Patrick Meier: Crisis Mapping Syria – Automated Data Mining and Crowdsourced Human Intelligence

Advanced Cyber/IO, Collective Intelligence, Communities of Practice, Earth Intelligence, Geospatial, Hacking
Patrick Meier

Crisis Mapping Syria: Automated Data Mining and Crowdsourced Human Intelligence

The Syria Tracker Crisis Map is without doubt one of the most impressive crisis mapping projects yet. Launched just a few weeks after the protests began one year ago, the crisis map is spearheaded by a just handful of US-based Syrian activists have meticulously and systematically documented 1,529 reports of human rights violations including a total of 11,147 killings. As recently reported in this NewScientist article, “Mapping the Human Cost of Syria’s Uprising,” the crisis map “could be the most accurate estimate yet of the death toll in Syria’s uprising […].” Their approach? “A combination of automated data mining and crowdsourced human intelligence,” which “could provide a powerful means to assess the human cost of wars and disasters.”

On the data-mining side, Syria Tracker has repurposed the HealthMap platform, which mines thousands of online sources for the purposes of disease detection and then maps the results, “giving public-health officials an easy way to monitor local disease conditions.” The customized version of this platform for Syria Tracker (ST), known as HealthMap Crisis, mines English information sources for evidence of human rights violations, such as killings, torture and detainment. As the ST Team notes, their data mining platform “draws from a broad range of sources to reduce reporting biases.” Between June 2011 and January 2012, for example, the platform collected over 43,o00 news articles and blog posts from almost 2,000 English-based sources from around the world (including some pro-regime sources).

Syria Tracker combines the results of this sophisticated data mining approach with crowdsourced human intelligence, i.e., field-based eye-witness reports shared via webform, email, Twitter, Facebook, YouTube and voicemail. This naturally presents several important security issues, which explains why the main ST website includes an instructions page detailing security precautions that need to be taken while sub-mitting reports from within Syria. They also link to this practical guide on how to protect your identity and security online and when using mobile phones. The guide is available in both English and Arabic.

Eye-witness reports are subsequently translated, geo-referenced, coded and verified by a group of volunteers who triangulate the information with other sources such as those provided by the HealthMap Crisis platform. They also filter the reports and remove dupli-cates. Reports that have a low con-fidence level vis-a-vis veracity are also removed. Volunteers use a dig-up or vote-up/vote-down feature to “score” the veracity of eye-witness reports. Using this approach, the ST Team and their volunteers have been able to verify almost 90% of the documented killings mapped on their platform thanks to video and/or photographic evidence. They have also been able to associate specific names to about 88% of those reported killed by Syrian forces since the uprising began.

Depending on the levels of violence in Syria, the turn-around time for a report to be mapped on Syria Tracker is between 1-3 days. The team also produces weekly situation reports based on the data they’ve collected along with detailed graphical analysis. KML files that can be uploaded and viewed using Google Earth are also made available on a regular basis. These provide “a more precisely geo-located tally of deaths per location.”

In sum, Syria Tracker is very much breaking new ground vis-a-vis crisis mapping. They’re combining automated data mining technology with crowdsourced eye-witness reports from Syria. In addition, they’ve been doing this for a year, which makes the project the longest running crisis maps I’ve seen in a hostile environ-ment. Moreover, they’ve been able to sustain these import efforts with just a small team of volunteers. As for the veracity of the collected information, I know of no other public effort that has taken such a meticulous and rigorous approach to documenting the killings in Syria in near real-time. On February 24th, Al-Jazeera posted the following estimates:

Syrian Revolution Coordination Union: 9,073 deaths
Local Coordination Committees: 8,551 deaths
Syrian Observatory for Human Rights: 5,581 deaths

At the time, Syria Tracker had a total of 7,901 documented killings associated with specific names, dates and locations. While some duplicate reports may remain, the team argues that “missing records are a much bigger source of error.” Indeed, They believe that “the higher estimates are more likely, even if one chooses to disregard those reports that came in on some of the most violent days where names were not always recorded.”

