{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:57:29Z","timestamp":1774929449090,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T00:00:00Z","timestamp":1595289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T00:00:00Z","timestamp":1595289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks\u2014especially when considering lone-wolf terrorism\u2014lead to irregular and isolated (digital) footprints. The irregularity of data affects the accuracy of machine learning algorithms and the mass surveillance that depends on them which can be explained by three kinds of known problems encountered in machine learning theory: <jats:italic>class imbalance<\/jats:italic>, <jats:italic>the curse of dimensionality<\/jats:italic>, and <jats:italic>spurious correlations<\/jats:italic>. Proponents of mass surveillance often invoke the distinction between collecting data and metadata, in which the latter is understood as a lesser breach of privacy. Their arguments commonly overlook the ambiguity in the definitions of data and metadata and ignore the ability of machine learning techniques to infer the former from the latter. Given the sparsity of datasets used for machine learning in counterterrorism and the privacy risks attendant with bulk data collection, policymakers and other relevant stakeholders should critically re-evaluate the likelihood of success of the algorithms and the collection of data on which they depend.<\/jats:p>","DOI":"10.1007\/s11948-020-00254-w","type":"journal-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T16:05:20Z","timestamp":1595347520000},"page":"2975-2984","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8677-862X","authenticated-orcid":false,"given":"H. M.","family":"Verhelst","sequence":"first","affiliation":[]},{"given":"A. W.","family":"Stannat","sequence":"additional","affiliation":[]},{"given":"G.","family":"Mecacci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"issue":"1","key":"254_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1038\/s42256-018-0004-1","volume":"1","author":"E Begoli","year":"2019","unstructured":"Begoli, E., Bhattacharya, T., & Kusnezov, D. (2019). The need for uncertainty quantification in machine-assisted medical decision making. Nature Machine Intelligence, 1(1), 20\u201323. https:\/\/doi.org\/10.1038\/s42256-018-0004-1.","journal-title":"Nature Machine Intelligence"},{"key":"254_CR2","unstructured":"Bigo, D., Carrera, S., Hernanz, N., Jeandesboz, J., Parkin, J., Ragazzi, F., & Scherrer, A. (2013). Mass surveillance of personal data by EU member states and its compatibility with EU law. Retrieved from https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2360473."},{"issue":"3","key":"254_CR3","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/s11948-013-9458-z","volume":"19","author":"SJ Bird","year":"2013","unstructured":"Bird, S. J. (2013). Security and privacy: Why privacy matters. Science and Engineering Ethics, 19(3), 669\u2013671. https:\/\/doi.org\/10.1007\/s11948-013-9458-z.","journal-title":"Science and Engineering Ethics"},{"key":"254_CR4","unstructured":"Borowiec, S. (2016). AlphaGo seals 4-1 victory over Go grandmaster Lee Sedol. Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2016\/mar\/15\/googles-alphago-seals-4-1-victory-over-grandmaster-lee-sedol."},{"issue":"5","key":"254_CR5","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1177\/0003122417725865","volume":"82","author":"S Brayne","year":"2017","unstructured":"Brayne, S. (2017). Big data surveillance: The case of policing. American Sociological Review, 82(5), 977\u20131008. https:\/\/doi.org\/10.1177\/0003122417725865.","journal-title":"American Sociological Review"},{"issue":"3","key":"254_CR6","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10699-016-9489-4","volume":"22","author":"CS Calude","year":"2017","unstructured":"Calude, C. S., & Longo, G. (2017). The deluge of spurious correlations in big data. Foundations of Science, 22(3), 595\u2013612. https:\/\/doi.org\/10.1007\/s10699-016-9489-4.","journal-title":"Foundations of Science"},{"key":"254_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/J.DSS.2015.04.012","volume":"75","author":"M Camacho-Collados","year":"2015","unstructured":"Camacho-Collados, M., & Liberatore, F. (2015). A decision support system for predictive police patrolling. Decision Support Systems, 75, 25\u201337. https:\/\/doi.org\/10.1016\/J.DSS.2015.04.012.","journal-title":"Decision Support Systems"},{"issue":"1","key":"254_CR8","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"Y-A de Montjoye","year":"2013","unstructured":"de Montjoye, Y.-A., Hidalgo, C. A., Verleysen, M., & Blondel, V. D. (2013). Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3(1), 1376. https:\/\/doi.org\/10.1038\/srep01376.","journal-title":"Scientific Reports"},{"key":"254_CR9","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297","author":"YA De Montjoye","year":"2015","unstructured":"De Montjoye, Y. A., Radaelli, L., Singh, V. K., & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science. https:\/\/doi.org\/10.1126\/science.1256297.","journal-title":"Science"},{"key":"254_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/J.SPL.2018.02.028","volume":"136","author":"DB Dunson","year":"2018","unstructured":"Dunson, D. B. (2018). Statistics in the big data era: Failures of the machine. Statistics & Probability Letters, 136, 4\u20139. https:\/\/doi.org\/10.1016\/J.SPL.2018.02.028.","journal-title":"Statistics & Probability Letters"},{"key":"254_CR11","doi-asserted-by":"publisher","unstructured":"Feigenbaum, J., & Koenig, J. (2014). On the feasibility of a technological response to the surveillance morass. