Insider mapping

classic Classic list List threaded Threaded
10 messages Options
Reply | Threaded
Open this post in threaded view
|

Insider mapping

Joseph Dalessandro
Mining of email data could help companies spot dangerous employees
before they do damage

http://www.darkreading.com/document.asp?doc_id=147627

Three researchers at the Air Force Institute of Technology -- James
Okolica, Gilbert Peterson, and Robert Mills -- have published a paper
that outlines an algorithm for mining email data and identifying
patterns of transmission that might tell managers when employees are
keeping a secret.


Reply | Threaded
Open this post in threaded view
|

Insider mapping

James Steiner
Sounds like their whole concept is flawed--that an employee who keeps
secrets from the workplace is a potentially bad employee? Wouldn't the
ability to compartmentalize work email topics and personal email
topics be a sign of a *good* employee?

~~James
_________________
www.turtlezero.com

On Wed, Mar 5, 2008 at 8:35 PM, Joseph Dalessandro <joe at nan0.com> wrote:

> Mining of email data could help companies spot dangerous employees
>  before they do damage
>
>  http://www.darkreading.com/document.asp?doc_id=147627
>
>  Three researchers at the Air Force Institute of Technology -- James
>  Okolica, Gilbert Peterson, and Robert Mills -- have published a paper
>  that outlines an algorithm for mining email data and identifying
>  patterns of transmission that might tell managers when employees are
>  keeping a secret.
>
>  ============================================================
>  FRIAM Applied Complexity Group listserv
>  Meets Fridays 9a-11:30 at cafe at St. John's College
>  lectures, archives, unsubscribe, maps at http://www.friam.org
>


Reply | Threaded
Open this post in threaded view
|

Insider mapping

Joost Rekveld
quote from the article:

"The algorithm, dubbed the Potential Insider Threat Detection  
Algorithm, is a "promising tool" for aiding IT departments in  
narrowing down the list of subjects in a breach investigation, the  
researchers said. However, the experimental analysis of Enron's email  
did not correctly identify the top managers who were involved in the  
company's fraud."

so the method was developed, tested, and it failed.
right.

anyway it seems that according to these people anyone with  
'excentric' interests should be labeled as a threat: obscure hobbies,  
knowledge of foreign languages are all signs of a potential threat ?
great ! seems these people work in very boring companies indeed !

ciao,

Joost.




On  6 Mar, 2008, at 3:06 AM, James Steiner wrote:

> Sounds like their whole concept is flawed--that an employee who keeps
> secrets from the workplace is a potentially bad employee? Wouldn't the
> ability to compartmentalize work email topics and personal email
> topics be a sign of a *good* employee?
>
> ~~James
> _________________
> www.turtlezero.com
>
> On Wed, Mar 5, 2008 at 8:35 PM, Joseph Dalessandro <joe at nan0.com>  
> wrote:
>> Mining of email data could help companies spot dangerous employees
>>  before they do damage
>>
>>  http://www.darkreading.com/document.asp?doc_id=147627
>>
>>  Three researchers at the Air Force Institute of Technology -- James
>>  Okolica, Gilbert Peterson, and Robert Mills -- have published a  
>> paper
>>  that outlines an algorithm for mining email data and identifying
>>  patterns of transmission that might tell managers when employees are
>>  keeping a secret.
>>
>>  ============================================================
>>  FRIAM Applied Complexity Group listserv
>>  Meets Fridays 9a-11:30 at cafe at St. John's College
>>  lectures, archives, unsubscribe, maps at http://www.friam.org
>>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> lectures, archives, unsubscribe, maps at http://www.friam.org



Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

Patrick Reilly
Sounds like a "promising" pre-crime detection system.  Could be used  
to justify a search warrant, but then, who needs  a judge's  
permission anymore?



