Skip to main content

2019 | OriginalPaper | Buchkapitel

6. Prediction and Postdiction: Real-Time Data Mining and Data Analytics

verfasst von : Peter Lehr

Erschienen in: Counter-Terrorism Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, I focus on data-mining and data analytics. It is obvious that without integrated databases set up for collecting, collating, managing and disseminating data derived from various identification, monitoring and surveillance systems, all efforts in this direction would be in vain – which is why we need to discuss such computerized databases first. But databases are just the beginning: nowadays, computers can tap into the World Wide Web to proactively search all kinds of social media including listen in on phone calls to detect suspicious behaviour, to profile individual terrorists or suspects. This process is known as data mining and acquisition, and similar to what many private companies such as Google or Facebook routinely do ways as well. I argue that currently, the ‘holy grail’ of data-mining and acquisition is to be able to do so in real time, while ‘it’ happens. With a discussion of this current cutting edge of research and the implications for our civil liberties, I conclude this chapter.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Amoore L, de Goede M (2008) Introduction: governing by risk in the war on terror. In: Amoore L, de Goode M (eds) Risk and the war on terror. Routledge, London/New York, pp 5–19 Amoore L, de Goede M (2008) Introduction: governing by risk in the war on terror. In: Amoore L, de Goode M (eds) Risk and the war on terror. Routledge, London/New York, pp 5–19
Zurück zum Zitat Aust S (2008) The Baader-Meinhof complex. The Bodley Head, London Aust S (2008) The Baader-Meinhof complex. The Bodley Head, London
Zurück zum Zitat Blunden M (2018) Big brother is wondering why you’re in the loo again. i Paper, 01 February Blunden M (2018) Big brother is wondering why you’re in the loo again. i Paper, 01 February
Zurück zum Zitat Chattopadhyay A, Chang CH, Yu H (eds) (2017) Emerging Technology and Architecture for Big-data Analytics. Springer, Cham/Singapore Chattopadhyay A, Chang CH, Yu H (eds) (2017) Emerging Technology and Architecture for Big-data Analytics. Springer, Cham/Singapore
Zurück zum Zitat Chen H (2006) Intelligence and security informatics for international security. Information sharing and data mining. Springer, New York Chen H (2006) Intelligence and security informatics for international security. Information sharing and data mining. Springer, New York
Zurück zum Zitat Chertoff M (2006) A tool we need to stop the next airliner plot. Washington Post, 29 August Chertoff M (2006) A tool we need to stop the next airliner plot. Washington Post, 29 August
Zurück zum Zitat Christl W (2014) Kommerzielle digitale Überwachung im Alltag. Erfassung, Verknüpfung und Verwertung persönlicher Daten im Zeitalter von Big Data: Internationale Trends, Risiken und Herausforderungen anhand ausgewählter Problemfelder und Beispiele. Studie im Auftrag der Bundesarbeitskammer Wien. Wien: Cracked Labs. Institut für Kritische Digitale Kultur, November. http://crackedlabs.org/dl/Studie_Digitale_Ueberwachung.pdf Christl W (2014) Kommerzielle digitale Überwachung im Alltag. Erfassung, Verknüpfung und Verwertung persönlicher Daten im Zeitalter von Big Data: Internationale Trends, Risiken und Herausforderungen anhand ausgewählter Problemfelder und Beispiele. Studie im Auftrag der Bundesarbeitskammer Wien. Wien: Cracked Labs. Institut für Kritische Digitale Kultur, November. http://​crackedlabs.​org/​dl/​Studie_​Digitale_​Ueberwachung.​pdf
Zurück zum Zitat Deflem M (2005) ‘Wild beasts without nationality’. The uncertain origins of Interpol, 1898–1910. In: Reichel P (ed) Handbook of transnational crime and justice. Sage Publications, Thousand Oaks, pp 275–285CrossRef Deflem M (2005) ‘Wild beasts without nationality’. The uncertain origins of Interpol, 1898–1910. In: Reichel P (ed) Handbook of transnational crime and justice. Sage Publications, Thousand Oaks, pp 275–285CrossRef