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). https:\/\/doi.org\/10.1007\/978-3-319-12400-1_23.","DOI":"10.1007\/978-3-319-12400-1_23"},{"key":"254_CR12","first-page":"1","volume":"584","author":"J Jonas","year":"2006","unstructured":"Jonas, J., & Harper, J. (2006). Effective counterterrorism and the limited role of predictive data mining. Policy Analysis, 584, 1\u201312.","journal-title":"Policy Analysis"},{"key":"254_CR13","first-page":"333","volume":"13","author":"Paula Kift","year":"2016","unstructured":"Kift, Paula, & Nissenbaum, Helen. (2016). Metadata in context-an ontological and normative analysis of the NSA\u2019s bulk telephony metadata collection program. ISJLP, 13, 333.","journal-title":"ISJLP"},{"key":"254_CR14","doi-asserted-by":"publisher","first-page":"7776","DOI":"10.1109\/ACCESS.2017.2696365","volume":"5","author":"A L\u2019Heureux","year":"2017","unstructured":"L\u2019Heureux, A., Grolinger, K., Elyamany, H. F., & Capretz, M. A. M. (2017). Machine learning with big data: Challenges and approaches. IEEE Access, 5, 7776\u20137797. https:\/\/doi.org\/10.1109\/ACCESS.2017.2696365.","journal-title":"IEEE Access"},{"key":"254_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.90","author":"S Landau","year":"2013","unstructured":"Landau, S. (2013). Making sense from snowden: What\u2019s significant in the NSA surveillance revelations. IEEE Security and Privacy. https:\/\/doi.org\/10.1109\/MSP.2013.90.","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"254_CR16","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/19434472.2017.1407814","volume":"11","author":"L Lindekilde","year":"2019","unstructured":"Lindekilde, L., O\u2019Connor, F., & Schuurman, B. (2019). Radicalization patterns and modes of attack planning and preparation among lone-actor terrorists: An exploratory analysis. Behavioral Sciences of Terrorism and Political Aggression, 11(2), 113\u2013133. https:\/\/doi.org\/10.1080\/19434472.2017.1407814.","journal-title":"Behavioral Sciences of Terrorism and Political Aggression"},{"key":"254_CR17","unstructured":"Liu, Y., Gadepalli, K., Norouzi, M., Dahl, G. E., Kohlberger, T., Boyko, A., & Stumpe, M. C. (2017). Detecting cancer metastases on gigapixel pathology images. Retrieved from http:\/\/arxiv.org\/abs\/1703.02442."},{"issue":"10","key":"254_CR18","doi-asserted-by":"publisher","first-page":"2848","DOI":"10.3390\/su11102848","volume":"11","author":"I Matijosaitiene","year":"2019","unstructured":"Matijosaitiene, I., McDowald, A., & Juneja, V. (2019). Predicting safe parking spaces: A machine learning approach to geospatial urban and crime data. Sustainability, 11(10), 2848. https:\/\/doi.org\/10.3390\/su11102848.","journal-title":"Sustainability"},{"key":"254_CR19","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1508081113","author":"J Mayer","year":"2016","unstructured":"Mayer, J., Mutchler, P., & Mitchell, J. C. (2016). Evaluating the privacy properties of telephone metadata. Proceedings of the National Academy of Sciences of the United States of America. https:\/\/doi.org\/10.1073\/pnas.1508081113.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"254_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33","author":"A Narayanan","year":"2008","unstructured":"Narayanan, A., & Shmatikov, V. (2008). Robust de-anonymization of large sparse datasets. Proceedings\u2014IEEE Symposium on Security and Privacy. https:\/\/doi.org\/10.1109\/SP.2008.33.","journal-title":"Proceedings\u2014IEEE Symposium on Security and Privacy"},{"key":"254_CR21","unstructured":"National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2018). Global Terrorism Database. Retrieved from http:\/\/www.start.umd.edu\/gtd."},{"key":"254_CR22","unstructured":"Naughton, J. (2013). NSA surveillance: Don\u2019t underestimate the extraordinary power of metadata. Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2013\/jun\/21\/nsa-surveillance-metadata-content-obama."},{"key":"254_CR23","unstructured":"Schneier, B. (2015). NSA doesn\u2019t need to spy on your calls to learn your secrets. Wired. Retrieved from https:\/\/www.wired.com\/2015\/03\/data-and-goliath-nsa-metadata-spying-your-secrets\/."},{"issue":"4","key":"254_CR24","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1080\/1475179052000345421","volume":"21","author":"MP Sirseloudi","year":"2005","unstructured":"Sirseloudi, M. P. (2005). How to predict the unpredictable: On the early detection of terrorist campaigns. Defense & Security Analysis, 21(4), 369\u2013386. https:\/\/doi.org\/10.1080\/1475179052000345421.","journal-title":"Defense & Security Analysis"},{"key":"254_CR25","first-page":"5","volume-title":"Insecure flight: Broken boarding passes and ineffective terrorist watch lists. Policies and research in identity management","author":"C Soghoian","year":"2008","unstructured":"Soghoian, C. (2008). Insecure flight: Broken boarding passes and ineffective terrorist watch lists. Policies and research in identity management (pp. 5\u201321). Boston, MA: Springer."},{"issue":"1","key":"254_CR26","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s11948-011-9277-z","volume":"18","author":"J Van den Hoven","year":"2012","unstructured":"Van den Hoven, J., Lokhorst, G.-J., & Van de Poel, I. (2012). Engineering and the problem of moral overload. Science and Engineering Ethics, 18(1), 143\u2013155. https:\/\/doi.org\/10.1007\/s11948-011-9277-z.","journal-title":"Science and Engineering Ethics"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-020-00254-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11948-020-00254-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-020-00254-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T23:55:15Z","timestamp":1626825315000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11948-020-00254-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,21]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["254"],"URL":"https:\/\/doi.org\/10.1007\/s11948-020-00254-w","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,21]]},"assertion":[{"value":"3 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}