PRODIGAL (Computer System)
PRODIGAL (Computer System)
Primary participants
Georgia Institute of Technology College of Computing
Georgia Tech Research Institute
Defense Advanced Research Projects Agency
Army Research Office
Science Applications International Corporation
Oregon State University
University of Massachusetts Amherst
Carnegie Mellon University
See also
Cyber Insider Threat
Einstein (US-CERT program)
Threat (computer)
Intrusion detection
ECHELON, Thinthread, Trailblazer, Turbulence (NSA programs)
Fusion center, Investigative Data Warehouse (FBI)
References
1. "Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad" (http://i
nsidehpc.com/2011/11/29/video-interview-darpas-adams-project-taps-big-data-to-find-the-br
eaking-bad/). Inside HPC. November 29, 2011. Retrieved December 5, 2011.
2. Brandon, John (December 3, 2011). "Could the U.S. Government Start Reading Your
Emails?" (http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-yo
ur-emails/). Fox News. Retrieved December 6, 2011.
3. "Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data
Sets" (http://www.gatech.edu/newsroom/release.html?nid=72599). Georgia Institute of
Technology. November 10, 2011. Retrieved December 6, 2011.
4. Storm, Darlene (December 6, 2011). "Sifting through petabytes: PRODIGAL monitoring for
lone wolf insider threats" (https://web.archive.org/web/20120112170109/http://blogs.comput
erworld.com/19382/sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_t
hreats). Computer World. Archived from the original (http://blogs.computerworld.com/19382/s
ifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats) on January
12, 2012. Retrieved December 6, 2011.