New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
image
Prime Choice
· TechTV!
· Head Lines
· CCSP News Ltrs
· Dnld of the Week!
· Find a Cure!

· Ian T's (AR 17)
· Marcia's (OP13)
· Bill G's (CO3)
· Paul's (AR 5)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 16784
Comments: 142
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Hosted By
Computer Cops is a satisfied customer of [ JaguarPC ]
image
image cybsec: Security HeadLines: Computer-Sleuthing Aids Troops in Iraq image
Cyber Security
Computer-Sleuthing Aids Troops in Iraq
By Jim Krane, Associated Press Writer
December 21, 2003

BAGHDAD, Iraq (AP)—U.S. troops battling the shadowy guerrilla insurgency in Iraq have adopted the computer-sleuthing tactics of big-city American police departments to prepare strikes against rebel fighters and their sources of money and weapons.

Military intelligence analysts have adopted databases and software used by civilian law enforcers to catalog names, pictures and suspects' fingerprints and to search such for links among guerrilla suspects, said Lt. Col. Ken Devan, the top intelligence officer for the U.S. Army's 1st Armored Division.

Like the police, the military uses the software to predict the locations and timing of attacks.

The idea, Devan said on Saturday, is to focus the division's raids on insurgents without sweeping up too many innocent people and risk turning more Iraqis against the U.S. military.

Early on we may have been a blunt instrument. Now it's all about precision, Devan said in an interview with The Associated Press at division headquarters at Baghdad International Airport. We try to be very precise in what we do. You don't want to turn someone who may have been supportive of the coalition.

Baghdad has about 200-500 hardcore insurgents, along with hundreds more part-time rebels who work for pay, Devan said. Across Iraq, military estimates have placed the number of die-hard guerrillas at 5,000. The 1st Armored Division has identified 14 cells operating in and around the city, one of which has already been dismantled, division commanders have said.

Devan and the division's intelligence analysts study clusters of attacks in Baghdad neighborhoods, looking for the time of day and days of the week when strikes are most likely. They then alter their convoy schedules and routes to avoid ambushes or send patrols to confront the guerrillas, Devan said.

The division uses three programs in tandem, entering data on every bomb blast, every firefight, every suspect detained and every tip given by a local resident. Digital fingerprints are taken from every arrested suspect and added to the database.

We're seeing patterns emerge. There are certain neighborhoods you don't want to be out in, or there's a better likelihood you'll be attacked, Devan said. You try to predict what the enemy's going to do next. We try to cut him off at the knees.

The software allows the military to plot on a Baghdad street map, for instance, the locations of roadside bomb blast that occurred between 7 p.m. and 10 p.m. in a given month. Commanders then tailor raids to catch the bombers by watching the neighborhood and rounding up suspects until they find a weapons cache, Devan said.

On Friday, one 1st Armored unit did just that, turning up a cache of about 50 130mm artillery shells—commonly used to make roadside bombs, Devan said.

Now we find more of them before they go off, he said. We're getting better at focusing resources in those areas. It's all about pattern analysis.

The Army's software includes a program called Analyst's Notebook, from the British software maker i2, as well as CrimeLink, made by Sierra Vista, Ariz.-based Precision Computing Intelligence. These and similar programs are used by police across North America and Europe to map crime hotspots and track serial rapists or arsonists. Police have credited the tools with solving high-profile murder sprees and helping cut crime in the United States and beyond.

More at eWeek
Posted on Wednesday, 24 December 2003 @ 04:00:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Intel
· HotScripts
· W3 Consortium
· More about Cyber Security
· News by phoenix22


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.