SlideShare a Scribd company logo
1 of 8
Quorum Alerting
IDV R&D: Quorum Engine for Automated Social Alerting
IDV R&D: Quorum Engine for Automated Social Alerting
IDV R&D: Quorum Engine for Automated Social Alerting
IDV R&D: Quorum Engine for Automated Social Alerting
IDV R&D: Quorum Engine for Automated Social Alerting
IDV R&D: Quorum Engine for Automated Social Alerting
IDV R&D: Quorum Engine for Automated Social Alerting

More Related Content

More from John Nelson

More from John Nelson (6)

Making Maps is Just the Best
Making Maps is Just the BestMaking Maps is Just the Best
Making Maps is Just the Best
 
Makey Feely Writey
Makey Feely WriteyMakey Feely Writey
Makey Feely Writey
 
20 Unrequested Map Tips
20 Unrequested Map Tips20 Unrequested Map Tips
20 Unrequested Map Tips
 
DEM Brain Hacks
DEM Brain HacksDEM Brain Hacks
DEM Brain Hacks
 
Intricate (Fake) Wooden Maps
Intricate (Fake) Wooden MapsIntricate (Fake) Wooden Maps
Intricate (Fake) Wooden Maps
 
Adventures in Mapping: What, How, and Especially Why
Adventures in Mapping: What, How, and Especially WhyAdventures in Mapping: What, How, and Especially Why
Adventures in Mapping: What, How, and Especially Why
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

IDV R&D: Quorum Engine for Automated Social Alerting

Editor's Notes

  1. The standard practice of monitoring Twitter for risk management requires a person to firstsearch for a term or choose from various categories of security and emergency-response keywords, somehow knowing ahead of time what topic may reveal a threat, and where that might emerge. But one of the benefits of an automated system of listening is the ability to highlight when any word sees a drastic and unusual increase in use, especially when that term is unknown by an operator or off the radar of the team overall.In this way, security operators wouldn’t be subject to a library of pre-determined threat terms or be saddled with the task of manually searching here or there in the hopes of perhaps stumbling on an unfolding event, where it’s happening. Rather, an engine that consumes the never ending blast of tweets and scans it for a critical mass of three factors: time, location, and topic, ensures that important emerging incidents aren’t missed. This three-part tipping point is the signature of an event of interest that is then used to proactively generate alerts to stakeholders and locally effected individuals.
  2. For example, what you see here are the locations of tweets in and around Boston on April 15, 2013. The day of the Boston Marathon. The result is essentially a population map of Boston on that day.
  3. These highlighted tweets, by the way, contain the word, “marathon,” and plot a tight signal of the course for us.
  4. But what do the tweets look like if we simulate for an automated alerting engine that triggers at the intersection of 1, a sudden spike in tweeting, 2, tweets within close proximity to each other, and 3, tweets sharing a common subject –whatever that is.
  5. These are the tweets that are compact in time –a rapid period of twitter activity in the area. This happened to be the moments following the bombing.
  6. Here are those tweets, further isolated to those that were geographically compact, happening in tight proximity to each other.
  7. And those tweets, refined further to only those sharing a common topic.The result is a timely unit of intelligence signals, many including photographs, indicating something of interest has just occurred in a defined location. These can be can be triaged by security and emergency response personnel and vetted for sentiment and relevance perhaps long before standard alerting sources may come in.By the way, among the words that saw the greatest spike in use, compared to the general population of tweets, and a signature of tweets related to the bombing, was the word, “just.” Use of the word “just” saw a 1,300% increase in use in those tweets relating to the sudden explosions. This is an example of mining actual events to reveal surprising word-use signatures that were unlikely to have been predicted in some emergency word dictionary. These signatures then feed back into the alerting engine to improve the scanning process.
  8. The timely digital delivery of alert summaries, with contextual information on the nature and proximity of the threat, to only organizationally-relevant stakeholders and locally affected employees, whether residential or travelling, reduces the problem of false positives and its debilitating fatigue of over-notification.