On Mar 6, 2008, at 6:23 AM, Joost Rekveld wrote:

> quote from the article:
>
> "The algorithm, dubbed the Potential Insider Threat Detection
> Algorithm, is a "promising tool" for aiding IT departments in
> narrowing down the list of subjects in a breach investigation, the
> researchers said. However, the experimental analysis of Enron's email
> did not correctly identify the top managers who were involved in the
> company's fraud."
>
> so the method was developed, tested, and it failed.
> right.
>
> anyway it seems that according to these people anyone with
> 'excentric' interests should be labeled as a threat: obscure hobbies,
> knowledge of foreign languages are all signs of a potential threat ?
> great ! seems these people work in very boring companies indeed !
>
> ciao,
>
> Joost.
>
>
>
>
> On  6 Mar, 2008, at 3:06 AM, James Steiner wrote:
>
>> Sounds like their whole concept is flawed--that an employee who keeps
>> secrets from the workplace is a potentially bad employee? Wouldn't  
>> the
>> ability to compartmentalize work email topics and personal email
>> topics be a sign of a *good* employee?
>>
>> ~~James
>> _________________
>> www.turtlezero.com
>>
>> On Wed, Mar 5, 2008 at 8:35 PM, Joseph Dalessandro <joe at nan0.com>
>> wrote:
>>> Mining of email data could help companies spot dangerous employees
>>>  before they do damage
>>>
>>>  http://www.darkreading.com/document.asp?doc_id=147627
>>>
>>>  Three researchers at the Air Force Institute of Technology -- James
>>>  Okolica, Gilbert Peterson, and Robert Mills -- have published a
>>> paper
>>>  that outlines an algorithm for mining email data and identifying
>>>  patterns of transmission that might tell managers when employees  
>>> are
>>>  keeping a secret.
>>>
>>>  ============================================================
>>>  FRIAM Applied Complexity Group listserv
>>>  Meets Fridays 9a-11:30 at cafe at St. John's College
>>>  lectures, archives, unsubscribe, maps at http://www.friam.org
>>>
>>
>> ============================================================
>> FRIAM Applied Complexity Group listserv
>> Meets Fridays 9a-11:30 at cafe at St. John's College
>> lectures, archives, unsubscribe, maps at http://www.friam.org
>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> lectures, archives, unsubscribe, maps at http://www.friam.org



Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

Joost Rekveld
are you serious ?
I guess my point is these kinds of developments are threatening for  
those who do not think the norm is for them. As a peace-loving  
multilingual artist with several relatively obscure interests I can  
totally see that what I consider to be interesting will soon be  
labelled pre-crime symptoms. Who needs renaissance optics, ottoman  
music, outmoded utopias ? all very suspicious !
I guess I should be watching TV like everybody else...

ciao,

Joost.

On  6 Mar, 2008, at 3:52 PM, Patrick Reilly wrote:

> Sounds like a "promising" pre-crime detection system.  Could be used
> to justify a search warrant, but then, who needs  a judge's
> permission anymore?
>
>
>
> On Mar 6, 2008, at 6:23 AM, Joost Rekveld wrote:
>
>> quote from the article:
>>
>> "The algorithm, dubbed the Potential Insider Threat Detection
>> Algorithm, is a "promising tool" for aiding IT departments in
>> narrowing down the list of subjects in a breach investigation, the
>> researchers said. However, the experimental analysis of Enron's email
>> did not correctly identify the top managers who were involved in the
>> company's fraud."
>>
>> so the method was developed, tested, and it failed.
>> right.
>>
>> anyway it seems that according to these people anyone with
>> 'excentric' interests should be labeled as a threat: obscure hobbies,
>> knowledge of foreign languages are all signs of a potential threat ?
>> great ! seems these people work in very boring companies indeed !



-------------------------------------------

                             Joost Rekveld
-----------    http://www.lumen.nu/rekveld

-------------------------------------------

"There is little use in devising a system of thought about
the nature of the trap if the only thing to do in order to
get out of the trap is to know the trap and find the exit.
Everything else is utterly useless: Singing hymns about
the suffering in the trap ... or making poems about the
freedom outside of the trap, dreamed of within the trap ...
The first thing to do is to find the exit out of the trap.
The nature of the trap has no interest whatsoever beyond
this one crucial point:
WHERE IS THE EXIT OUT OF THE TRAP?