The Syria Crisis Map itself has been viewed by visitors from 136 countries around the world and 2,018 cities—with the top 3 cities being Damascus, Washington DC and, interestingly, Riyadh, Saudia Arabia. The witnessing has thus been truly global and collective. When the Syrian regime falls, “the data may help sub-sequent governments hold him and other senior leaders to account,” writes the New Scientist. This was one of the principle motivations behind the launch of the Ushahidi platform in Kenya over four years ago. Syria Tracker is powered by Ushahidi’s cloud-based platform, Crowdmap. Finally, we know for a fact that the International Criminal Court (ICC) and Amnesty International (AI) closely followed the Libya Crisis Map last year.

Michel Bauwens: Open Sourcing Digital Medical Devices

Advanced Cyber/IO, Collaboration Zones, Communities of Practice, Ethics, Hacking, Mobile, Policies, Real Time, Threats
Michel Bauwens

Essay of the Day: From Open Source to Open Sourcing Digital Medical Devices

Excerpted from Glyn Moody:

“It is not just an issue for life-saving medical devices that can kill as well as save: it is about our increasing reliance on embedded software in everyday life, in developed countries at least.

Clearly, we can’t. If the code is not available, then it necessarily limits the number of people who have looked at it. And as Linus’ Law reminds us, given enough eyeballs, all bugs are shallow. That doesn’t mean opening up the code guarantees that all bugs will be found, but it certainly increases the probability. The corollary is that keeping it closed decreases the chance of someone finding such bugs.

But there’s a problem here. As we move from the realm of “pure” software – that is, programs running on generalised computers producing essentially digital output (even if that is converted into analogue formats like sounds, images or printouts) – to that of “applied” software, there is a new element: the device itself.

For example, in the case of the pacemakers, having the software that drives the computational side of things is only part of the story: just as important is knowing what the software does in the real world, and that depends critically on the design of the hardware. Knowing that a particular sub-routine controls a particular aspect of the pacemaker tells us little unless we also know how the sub-routine’s output is implemented in the device.

What that means is that not only do we need the source code for the programs that run the devices, we also need details about the hardware – its design, its mechanical properties etc. That takes us into the area of open hardware, and here things start to get tricky.

Read rest of article.

Phi Beta Iota:  Governments have all failed to be responsible about understanding complexity and understanding the role of integrity as a foundation for sustainable properity.  Proprietary does not scale.  Closed kills.  It's time now for open everything and no compromises with respect to intelligence and integrity.

See Also:

2012 (Book) THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust 

2012 (Slides) THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust

Graphic: School for Future-Oriented Hybrid Governance with World Brain Institute, Global Game, and Prototype Center for Public Intelligence

Advanced Cyber/IO, Collaboration Zones, Ethics, Hacking, Key Players, Mobile, Policies, Real Time, Serious Games, Threats, Topics (All Other), True Cost, Worth A Look
Click on Image to Enlarge

Creative Commons license applies — no financial exploitation without permission.  Robert Steele owns three of the four world-brain urls (net, org, com) and is looking for a university with the gravitas to understand why this concept needs to be implemented in full, soonest.

See Also:

Director of articles & chapters leading to this graphic

Director of briefings & lectures leading to this graphic

Books leading to this graphic

Reviews of books by others leading to this graphic (negative)

Reviews of books by others leading to this graphic (positive)

Personal web page of Robert Steele

Yoda: Child-Driven Education, Convergence of Knowledge

04 Education, 11 Society, Advanced Cyber/IO, Blog Wisdom, Collaboration Zones, Communities of Practice, Ethics, Hacking, Methods & Process, Serious Games, Standards, Technologies, Threats, Tools
Got Crowd? BE the Force!

How Children’s Toys Reflect What’s Next in Technology & Education, March 5, 2012, PRAGMATIC VISIONS | by Jim Brazell 

[Editor’s note: This is the first in a new column series from the pragmatic visionaries at the Thornburg Center for Professional Development for edtech digest]

“The availability of technologies to youth is its own instructor.” –Nobelist Herbert A. Simon (June 15, 1916 – February 9, 2001), Author of Science of the Artificial and a Father of Artificial Intelligence

EXTRACT:  TOYS MIRROR WHAT’S NEXT IN TECHNOLOGY

In the same way that Erector Sets were patterned after the technologies of the third phase of the industrial revolution, the LEGO MindStorms kits reflect the structure of emerging technology and careers in the 21st Century. In 2006, Nano Quest from FIRST Robotics enabled students to program LEGO robots to mimic biological, chemical, and physical systems across  micro-, meso-, and nano-scales.

