Return-Path: <sentto-279987-5157-1028993532-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 10 Aug 2002 08:35:08 -0700 (PDT) Received: (qmail 8820 invoked by uid 510); 10 Aug 2002 15:30:51 -0000 Received: from n30.grp.scd.yahoo.com (66.218.66.87) by all.net with SMTP; 10 Aug 2002 15:30:51 -0000 X-eGroups-Return: sentto-279987-5157-1028993532-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.94] by n30.grp.scd.yahoo.com with NNFMP; 10 Aug 2002 15:32:12 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 10 Aug 2002 15:32:12 -0000 Received: (qmail 12609 invoked from network); 10 Aug 2002 15:32:12 -0000 Received: from unknown (66.218.66.216) by m1.grp.scd.yahoo.com with QMQP; 10 Aug 2002 15:32:12 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 10 Aug 2002 15:32:12 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7AFWev02836 for iwar@onelist.com; Sat, 10 Aug 2002 08:32:40 -0700 Message-Id: <200208101532.g7AFWev02836@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 10 Aug 2002 08:32:40 -0700 (PDT) Subject: [iwar] [fc:Tracking.Terrorists.the.Las.Vegas.Way] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=1.6 required=5.0 tests=CASINO,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: * Tracking Terrorists the Las Vegas Way <a href="http://www.pcworld.com/news/article/0,aid,103692,00.asp">http://www.pcworld.com/news/article/0,aid,103692,00.asp> CIA-funded firm uses techniques for catching gambling cheaters to help government identify terrorists. PCWorld.com Wednesday, August 07, 2002 LAS VEGAS--It might not seem that gambling sharks and Al Qaeda terrorists have much in common. But a firm here that helps casinos catch cheaters is now using its software to help the government track people suspected of being terrorists. Jeff Jonas, founder and chief scientist of Systems Research and Development, offered a glimpse of his company's NORA (Non-Obvious Relationship Awareness) technology at the recent Black Hat security conference. NORA could just as well be called In Search of Kevin Bacon, as it crunches data to find the six degrees of separation that folklorists say connect all people in the world. SRD designed the program to catch card counters and other cheaters at casino gaming tables, and to detect collusion between corrupt dealers and gamblers. Fuzzy Logic The version of the software used by casinos can use face recognition to quickly match a surveillance-camera image with a database of known cheaters. It also uses fuzzy logic to help detect less obvious relationships between casino personnel and known cheaters who appear on the Nevada Gaming Commission's blacklist, by comparing and cross-checking employee data on resumes and company applications. NORA evaluates information such as names, addresses, social security and credit card numbers, and emergency contact numbers in company records, searching for similarities among employees and cheaters. Companies can also get data from firms like Choicepoint that aggregate information such as driver's license and vehicle registration information, land deed records, and credit histories. For instance, NORA might reveal that a dealer was once married to a woman whose maiden name matches the surname of a suspected cheater, raising the possibility that the dealer and the cheater were once in-laws. Jonas cautions that such data alone doesn't establish guilt. Still, it could help investigators optimize their surveillance resources by homing in on the likeliest possible suspects. Investigators first funnel raw data through a clean-up process to reconcile conflicting information. For instance, someone named Francis George might appear on one list with an address at 224 Washington Street and on another list as George Francis at the same address or as Frank George at 242 Washington Street. NORA looks for all permutations of a name or address to identify a possible alias, to reconcile mistakes in data entry, and to deliberate attempts to alter data. Something as simple as transposed numbers or misspelled street names, for example, could throw a standard background check off track. Government Potential NORA's analytical capabilities could prove useful to government intelligence agencies trying to ferret out terrorist cells entrenched in communities. U.S. intelligence agencies endured criticism following reports that information on terrorists was not properly analyzed or disseminated before September 11. The government amassed a large amount of data, but was slow to process and analyze it. "Many organizations have applications that hold a lot of data," says chief executive officer John Slitz of SRD. "But these applications don't accept a query, so you can't analyze the data." NORA creates a data warehouse for storing information where users can quickly add new information and cross-check it with other entries. The FBI could cross-check lists of Al Qaeda and Taliban prisoners at the Guantanamo Bay naval base, or trace relationships among suspected terrorists being held in the United States. Likewise, the FBI could quickly check airline passenger lists to determine whether a suspect at a Cleveland airport is the nephew of a known Egyptian terrorist, once shared an address with another terrorist suspect in Germany, or uses the same credit card or bank account number as a suspect in Texas. NORA analyzes data in near real-time, returning query results in about 8 seconds, according to Slitz. The program collects data from the FBI's Most Wanted Terrorist List as well as from the Treasury Department's Office of Foreign Asset Control. The Most Wanted Terrorist List compiles names of individuals and organizations considered a threat to the United States, including terrorists and drug traffickers. SRD itself is backed by the CIA's venture-capital firm In-Q-Tel, which invests in companies that develop products useful to intelligence operations. ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT