Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma

Science and Engineering Ethics 26 (6):2975-2984 (2020)
  Copy   BIBTEX

Abstract

Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially when considering lone-wolf terrorism—lead to irregular and isolated footprints. The irregularity of data affects the accuracy of machine learning algorithms and the mass surveillance that depends on them which can be explained by three kinds of known problems encountered in machine learning theory: class imbalance, the curse of dimensionality, and spurious correlations. Proponents of mass surveillance often invoke the distinction between collecting data and metadata, in which the latter is understood as a lesser breach of privacy. Their arguments commonly overlook the ambiguity in the definitions of data and metadata and ignore the ability of machine learning techniques to infer the former from the latter. Given the sparsity of datasets used for machine learning in counterterrorism and the privacy risks attendant with bulk data collection, policymakers and other relevant stakeholders should critically re-evaluate the likelihood of success of the algorithms and the collection of data on which they depend.

Other Versions

No versions found

Links

PhilArchive

    This entry is not archived by us. If you are the author and have permission from the publisher, we recommend that you archive it. Many publishers automatically grant permission to authors to archive pre-prints. By uploading a copy of your work, you will enable us to better index it, making it easier to find.

    Upload a copy of this work     Papers currently archived: 105,586

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):362-370.
Real-Time Medical Image Analysis and Guidance Via Telegram Chatbot: Bridging Accessibility Gaps in Urban Healthcare.P. Shivathmika - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.

Analytics

Added to PP
2020-07-22

Downloads
24 (#1,003,370)

6 months
2 (#1,364,362)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Add more citations

References found in this work

Security and Privacy: Why Privacy Matters. [REVIEW]Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (3):669-671.

Add more references