million people are at the gates of Europe. Refugees from Syria persevere to the border with Turkey. The refugee crisis is one of the biggest challenges for decades. The security agencies concerned with the question whether the refugees to protection seekers or whether potential terrorists are among them. Two of the Paris-bombers traveled a over Greece as refugees, two IS terrorists who came as refugees, arrested the police in Graz; that the IS uses the movement of refugees to infiltrate terrorists widely used in Europe, is in the security agencies now solid knowledge.
As the magazine “Defense One” reported the technology company IBM has developed a software that allows the registration should be made easier. i2 EIA (Enterprise Insight Analysis) to filter out records like passport lists and press reports persons who might be associated with terrorist activities. The software calculates a value that identifies the individual as a refugee or terrorists. It is a matter, “black sheep” to separate from the herd, the author writes Patrick Trucker.
The individual is reduced to numbers
The chief strategist of IBM, Andrew-born is, with quoted as saying: “It’s like a credit score. (…) For large financial decisions, someone with a high score still represent a high risk. Someone with an average credit score but is a safe bet. “The score indicates a probability, similar to a credit risk, with a fugitive faked his identity and dizzy during the registration. Exactly how the value is calculated and where the method already is used, the group did not want to be notified on request. However, an analyst is in the relationship network can recognize immediately whether someone is a troublemaker. ‘/ p>
More about
the Disturbing it’s not just that here creditworthiness and security are equated, but that the individual is reduced to a number logic. The refugees at the border embodies yes no score, but a destiny. Therefore, there is also an individual right to asylum. The tech companies, however, are inspired by the idea that describe all the problems in the world in numbers and can be solved with formulas. “Solutionism” calls this the critic Evgeny Morozov. i2 EIA was advertised as a tool that with computer forensic methods rummages through gigantic records and discovered traces of criminals. But software can really tell if someone is a terrorist, and after the method “Predictive Policing” bombings predict? Experts have doubts about this.
The risk of prejudice is great
The methodological problem is that attacks differently about credit card fraud that occurs en masse and provide robust data whose transactions are to derive pattern already can not so easily quantified solely on the basis of the diversity of design. Terrorists left no “signature” that would allow it to identify regularities. Security researcher Bruce Schneier, author of “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World”, writes on his blog: “Terrorist attacks are very rare. This means that even highly accurate Terror warning systems would so flooded with false alarms that they are useless “statisticians familiar with the problem of” false positives “. Events that have never occurred, can not be predicted
you can acquire the rights to this article
Other recommendations
‘);if(!lib||!lib.publickey){window[name]={publickey:p,widgets:[{name:w,pre:u}],geo:g,categories:c,dataMode:’data-display’};s=d.createElement(n);s0=d.getElementsByTagName(n)[0];s.async=’async’;s.type=’text/javascript’;s.src=(d.location.protocol===’https:’?’https:’:’http:’)+’//static.plista.com/async/’+name+’.js’;s0.parentNode.insertBefore(s,s0);}else{lib.widgets.push({name:w,pre:u});}}(‘28350f6a5e04a1c24fd71d0c76e32f42119062b0′,’retrescoAd_2′,’de’));


No comments:
Post a Comment