Using Machine Learning to Help Security Services

DZone 's Guide to

Using Machine Learning to Help Security Services

Classifying the two billion emails the U.S. State Department on a yearly basis is a daunting task. It has seen the benefit of machine learning and automation.

· Big Data Zone ·
Free Resource

The failures in coordination in the American security services have been widely reported in the aftermath of events like the 9/11 attacks. The knowledge required to prevent the attacks was available to staff but a lack of coordination resulted in this not reaching the people it should have. As a result, preventable atrocities took place.

A recent paper set out to explore how AI can be used to improve the internal processes in the U.S. State Department. The work was particularly interested in how the department can get better at correctly classifying the huge volume of emails generated each year internally.

Classifying the Classified

The department is believed to generate around two billion emails per year, many of which contain classified information. Understanding (and thus correctly tagging) the content that needs classifying is a laborious job, however.

The researchers used machine learning to improve this. They began by training their algorithms on around one million declassified cables from the 1970s between the State Department and overseas diplomats. Each message had been previously tagged as either secret, confidential, limited official use, or unclassified.

Having trained the system, they set it to work to see if it could correctly classify documents, and especially whether it could correctly label content as deserving of classified status.

The algorithm proved particularly potent at doing this, with a 90% success rate in spotting classified content, and a false positive rate of just 11%. What’s more, the team believe that they could do even better with slightly better data to work with.

What Makes Something Classified?

Aside from the ability to classify content, the work also sheds a new light on the aspects of a message that most contribute to its security status. For instance, it emerged that the frequency of certain words was the best indicator of the security status of the overall message, with sender and recipient much less reliable.

Interestingly, some of the false positive labels assigned by the machine, were actually proven to be human errors after all. In other words, they should have been classified but humans had tagged them otherwise.

It suggests that machines may play an increasingly important role in ensuring that content is classified correctly, but that for this to be effective they need to have good quality data on which to train themselves.

What’s more, the work also has the potential of revealing patterns in data sharing, and indeed in data removal within our security services that may in itself have security implications. After all, it emerged that classified content had a habit of going missing.

Whilst it’s undoubtedly interesting, it’s also clear that this is a very early stage of such a process. However, given the billions spent each year by the State Department on classifying documents, it’s work that hopefully merits further development.

artifical intelligence, big data, machine learning, national security

Published at DZone with permission of Adi Gaskell , DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}