Automating Crime Prevention, Surveillance, and Military Operations 2021
DOI: 10.1007/978-3-030-73276-9_10
|View full text |Cite
|
Sign up to set email alerts
|

Project Maven, Big Data, and Ubiquitous Knowledge: The Impossible Promises and Hidden Politics of Algorithmic Security Vision

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…The automatic identification of anomalies out of similar data may avoid, as Aradau and Blanke (2018) suggest, identifying norms beforehand. Yet the whole process of creating the databases from which algorithms work involves selecting, filtering, indexing, and excluding to keep only the types of data deemed relevant to identifying risks (Hogue 2021). In other words, even if anomaly detection does not ask programmers to set queries beforehand, developers still need to select specific types of data thought to provide insight-communication metadata to reconstruct social graphs or geolocation data to build mobility patternsand then leave analysts to judge the security value of the flagged data afterward.…”
Section: The Efficient Machine: Normalizing Algorithmic Surveillance ...mentioning
confidence: 99%
“…The automatic identification of anomalies out of similar data may avoid, as Aradau and Blanke (2018) suggest, identifying norms beforehand. Yet the whole process of creating the databases from which algorithms work involves selecting, filtering, indexing, and excluding to keep only the types of data deemed relevant to identifying risks (Hogue 2021). In other words, even if anomaly detection does not ask programmers to set queries beforehand, developers still need to select specific types of data thought to provide insight-communication metadata to reconstruct social graphs or geolocation data to build mobility patternsand then leave analysts to judge the security value of the flagged data afterward.…”
Section: The Efficient Machine: Normalizing Algorithmic Surveillance ...mentioning
confidence: 99%
“…However, Project Maven has not yet undergone rigorous scientific testing. Investigating the usefulness of a Maven-like recognition aid for enhancing sensemaking is important because other projects that the U.S. Defense Department is planning on undertaking build upon the design of Project Maven (Hogue, 2021).…”
Section: Introductionmentioning
confidence: 99%