This article first appeared on Gizmodo on September 6, 2012. The original author was Molly Oswaks. To read the original article, click here.

A giant, riled up crowd of people. Political tension. The need for superhigh security is never great than it is at a political convention.

So what kind of tech do they have keeping President Obama safe?

UReveal produces a special date-mining software programmed to comb through Internet for any mentions of the president, the Democratic National Convention, and any related threatening terms.

“[T]he software uses concepts rather than straight keywords,” reports Discovery News, “and it’s language processing is sophisticated enough to understand context.”

“It sees the word ‘bomb’ and knows that there’s a difference between ‘bomb’ as in failure, or ‘the bomb’ as in good,” said Bill Bickford, vice president of operations at Jacksonville, Fla.-based IxReveal, a company that produces the data mining software uReveal.

Bickford told Discovery News that the software searches for spikes in activity around specific concepts. When it sees something that looks important, it will flag it so a person can investigate further and decide if it’s a threat. A self-described terrorist in South America writing Facebook rants may not be as important as a buzz of activity on a militia site in North Carolina, where the convention is being held. UReveal is designed to distinguish between both.

Another technology, which the Houston-based BRS Labs cannot confirm nor deny whether it is in fact being used at Charlotte’s DNC—though it was used at the RNC in Tampa and several other cities—is a special software that takes into account what a scene looks like over several days, then send an alert when any unusual activity registers.

“So it will say this area looks like this most of the time and this other area looks like that,” said David Gerulski, vice president of marketing. When that area of the image changes it will send an alert that something has changed.

“A guy standing at the edge of a parking lot for 30 minutes would get flagged,” he said. In one sense, it does exactly what police are supposed to do — look for something unusual.

Essentially, it does what police ought to do: scan a zone for suspicious activity.

So far, the conventions have gone on without incident. So, that’s good.

Published by Geoffrey Liu

A software engineer by trade and a classical musician at heart. Currently a software engineer at Groupon getting into iOS mobile development. Recently graduated from the University of Washington, with a degree in Computer Science and a minor in Music. Web development has been my passion for many years. I am also greatly interested in UI/UX design, teaching, cooking, biking, and collecting posters.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.