Language Selection

English French German Italian Portuguese Spanish

Forging an anti-terrorism search tool

Filed under

Google is the No. 1 free tool to snoop on friends or strangers. But government agencies including the Federal Aviation Administration are investing in a new search engine being developed at the University of Buffalo to do some of their more sensitive detective work.

The technology, released as a prototype in recent weeks, is designed to mine a corpus of documents for associated ideas or connections--connections between two unrelated concepts, for example, that would otherwise go unseen or would take countless hours of investigative work to discover. The project was specifically funded for anti-terrorism efforts and initially was used for searching over data within the 9/11 Commission report and public Web pages related to the suicide bombings carried out by terrorists who hijacked three U.S. commercial planes.

"Say you have the kind of question that connects these two people that we don't know about. You could start reading through all those documents. But our system is designed to look specifically for those evidence trails" that connect those two people, said Rohini Srihari, UB professor of computer science and engineering.

John McCarthy, professor emeritus of computer science at Stanford University, said that linking between concepts is an old idea, but that a new way of doing it could be an important breakthrough. In general, search engines such as Google and Yahoo mine documents for textual clues, or matches to query terms, rather than on the occurrence of ideas. Still, Google is working in the area of searching for concepts.

"The tools that we already have would be more useful if we could search on concepts," McCarthy said.

Srihari and a team in the Center of Excellence in Document Analysis and Recognition in the UB School of Engineering and Applied Sciences have been developing the search engine for the last two years. She said that her team plans to have a deliverable system for the FAA and the intelligence community by the end of the year, but it will not be widely available to the public. The underlying research, co-funded by the National Science Foundation, will also be published.

The technology, called a concept chain graph, uses different mathematical algorithms for finding the best path for connecting two different concepts. It will then list the strongest to weakest links.

Full Story.

More in Tux Machines

Software: Corebird, RawTherapee, LVFS and More

Red Hat and Fedora: Red Hat Enterprise Linux 8 Alpha, Results Imminent, Fedora Atomic Workstation and More

Ubuntu and Mint Leftovers

  • Ubuntu 18.04's Automatic Suspend Shows Linux Suspend Can Still Be An Issue In 2018
    One of the subtle changes that seemed to have been made during the Ubuntu 18.04 development cycle is automatic suspend now being enabled by default on desktop systems. Automatic suspend is flipped on with Ubuntu 18.04 desktop after a twenty minute delay of being idle, at least on several systems I've been running the daily Bionic Beaver with this month.
  • Bid “bonjour” to our Bionic Beaver!
    Along with a sneak preview of our official Bionic mascot, it’s a short update this week as we’re all heads-down in bug fixing mode. There are a couple of links to check out if you’re interested in what sort of data we want to collect about hardware and setup, with links to the source.
  • MintBox Mini 2
    Based on the Compulab Fitlet2, the new Mini is just as small as the original MintBox Mini and the MintBox Mini Pro but with much better specifications, better performance and a few more features.

Android Leftovers

  • Android tips and tricks: 10 great ways to boost your phone experience
  • About the privacy of the unlocking procedure for Xiaomi’s Mi 5s plus
    First, you got to register on Xiaomi’s website, and request for the permission to unlock the device. That’s already bad enough: why should I ask for the permission to use the device I own as I am pleased to? Anyway, I did that. The procedure includes receiving an SMS. Again, more bad: why should I give-up such a privacy thing as my phone number? Anyway, I did it, and received the code to activate my website account. Then I started the unlock program in a virtualbox Windows XP VM (yeah right… I wasn’t expecting something better anyway…), and then, the program tells me that I need to add my Xiaomi’s account in the phone. Of course, it then sends a web request to Xiaomi’s server. I’m already not happy with all of this, but that’s not it. After all of these privacy breaches, the unlock APP tells me that I need to wait 72 hours to get my phone to account association to be activated. Since I wont be available in the middle of the week, for me, that means waiting until next week-end to do that. Silly…
  • You Can Now Try Android Games Without Downloading Them
    Tired of downloading games only to realize they suck? Google Play Instant might mean never doing that again.
  • Plex for Android Will Soon Let You Cast Your Own Videos to Chromecast