorism. Big data analysis used to counter terrorism is used for humanitarian purposes
including protecting the people, but there could be more efforts put into risk-management
BIG DATA ANALYSIS AND TERRORISM 5
to minimize consequences. For example, data subjects must be properly informed, big
data analysis could be infiltrated into the education system for the general population to
have more of an understanding of it, more monitoring of companies holding information,
and there could be more analytics to help prevent biases.
The Philosophical Debate of Big Data Analysis
From a communitarianism perspective, it is a battle between the virtues of man
versus the virtues of a citizen. Kantian ethics states, “act on the maxim that you wish to
have become a universal law” (CSUS 4). Using big data analysis to counter terrorism is
not acceptable, ethically speaking, if there is no attention given to who is affected on a
global scale, to whom the information is being distributed to, and if there are no efforts
being made to minimize costs, such as looking at who is responsible if the analysis is
incorrect, etc. Ethical Relativism states as such: “no fixed principles universally apply to
any situation that may arise” (Pistilli and Willis 2013, 14). Similarly, there is no single
“right” answer for what extent it is acceptable to use big data analysis to counter
terrorism, or the debate between transparency and privacy, but by putting in all efforts to
minimize the costs, this is perhaps most ethical thing to do for society as a whole.
“Without big data, you are blind and deaf in the middle of a freeway” (Moore
2012). Big data analysis allows us to make sense out of this brave new digital world. It
allows us to provide security and to prepare for terrorist attacks; it allows us to use the
Islamic State’s own weapon against them. However, it can easily be unethically used:
manipulation, fraud, being used by corporations for un-humanitarian purposes (e.g.:
ISIS), biased analysis, and a general lack of knowledge by the public about the amount of
surveillance they are under. With more attention given to the prevention of these
consequences and costs and to acknowledging big data analysis itself in education
systems more, this will allow big data analysis to be used at its best and most ethical
possible manner. We are in an age of technology but also in an age of terror, and big data
analysis benefits us greatly, so long as we are able to harness its powers correctly and in
the most ethical way possible.
BIG DATA ANALYSIS AND TERRORISM 6
Bibliography
Astel, Omri. “Terrorist Attacks Reveal the Humanitarian Value of Big Data,” Astelo
(2015). Accessed November 28, 2015, http://astelo.com/contentolgy/Terrorist-Attacks-
Reveal-The-Humanitarian-Value-Of-Big-Data-.
Bathla, Rajender and Nishi Midha. “Big Data Analytics with Map Reduce and Hadoop,”
International Journal of Advanced Research in Computer Science and Software
Engineering, Vol. 5, Issue 9, (2015).
Castelles, Manuel. The Network Society: From Knowledge to Policy. Washington: Center
for Translantic Relations, 2005.
Chivers, Tom. “Wikileaks’ 10 Greatest Stories,” The Telegraph (2010). Accessed
November 28, 2015.
http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/8070253/Wikileaks-10-
greatest-stories.html
Cuijpers, Colette. “Wicked Problems: Data, Privacy, Ethics”. Wicked Problems: Society,
Culture and Economy, 800157, Tilburg University, October 13, 2015.
“Edward Snowden: Leaks that Exposed US Spy Programme.” BBC News (2014).
Accessed November 26, 2015. http://www.bbc.com/news/world-us-canada-23123964
Etzioni, Amitai. “Ethics, Development and the Need for a New Paradigm,” Journal of
Regional Policy, No. 3-4/91. Vol. 11: 587-599. Accessed November 27, 2015.
Hill, Kashmir. “How Target Figured Out A Teen Girl Was Pregnant Before Her Father
Did.” Forbes (2012). Accessed November 27, 2015.
http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-
was-pregnant-before-her-father-did/
“Kantian Ethics.” California State University, Sacramento. Accessed November 29,
2015.
Knowledgent Cares. “Applying Big Data to One of the Worlds Biggest Problems:
Alzheimer’s Disease.” Knowledgent Cares firm website. Accessed November 27, 2015.
http://knowledgent.com/whitepaper/applying-big-data-to-one-of-the-worlds-biggest-
problems-alzheimers-disease/
Moore, Geoffrey. “Importance of Big Data.” Hadoop Summit, 2012.
Muller, Sasha. “What is Anonymous? Inside the Group Plotting to Attack Islamic
BIG DATA ANALYSIS AND TERRORISM 7
State/ISIS.” A Fresh Take on Technology (2015). Accessed November 30, 2015.
http://www.alphr.com/security/1000275/what-is-anonymous-inside-the-group-plotting-
to-attack-islamic-stateisis
Oxford English Dictionary. 2nd ed. 20 vols. Oxford: Oxford University Press, 1989.
Pistilli, Matthew and James Willis. “Ethics, Big Data, and Analytics: A Model for
Application.” Educause Review (2013). Accessed November 29, 2015.
Rahman, Hakikur and Isabel Ramos. “Ethical Data Mining Applications for Socio-
Economic Development.” IGI Global Book Series Advances in Data Mining and
Database Management (2013).
Resnik, David. “What is Ethics in Research & Why is it Important?” National Institute of
Environmental Health Sciences (2011).
Scahill, Jeremy. “The Assassination Complex.” The Drone Papers: The Intercept (2015).
Accessed November 28, 2015. https://theintercept.com/drone-papers/the-assassination-
complex/
Smith, Oliver. “Facebook Terms and Conditions: Why You Don’t Own Your Online
Life.” The Telegraph (2013). Accessed December 7, 2015.
http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-and-
conditions-why-you-dont-own-your-online-life.html
Tene, Omer and Jules Polonetsky. “Big Data For All: Privacy and User Control in the
Age of Analytics,” Northwestern Journal of Technology and Intellectual Property Vol. II
Issue 5 (2013). Accessed November 29, 2015.
Vedder, Anton. “Wicked Problems: Data, Privacy, Ethics”. Wicked Problems: Society,
Culture and Economy, 800157, Tilburg University, November 3, 2015.

