The video in this case has two parts to it's presentation. The first part involves the very interesting use of data mining to create a graphic representation of the way in which an individual communicates through their typing. This in itself seems somewhat innocuous, but can be overstated in pursuing suspects as seen in the second part of the video. As Chen states in a journal article, Overall, the expert agreed that the results were very promising because they offer useful investigation leads and would be very helpful to improve understanding of terrorist activities on the Web" (Chen, Chung, Qin, Reid, Sageman, &Weimann 2008). What I take from that is that data mining should be a start to an investigation and not the entire investigation.
The interesting and controversial use of data mining in the fight against global terrorism can be a hot button topic to say the least. When cases like Andrej Holm come up you have to question how things like this happen. Just because the technology exists and has been used for good does not mean it cannot be perverted and used to persecute individuals that have not committed a crime.
A major issue that is questioned in these practices is one of privacy. Is it right for the government or any other entity to catalog so much of an individual's online activity? I take the stance of, if you put it out there then it is no longer private. If you do not want people to know how you feel about something on a message board, then do not post about it. This is still American, you can say almost anything you want, even if it lacks truth to it. I am a person that firmly believes in consequences though. If you feel the need to post inflammatory remarks that are racist or discriminatory then feel free to. Just do not complain about it when there are repercussions.
Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the dark Web: A case study of Jihad on the Web. Journal Of The American Society For Information Science & Technology, 59(8), 1347-1359.
No comments:
Post a Comment