Presentation is loading. Please wait.

Presentation is loading. Please wait.

Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller.

Similar presentations


Presentation on theme: "Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller."— Presentation transcript:

1 Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller

2 Background  Uses data warehouses comprised of large amounts of data to find trends  Increased usage after terrorist attacks (Dept. of Homeland Security)  Data Mining Uses –improving service or performance –detecting fraud, waste, and abuse –analyzing scientific and research information –detecting criminal activities or patterns –analyzing intelligence and detecting terrorist activities

3 Sources of Data  Directly from individuals –Surveys  Web Crawlers –Indexing Services like search engines  Government Agencies –National Oceanic and Atmospheric Administration  Private Sector Sources –Credit Card Companies –Banks and other Financial Institutions

4 GAO Study of Data Mining  Government agencies required to provide notice to individual respondents explaining why the information is being collected –Only 2 of 5 agencies in GAO study provided this notice –Agency compliance with key security requirements was inconsistent  122 of 199 data mining efforts used personal information –student loan application data –bank account numbers –credit card information –taxpayer identification numbers  Results: “Until agencies fully comply with these requirements, they lack assurance that individual privacy rights are being appropriately protected”

5 Inherent Data Mining Issues  Can reveal patterns and relationships but doesn’t tell the value or significance of these patterns  Can identify connections between behaviors and/or variables  DOES NOT necessarily identify a causal relationship –Leads to false positives and incorrect conclusions

6 Data Mining Ineffectiveness The New York Times confirmed that point, with its report that the NSA has sent the FBI a "flood" of tips generated by mass domestic eavesdropping and data mining, virtually all of which led to dead ends that wasted the FBI's resources. "We'd chase a number, find it's a schoolteacher with no indication they've ever been involved in international terrorism," one former FBI agent told the Times. "After you get a thousand numbers and not one is turning up anything, you get some frustration.” ACLU.org - Eavesdropping 101: What Can The NSA Do?

7

8 Data Mining Ineffectiveness 1)Detect: Terrorists Enjoy Driving El Caminos 2)Classify: El Camino lovers classifies person as potential terrorist 3)ID: John Bagby internet queries reveals El Camino interests 4)Track: Bagby tracked searching for El Camino availability at www.autotrader.com 5)Understand: Bagby works for a university that does research for sensitive government projects 6)Preempt: Bagby’s door kicked down by government agents

9 Privacy Violations  Pentagon’s Total Information Awareness System –Violation of 4 th Amendment rights because warrants needed to search a particular place as opposed to blanket searches –Right of people to be secure…in their papers  Data mining and warehousing efforts hastily implemented after 9/11 –Few privacy considerations

10 Further Problems  Compromise of personal data by hackers or data misuse –Many data warehousing efforts performed by private businesses


Download ppt "Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller."

Similar presentations


Ads by Google