(Wilhelm Reich)

-------------------------------------------






-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://redfish.com/pipermail/friam_redfish.com/attachments/20080306/61a6ee0d/attachment.html 

Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

Patrick Reilly
Hola Joost:

I'm quite serious that algorithms like these might someday be used to  
justify a search warrant.  That is assuming that the US Bill of  
Rights will someday be restored and the US courts will require the  
police to secure search warrants.

--   Pat


On Mar 6, 2008, at 8:13 AM, Joost Rekveld wrote:

> are you serious ?
> I guess my point is these kinds of developments are threatening for  
> those who do not think the norm is for them. As a peace-loving  
> multilingual artist with several relatively obscure interests I can  
> totally see that what I consider to be interesting will soon be  
> labelled pre-crime symptoms. Who needs renaissance optics, ottoman  
> music, outmoded utopias ? all very suspicious !
> I guess I should be watching TV like everybody else...
>
> ciao,
>
> Joost.
>
> On  6 Mar, 2008, at 3:52 PM, Patrick Reilly wrote:
>
>> Sounds like a "promising" pre-crime detection system.  Could be used
>> to justify a search warrant, but then, who needs  a judge's
>> permission anymore?
>>
>>
>>
>> On Mar 6, 2008, at 6:23 AM, Joost Rekveld wrote:
>>
>>> quote from the article:
>>>
>>> "The algorithm, dubbed the Potential Insider Threat Detection
>>> Algorithm, is a "promising tool" for aiding IT departments in
>>> narrowing down the list of subjects in a breach investigation, the
>>> researchers said. However, the experimental analysis of Enron's  
>>> email
>>> did not correctly identify the top managers who were involved in the
>>> company's fraud."
>>>
>>> so the method was developed, tested, and it failed.
>>> right.
>>>
>>> anyway it seems that according to these people anyone with
>>> 'excentric' interests should be labeled as a threat: obscure  
>>> hobbies,
>>> knowledge of foreign languages are all signs of a potential threat ?
>>> great ! seems these people work in very boring companies indeed !
>
>
>
> -------------------------------------------
>
>                              Joost Rekveld
> -----------    http://www.lumen.nu/rekveld
>
> -------------------------------------------
>
> "There is little use in devising a system of thought about
> the nature of the trap if the only thing to do in order to
> get out of the trap is to know the trap and find the exit.
> Everything else is utterly useless: Singing hymns about
> the suffering in the trap ... or making poems about the
> freedom outside of the trap, dreamed of within the trap ...
> The first thing to do is to find the exit out of the trap.
> The nature of the trap has no interest whatsoever beyond
> this one crucial point:
> WHERE IS THE EXIT OUT OF THE TRAP?
>
> (Wilhelm Reich)
>
> -------------------------------------------
>
>
>
>
>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> lectures, archives, unsubscribe, maps at http://www.friam.org

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://redfish.com/pipermail/friam_redfish.com/attachments/20080306/541cf1fc/attachment.html 

Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

Roger Critchlow-2
Joost --

Patrick is being ironic about this, at least so my american english humor
detector tells me.  He isn't advocating that this ought to be done, just
noting that it probably will be done.

My sixth grade daughter came home from taking a standardized science test
yesterday and reported that the test asked for a definition of "outlier" and
there wasn't  a definition in any dictionary they had in the classroom.

-- rec --

On Thu, Mar 6, 2008 at 9:23 AM, Patrick Reilly <patrick.reilly at ipsociety.net>
wrote:

