Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump

All the dazzling technology, the big data and the sophisticated modeling that American newsrooms bring to the fundamentally human endeavor of presidential politics could not save American journalism from yet again being behind the story, behind the rest of the USA

The news media by and large missed what was happening all around it, and it was the story of a lifetime. The numbers weren’t just a poor guide for election night, they were an off-ramp away from what was actually happening.

One computer forecasting system predicted Trump’s victory - the one with the least human input.

Donald Trump’s win surprised many around the world, but none more than the modelers and big league prognosticators who were calling for a likely Clinton victory. That outcome doesn’t mean that data-driven forecasting died on Tuesday 8th November. In fact, the best performance went to an artificial intelligence able to crunch more data than its human rivals. The takeaway?

Forecasters need new ways to talk about the uncertainty of their models and need to expand beyond “polling data.” The Defense Department and the intelligence community, who have also grown fond of machine aided prediction, would do well to heed that lesson.

There’s an important and overlooked distinction between a prediction (which suggests certainty) and a forecast, which acknowledges more than one possible outcome and then weighs multiple outcomes in terms of their relative probability. But humans, and particularly media types that report on polling information, like certainty. So forecasts are cast as predictions.

Nate Silver, the famous prognosticator, forecast Hillary Clinton’s win as likely, giving it an about 71 percent probability. Importantly, that does not mean he was technically wrong. It just means that the less likely outcome occurred.

The site Election Analytics, maintained by computer scientist Sheldon Jacobson of the University of Illinois, outputs a number of possible outcomes for elections. In the Clinton-Trump matchup, the site had had 21 possible scenarios. In only one did Donald Trump win.

“We didn’t report it widely” said Jacobson of the winning scenario. “I woke up on Tuesday and wondered, ‘Should I report the most extreme scenario? Or should I report the average?’ It’s like buying a basket of stocks versus buying an individual stock.” Bottom line, he says, “People expect a level of precision that the data cannot provide.”

Jacobson also does forecasting for TSA, part of the effort to screen for terrorists effectively while still keeping lines moving at airports. He says a key difference between forecasting elections and forecasting for airport security is that the risk of getting an election prediction wrong is small. “If we had 21 scenarios and one came up red” in a national security policy, “We would not implement that security policy. That risk was too great.”

Jacobson’s method, like Silver’s, employs Bayesian statics. That means that both models employ the following formula.

P (A | X) = p (X | A) p (A)
p (X)

P means probability, A is the answer, and X is something that will influence the probability. The more information you provide, the more times you run the formula, the greater your confidence level about A. But Bayesian statistics never tell you exactly what will happen, only what might happen based on available data.

That means your output is only going to be as good as the data you’re putting into the model. The pollsters that failed on Tuesday all relied on conventional polling information. “I don’t think the polling data was the problem,” Jacobson said. “It was the uncertainty in the data because of the undecided factor. In a few polls, it was 11 percent. That’s like trying to drive 80 miles an hour in fog. We just had an accident.”

University of Maryland computer scientist V.S. Subrahmanian creates forecasting methods that the intelligence community uses to predict the activities of terrorist groups. He said that the Clinton-Trump matchup presented three “Black Swan” factors that traditional polling data could not capture.

“The first was a candidate with a background totally different from major recent presidential candidates – one who had held no political office, and who spoke his mind freely, unlike the more guarded speech of seasoned politicians,” Subrahmanian said.

“The second was the unprecedented disclosures by the FBI during the final few days of the election. A third was the influence campaign run by a foreign state through the drip-by-drip disclosure of internal campaign deliberations. I believe that existing predictive models were unable to account for these three types of variables, leading to predictions based on other historical factors, which were eventually proven wrong.”

Kalev Leetaru used big data to accurately discover the location of Osama Bin Laden in Abbottabad, Pakistan, using not polling information but open-source published news articles. Leetaru chalked up Tuesday 8th’s failure to bad judgment about which data was relevant.

“When it comes to the kinds of questions that intelligence personnel actually want forecasting engines to answer, such as ‘Will Brexit happen’ or ‘Will Trump win,’ those are the cases where the current approaches fail miserably. It’s not because the data isn’t there. It is. Is because we use our flawed human judgment to decide how to feed that data into our models and therein project our biases into the model’s outcomes.”

Beyond Conventional Polling: The Future of Forecasts

Today, of course, researchers can use more than just phone data to make forecasts, including broad social phenomena. In 2012, Virginia Tech computer scientist Naren Ramakrishnan was able to correctly predict social protest movements in Mexico and Brazil with nothing but Twitter data, part of a research program sponsored by the Intelligence Community through the Intelligence Advanced Research Projects Activity, or IARPA.

In his own theory about Tuesday 8th November’s outcome, Ramakrishnan also cited Black Swan high-impact, low-probability events. Bottom line, many forecasters did, in fact, predict it. They just predicted that outcome alongside many others. To the average person, that works out the same as not predicting the actual outcome.

“There are a lot of best practices that one could use, the important thing is to rely on multiple sources of data, the other important thing, quantify uncertainty. You have to ask the question, ‘When will I be wrong?’” he says. Forecasters need to make that that self-analysis as public as their forecasts.

Predata, a predictive analytics company established by former members of the intelligence community, also said a Clinton win was more likely than a Trump win. They  crunch hundreds of thousands of data points a day from over a thousand web sites, such as YouTube.

In a note to subscribers of their newsletter, Predata officials explained that three things led them to their conclusion on a Clinton win being more likely based on the complexity of the electoral college system, overweighting polls and “other experts;” and Trump generating a lot of online content and excitement that should have made it into their analysis, but didn’t, for the same reason pollsters and elite liberal newspapers wrote off Trump as a joke until his victory was a reality.

“Trump did not win because he uploaded some ads to his official YouTube channel. Rather, his victory was a function of the support that thrived in the seamier, populist corners of the Internet, the corners, that is, we made an early decision to exclude from our curation of the signal sets.”

In other words, it came down to precisely the sort of human judgement error that Leetaru highlighted.

It’s thus not surprising that the big winner in the polling contest was not a human at all but an artificial intelligence named MogIA. Developed by Indian entrepreneur Sanjiv Rai, it takes in 20 million data points from a variety of open public websites such as YouTube, Google, Twitter, and Facebook to uncover trends in “user engagement.”

Rai said his exclusive arrangement with CNBC prevents him from talking about how the system works or crunches the data points.

“While most algorithms suffer from programmers/developer’s biases, MoglA aims at learning from her environment, developing her own rules at the policy layer and develop expert systems without discarding any data,” Rai told CNBC reporter Arjun Kharpal.

Big data and computer-aided projection is hardly dead. It’s just getting started.

DefenseOne:    NYT:     Was Donald Trump's Surprise Victory Hidden In The Data?:

 

 

« Internet of Things – For Smart and Secure Cities
Virtual Reality – Just Getting Started »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.