Weitere Àhnliche Inhalte

Was ist angesagt?

Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusioncsandit
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGCATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGijaia
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosureSara-Jayne Terp
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Philosophy of Big Data
Philosophy of Big DataPhilosophy of Big Data
Philosophy of Big DataMelanie Swan
 
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiBig Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiData Driven Innovation
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 
Amplification and Personalization: The impact of metrics, analytics, and algo...
Amplification and Personalization: The impact of metrics, analytics, and algo...Amplification and Personalization: The impact of metrics, analytics, and algo...
Amplification and Personalization: The impact of metrics, analytics, and algo...Nicole Blanchett
 
2053951715611145
20539517156111452053951715611145
2053951715611145Firas Husseini
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaCOMRADES project
 
Basic information concepts of management of Information System
Basic information concepts of management of Information SystemBasic information concepts of management of Information System
Basic information concepts of management of Information Systemtenzin choeying
 

Was ist angesagt? (14)

Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGCATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
SMP textfile
SMP textfileSMP textfile
SMP textfile
 
Philosophy of Big Data
Philosophy of Big DataPhilosophy of Big Data
Philosophy of Big Data
 
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro SistiBig Data, Psychografics and Social Media Advertising - Alessandro Sisti
Big Data, Psychografics and Social Media Advertising - Alessandro Sisti
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Amplification and Personalization: The impact of metrics, analytics, and algo...
Amplification and Personalization: The impact of metrics, analytics, and algo...Amplification and Personalization: The impact of metrics, analytics, and algo...
Amplification and Personalization: The impact of metrics, analytics, and algo...
 
2053951715611145
20539517156111452053951715611145
2053951715611145
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
Basic information concepts of management of Information System
Basic information concepts of management of Information SystemBasic information concepts of management of Information System
Basic information concepts of management of Information System
 

Andere mochten auch

12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secureKirsten Fiedler
 
Smart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, PeopleSmart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, PeopleJin-Hyeok Yang
 
Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015Dublinked .
 
BIG IoT Project Overview
BIG IoT Project OverviewBIG IoT Project Overview
BIG IoT Project OverviewBIG IoT Project
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...mfrancis
 
PNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data AnalyticsPNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data AnalyticsJohn Evans
 
Choosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloudChoosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloudJames Serra
 
Terrorism In Pakistan
Terrorism In PakistanTerrorism In Pakistan
Terrorism In PakistanUsama Malik
 
Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)James Serra
 
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...SocialCops
 

Andere mochten auch (13)

12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
 
Smart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, PeopleSmart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, People
 
Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015
 
Take On Terror
Take On TerrorTake On Terror
Take On Terror
 
BIG IoT Project Overview
BIG IoT Project OverviewBIG IoT Project Overview
BIG IoT Project Overview
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
 
PNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data AnalyticsPNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data Analytics
 
RUN Digital Cluster 2017
RUN Digital Cluster 2017RUN Digital Cluster 2017
RUN Digital Cluster 2017
 
Choosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloudChoosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloud
 
Terrorism In Pakistan
Terrorism In PakistanTerrorism In Pakistan
Terrorism In Pakistan
 
Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)
 
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
 

Ähnlich wie Big Data Analysis and Terrorism

Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceDotmappers1
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceHop Trieu Sung
 
Epistemic Intelligence Communities. Counterintelligence
Epistemic Intelligence Communities. CounterintelligenceEpistemic Intelligence Communities. Counterintelligence
Epistemic Intelligence Communities. CounterintelligenceNicolae Sfetcu
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docxRunning head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docxtodd271
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracySamos2019Summit
 
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingAssessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingHannah Baker
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive PolicingSherry Bailey
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
 
The ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docxThe ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docxtodd801
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementPatty Buckley
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae BrandtzĂŠg
 
Outline D
Outline DOutline D
Outline Dbutest
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_defAlessandro Mantelero
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015CSI Piemonte
 

Ähnlich wie Big Data Analysis and Terrorism (20)

Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
 
Epistemic Intelligence Communities. Counterintelligence
Epistemic Intelligence Communities. CounterintelligenceEpistemic Intelligence Communities. Counterintelligence
Epistemic Intelligence Communities. Counterintelligence
 
Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docxRunning head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracy
 
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingAssessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
 
The ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docxThe ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docx
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 
Outline D
Outline DOutline D
Outline D
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015Rasetti fondazioneisi 29_06_2015
Rasetti fondazioneisi 29_06_2015
 

