Friday, October 23, 2015

Computer Hunting one of the few hopes to find mass murderers – Sydsvenskan

Where to get the capacity from?

– In my experience, it is a prerequisite that the person is socially isolated, marginalized, outside the Community – in the community or family – or to he just feels like this.

– Fallen united by a feeling of immense violation. Both from the community and other people. These people who have been bullied.

Is it enough to create a killer?

– It gets worse when such coincides with other negative things, like the person has a special interest in violence, films or other experiences and enters all for it. You spend a lot to violent video games, build contacts online and continues to isolate itself.

– It becomes dangerous when several such negative things converge in a person who is alone, a little odd and abnormal and can not really find ways to listen to.

What is the particular business on the internet?

– People are capable of doing things like this tie Please contacts online. Where it is perhaps easier to communicate with others, but can also become more malignant.

A dream world?

– Roughly. These people are more likely than others to meddle with things they read or see in the movies, and build something of their own heads.

– If you look at the images of the killer in Trollhättan, so go thoughts to someone who dressed up to go to war, and he posed with the students, almost a little role-playing preferable.

How to find them before it slams?

– In retrospect, one can surely put together a lot of signs and signals, but not before – they go under the radar, is more subtle – music and movies is not enough to sign. But there may be other things that are not visible clearly.

What can you do?

– I think the only way is to work the intelligence oriented, particularly online. The fact that network traffic is systematically reviewed and that we learn which behaviors are associated with higher risks. In the United States, as in Finland, we have seen that the added material online before the attacks. And even Breivik got something out online before he struck.

This expresses itself Lars Nicander, Director of the Centre for Asymmetric Threat Studies

– The more isolated they are, the harder it is to find them.

Why?

– All underrrättelse and safety is all about communication, otherwise there’s nothing to look for. It found only in the mind of a person is far more difficult to access.

How do you find them?

– It is extremely difficult to get on alone gärningamän. Secret Service in the US as the world leader in threat analysis always travel in advance when the President going somewhere and controls the mental cases that are near, and that they are under control: sitting inside. But it only helps against those who have already been classified.

And to hunt through the Internet, then?

– Well, then you must surely it looking for at all be online. And of course you can work with large data sets and look, but we do not really have that ability yet. And such that Breivik was knowledgeable and was dark the inputs to the network he used.

There have been concrete plans for network monitoring in the hunt for extremists and murderers, even in Sweden, but no authority wanted to finance the continuation of the study researcher Fredrik Johansson at the Swedish Defence Research Agency, FOI, participated in a couple of years ago.

– We looked closely at the different kinds of text analysis and machine learning, to earlier detect signs of such incidents being prepared, he says.

Machine Learning means simplified that a computer judge of text and searches for specific combinations of characters, words, sentences or even pictures. And the computer program are learning, getting better and better at locating signals that someone is planning murder or terrorist act.

How far did you get?

– We talked about this from a technical perspective – technique is one thing, but to be able to realize the need to discuss the ethical issues too. How much surveillance society we want. It is not even certain that the relevant authorities must use these methods.

How would a computer spy work?

– First, sweep widely across different types of social media to locate keywords. Then you can detect if it is discussed school shootings and violent extremism. Or if there are pictures where someone posing with guns. There would be many false alarms, of course, but also signals for each one should put in more targeted retrieval.

Is it enough?

– Is there a direct Threats in the text, recently the University of Lund, it would come up much earlier. But the computer should not take any decision without just producing material. Since there must be a man in order to evaluate the threat right.

LikeTweet

No comments:

Post a Comment