Data Analytics

Feds tackle 'major data crunch' in Boston investigation

Boston Marathon Television Footage

The FBI is gathering a wide range of video, photographic, text-message and social-media data to stitch together a fuller picture of the April 15 bombing.

One of the most challenging aspects of the large-scale investigation into the April 15 Boston Marathon bombings is crunching all the incoming data from digital cameras, video, phone calls, text messages, social media and other disparate sources.

It's a relatively new challenge for local law enforcement officials and the Federal Bureau of Investigation, which leads the investigation with various federal resources at its disposal. Yet it is a challenge FBI officials have embraced, expressing a desire to collect every bit and byte of potentially useful information to connect the dots.

Law enforcement officials have cast a wide net in seeking photo evidence that might yield information about the Boston Marathon bombing, and the FBI has established an e-mail address where eyewitnesses can send photos and videos. Customs officials are reportedly asking travelers departing Boston on international flights to share any photos and videos before they leave the U.S.

In short, officials are asking for anything and everything – Boston Police Commission Edward F. Davis stated as much during an April 16 news briefing, pleading with residents that even seemingly insignificant information "might have some value to this investigation."

And all that data is a lot to process.

"Given that what the FBI has requested is as many photos and images they can possibly get from the event, you're looking at a potential major data crunch," said Bradley Schreiber, vice president of Washington operations for the Applied Science Foundation for Homeland Security.

The challenge for law enforcement is to stitch together a visual timeline of events from pre-race setup to the finish line of the Boston Marathon, culling from photos and videos shot by spectators, news footage, and the feeds from a reported 600 surveillance cameras in the vicinity. Added to that data is material posted to Twitter, Instagram, Facebook and YouTube, as well as from other public-facing websites.

"Social media is probably the biggest challenges for investigators," Schreiber said. "You can have 1,000 people saying they saw someone in a black or red hood, but are they talking about the same person or someone else? There really aren't algorithms that give you that kind of solution."

Since the attacks of 9/11, federal law enforcement has been standing up systems, IT tools and data centers to collect, process and analyze just this kind of information. These systems are well equipped to receive, store and sort through the kind of evidence that bystanders will be submitting, said Van Hitch, former Chief Information Officer at the Justice Department and now a senior advisor at Deloitte Consulting.

"Is it push-a-button and you have the answer? No. Are there tools that help you sift through that information pretty quickly and identify patterns? Yes," he said.

The FBI is also looking to expand its capacity to analyze images using computer tools.

Last January, the FBI put out a call for ideas for a social media mining tool that would give law enforcement a window into emergency situations. In a request for information detailing the FBI's interest in scraping social media for emerging threats and potential crises, the agency said that, "Social media is rivaling 911 services in crisis response and reporting."

It is unclear whether such a monitoring dashboard has yet been established by the FBI, but social media monitoring by law enforcement is improving, according to David Petty, vice president of enterprise search firm X1 Discovery. "Candidly, the social media investigative capabilities have come a long way in the last year," Petty told the New York Times in a video interview. "But it's relatively immature when compared to things like computer forensics."

In 2013, the FBI plans to stand up improvements to its Next Generation Identification system. It incorporates the ability to match facial recognitions, scars, tattoos and other distinguishing marks with criminal records. Such improvements are expected to reduce matching time "from hours to seconds," according to a recent budget presentation from the federal CIO's office.

Counterterrorism specialists have told several publications that existing facial recognition software is being used to compare faces of potential suspects against various drivers' license, visa and passport databases.

Advanced as it may be, many photographs and video still require the visual tool we're all most accustomed to using.

"It's still going to require a human eye," Schreiber told FCW. "What if the quality of image is poor or you don't even know what you're looking for? A computer is great for comparing images of a person to someone on file, but it's people who have to figure out what we're looking for."

Schreiber, a former member of the intelligence community, said the IC "would leverage whatever resources it can" to the investigation as well, and said data storage and sharing of information between agencies isn't likely to be a problem, either.

"In the course of a national investigation, you're not going to have problems anymore like we did in 9/11," Schreiber said, referring to stovepipe models of data storage and sharing popular a decade ago.

"Those problems have certainly been addressed since then," he added.

About the Authors

Frank Konkel is a former staff writer for FCW.

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy, health IT and the Department of Veterans Affairs. Prior to joining FCW, Mr. Mazmanian was technology correspondent for National Journal and served in a variety of editorial at B2B news service SmartBrief. Mazmanian started his career as an arts reporter and critic, and has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, Architect magazine, and other publications. He was an editorial assistant and staff writer at the now-defunct New York Press and arts editor at the About.com online network in the 1990s, and was a weekly contributor of music and film reviews to the Washington Times from 2007 to 2014.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1996, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Thu, Apr 18, 2013 Che Florida

How can anyone be so out of touch with reality? Wow!!Schreiber's comment is amazing. We still have the stovpipe problems. They are more serious now, since there is access to more data.

Thu, Apr 18, 2013 Jay DC

Sorry to be the one that pours some "Reality" on this article..... but the last statement "In the course of a national investigation, you're not going to have problems anymore like we did in 9/11,... referring to stovepipe models of data storage and sharing popular a decade ago." Those problems have certainly been addressed since then," ...these problems Have Not been addressed and are probably more pronounced that before 911. Each agency has their own "silo" system and rarely share anything with anyone else......

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group