There's no code of conduct. There's no standard. There's nothing that safeguards privacy and establishes rules of the road.
This information may be about purchasing preferences, hobbies, geographical location, friends and family, political affiliation, entertainment interests and so on. In short, any and all components of a biographical identity may be discernible.
Right after I e-mailed a friend in Texas that I might be coming to town, a suggestion for a restaurant in Houston popped up as a one-line all-text ad above my Gmail inbox.”
Phorm’s latest method of involuntary eavesdropping and surveillance involves intercepting and hijacking image requests, and redirecting them to Phorm’s OIX domain. Once redirected to the OIX domain, Phorm can then read the unique OIX user ID cookie to identify the subscriber. At this point Phorm have access to the subscriber’s IP address, OIX UID cookies, date/time of access, referring page content (& cookies) … giving them enough information to profile the subscriber. (Dec 2011)
The same data mining technologies that have been used by marketers to provide ‘personalization’ which is the exact placement of the right offer, to the right person at the right time can be used for providing the right inquiry to the right perpetrator at the right time: before they commit the crime. Investigative data mining is the visualization, organization, sorting, clustering, segmenting and prediction of criminal behavior using data attributes such as age, previous arrests, modus operandi, type of building, household income, time of day, geo code, countries visited, housing type, auto make, length of residency, type of license, utility usage, IP address, VISA type, number of children, place of birth, average usage of ATM card, number of credit cards, etc., the data points can run into the hundreds. Pre-crime is the interactive process of predicting criminal behavior by mining this vast array of data using several artificial intelligence technologies, including:
Link Analysis- for creating graphical networks to view criminal associations and interactions.
Intelligent Agents - for retrieving, monitoring, organizing and acting on case related information.
Text Mining - for searching through gigabytes of documents in search of concepts and key words.
Neural Networks - for recognizing the patterns of criminal behavior and anticipating criminal activity
Machine Learning Algorithms - for extracting rules and graphical maps of criminal behavior and perpetrator profiles.
Mankind barely noticed when the concept of massively organized information quietly emerged to become a means of social control, a weapon of war, and a roadmap for group destruction ... Hitler and his hatred of the Jews was the ironic driving force behind this intellectual turning point. But his quest was greatly enhanced and energized by the ingenuity and craving for profit of a single American company and its legendary, autocratic chairman. That company was International Business Machines, and its chairman was Thomas J. Watson." (Edwin Black, IBM and the Holocaust, 2001)
RCA for Law Enforcement can do data mining on any textual data source; for example, storage media obtained from mobile phones, iPad®s, notebooks and other storage devices.
Various analytic views allow investigators to rapidly identify patterns and relationships, and perform investigative discovery on large amounts of data rapidly.
In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways. The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288. The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.
Taking Cleverly’s statement about possible interest from America’s intelligence community one step further, a Watson-like supercomputer can easily be used by state, local, and federal law enforcement entities to analyze ‘open source’ information such as social networking sites and other areas of the Internet where known offenders tend to share details of their wrongdoing.
At the very least, you could apply a Watson-like solution to triage non-emergency calls to the dispatch center — essentially creating an automated, intelligent, sorting mechanism based on a series of data points that are collectable, measurable, and understandable and taken in sum point to specific situations or scenarios.
'Let me make the caveat that this is all very early thinking — there’s nothing out there now that does that — but there’s enough capability in the Watson-like arena that you can see some of these things being possible,' Cleverly said.
There is a meta-narrative to history and espionage, ‘a story about a story’ – SPYPEDIA gives you that story…. History is repeating itself. You are living through it.
Once they see the world through distrustful eyes, and they think they’re being lied to, that colours their perception of all subsequent events . . . Real life conspiracies tend to be small and grubby and primarily about money and sex.