This document discusses the challenge of identifying potential threats or "bad apples" within a large population. It notes that current solutions like mass surveillance violate privacy and human rights. The document proposes an alternative approach using community-based methods to identify and group "haystacks" or subsets of the population that may warrant closer monitoring. Key individuals within these groups would have a risk rating assigned based on gathered information, with the goal of early identification of potential threats while respecting individual rights and privacy. An integrated technological solution is offered to enable this ongoing, adaptive process of gathering and analyzing information across groups.
3. q Is always sick and does not attend office reliably.
q Plays online games or browses porn in the office
q Is an alcoholic or a drugabuser and misbehaves sometimes.
q Is a gambler or has a lot of debt from it.
q Is deeply religious and willing to die for it.
q The person does not care whether and if he gets caught.
q He is taking kickbacks from suppliers.
q Has stocks in competing firms.
q Is secretive and we do not know much about his or her private life.
o … as long as he or she does what they are being paid for, workoutput is
good AND the paperwork is all perfect & verified, its ok!
We may Appear scaremongering and be talking about the 20% of the 20% of the 20% of
the 20% of 20% under your control … but that’ enough – the one bad apple, the lonewolf or
needle in the haystack to upset the applecart, bring business to a halt or make all haystacks un
usable.
The real conundrum
The law perhaps arguably – but the facts remains – maybe based on Christian, secular,
constitution, Western tradition but is one giving a chance to redeem, change, be forgiven, let go,
forgiveness, if they are sorry, or plead guilty, lesser charge for cooperation or being an
informant. Rehabilitation & correction facilities, won’t happen again. A first offender must be
allowed redemption and given a second chance. Systems already allow this.
However we still must track onetime offenders to catch them if there is a second
transgression or a repeatoffender. If we don’t do the first, the second will fall through the
cracks of the system. This is where technology, automation and goodsystems can make a
difference.
Solution options
Current solutions of hoping it will go away, passing the buck, throwing resources or
money at it, allowing agencies to go rogue are not working.
Use our adaptive, evolutionary, community, multiple haystack grouping methodology,
design, architecture, taxonomy, system, process, workflow, checklists, cloud, platform, software,
hardware, hosting, tool, enabler as an endtoend comprehensive integrated solution to your
“needles in haystacks” problem.
Look for an integrated solution, don’t acquire it in silos and hope to integrate it at some
future date just because you don’t have the resources or you want to save your backside by
6. 8. Pyschographic profiling. Supporting the Geographic & Demographic. Self
assessment, over 30+ behavioural assessments, peer assessments, thirdparty
validation, 360 degree and more.
9. Cloud based accessible anywhere, anytime, anydevice, anyone (with or without
login). Currently limited to English but any Unicode language addon is technically
feasible.
10. InfoTollGate automated query system. SOAP, XML, EDIX25 integration etc.
11. eWallet payment system with subscriber subscriptions management and automated
billing and eCash management.
Possible usergroup(s) or Target audience(s)
In our design and system these could be the haystacks that we define in our solution
space. The list is unlimited with different implications for different user groups under different
circumstances.
1. Government – Central & State, Local authoritative.
a. Foreign visitors (Immigration control)
b. Criminal databases Records (Escaped, wanted, supposed to be in custody)
c. Pastcriminalrecord database (Public to be able to query this)
d. Travel restrictions database (Homeland security)
e. Not allowed to drive (RTO/Police traffic accident, drunkdriving etc.)
f. Extremist organization members.
g. Homeland Security. Antiterrorist cells.
2. Private Enterprise
a. KYC (Known Your Customer) for banks
b. CAF (Customer Application Form) for Telecom firms.
c. Do not employ register. (Reasons, background, evidence)
d. Do not deal with. (AML/Corruption/Black money policerecord).
e. Deal with care (Known whistleblowers)
f. Defunct firms list (MCA, SEBI, BSE, NSE other government authorities)
g. Profiling agencies. LPO. BPO. KPO.
h. Data governance, data management, analytics firms.
3. Individuals
a. Selfservice. Public access. Free. Paidfor. Subscribedto. Shift the onus.
b. Prove that you are clear and are employable, can be trusted.
c. Allow authorities to verify, doublecheck, confirm, audit your data.
Access would again be based on open to public as a citizen good, against to firms,
subscriptions to individuals, payperuser, who can WRITE or READONLY from the systems,
FREE or PAIDFOR automated transactionquerybased access, selfservice, trust & antitrust
based system, records and fields in the database.