Threat Risk Assessment – Read This Complete Summary in Regards to This Security Threat Assessment.

Perhaps, you might be unaware however, there is an advanced research division for future technologies allotted to america Government intelligence agencies and industrial intelligence complex. It’s called IARPA which is an ingenious concept depending on the DARPA model; High Risk – High Gain strategy to advanced research and development. Which makes sense right, especially considering we are now living in a world fraught with cyber hackers, corporate espionage, and terrorists. This implies our intelligence agencies has to be on the ball, and they should be right 100% of times whilst the evil-doers only have to have it right once you see.

Now then, consider when you will the massive quantity of data our company is collecting on individual citizens currently online. Aside from that, but everyone presently has an intelligent phone, an e-mail address, and perhaps a couple of social media pages. Folks also make comments on articles they read in the media into little boxes and press the submit button. As it is rather easy to determine who someone will depend on their ISP address, their social network sites profile, their cellphone number, and the way they write – it is very simple to do threat assessment to find out if they could be a threat risk.

Today, the artificial intelligent computers which collect all this data have not been optimized or programmed everything well, and so they can be flagging quite a few false positives. However each and every time an individual gets away with a crime against humanity, a terrorist act, a hacking event, a criminal act, and even spying the authorities can go back and check out their types of operation, their writings, and gain clues in the human psyche that goes in addition to such folks. And every time the artificial intelligent computers improve at guesstimating in just a close tolerance of probability the particular individuals they are searching for – the more effective they may work. If you were IARPA wouldn’t you be looking into this?

Okay so, as this has all but going on quite a long time it seems sensible that these artificial intelligent computers are becoming rather good at the Lone Wolf assessment (Lone Wolf could possibly be someone just like the Unabomber for instance). Think about lone wolf because the hardest sort of terrorist to discover, someone who works alone, has very little communication using the rest of the world, detailed plans which can be never shared with anyone, and thus few clues to give them, or few associates, Facebook friends, or collaborators to transform them in. Therefore it is tough to go into their brains and discover what they’re thinking without contacting them within the auspice of some important reason other than the exact surveillance.

In other words it requires manpower, and a really good story to even get to a point to speak with this type of individual. However because everyone is connected now and everyone is able to be geo-tracked, and has an e-mail address, or even a Facebook page there are lots of approaches to make contact with they. The only problem with the is manpower. Therefore it’s obvious that later on artificial intelligent computers, true artificial intelligence according to Alan Turing’s famous AI test (the capacity of the computer to fool a human into thinking that it is actually conversing with another human) – will contact these folks and commence up some form of conversation.

The easiest method to do this can be for your artificial intelligent computer to search through each of the data, including all of the writings that could have been posted in forums, responding to online media articles, and each of the postings on blogs, and social network sites pages. After that the artificial intelligent computer may use the individual’s own words, and modify those sentences using similar words with the same meaning from your thesaurus, within the database of the AI computer software – and also this AI computer are able to talk with the individual with a one-on-one basis.

By doing this, the AI computer is going to be gathering information from that conversation together with something that the average person types way back in an e-mail. All of that may then be loaded right into a database and included with every one of the collected words already written, or spoken in to a cellular phone, so long as the intelligence agencies have obtained the authority to listen in. Obviously, each of the public information will not want a permission slip or court subpoena. It is quite possible that eventually these AI systems are able to correspond with the individual every once in awhile, checking in on the psychological displacement, or progress, further assessing should they have increased the possible chance of committing a violent act, or maybe if that individual will be downgraded to a different level.

When the individual grows to the top level, and it would appear that they can be either willing or willing to commit this kind of act, that’s when human intervention may take place, and merely if they become a menace to society or our government inside a strong probability, mathematically speaking. As time passes better algorithms will likely be used and thru practice better techniques will probably be learned to make sure you can find hardly any false positives. Now then, I can hear the EFF – Electronic Freedom Foundation already to submit a lawsuit against the application of these AI computers in connection with this.

Probably the ethical question is going to be does the government and our intelligence agencies have the legal right to snoop on citizens, pretend being someone they are certainly not, collect specifics of each potential individual, and stick that into a file somewhere, or hidden in certain giant data center? The fact is when someone posts information online within the public, that details are now in the public, and anyone may apply it any legitimate purpose.

Protecting the American people is within the arena of the government’s responsibility according to the United states Constitution plus a legitimate purpose one could argue just before the Supreme Court. Thus, they could have the authority to gather each of the public information about anyone which happens to be on the web. Not merely will they do this for American citizens, and also from potential threats of international terrorism, and folks away from our country. Surely, our intelligence services and agencies will likely be working together with other governments around the world sharing this info.

Who may be to mention that other governments are not already collecting info on Americans? It would behoove them to get this done even though they didn’t find any Americans were a menace to their countries or nations, for your simple reason to offer us more of their items which has been imported to the United States. Corporations collect your details at all times because perhaps you are a client, you have joined their rewards program, or you are already recognized as someone that may potentially buy something from them in the future. They are doing have the ability to collect information they find online.

Let’s say someone that is upset with something going on on earth writes rather disparaging comments about some agency, company, industry, or individual around the Washington Post website after articles they only read – that information will probably be collected, and then the AI computer may contact that individual under false pretense, and attempt to launch a conversation. If this conversation leads the AI computer to consider that this person is problematic, psychotic, extremely angry, or prepared to do something inside their own hands, then the threat assessment level will go up, and red flags is going to be raised.

Remember, I was discussing the difficulties of manpower within the intelligence industry and intelligence agencies. It is a real dilemma, for whenever we have way too many false positives and spend too much time and cash on the wrong individuals, our company is liable to let someone else slip through. However, when the artificial intelligent computer has brought seccurity the point it can pass the Turing test without tipping away from the individual, it could in essence have conversations by e-mail with thousands of people within a afternoon.

Since this is possible or simply, already is, it will probably be part of our future, our government, as well as other governments, and folks will use these techniques, every one of them plus some more We have not discussed in this article. Okay so, I assume you will be wondering why I understand this? No comment. Indeed, I hope you’ve enjoyed today’s technology briefing and revel in your entire afternoon, I understand I will, and don’t forget to place more details about you online at your social media. Ha ha ha. Please consider this all and think upon it.