1 / 10

Against Data-Mining Uses

Against Data-Mining Uses . Team 10 Ben Jabara Jesse Lentz Ben Heller. Background. Uses data warehouses comprised of large amounts of data to find trends Increased usage after terrorist attacks (Dept. of Homeland Security) Data Mining Uses improving service or performance

kerryn
Download Presentation

Against Data-Mining Uses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller

  2. Background • Uses data warehouses comprised of large amounts of data to find trends • Increased usage after terrorist attacks (Dept. of Homeland Security) • Data Mining Uses • improving service or performance • detecting fraud, waste, and abuse • analyzing scientific and research information • detecting criminal activities or patterns • analyzing intelligence and detecting terrorist activities

  3. Sources of Data • Directly from individuals • Surveys • Web Crawlers • Indexing Services like search engines • Government Agencies • National Oceanic and Atmospheric Administration • Private Sector Sources • Credit Card Companies • Banks and other Financial Institutions

  4. GAO Study of Data Mining • Government agencies required to provide notice to individual respondents explaining why the information is being collected • Only 2 of 5 agencies in GAO study provided this notice • Agency compliance with key security requirements was inconsistent • 122 of 199 data mining efforts used personal information • student loan application data • bank account numbers • credit card information • taxpayer identification numbers • Results: “Until agencies fully comply with these requirements, they lack assurance that individual privacy rights are being appropriately protected”

  5. Inherent Data Mining Issues • Can reveal patterns and relationships but doesn’t tell the value or significance of these patterns • Can identify connections between behaviors and/or variables • DOES NOT necessarily identify a causal relationship • Leads to false positives and incorrect conclusions

  6. Data Mining Ineffectiveness The New York Times confirmed that point, with its report that the NSA has sent the FBI a "flood" of tips generated by mass domestic eavesdropping and data mining, virtually all of which led to dead ends that wasted the FBI's resources. "We'd chase a number, find it's a schoolteacher with no indication they've ever been involved in international terrorism," one former FBI agent told the Times. "After you get a thousand numbers and not one is turning up anything, you get some frustration.” ACLU.org - Eavesdropping 101: What Can The NSA Do?

  7. Data Mining Ineffectiveness • Detect: Terrorists Enjoy Driving El Caminos • Classify: El Camino lovers classifies person as potential terrorist • ID: John Bagby internet queries reveals El Camino interests • Track: Bagby tracked searching for El Camino availability at www.autotrader.com • Understand: Bagby works for a university that does research for sensitive government projects • Preempt: Bagby’s door kicked down by government agents

  8. Privacy Violations • Pentagon’s Total Information Awareness System • Violation of 4th Amendment rights because warrants needed to search a particular place as opposed to blanket searches • Right of people to be secure…in their papers • Data mining and warehousing efforts hastily implemented after 9/11 • Few privacy considerations

  9. Further Problems • Compromise of personal data by hackers or data misuse • Many data warehousing efforts performed by private businesses

More Related