Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump

All the dazzling technology, the big data and the sophisticated modeling that American newsrooms bring to the fundamentally human endeavor of presidential politics could not save American journalism from yet again being behind the story, behind the rest of the USA

The news media by and large missed what was happening all around it, and it was the story of a lifetime. The numbers weren’t just a poor guide for election night, they were an off-ramp away from what was actually happening.

One computer forecasting system predicted Trump’s victory - the one with the least human input.

Donald Trump’s win surprised many around the world, but none more than the modelers and big league prognosticators who were calling for a likely Clinton victory. That outcome doesn’t mean that data-driven forecasting died on Tuesday 8th November. In fact, the best performance went to an artificial intelligence able to crunch more data than its human rivals. The takeaway?

Forecasters need new ways to talk about the uncertainty of their models and need to expand beyond “polling data.” The Defense Department and the intelligence community, who have also grown fond of machine aided prediction, would do well to heed that lesson.

There’s an important and overlooked distinction between a prediction (which suggests certainty) and a forecast, which acknowledges more than one possible outcome and then weighs multiple outcomes in terms of their relative probability. But humans, and particularly media types that report on polling information, like certainty. So forecasts are cast as predictions.

Nate Silver, the famous prognosticator, forecast Hillary Clinton’s win as likely, giving it an about 71 percent probability. Importantly, that does not mean he was technically wrong. It just means that the less likely outcome occurred.

The site Election Analytics, maintained by computer scientist Sheldon Jacobson of the University of Illinois, outputs a number of possible outcomes for elections. In the Clinton-Trump matchup, the site had had 21 possible scenarios. In only one did Donald Trump win.

“We didn’t report it widely” said Jacobson of the winning scenario. “I woke up on Tuesday and wondered, ‘Should I report the most extreme scenario? Or should I report the average?’ It’s like buying a basket of stocks versus buying an individual stock.” Bottom line, he says, “People expect a level of precision that the data cannot provide.”

Jacobson also does forecasting for TSA, part of the effort to screen for terrorists effectively while still keeping lines moving at airports. He says a key difference between forecasting elections and forecasting for airport security is that the risk of getting an election prediction wrong is small. “If we had 21 scenarios and one came up red” in a national security policy, “We would not implement that security policy. That risk was too great.”

Jacobson’s method, like Silver’s, employs Bayesian statics. That means that both models employ the following formula.

P (A | X) = p (X | A) p (A)
p (X)

P means probability, A is the answer, and X is something that will influence the probability. The more information you provide, the more times you run the formula, the greater your confidence level about A. But Bayesian statistics never tell you exactly what will happen, only what might happen based on available data.

That means your output is only going to be as good as the data you’re putting into the model. The pollsters that failed on Tuesday all relied on conventional polling information. “I don’t think the polling data was the problem,” Jacobson said. “It was the uncertainty in the data because of the undecided factor. In a few polls, it was 11 percent. That’s like trying to drive 80 miles an hour in fog. We just had an accident.”

University of Maryland computer scientist V.S. Subrahmanian creates forecasting methods that the intelligence community uses to predict the activities of terrorist groups. He said that the Clinton-Trump matchup presented three “Black Swan” factors that traditional polling data could not capture.

“The first was a candidate with a background totally different from major recent presidential candidates – one who had held no political office, and who spoke his mind freely, unlike the more guarded speech of seasoned politicians,” Subrahmanian said.

“The second was the unprecedented disclosures by the FBI during the final few days of the election. A third was the influence campaign run by a foreign state through the drip-by-drip disclosure of internal campaign deliberations. I believe that existing predictive models were unable to account for these three types of variables, leading to predictions based on other historical factors, which were eventually proven wrong.”

Kalev Leetaru used big data to accurately discover the location of Osama Bin Laden in Abbottabad, Pakistan, using not polling information but open-source published news articles. Leetaru chalked up Tuesday 8th’s failure to bad judgment about which data was relevant.

“When it comes to the kinds of questions that intelligence personnel actually want forecasting engines to answer, such as ‘Will Brexit happen’ or ‘Will Trump win,’ those are the cases where the current approaches fail miserably. It’s not because the data isn’t there. It is. Is because we use our flawed human judgment to decide how to feed that data into our models and therein project our biases into the model’s outcomes.”

Beyond Conventional Polling: The Future of Forecasts

Today, of course, researchers can use more than just phone data to make forecasts, including broad social phenomena. In 2012, Virginia Tech computer scientist Naren Ramakrishnan was able to correctly predict social protest movements in Mexico and Brazil with nothing but Twitter data, part of a research program sponsored by the Intelligence Community through the Intelligence Advanced Research Projects Activity, or IARPA.

In his own theory about Tuesday 8th November’s outcome, Ramakrishnan also cited Black Swan high-impact, low-probability events. Bottom line, many forecasters did, in fact, predict it. They just predicted that outcome alongside many others. To the average person, that works out the same as not predicting the actual outcome.

“There are a lot of best practices that one could use, the important thing is to rely on multiple sources of data, the other important thing, quantify uncertainty. You have to ask the question, ‘When will I be wrong?’” he says. Forecasters need to make that that self-analysis as public as their forecasts.

Predata, a predictive analytics company established by former members of the intelligence community, also said a Clinton win was more likely than a Trump win. They  crunch hundreds of thousands of data points a day from over a thousand web sites, such as YouTube.

In a note to subscribers of their newsletter, Predata officials explained that three things led them to their conclusion on a Clinton win being more likely based on the complexity of the electoral college system, overweighting polls and “other experts;” and Trump generating a lot of online content and excitement that should have made it into their analysis, but didn’t, for the same reason pollsters and elite liberal newspapers wrote off Trump as a joke until his victory was a reality.

“Trump did not win because he uploaded some ads to his official YouTube channel. Rather, his victory was a function of the support that thrived in the seamier, populist corners of the Internet, the corners, that is, we made an early decision to exclude from our curation of the signal sets.”

In other words, it came down to precisely the sort of human judgement error that Leetaru highlighted.

It’s thus not surprising that the big winner in the polling contest was not a human at all but an artificial intelligence named MogIA. Developed by Indian entrepreneur Sanjiv Rai, it takes in 20 million data points from a variety of open public websites such as YouTube, Google, Twitter, and Facebook to uncover trends in “user engagement.”

Rai said his exclusive arrangement with CNBC prevents him from talking about how the system works or crunches the data points.

“While most algorithms suffer from programmers/developer’s biases, MoglA aims at learning from her environment, developing her own rules at the policy layer and develop expert systems without discarding any data,” Rai told CNBC reporter Arjun Kharpal.

Big data and computer-aided projection is hardly dead. It’s just getting started.

DefenseOne:    NYT:     Was Donald Trump's Surprise Victory Hidden In The Data?:

 

 

« Internet of Things – For Smart and Secure Cities
Virtual Reality – Just Getting Started »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Tototheo Global

Tototheo Global

Tototheo Global harness the power of connectivity and technology to bridge technological divides, driving progress, security, and sustainability for a seamlessly connected world.

Cyber Solutions Inc

Cyber Solutions Inc

Cyber Solutions has been providing professional IT Support for businesses since 1998.