SKYNET (surveillance program): Difference between revisions

From Wikipedia, the free encyclopedia

Content deleted Content added


 

Line 2: Line 2:

{{otherusesof|Skynet}}

{{otherusesof|Skynet}}

”’SKYNET”’ is a program by the U.S. [[National Security Agency]] that performs [[machine learning]] analysis on [[communications intelligence|communications data]] to extract information about possible terror suspects. The tool is used to identify targets, such as [[al-Qaeda]] couriers, who move between [[GSM]] [[cellular network]]s. Specifically, mobile usage patterns such as swapping [[SIM card]]s within phones that have the same [[Electronic serial number|ESN]], [[MEID]] or [[IMEI]] number are deemed indicative of covert activities.<ref name=ArsTechnica20160216 /><ref name=”theintercept” /> Like many other security programs, the SKYNET program uses graphs that consist of a set of nodes and edges to visually represent social networks.<ref name=”:0″>{{Cite web|url=https://search.edwardsnowden.com/docs/SKYNETCourierDetectionviaMachineLearning2015-05-08nsadocs|title=SKYNET: Courier Detection via Machine Learning|last=NSA|website=Snowden Doc Search|access-date=December 7, 2019|archive-date=2019-12-08|archive-url=https://web.archive.org/web/20191208021148/https://search.edwardsnowden.com/docs/SKYNETCourierDetectionviaMachineLearning2015-05-08nsadocs|url-status=dead}}</ref> The tool also uses [[Statistical classification|classification]] techniques like [[random forest]] analysis. Because the [[data set]] includes a very large proportion of [[true negative]]s and a small [[training set]], there is a risk of [[overfitting]].<ref name=”ArsTechnica20160216″ /> [[Bruce Schneier]] argues that a [[false positive rate]] of 0.008% would be low for commercial applications where “if Google makes a mistake, people see an ad for a car they don’t want to buy” but “if the government makes a mistake, they kill innocents.”<ref name=”ArsTechnica20160216″/>

”’SKYNET”’ is a program by the U.S. [[National Security Agency]] that performs [[machine learning]] analysis on [[communications intelligence|communications data]] to extract information about possible terror suspects. The tool is used to identify targets, such as [[al-Qaeda]] couriers, who move between [[GSM]] [[cellular network]]s. Specifically, mobile usage patterns such as swapping [[SIM card]]s within phones that have the same [[Electronic serial number|ESN]], [[MEID]] or [[IMEI]] number are deemed indicative of covert activities.<ref name=ArsTechnica20160216 /><ref name=”theintercept” /> Like many other security programs, the SKYNET program uses graphs that consist of a set of nodes and edges to visually represent social networks.<ref name=”:0″>{{Cite web|url=https://search.edwardsnowden.com/docs/SKYNETCourierDetectionviaMachineLearning2015-05-08nsadocs|title=SKYNET: Courier Detection via Machine Learning|last=NSA|website=Snowden Doc Search|access-date=December 7, 2019|archive-date=2019-12-08|archive-url=https://web.archive.org/web/20191208021148/https://search.edwardsnowden.com/docs/SKYNETCourierDetectionviaMachineLearning2015-05-08nsadocs|url-status=dead}}</ref> The tool also uses [[Statistical classification|classification]] techniques like [[random forest]] analysis. Because the [[data set]] includes a very large proportion of [[true negative]]s and a small [[training set]], there is a risk of [[overfitting]].<ref name=”ArsTechnica20160216″ /> [[Bruce Schneier]] argues that a [[false positive rate]] of 0.008% would be low for commercial applications where “if Google makes a mistake, people see an ad for a car they don’t want to buy” but “if the government makes a mistake, they kill innocents.”<ref name=”ArsTechnica20160216″/>

==Participation and partnerships==


Latest revision as of 09:16, 19 October 2025

U.S. National Security Agency Surveillance Program

SKYNET is a program by the U.S. National Security Agency that performs machine learning analysis on communications data to extract information about possible terror suspects. The tool is used to identify targets, such as al-Qaeda couriers, who move between GSM cellular networks. Specifically, mobile usage patterns such as swapping SIM cards within phones that have the same ESN, MEID or IMEI number are deemed indicative of covert activities.[1][2] Like many other security programs, the SKYNET program uses graphs that consist of a set of nodes and edges to visually represent social networks.[3] The tool also uses classification techniques like random forest analysis. Because the data set includes a very large proportion of true negatives and a small training set, there is a risk of overfitting.[1] Bruce Schneier argues that a false positive rate of 0.008% would be low for commercial applications where “if Google makes a mistake, people see an ad for a car they don’t want to buy” but “if the government makes a mistake, they kill innocents.”[1]

It has partnerships with TMAC/FASTSCOPE, MIT Lincoln labs and Harvard.[4]

The SKYNET project was linked with drone systems, thus creating the potential for false-positives to lead to deaths.[1][5]

According to NSA, the SKYNET project is able to accurately reconstruct crucial information about the suspects including their social relationships, habits, and patterns of movements through graph-based visualization of GSM data.[3] However, scholars criticize that current security literature conflate statistical discrepancies with behavioral abnormalities and that the anomaly detection methodology SKYNET perpetuates the self/other binary.[6] For example, Al-Jazeera‘s bureau chief in Islamabad, Ahmad Zaidan, was wrongly identified as the most probable member of al-Qaeda and the Muslim Brotherhood on their records.[1][5][7]

Leave a Comment

Your email address will not be published. Required fields are marked *

Exit mobile version