Via Wired.com, an article on the FBI's National Security Branch Analysis Center (NSAC) database, which, according to declassified documents obtained by Wired, contains than 1.5 billion government and private-sector records about citizens and foreigners, ans is thus becoming the “Total Information Awareness” the government wanted to put in place after 9/11.
The government thought then of data mining private databases for national security reasons. The New York Times had reported in February 2002 that the Pentagon, under the leadership of Vice Admiral John Poindexter, was building a computer able to collect and data mine personal data, such as credit card records, school, travel and medical records, in order to track terrorists. The name of the program, Total Information Awareness, was later changed to Terrorism Information Awareness. Congress eliminated funding for the program in 2003.
TIA was followed by “The Matrix,” a data mining program linking government and commercial databases. Government agencies have also required in the past the assistance of telecommunication carriers to eavesdrop on suspect’s emails. The FBI’s CARNIVORE program plugs, (or plugged,) a computer (the DCS-1000) directly to an ISPs’ network to monitor suspect incoming and outgoing emails. ECHELON was a program eavesdropping on international private telephone calls, e-mails and faxes, using both ground and satellites.
Data mining, or Knowledge Discovery in Databases (KDD) is the process that allows experts to extract trends and patterns from data, using algorithms to identify relationships and patterns in data. There are two main data mining methods. The top-down method looks for a well-defined profile by asking questions and testing hypotheses. The bottom-up method analyzes raw data to find trends and groups.
Is data mining such an extensive amount of information an efficient method to increase security? This is an important question as citizens are asked to trade off some of their liberties for security, or at least for a renewed sense of security, and would be more reluctant to do so for a program efective in preventing terrorist attacks. Former Homeland Security Secretary Michael Chertoff believed in the ability of data mining to prevent terrorism. While an assistant attorney general, he testified in 2002 that he found data mining a promising way to fight terrorism. He further testified that the Department of Justice was “using computers to analyze information obtained in the course of criminal investigations, to uncover patterns of behavior.(…) Through what has come to be called ‘data mining’ and predictive technology, we seek to identify other potential terrorists and terrorism financing networks.”
Even some privacy advocates believe that the use of commercial databases can “help improve the amount and quality of identifying information in watch lists.” However, most of them do not believe that such massive data mining would protect us against terrorist attacks, and is not fail-proof. The Wired article quotes Kurt Opsahl, an EFF senior attorney: “We have a situation where the government is spending fairly large sums of money to use an unproven technology that has a possibility of false positives that would subject innocent Americans to unnecessary scrutiny and impinge on their freedom.”
The efficiency of a method should not be the ultimate test used to establish an opinion about government surveillance. But if we may have a high surveillance tolerance, we certainly have a zero tolerance for being arrested by mistake, or prevented to board an airplane.
RE: Cyberlaw, IP, rivacy in the USA and Europe NB: This site is 100% legal-advice free.
Subscribe to:
Post Comments (Atom)
Blog Archive
Labels
- ACTA
- Anomymat sur Internet
- Art Law
- Avatars
- Biometry
- blogs
- Book Worm Report
- Censorship
- Cloud Computing
- CNIL
- Compteurs Intelligents
- Contrefaçon
- Cookies
- Copie Privée
- Copyright
- Copyright Fair Use
- Counterfeiting
- Cyberlaw
- Cybersquatting
- Data Breaches
- Data Mining
- Data Privacy
- Database
- Defamation
- Diffamation
- Digital Identity
- DMP
- DNA
- Droit a l'image
- Droit à l'Oubli
- Droit de Réponse
- Droit Moral
- Droits Voisins
- e-commercre
- ECPA
- emails
- Fashion and Copyright
- Fashion and Patents
- Fashion and Trademark
- Fashion News
- FCC
- Fingerprints
- First Amendment
- Flag
- Fourth Amendment
- France
- Freedom of Expression
- Freedom of the Press
- French IP Law
- FTC
- Genetic Privacy
- Google's Book Settlement
- GPS
- Great Britain
- HADOPI
- How to be an Attorney
- HR 5055
- HR 683
- ID cards
- Identité Génétique
- Identity
- Identity Theft
- Indecent Speech
- International Privacy
- Internet of Things
- Internet Privacy
- Internet Security
- IP Address
- Locational Privacy
- LOPPSI 2
- Misc.
- Net Neutrality
- New York Privacy Laws
- New York State
- Online Identity
- Online Impersonation
- Online Privacy
- Pacifica
- Parody
- Passwords
- Patriot Act
- Privacy
- Privacy as a Human Right
- Privacy Breach as a Crime
- privacy in European Union
- Privacy in the EU
- Privacy in the Workplace
- Privacy Settings
- Professions Juridiques
- Propriété Intellectuelle
- Public Domain
- Public Records
- RFID
- Right of Publicity
- RSS
- Safe Harbor
- SCA
- Section 230
- Security Breaches
- Smart Grids
- Social Network
- Sports Law
- Subpoenas
- Surveillance
- Text-Messaging
- The Public Voice
- Three-Strikes
- Thrift Store Tee Shirts
- Trade Dress
- Trademark
- Trademark and Marketing
- Trademark Dilution
- Trademark Fair Use
- Trademark Infringement
- UK
- US Privacy Laws
- Vie Privee
- Virtual Worlds
- Web 2.0
- WHOIS
- Yankees
No comments:
Post a Comment