Big Data Analysis and Terrorism

  • 1. BIG DATA ANALYSIS AND TERRORISM 1 BIG DATA ANALYSIS AND TERRORISM Amanda Laura Fanshawe Tapp Wicked Problems: Society, Culture and Economy Professor Leenknegt December 09, 2015
  • 2. BIG DATA ANALYSIS AND TERRORISM 2 Topic: To what extent is it acceptable from an ethical point of view for governments to use big data analysis in order to identify possible terrorist threats? Which factors determine this? “Is it alright to cast one Christian to the lions, if it will provide considerable pleasure to many Romans?” (Etzioni 1991, 587) In today’s society, knowledge is power. In the “network society” we are in now, in which key social structures and activities are organized around electronically processed information networks, big data analysis could essentially control everything (Castelles 2005, 218). Since 9/11, there has been a change. The fear of terrorism has changed society: we are now in an era of information feudalism, where there is an increasing concentration of ownership of information. When information and knowledge is power, it is important to look at the ethical aspect of big data analysis and how far it should go in terms of its use in countering terrorist attacks by governments and other organizations. Big data analysis, as all things, may be used to cause human suffering but also to prevent human suffering. Factors including manipulation, biased analysis, and incorrect data causing dire consequences and fraud, all help determine to what extent it is ethical for governments to use big data analysis to counter terrorism. More attention needs to be given to risk-management in order for big data analysis to continue protecting people from terror, and also helping increase research for disease and other humanitarian goals. According to Bathla and Midha, big data analysis may be defined as such: “The collection of large and complex data sets that are difficult to process using conventional data processing tools [
] coming from social networking sites, scientific experiments, mobile conversations, sensor networks and various other sources” (Bathla and Midha 2015, 1). Big data analysis has been used in multiple ways for the greater good of society in terms of helping with terrorist attacks. By “greater good” I mean by helping protect the citizens, and maintain peace for the overall population. One example of this is the Facebook Safety Check feature. It was activated by using large amounts of data about its users for a humanitarian goal and was able to identify people close to accidents of terrorism or natural disasters (Astel 2015, 4). It was able to “reduce the burden of communications by offering a fast and simple way to reassure large numbers of people at the same time” (Astel 2015, 9). Big Data Analysis and the Fight Against Terrorism Big data analysis helps fight the war against terrorism in multiple ways, as it is using the terrorist’s own weapon against them, thus promoting peace and in other words, being used ethically. For example, big data and data analytics are used widely by Israeli military and intelligence agencies to track down enemies of the Israeli State (Engelen 2015, 1). Former head of the Israeli Security Agency’s IT unit Ronen Horowitz agrees, saying that the “flood of unstructured data in the form of video, images, text and speeches” had been “utilized to the Israeli military to track down and kill enemies” (Engelen 2015, 2). He also said: “quite a few dead terrorists are looking at us from the sky owing to Big Data capabilities” (Engelen 2015, 4). The police force now analyze
  • 3. BIG DATA ANALYSIS AND TERRORISM 3 Twitter and text messages as part of their activities, which is called predictive policing. This has been proven to decrease incidences of terrorism but only if we can “minimize the risk of misuse and undesired side effects” (Engelen 2015, 4). This shows how big data analysis can be used towards terrorism by governments in an ethical sense. By “ethical” I refer to a definition many government-run programs, including the National Science Foundation and the NIH Ethics Program, use. Many government organisations have a similar set of principles of codes and policies for research that they follow. Professor Resnik in the US department of Health and Human Services listed them as such: Honesty, Objectivity, Carefulness, Openness (sharing data), Responsible mentoring and publication, and Human Subjects Protection (Resnik 2011, 2). Factors such as saving lives, deterrence of terrorism and fear, damages of the economy as well as invasion of privacy, betrayal of trust, manipulation of data, fraud, and the possible illegality of the act of collecting the data itself each affect the ethical extent to which big data analysis helps in countering terrorism. Unethical Uses of Big Data Analysis in Relation to Terrorism On the contrary, big data analysis may easily be used unethically unintentionally or intentionally. It could also be seen as an infiltration into personal privacy and can be easily manipulated (Tene and Polonetsky 2013, 270). “Like any other type of research, data analytics can cross the threshold of unethical behaviour” in the “surveillance society” we are in today where no one is exempt from scrutiny (Tene and Polonetsky 2013, 256). As Watchdog’s Big Brother UK Warning put it, we are in a “psychologically oppressive world in which individuals are cowed to conforming behavior by the state’s potential panoptic gaze” (BBC 2004). Raw data might not be equal to sensitive data, just as “inaccurate, manipulative or discriminatory conclusions” may be drawn from “perfectly innocuous, accurate data” (Tene and Polonetsky 2013, 270). For example, these are merely possible terrorist attacks, thus the government might be incurring the possibility of multiple costs with the probability of it being a false alarm. Big data analysis is an interpretive process, and it is also subject to error, as the observer may also affect the results in multiple ways. The analytics’ bias and perspective creates bias and may affect results. Perhaps if there is more data given to finding data percentages to the times big data analysis had a success rate and managed to stop potential terrorist attacks in comparison to false terrorist attacks, and then focusing on improving these statistics, this could also be another factor that determines to what extent it is ethical for governments to use big data analysis to identify possible terrorist threats. Ultimately the goal to use big data analysis in the most ethical way is to put more efforts into increasing the effectiveness of big data analysis while minimizing the costs of the process. Due to the variety of possible consequences big data analysis may lead to, more attention needs to be given to the prevention of these costs. Tene and Polonetsky outline the moral argument for the costs of big data analysis. They argue that the fundamental question is: Who has the right to access big data sets, for what purposes, in what contexts, and with what constraints (Tene and Polonetsky 2013, 272). Without answering these questions properly, there will be and already are irreversible consequences. As all things, there are benefits and costs to big data analysis. We mustn’t just weigh them in comparison to each other, but look at where the line could be drawn. After all, what if it
  • 4. BIG DATA ANALYSIS AND TERRORISM 4 becomes two Christians cast to the lion for the pleasure of many Romans, or three Christians, or more? At what point is it not OK? Who decides? And what if it was for the safety of the Romans (not just for their pleasure), as it is today- for the security of the people from the threat of the Islamic State? The Line Between Ethical and Unethical Without big data analysis, organizations such as Anonymous would not be able to fight against ISIS and the Islamic State. The hacktivist group declared war on ISIS and uses big data analysis to counter terrorism. Their biggest operation is currently OpISIS, which began after the Charlie Hebdo attacks. Within seventy-two hours after the Paris attacks, it was reported they took down thousands of ISIS-related Twitter accounts (Muller 2015, 1). According to their Facebook page We Are Anonymous, “In the age of information, ignorance is a choice.” They also tweeted that they took down 5,500 Twitter accounts of #ISIS on the 17th of November. Destroying the terrorists main form of communication which they also use to convince more people to join is a clear example of big data analysis being used for the good of humanity: to protect people from terror. If governments were to use big data analysis in the same way to identify possible terrorist threats by also looking at twitter accounts and so on, it would be using big data analysis in an ethical way no matter to what extent. However, once they go further- once they begin infiltrating other parts of people’s personal lives beyond to counter terrorism or they manipulate or create bias information (unintentionally or not), this is when it is no longer acceptable, from an ethical point of view, to use big data analysis to identify possible terrorist threats. Minimizing Consequences of Big Data Analysis Despite the possible consequences of big data analysis, it is undeniable that “every society needs information” (Rahman and Ramos 2013, 114). Governments using big data analysis to protect its citizens is a means to protect the public, not individuals. Researchers are committed to finding information for social desires, for society’s interests, but we must not ignore its misuses. As we are in an information era and society is reliant on big data analysis, we must focus only on how to minimize the costs it can cause. Costs include denying access to smaller/less wealthy users, selling data to other companies and adopting vague privacy agreements (Rahman and Ramos 2013, 114). As long as there is more attention given to minimizing the misuses of big data analysis, it is ethical to use big data analysis to counter terrorism. The general lack of transparency towards supervisory authorities prevents individuals from exercising control over their data (Cuijpers 2015). Facebook states that it is “free and always will be”. This is false, as individuals pay with personal information unknowingly which Facebook then sells (Smith 2013, 2). The General rule in the DDPA is that “data may only be processed fair and lawful” (Cuijpers 2015). Here we must question when is it “fair” and when is it “lawful”? Who decides? These questions must be asked and given more attention to when dealing with the ethical dilemma of big data analysis in terms of countering terrorism. Big data analysis used to counter terrorism is used for humanitarian purposes including protecting the people, but there could be more efforts put into risk-management
