{"id":10742,"date":"2013-11-14T13:30:49","date_gmt":"2013-11-14T02:30:49","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=10742"},"modified":"2013-11-15T08:50:18","modified_gmt":"2013-11-14T21:50:18","slug":"does-collecting-big-data-make-us-safer","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/does-collecting-big-data-make-us-safer\/","title":{"rendered":"Does collecting big data make us safer?"},"content":{"rendered":"
The idea of\u00a0Big data<\/a>, the bane of privacy and civil liberty activists, now conjures up Edward Snowden, the NSA, and mass surveillance. It\u2019s also regularly presented as a critical tool for national security. So does it really keep us safe?<\/p>\n Intelligence organisations argue that collecting big data helps keep us safe by providing the information to thwart terrorists and other nefarious actors. When we talk about big data, we are also talking about its collection and analysis. For organizations like the NSA, charged with the directive to \u2018process, analyze, produce, and disseminate signals intelligence information and data,\u2019 it is no surprise that big data represents a holy grail of sorts. But data alone isn\u2019t an intelligence product; the organization, interpretation, and analysis of data is what\u2019s important.<\/p>\n The argument is that big data is worth what it costs. As one former U.S. intelligence official described<\/a> Gen. Keith Alexander\u2019s approach, \u2018rather than look for a single needle in the haystack\u2026let\u2019s collect the whole haystack.\u2019 After all, why would an intel organisation not want all the data it can get?<\/p>\n Although the official line of \u201854 thwarted terrorist plots\u2019 has received its fair share of scrutiny, there is little doubt that the vast stores of data gathered by the NSA has produced at least some actionable intelligence. But the important question however is whether this method produces results which warrant the costs, including to privacy, compared to more targeted investigations.<\/p>\n The primary challenge for any big data operation is resources. The procurement, storage, and processing of such a great volume of data is resource and labor intensive. The NSA\u2019s newest data center in Utah is slated to cost taxpayers $1.4 billion and that\u2019s not including the supercomputers that\u2019ll reside there. Operating costs are also significant. A look at the leaked Black Budget points to $10.8 billion in funding, and upwards of 35,000 employees slated for NSA operations, second only to the CIA in intelligence spending.<\/p>\n This kind of data collection also impacts the resulting analysis. Gathering a database of records as large as the Library of Congress every six hours is no simple task, but sifting through it is much more challenging.<\/p>\n Transforming the \u2018haystack\u2019 into intelligence is the trick. Analytics would need to rely on the use of identifiers, key words, and pattern recognition. And, true to the haystack metaphor, most of the data collected is irrelevant. 72.1 percent<\/a> of email communications are spam and only a miniscule proportion of intercepted communications are mission relevant. Automation helps, but programed searches often lack the refinement and depth needed for detailed investigatory work.<\/p>\n Despite these vast droves of data, events ranging from the Arab Spring to the Boston bombing do fall through the cracks. Even big data gathering won\u2019t always identify and thwart the \u201clone wolves and small terrorist cells embracing violent rightwing extremist ideology\u201d that the Department of Homeland Security<\/a> has long deemed to be \u201cthe most dangerous domestic terrorism threat in the United States.\u201d And there are ways to bypass the type of wide-net intelligence gathering practices revealed by Edward Snowden. In fact the United States government is in many ways a major provider of such bypasses, from the State Departments support of Tor development to even the United States Postal Service. The sweeping surveillance of conventional communications channels are too broad to consistently identify outlier threats, while more organized or systemic threats can take advantage of the over reliance on this data.<\/p>\n The appeal of big data for intelligence agencies is undeniable. But data lacks meaning until it has been analysed. And getting to the pertinent pieces of information in a big data set is no easy task. While there is clearly value in this approach, there appears to be an obsession with big data in the NSA and other intelligence organizations around the world. An overreliance on this method compared to others would be detrimental for their respective national security functions.<\/p>\n Many have highlighted the challenge of balancing liberties and security, and this is a vital debate. But there has been a surprising lack of attention paid to the effectiveness or otherwise of mass surveillance while defending the approach in the name of counterterrorism.\u00a0 Those answers are of course hidden behind layers of security clearance. But to get a sense of whether big data warrants its cost to privacy, we need to develop a sense of whether it\u2019s really more effective than more targeted and warranted investigations.<\/p>\n