Zurück zum Zitat EUR-Lex (2016) Regulation (EU) 2016/679 of the European Parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation). Brussels, 27 April. http://eur-lex.europa.eu/eli/reg/2016/679/oj EUR-Lex (2016) Regulation (EU) 2016/679 of the European Parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation). Brussels, 27 April. http://​eur-lex.​europa.​eu/​eli/​reg/​2016/​679/​oj
Zurück zum Zitat Fienberg SE (2008) Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists. In: Chen H et al (eds) In terrorism informatics. Knowledge management and data Mining for Homeland Security. Springer, New York, pp 197–218 Fienberg SE (2008) Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists. In: Chen H et al (eds) In terrorism informatics. Knowledge management and data Mining for Homeland Security. Springer, New York, pp 197–218
Zurück zum Zitat Hu X et al (2008) Text mining the biomedical literature for identification of potential virus/bacterium as bio-terrorism weapons. In: Chen H et al (eds) Terrorism informatics. Knowledge management and data Mining for Homeland Security. Springer, New York, pp 385–406 Hu X et al (2008) Text mining the biomedical literature for identification of potential virus/bacterium as bio-terrorism weapons. In: Chen H et al (eds) Terrorism informatics. Knowledge management and data Mining for Homeland Security. Springer, New York, pp 385–406
Zurück zum Zitat Jensen RB (2001) The United States, international policing and the war against anarchist terrorism, 1900–1914. Terrorism and Political Violence, 13(1): 15–46 (Spring)CrossRef Jensen RB (2001) The United States, international policing and the war against anarchist terrorism, 1900–1914. Terrorism and Political Violence, 13(1): 15–46 (Spring)CrossRef
Zurück zum Zitat Lee N (2014) Facebook nation: Total information awareness. Springer, New York et al.CrossRef Lee N (2014) Facebook nation: Total information awareness. Springer, New York et al.CrossRef
Zurück zum Zitat Lewis R (2017) Under surveillance: being watched in modern America. University of Texas Press, Austin Lewis R (2017) Under surveillance: being watched in modern America. University of Texas Press, Austin
Zurück zum Zitat McEwen A, Cassimally H (2014) Designing the internet of things. John Wiley & Sons, London McEwen A, Cassimally H (2014) Designing the internet of things. John Wiley & Sons, London
Zurück zum Zitat Mueller JE (2006) Overblown: how politicians and the terrorist industry inflate national security threats, and why we believe them. Free Press, New York Mueller JE (2006) Overblown: how politicians and the terrorist industry inflate national security threats, and why we believe them. Free Press, New York
Zurück zum Zitat Solove DJ (2004) The digital person: technology and privacy in the information age. New York University Press, New York/London Solove DJ (2004) The digital person: technology and privacy in the information age. New York University Press, New York/London
Zurück zum Zitat Sparke M (2008) Fast capitalism/slow terror: cushy cosmopolitanism and its extraordinary others. In: Amoore L, de Goode M (eds) Risk and the war on terror. Routledge, London/New York, pp 133–157 Sparke M (2008) Fast capitalism/slow terror: cushy cosmopolitanism and its extraordinary others. In: Amoore L, de Goode M (eds) Risk and the war on terror. Routledge, London/New York, pp 133–157
Zurück zum Zitat Williams P, Selle W (eds) (2016) Military contingencies in megacities and sub-megacities. Carlile Barracks. United States Army War College Press (December), PA Williams P, Selle W (eds) (2016) Military contingencies in megacities and sub-megacities. Carlile Barracks. United States Army War College Press (December), PA
Metadaten
Titel
Prediction and Postdiction: Real-Time Data Mining and Data Analytics
verfasst von
Peter Lehr
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-90924-0_6

Neuer Inhalt