The New York Times The New York Times Technology December 30, 2002  

Home
Job Market
Real Estate
Automobiles
News
International
National
Washington
Business
Technology
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions


Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Multimedia/Photos
College
Learning Network
Services
Archive
Classifieds
Book a Trip
Personals
Theater Tickets
NYT Store
NYT Mobile
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Member_Center
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Privacy Policy
Newspaper
Home Delivery
Customer Service
Electronic Edition
Media Kit
Community Affairs
Text Version

25 COMMISSION-FREE TRADES Join Ameritrade today!


Go to Advanced Search/Archive Go to Advanced Search/Archive Symbol Lookup
Search Optionsdivide
go to Member Center Log Out
  Welcome, malak

Taming the Task of Checking for Terrorists' Names

(Page 2 of 2)

There are a few ways computers can tackle the name-search problem. A simple database search will look for a string of characters, called a key-based search, and try to find a match. But if the string is not exact, the process is futile.

A more sophisticated search, using what is called fuzzy logic, can look for similar strings and return the closest matches. But that can return many inaccurate results. Researchers at Language Analysis Systems have found, for example, that looking for names with similar consonant sounds, a longstanding method of name analysis, could find these matches for the name Criton: Courtmanche, Corradino and Cortinez.

Advertisement


Language Analysis Systems has created NameClassifier, a program that attempts to identify the cultural origins of a name, and NameHunter, which searches for names with the same linguistic parameters, like whether affixes like "y" and "de la" are used. NameHunter uses a pair-wise strategy, a technique that accounts for dissimilarities and random errors by basing its search on a series of comparisons, looking for shared properties.

"Maria De la Cruz Vasco de Gamma' has a lot more different things going on than a short Chinese name," said Dr. Hermansen. "If you can discover what culture are you looking at, you can apply the best computational techniques."

Intelligent Search Technology's system, NameSearch, also ranks results. But rather than identify the culture of a language, NameSearch employs a key-based strategy that uses multiple keys for each name — taking affixes into account, for example, or various phonetic spellings and nicknames. The search is then performed using a series of comparisons that determine how similar a name is to the keys.

Another company, Basis Technology, in Cambridge, Mass., has developed a language analyzer, based on phonics, for translating Latinized names back into their original alphabets so they can be searched against lists in the original languages.

Joel Ross, vice president of military and intelligence services for Basis, noted that "Qaddafi," for example, can be spelled at least 60 ways in the Latin alphabet. To match a name on a watch list, the Basis system takes a Latinized name and compares it to the company's own transcription scheme, so that it will match with the one Arabic version of the name.

The future of name-searching, according to the companies working on it, is not in watch lists, but in sifting through huge quantities of digital documents, like those that might be found on terrorists' computers or intercepted online.

"Going through massive amounts of text and identifying when there's a name, city, corporation," is the next challenge, said Richard Wagner, the president of Intelligent Search Technology. "That's where this industry is headed."





THREATS AND RESPONSES: THE ATTACKS; U.S. Says Evidence Possibly Ties Al Qaeda to the Attack in Kenya  (December 3, 2002)  $

THREATS AND RESPONSES: THE TERROR NETWORK; Qaeda Uses Teeming Karachi As New Base, Pakistanis Say  (November 1, 2002)  $

THREATS AND RESPONSES: DATA MINING; British Concern to Help U.S. Track Terrorists  (October 21, 2002)  $

Protesting the Big Brother Lens, Little Brother Turns an Eye Blind  (October 7, 2002)  $

Find more results for Terrorism and Computers and The Internet .



Doing research? Search the archive for more than 500,000 articles:




E-Mail This Article
Printer-Friendly Format
Most E-Mailed Articles
Reprints
Single-Page View

It's easy to follow the top stories with home delivery of The New York Times newspaper.
Click Here for 50% off.


Home | Back to Technology | Search | Corrections | Help | Back to Top


Copyright 2002 The New York Times Company | Permissions | Privacy Policy
E-Mail This Article
Printer-Friendly Format
Most E-Mailed Articles
Reprints
Single-Page View

Enlarge This Image

Carol T. Powers for The New York Times
John C. Hermansen, a co-founder of Language Analysis Systems, which makes name-searching software.


Topics

 Alerts
Terrorism
Computers and The Internet
Immigration and Refugees
Immigration and Naturalization Service
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters


Focus On Customer Experience, Not CRM

SAMPLE PRODUCT IMG 75X75

Get Insight



Spotlight on...

San Francisco
Pacific Heights, Cow Hollow, more...

Hamptons Homes
Montauk, Easthampton, more...


Search Other Areas