  • 5. BIG DATA ANALYSIS AND TERRORISM 5 to minimize consequences. For example, data subjects must be properly informed, big data analysis could be infiltrated into the education system for the general population to have more of an understanding of it, more monitoring of companies holding information, and there could be more analytics to help prevent biases. The Philosophical Debate of Big Data Analysis From a communitarianism perspective, it is a battle between the virtues of man versus the virtues of a citizen. Kantian ethics states, “act on the maxim that you wish to have become a universal law” (CSUS 4). Using big data analysis to counter terrorism is not acceptable, ethically speaking, if there is no attention given to who is affected on a global scale, to whom the information is being distributed to, and if there are no efforts being made to minimize costs, such as looking at who is responsible if the analysis is incorrect, etc. Ethical Relativism states as such: “no fixed principles universally apply to any situation that may arise” (Pistilli and Willis 2013, 14). Similarly, there is no single “right” answer for what extent it is acceptable to use big data analysis to counter terrorism, or the debate between transparency and privacy, but by putting in all efforts to minimize the costs, this is perhaps most ethical thing to do for society as a whole. “Without big data, you are blind and deaf in the middle of a freeway” (Moore 2012). Big data analysis allows us to make sense out of this brave new digital world. It allows us to provide security and to prepare for terrorist attacks; it allows us to use the Islamic State’s own weapon against them. However, it can easily be unethically used: manipulation, fraud, being used by corporations for un-humanitarian purposes (e.g.: ISIS), biased analysis, and a general lack of knowledge by the public about the amount of surveillance they are under. With more attention given to the prevention of these consequences and costs and to acknowledging big data analysis itself in education systems more, this will allow big data analysis to be used at its best and most ethical possible manner. We are in an age of technology but also in an age of terror, and big data analysis benefits us greatly, so long as we are able to harness its powers correctly and in the most ethical way possible.
  • 6. BIG DATA ANALYSIS AND TERRORISM 6 Bibliography Astel, Omri. “Terrorist Attacks Reveal the Humanitarian Value of Big Data,” Astelo (2015). Accessed November 28, 2015, http://astelo.com/contentolgy/Terrorist-Attacks- Reveal-The-Humanitarian-Value-Of-Big-Data-. Bathla, Rajender and Nishi Midha. “Big Data Analytics with Map Reduce and Hadoop,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue 9, (2015). Castelles, Manuel. The Network Society: From Knowledge to Policy. Washington: Center for Translantic Relations, 2005. Chivers, Tom. “Wikileaks’ 10 Greatest Stories,” The Telegraph (2010). Accessed November 28, 2015. http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/8070253/Wikileaks-10- greatest-stories.html Cuijpers, Colette. “Wicked Problems: Data, Privacy, Ethics”. Wicked Problems: Society, Culture and Economy, 800157, Tilburg University, October 13, 2015. “Edward Snowden: Leaks that Exposed US Spy Programme.” BBC News (2014). Accessed November 26, 2015. http://www.bbc.com/news/world-us-canada-23123964 Etzioni, Amitai. “Ethics, Development and the Need for a New Paradigm,” Journal of Regional Policy, No. 3-4/91. Vol. 11: 587-599. Accessed November 27, 2015. Hill, Kashmir. “How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did.” Forbes (2012). Accessed November 27, 2015. http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl- was-pregnant-before-her-father-did/ “Kantian Ethics.” California State University, Sacramento. Accessed November 29, 2015. Knowledgent Cares. “Applying Big Data to One of the Worlds Biggest Problems: Alzheimer’s Disease.” Knowledgent Cares firm website. Accessed November 27, 2015. http://knowledgent.com/whitepaper/applying-big-data-to-one-of-the-worlds-biggest- problems-alzheimers-disease/ Moore, Geoffrey. “Importance of Big Data.” Hadoop Summit, 2012. Muller, Sasha. “What is Anonymous? Inside the Group Plotting to Attack Islamic
  • 7. BIG DATA ANALYSIS AND TERRORISM 7 State/ISIS.” A Fresh Take on Technology (2015). Accessed November 30, 2015. http://www.alphr.com/security/1000275/what-is-anonymous-inside-the-group-plotting- to-attack-islamic-stateisis Oxford English Dictionary. 2nd ed. 20 vols. Oxford: Oxford University Press, 1989. Pistilli, Matthew and James Willis. “Ethics, Big Data, and Analytics: A Model for Application.” Educause Review (2013). Accessed November 29, 2015. Rahman, Hakikur and Isabel Ramos. “Ethical Data Mining Applications for Socio- Economic Development.” IGI Global Book Series Advances in Data Mining and Database Management (2013). Resnik, David. “What is Ethics in Research & Why is it Important?” National Institute of Environmental Health Sciences (2011). Scahill, Jeremy. “The Assassination Complex.” The Drone Papers: The Intercept (2015). Accessed November 28, 2015. https://theintercept.com/drone-papers/the-assassination- complex/ Smith, Oliver. “Facebook Terms and Conditions: Why You Don’t Own Your Online Life.” The Telegraph (2013). Accessed December 7, 2015. http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-and- conditions-why-you-dont-own-your-online-life.html Tene, Omer and Jules Polonetsky. “Big Data For All: Privacy and User Control in the Age of Analytics,” Northwestern Journal of Technology and Intellectual Property Vol. II Issue 5 (2013). Accessed November 29, 2015. Vedder, Anton. “Wicked Problems: Data, Privacy, Ethics”. Wicked Problems: Society, Culture and Economy, 800157, Tilburg University, November 3, 2015.