Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at:
http://www.mail-archive.com/[email protected]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]
Om
--- Begin Message ---
-Caveat Lector-
![]()
CONCERN: GOP Rep. Curt Weldon (l.) and Democrat Sen. Russell Feingold want details on federal data-mining.
AP/FILE
US plans massive data sweepLittle-known data-collection system could troll news, blogs, even e-mails. Will it go too far?
Christian Science Monitor, February 09, 2006http://www.csmonitor.com/2006/0209/p01s02-uspo.html
EXCERPTS ONLY:
ADVISE would collect a vast array of corporate and public online information, from financial records to CNN news stories, and cross-reference it against US intelligence and law-enforcement records. A major part of ADVISE involves data-mining - or "dataveillance," as some call it.
But ADVISE aims to do much more, according to Joseph Kielman, manager of the TVTA portfolio. The key is not merely to identify terrorists, or sift for key words, but to identify critical patterns in data that illumine motives and intentions.
For example: Is a burst of Internet traffic between a few people the plotting of terrorists, or just bloggers arguing? ADVISE algorithms would try to determine that before flagging the data pattern for a human analyst's review.
At least a few pieces of ADVISE are already operational. Consider Starlight, which along with other "visualization" software tools can give human analysts a graphical view of data. Viewing data in this way could reveal patterns not obvious in text or number form. Understanding the relationships among people, organizations, places, and things - using social-behavior analysis and other techniques - is essential to going beyond mere data-mining to comprehensive "knowledge discovery in databases," Dr. Kielman wrote in his November report. He declined to be interviewed for this article.
As envisioned, ADVISE and its analytical tools would be used by other agencies to look for terrorists. "All federal, state, local and private-sector security entities will be able to share and collaborate in real time with distributed data warehouses that will provide full support for analysis and action" for the ADVISE system, says the 2004 workshop report.
A program in the shadows
Yet the scope of ADVISE - its stage of development, cost, and most other details - is so obscure that critics say it poses a major privacy challenge.
"We just don't know enough about this technology, how it works, or what it is used for," says Marcia Hofmann of the Electronic Privacy Information Center in Washington. "It matters to a lot of people that these programs and software exist. We don't really know to what extent the government is mining personal data."
Even congressmen with direct oversight of DHS, who favor data mining, say they don't know enough about the program. "I am not fully briefed on ADVISE," says Rep. Curt Weldon (R) of Pennsylvania, vice chairman of the House Homeland Security Committee.
www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substanceânot soap-boxingâplease! These are sordid matters and 'conspiracy theory'âwith its many half-truths, mis- directions and outright fraudsâis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply.Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at:
http://www.mail-archive.com/[email protected]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]
Om
--- End Message ---