> Hola Joost:
> I'm quite serious that algorithms like these might someday be used to
> justify a search warrant.  That is assuming that the US Bill of Rights will
> someday be restored and the US courts will require the police to secure
> search warrants.
>
> --   Pat
>
>
> On Mar 6, 2008, at 8:13 AM, Joost Rekveld wrote:
>
> are you serious ?I guess my point is these kinds of developments are
> threatening for those who do not think the norm is for them. As a
> peace-loving multilingual artist with several relatively obscure interests I
> can totally see that what I consider to be interesting will soon be labelled
> pre-crime symptoms. Who needs renaissance optics, ottoman music, outmoded
> utopias ? all very suspicious !
> I guess I should be watching TV like everybody else...
>
> ciao,
>
> Joost.
>
> On  6 Mar, 2008, at 3:52 PM, Patrick Reilly wrote:
>
> Sounds like a "promising" pre-crime detection system.  Could be used
> to justify a search warrant, but then, who needs  a judge's
> permission anymore?
>
>
>
> On Mar 6, 2008, at 6:23 AM, Joost Rekveld wrote:
>
> quote from the article:
>
> "The algorithm, dubbed the Potential Insider Threat Detection
> Algorithm, is a "promising tool" for aiding IT departments in
> narrowing down the list of subjects in a breach investigation, the
> researchers said. However, the experimental analysis of Enron's email
> did not correctly identify the top managers who were involved in the
> company's fraud."
>
> so the method was developed, tested, and it failed.
> right.
>
> anyway it seems that according to these people anyone with
> 'excentric' interests should be labeled as a threat: obscure hobbies,
> knowledge of foreign languages are all signs of a potential threat ?
> great ! seems these people work in very boring companies indeed !
>
>
>
>
> -------------------------------------------
>
>                               Joost Rekveld
> -----------    http://www.lumen.nu/rekveld
>
> -------------------------------------------
>
> "There is little use in devising a system of thought about
> the nature of the trap if the only thing to do in order to
> get out of the trap is to know the trap and find the exit.
> Everything else is utterly useless: Singing hymns about
> the suffering in the trap ... or making poems about the
> freedom outside of the trap, dreamed of within the trap ...
> The first thing to do is to find the exit out of the trap.
> The nature of the trap has no interest whatsoever beyond
> this one crucial point:
> WHERE IS THE EXIT OUT OF THE TRAP?
>
> (Wilhelm Reich)
>
> -------------------------------------------
>
>
>
>
>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> lectures, archives, unsubscribe, maps at http://www.friam.org
>
>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> lectures, archives, unsubscribe, maps at http://www.friam.org
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://redfish.com/pipermail/friam_redfish.com/attachments/20080306/28b4d396/attachment.html 

Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

glen ep ropella
In reply to this post by Patrick Reilly

The reality is that tools like this are easily avoided by competent
criminals.  Hence, tools like this only catch the sporadic stupid
criminal and provide justification for the persecution of large swaths
of innocent people.

Of course, just because it can be used to persecute innocent people
doesn't mean we shouldn't fully develop and use the tool.  After all,
any technology can be and is used to persecute innocent people.  So, we
might as well develop tools that do the best job possible of persecuting
innocent people.

--
glen e. p. ropella, 971-219-3846, http://tempusdictum.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://redfish.com/pipermail/friam_redfish.com/attachments/20080306/f0adbe83/attachment.bin 

Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

Joost Rekveld
Glen,

that's a deep one; i'm going to think about this..

On  6 Mar, 2008, at 5:41 PM, glen e. p. ropella wrote:

> Of course, just because it can be used to persecute innocent people
> doesn't mean we shouldn't fully develop and use the tool.  After all,
> any technology can be and is used to persecute innocent people.  
> So, we
> might as well develop tools that do the best job possible of  
> persecuting
> innocent people.





-------------------------------------------

                               Joost Rekveld
-----------    http://www.lumen.nu/rekveld

-------------------------------------------

"There are no passengers on spaceship earth.
We are all crew.?

(Marshall McLuhan)

-------------------------------------------

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://redfish.com/pipermail/friam_redfish.com/attachments/20080306/9e375b47/attachment.html 

Reply | Threaded
Open this post in threaded view
|

Pre-crime Insider mapping

Marcus G. Daniels
In reply to this post by Roger Critchlow-2
Roger Critchlow wrote:
> My sixth grade daughter came home from taking a standardized science
> test yesterday and reported that the test asked for a definition of
> "outlier" and there wasn't  a definition in any dictionary they had in
> the classroom.
But at the end of the day, it is the non-outliers that give power to
those that govern.  And so the motive to keep people from straying from
that centroid too much..