Language Selection

English French German Italian Portuguese Spanish

Forging an anti-terrorism search tool

Filed under
Misc

Google is the No. 1 free tool to snoop on friends or strangers. But government agencies including the Federal Aviation Administration are investing in a new search engine being developed at the University of Buffalo to do some of their more sensitive detective work.

The technology, released as a prototype in recent weeks, is designed to mine a corpus of documents for associated ideas or connections--connections between two unrelated concepts, for example, that would otherwise go unseen or would take countless hours of investigative work to discover. The project was specifically funded for anti-terrorism efforts and initially was used for searching over data within the 9/11 Commission report and public Web pages related to the suicide bombings carried out by terrorists who hijacked three U.S. commercial planes.

"Say you have the kind of question that connects these two people that we don't know about. You could start reading through all those documents. But our system is designed to look specifically for those evidence trails" that connect those two people, said Rohini Srihari, UB professor of computer science and engineering.

John McCarthy, professor emeritus of computer science at Stanford University, said that linking between concepts is an old idea, but that a new way of doing it could be an important breakthrough. In general, search engines such as Google and Yahoo mine documents for textual clues, or matches to query terms, rather than on the occurrence of ideas. Still, Google is working in the area of searching for concepts.

"The tools that we already have would be more useful if we could search on concepts," McCarthy said.

Srihari and a team in the Center of Excellence in Document Analysis and Recognition in the UB School of Engineering and Applied Sciences have been developing the search engine for the last two years. She said that her team plans to have a deliverable system for the FAA and the intelligence community by the end of the year, but it will not be widely available to the public. The underlying research, co-funded by the National Science Foundation, will also be published.

The technology, called a concept chain graph, uses different mathematical algorithms for finding the best path for connecting two different concepts. It will then list the strongest to weakest links.

Full Story.

More in Tux Machines

GNOME 3.25.3 Released, GTK Development

  • GNOME 3.25.3 Now Available
    GNOME 3.25.3 is now available as the latest stepping stone towards September's release of GNOME 3.26.
  • GNOME 3.26 Desktop Environment Development Continues, New Milestone Is Out Now
    Matthias Clasen has informed the community via an email announcement that the third milestone of the upcoming GNOME 3.26 desktop environment is now ready for public testing. After a one day delay, GNOME 3.25.3 is now available, and it's the third development release of the upcoming GNOME 3.26 desktop environment that could be used by default in popular GNU/Linux distributions, such as the Ubuntu 17.10 (Artful Aardvark) or Fedora 27, both due for release later this year. It brings a bunch of updates and new features to several of its components and apps.
  • Eight years since first release and still no usable theme?
    Well, let me be frank. Ever since gtk-3.0 I've been skeptical of it, especially of the theming aspect. In gtk-2 we had (and still have) many themes ranging from trash to excellent, almost every kind of taste could have been satisfied. Not so in gtk-3. First issue is constant changes to theming API, meaning that despite there being hundreds of themes, only handful of them actually work right :( And among them, I still have yet to find one that would work on my fairly usual 15,6″ laptop screen with 1366×768 px resolution. Basicaly I have two issues.

Microsoft Dirty Tricks and Entryism

Security: Windows Causes Chaos, Routers With Back Doors, Patching of UNIX/Linux

  • Traffic lights in Australia hit by WannaCry ransomware [Ed: Well, who uses Microsoft Windows to manage traffic?!?!]

    Radio station 3aw reports that dozens of pole based traffic calming measures are infected and that this came as a surprise to the local minister and Road Safety Camera Commissioner when radio reporters told him about it.

  • Honda shuts down factory after finding NSA-derived Wcry in its networks
    The WCry ransomware worm has struck again, this time prompting Honda Company to halt production in one of its Japan-based factories after finding infections in a broad swath of its computer networks, according to media reports. The automaker shut down its Sayama plant northwest of Tokyo on Monday after finding that WCry had affected networks across Japan, North America, Europe, China, and other regions, Reuters reported Wednesday. Discovery of the infection came on Sunday, more than five weeks after the onset of the NSA-derived ransomware worm, which struck an estimated 727,000 computers in 90 countries. The mass outbreak was quickly contained through a major stroke of good luck. A security researcher largely acting out of curiosity registered a mysterious domain name contained in the WCry code that acted as a global kill switch that immediately halted the self-replicating attack.
  • GhostHook: CyberArk finds new way to attack Windows 10

    Researchers at CyberArk Labs have discovered a new way of gaining access to the innards of Windows 10 64-bit systems that can bypass existing safeguards, including the kernel patch protection known as PatchGuard that Microsoft developed to improve system security.

  • John McAfee claims 'every router in America has been compromised' by hackers and spies

    Technology pioneer John McAfee believes that every home internet router in America is wide open to cyberattacks by criminal hackers and intelligence agencies. He makes the claim speaking after revelations from WikiLeaks that the Central Intelligence Agency (CIA) targets the devices.

  • 'Stack Clash' Smashed Security Fix in Linux
    What's old is new again: an exploit protection mechanism for a known flaw in the Linux kernel has fallen to a new attack targeting an old problem.
  • Continuous defence against open source exploits
    Register for next month's expo for the public sector DevOps community to hear key speakers from the front line of public sector digital transformation and see the latest technologies at first hand. Andrew Martin, DevOps lead in a major government department, has been added to the line-up of speakers to talk about the importance of getting the approach to security right with open source software.
  • IoT goes nuclear: creating a ZigBee chain reaction [iophk: "use 6lowpan instead"]

    If plugging in an infected bulb is too much hassle, the authors also demonstrate how to take over bulbs by war-driving around in a car, or by war-flying a drone.

  • Passengers given a freight as IT glitch knocks out rail ticket machines

    The network of machines are operated by the individual franchises, but share a common infrastructure from German software company Scheidt and Bachmann.

OpenBSD Development News

  • OpenBSD now has Trapsleds to make life harder for ROPers
  • Historical: My first OpenBSD Hackathon

    I was a nobody. With some encouragement, enough liquid courage to override my imposter syndrome, and a few hours of mentoring, I'm now doing big projects. The next time you're sitting at a table with someone new to your field, ask yourself: how can you encourage them? You just might make the world better.

    Thank you Dale. And thank you Theo.

  • Finish the link-kit job
    We've had the linkkit components in the tree for a while, but it has taken nearly 20 rounds between rpe/tb/myself to get the last few bits finished. So that the link kit is cleanly used at reboot, but also fits in with the practices kernel developers follow.