OVIOUSLY THIS DATA MINING BASE AND THE EU WILL BE CONNECTED TO KEEP TRACK OF ALL AMERICANS AND WORLDS DATA THROUGH MICROSOFT,GOOGLE AND ALL OTHER SOURCES.
The panopticon economy
http://www.sacurrent.com/news/story.asp?id=69607
Anti-Terrorist Data Mining Doesn't Work Very Well
http://it.slashdot.org/article.pl?sid=08/10/07/1827229&tid=172
Protecting Individual Privacy in the Struggle Against Terrorists:A Framework for Program Assessment
http://www.nap.edu/catalog.php?record_id=12452
NSA Is Building a New Datacenter In San Antonio
Posted by kdawson on Sunday December 07, @02:17AM
from the panopticon-economy dept.
An anonymous reader writes in with an article from a Texas paper on the NSA's new facility in San Antonio. America's top spy agency has taken over the former Sony microchip plant and is transforming it into a new data-mining headquarters... where billions of electronic communications will be sifted in the agency's mission to identify terrorist threats. ... [Author James] Bamford writes about how NSA and Microsoft had both been eyeing San Antonio for years because it has the cheapest electricity in Texas, and the state has its own power grid, making it less vulnerable to power outages on the national grid. He notes that it seemed the NSA wanted assurance Microsoft would be here, too, before making a final commitment, due to the advantages of having their miners virtually next door to the mother lode of data centers. The new NSA facility is just a few miles from Microsoft's data center of the same size. Bamford says that under current law, NSA could gain access to Microsoft's stored data without even a warrant, but merely a fiber-optic cable. The article mentions the NRC report concluding that data mining is ineffective as a tactic against terrorism, which we discussed a couple of months back.
October 7, 2008 9:30 AM PDT Government report: Data mining doesn't work well
Posted by Declan McCullagh
The most extensive government report to date on whether terrorists can be identified through data mining has yielded an important conclusion: It doesn't really work. A National Research Council report, years in the making and scheduled to be released Tuesday, concludes that automated identification of terrorists through data mining or any other mechanism is neither feasible as an objective nor desirable as a goal of technology development efforts. Inevitable false positives will result in ordinary, law-abiding citizens and businesses being incorrectly flagged as suspects. The whopping 352-page report, called Protecting Individual Privacy in the Struggle Against Terrorists, amounts to at least a partial repudiation of the Defense Department's controversial data-mining program called Total Information Awareness, which was limited by Congress in 2003. But the ambition of the report's authors is far broader than just revisiting the problems of the TIA program and its successors. Instead, they aim to produce a scholarly evaluation of the current technologies that exist for data mining, their effectiveness, and how government agencies should use them to limit false positives--of the sort that can result in situations like heavily-armed SWAT teams raiding someone's home and shooting their dogs based on the false belief that they were part of a drug ring. The report was written by a committee whose members include William Perry, a professor at Stanford University; Charles Vest, the former president of MIT; W. Earl Boebert, a retired senior scientist at Sandia National Laboratories; Cynthia Dwork of Microsoft Research; R. Gil Kerlikowske, Seattle's police chief; and Daryl Pregibon, a research scientist at Google. They admit that far more Americans live their lives online, using everything from VoIP phones to Facebook to RFID tags in automobiles, than a decade ago, and the databases created by those activities are tempting targets for federal agencies. And they draw a distinction between subject-based data mining (starting with one individual and looking for connections) compared with pattern-based data mining (looking for anomalous activities that could show illegal activities). But the authors conclude the type of data mining that government bureaucrats would like to do--perhaps inspired by watching too many episodes of the Fox series 24--can't work. If it were possible to automatically find the digital tracks of terrorists and automatically monitor only the communications of terrorists, public policy choices in this domain would be much simpler. But it is not possible to do so.
A summary of the recommendations:
* U.S. government agencies should be required to follow a systematic process to evaluate the effectiveness, lawfulness, and consistency with U.S. values of every information-based program, whether classified or unclassified, for detecting and countering terrorists before it can be deployed, and periodically thereafter.
* Periodically after a program has been operationally deployed, and in particular before a program enters a new phase in its life cycle, policy makers should (carefully review) the program before allowing it to continue operations or to proceed to the next phase.
* To protect the privacy of innocent people, the research and development of any information-based counterterrorism program should be conducted with synthetic population data... At all stages of a phased deployment, data about individuals should be rigorously subjected to the full safeguards of the framework.
* Any information-based counterterrorism program of the U.S. government should be subjected to robust, independent oversight of the operations of that program, a part of which would entail a practice of using the same data mining technologies to mine the miners and track the trackers.