Continue reading “Yoda: Child-Driven Education, Convergence of Knowledge”

DefDog: NASA lost ‘full control’ to hackers, pwned 13 times last year

Government, Hacking, IO Impotency
DefDog

NASA lost ‘full control' to hackers, pwned 13 times last year

Houston still has a problem with security

By John Leyden

The Register, 5 March 2012

Cybercrooks broke into NASA's computer systems 13 times last year gaining “full functional control” of important systems in the worse cases, according to the testimony before the US Congress by the space agency's inspector general.

Read full article.

See Also:

1994 Sounding the Alarm on Cyber-Security

1998 TAKEDOWN: Targets, Tools, & Technocracy

2010: OPINION–America’s Cyber Scam

2012 Reflexivity = Integrity: Toward Earth/Life 4.0

DefDog: $15 Billion for Cyber-Command, Zero for Actual Needs + Meta-RECAP

Jon Lebkowsky: Six Big Science Stories Going Forward

03 Economy, 04 Education, Academia, Advanced Cyber/IO, Blog Wisdom, Civil Society, Collective Intelligence, Ethics, Hacking
Jon Lebkowsky

“Any sufficiently advanced technology is indistinguishable from magic.” (AC Clarke)

My pal David Pescovitz at the Institute for the Future blogged recently about the IFTF “Multiverse of Exploration Map,” an overview of the six big stories of science that will play out over the next decade:

Decrypting the Brain,
Hacking Space,
Massively Multiplayer Data,
Sea the Future
Strange Matter, and
Engineered Evolution.

“Those stories are emerging from a new ecology of science shifting toward openness, collaboration, reuse, and increased citizen engagement in scientific research.” A followup post includes a video of Luigi Anzivino from The Exploratorium talking about the relationship of magic and neuroscience.

See Also:

THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust

Paul Fernhout: Open Letter to the Intelligence Advanced Programs Research Agency (IARPA)

Robert Steele: Intelligent Management of Intelligence Agencies, and the New Craft of Intelligence

Analysis, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Ethics, Geospatial, Hacking, History, Information Operations (IO), Intelligence (government), Key Players, Methods & Process, Officers Call, Open Government, Policies, Real Time, Reform, Resilience, Serious Games, Strategy, Technologies, Threats, Waste (materials, food, etc), Whole Earth Review
Robert David STEELE Vivas

I have begun drafting my portion of the new Handbook of Intelligence Studies (Routledge, 2013), it is a chapter early on entitled “The Craft of Intelligence.”  I pick up where Allen Dulles and Sherman Kent left off.  My graphic on Intelligence Maturity captures the essence of my thinking at the strategic level, but of course there is more to come, including the desperate need to restore integrity to all that we do.

In 1988 I ghost-wrote for the Commandant of  the Marine Corps an article that he enhanced and signed, “Global Intelligence Challenges in the 1990's.”  At that time my focus was on the difference between the conventional threat and the emerging unconventional threat.

Now my focus is on the purpose and process of intelligence as decision-support.  We must — we will — move from secret intelligence for the few to open intelligence for the many; from expensive centralized largely worthless intelligence to free and low-cost distributed intelligence relevant to every person at every level on every issue; from intelligence as window-dressing for channeling $80 billion a year to banks and corporations, to intelligence as an integral element of every aspect of a Smart Nation.

Today Owl sent me a link to an article, Philip E. Tetlock and Barabara A Mellers, “Intelligent Management of Intelligence Agencies,” American Psychologist, 2011, pp. 1-12.  I  respect Owl, so I printed it and read it twice.

This article is completely out of touch with reality and the authors have not bothered to familiarize themselves with the literatures pertinent to their endeavor.  Out of 89 cited sources 12 are non-intelligence-related prior publications of the lead author, 1 is a prior publication of the second author, and 11 are ostensibly about intelligence but truly marginal selections.  So 12% sources on the subject, 13% self-citation, and 75% escoteric psycho-babble irrelevant to the actual challenge.  As an intelligence professional, I am offended that two ostensibly erudite individuals would dare to publish this trype without even a semblance of understanding of the subject under discussion.

See Also:

Robert Steele: The Craft of Intelligence – OLD vs. NEW

Here are a few comments and additional links:

Continue reading “Robert Steele: Intelligent Management of Intelligence Agencies, and the New Craft of Intelligence”