Oops! The input is malformed! Social Network Analysis, Metadata and Business Intelligence: Paul Revere’s Ride Revisited by Dr. Ramon Barquin - BeyeNETWORK
We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.


Channel: Data Warehouse Realization - Bin Jiang RSS Feed for Data Warehouse Realization - Bin Jiang

 

Social Network Analysis, Metadata and Business Intelligence: Paul Revere’s Ride Revisited

Originally published March 18, 2014

“One if by land, two if by sea.” Every child in this country eventually comes across this phrase that shines as brightly in American history as the lantern light from the North Church tower that it refers to. Henry Wadsworth Longfellow immortalized Paul Revere’s Ride in his famous poem, but now Ed Snowden’s leaks about the NSA data collection methods and the debate that it sparked has also brought about an interesting series of attempts to revisit Paul Revere, the man, the ride and the events around it, and use them as a learning scenario for the present.

The gist involves reviewing what we know about Revere’s friends, relationships and group affiliations to reconstruct his social network and then use current social network analysis (SNA) techniques as part of a retroactive investigation. All this is done in the guise of a hypothetical enquiry being conducted by British “intelligence services” in 1772, a few years prior to the epic ride in 1775.

The most recent, and interesting, exercise I encountered was at the ACT-IAC Executive Leadership Conference in October.1 John Osterholz, former Department of Defense executive and now CSC’s Vice President of Cyber Operations, masterfully facilitated a “Talk Tank” case study in cybersecurity where he playacted the role of the British head of intelligence during that period, presenting the results of the investigation at an enactment of “Question Time” in a mock House of Commons.

The premise is that Paul Revere, a man of his time, was involved with many of the key players and organizations in Boston during those critical years and that if you had been able to capture “the metadata” – a specific jab at NSA’s metadata collection programs – related to his relationships and connections, it would have revealed the “colonists’ conspiracy against the Crown.”

Duke sociologist Kieran Healy seems to have started the current fad with a post on his blog last summer, Using Metadata to Find Paul Revere. He begins the post with the following:

“I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects.”
Using the work of Brandeis historian David Hackett Fischer, who had studied the historical event, as well as Paul Revere himself and his affiliations, in extensive detail, Healy developed some adjacency matrices based on the people Revere knew and the clubs or groups to which he belonged. (In a somewhat cute sideline, the mock report in the blog post credits “information gathered by our field agent, David Hackett Fischer,” whom it calls “…an expert and respected field Agent with a broad and deep knowledge of the colonies.”)

It identifies several key clubs or associations of dubious loyalty to the Crown remarking, tongue-in-cheek, “these organizational names sound rather belligerent.” The groupings are: the St. Andrews Lodge, the Loyal Nine, the North Caucus, the Long Room Club, the Tea Party, the Boston Committee and the London Enemies List. Healy then maps memberships and relationships of individuals and organizations creating both a “Person by Groups” and a “Groups by People” table. Using fairly standard SNA techniques – link analysis and centrality measures – he can rate some of the key members of the network. Guess who appears at the top of the list? None other than Paul Revere. He is at the top or among the top five in “betweenness centrality, eigenvector centrality and Bonacich Power Centrality” scores.

In fact, in an interview (see Paul Revere’s Ride, Booknotes, July 17, 1994), Fischer himself makes the case that the importance of Paul Revere went substantially beyond his ride.
“We found 60 other riders who were out that same night, and it seemed that, far from detracting from Paul Revere, they actually made his role more important in that he was more than just a messenger, he was an organizer. He was a man who would get things done. He was a great joiner. He was an associating man. Everybody seemed to know him.”
Of course, this whole exercise was motivated by the Snowden/NSA incident and debate. The many allusions in Healy’s post to the fact that “only metadata” was being used or that the presenter of the report to Parliament worked for the “Royal Security Administration (RSA)” were clearly intended to generate additional debate over that incident. Especially when you move to the next logical step, which Healy does not in his post, but Osterholz did at the ACT-IAC ELC: Now that we know that Paul Revere is a key player in a group of likely “conspirators and traitors,” what do we do about it?

This is the crux, of course, because if you were a revisionist historian at Oxford currently studying that period, it might make interesting speculation to suggest that Paul Revere should have been “neutralized” based on the data. This would sound horrendous to Americans today who still bask in the epic history of the Revolutionary War, where a band of upstart colonists and their ragtag army eventually beat the world’s dominant power…albeit with some help from the French.

At the end of his post, Healy is correct in drawing attention to the potential problem of false positives. “I admit,” he avers, “that, in addition to the possibilities for finding something interesting, there may also be the prospect of discovering suggestive but ultimately incorrect or misleading patterns.” And the consequence of a “neutralization” campaign, where the possibility of a false-positive is not negligible, is a big price to pay to in a society where, theoretically, a person is innocent until found guilty.

In all, this is a rather interesting way of eliciting discussion and transparency on the use of business intelligence techniques on these issues.

End Note:
  1. The American Council for Technology (ACT) - Industry Advisory Council (IAC) is a non-profit educational organization and a unique public-private partnership dedicated to helping government use technology to serve the public.

SOURCE: Social Network Analysis, Metadata and Business Intelligence: Paul Revere’s Ride Revisited

  • Dr. Ramon BarquinDr. Ramon Barquin

    Dr. Barquin is the President of Barquin International, a consulting firm, since 1994. He specializes in developing information systems strategies, particularly data warehousing, customer relationship management, business intelligence and knowledge management, for public and private sector enterprises. He has consulted for the U.S. Military, many government agencies and international governments and corporations.

    He had a long career in IBM with over 20 years covering both technical assignments and corporate management, including overseas postings and responsibilities. Afterwards he served as president of the Washington Consulting Group, where he had direct oversight for major U.S. Federal Government contracts.

    Dr. Barquin was elected a National Academy of Public Administration (NAPA) Fellow in 2012. He serves on the Cybersecurity Subcommittee of the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee; is a Board Member of the Center for Internet Security and a member of the Steering Committee for the American Council for Technology-Industry Advisory Council’s (ACT-IAC) Quadrennial Government Technology Review Committee. He was also the co-founder and first president of The Data Warehousing Institute, and president of the Computer Ethics Institute. His PhD is from MIT. 

    Dr. Barquin can be reached at rbarquin@barquin.com.

    Editor's note: More articles from Dr. Barquin are available in the BeyeNETWORK's Government Channel

     

Recent articles by Dr. Ramon Barquin

 

Comments

Want to post a comment? Login or become a member today!

Be the first to comment!