* Counterterrorism programs should provide meaningful redress to any individuals inappropriately harmed by their operation.
* The U.S. government should periodically review the nation's laws, policies, and procedures that protect individuals' private information for relevance and effectiveness in light of changing technologies and circumstances. In particular, Congress should re-examine existing law to consider how privacy should be protected in the context of information-based programs (e.g., data mining) for counterterrorism.
By itself, of course, this is merely a report with non-binding recommendations that Congress and the executive branch could ignore. But NRC reports are not radical treatises written by an advocacy group; they tend to represent a working consensus of technologists and lawyers.
The great encryption debate of the 1990s was one example. The NRC's so-called CRISIS report on encryption in 1996 concluded export controls--that treated software like Web browsers and PGP as munitions--were a failure and should be relaxed. That eventually happened two years later. Declan McCullagh, CNET News' chief political correspondent, chronicles the intersection of politics and technology. He has covered politics, technology, and Washington, D.C., for more than a decade, which has turned him into an iconoclast and a skeptic of anyone who says, We oughta have a new federal law against this. E-mail Declan.
I WRITE NEWS ABOUT AND PUT NEWS ARTICLES ABOUT ISRAEL AND JERUSALEM PERTAINING TO BIBLE PROPHESY HAPPENINGS.JOEL 3:20 But Judah (ISRAEL) shall dwell for ever, and Jerusalem from generation to generation.(THATS ISRAEL-JERUSALEM WILL NEVER BE DESTROYED AGAIN)-WE CHRISTIANS ARE ALL WAITING PATIENTLY FOR THE PRE-TRIBULATION RAPTURE TO OCCUR.SO WE CAN GO TO JESUS AND GET OUR NEVER DYING BODIES.SO WE CAN RULE OVER CITIES OURSELVES.WHILE JESUS RULES FROM DAVIDS THRONE FOREVER IN JERUSALEM.
IMPORTANT LINKS
- 2-STRONG MAN BEHIND THE SPIRIT.
- 2024 CANADA PREDICTIONS.
- ABORTION IS MURDER OF A GENERATION OF CHILDREN.
- BEHOLD ISRAEL-AMIR TSARFATI
- BIOLOGICAL WEAPON COVID STARTED IN 1965.
- BRENT MEIDINGER, SINGER
- CBN NEWS
- DESTINY OF NATIONS.
- ELIJAH & MOSES PREACH 3 1/2 YEARS
- EU'S 10 POINT PEACE PLAN.
- FOX NEWS
- FROM NEBUCHADNEZZAR TO TODAY.
- HOLY TEMPLE MYTH 1
- HOLY TEMPLE MYTH 2
- HOLY TEMPLE MYTH 3
- I ASKED AI LEADER QUESTIONS.
- ISRAEL AND EUS HISTORY TO END OF TRIBULATION.
- ISRAEL BIRD MIGRATION 2
- ISRAEL BIRD MIGRATION 3
- ISRAEL BIRD MIGRATION.
- ISRAEL DEFEATES ALL ENEMIES.
- ISRAEL RADIO
- ISRAEL-JERUSALEM TOGETHER FOREVER
- ISRAEL365 NEWS
- ISRAELI CITIES CAMERA
- J D FARAG
- JACK VAN IMPE
- JAN MARKELL
- JERUSALEM LIVE
- JERUSALEM POST NEWS
- JERUSALEM WESTERN WALL LIVE
- JEWISH FEASTS - HOLIDAYS - HOLY DAYS.
- LATEST MUSLIM SCAM READERS DIGEST
- LAURA-LYNN TYLER THOMPSON
- MARK LEVIN (TRUTHS)
- MY 12 YR BAN ON GAY FLAG IN OWENSOUND
- MY 7 YR PEACE TREATY SITE
- MY END TIME SCENARIO.
- MY MOHAWK HARNESS PREDICTIONS
- MY NHL HOCKEY STATS SITE
- MY TWITTER SITE
- MY YOUTUBE SITE
- NEW WORLD ORDER BY ME
- NTEB
- REBEL NEWS
- SHOTS ARE GENE THERAPY.
- SHROUD OF TURIN
- THE GATEWAY PUNDIT
- THE LAST GENERATION
- TIMES OF ISRAEL NEWSFEED
- WAR IN HEAVEN REV 12
- WERE ISLAM WILL BE BURIED 300 MILLION.
- WHOS LAND IS IT (2)
- WHOS LAND IS IT (3)
- WHOS LAND IS IT? (1)
- WHOS LAND IS IT? (4)
- WHOS LAND IS IT? (5)
- WHOS LAND IS IT? (6)
- WOKE CULTURE IS MAOISM IN CANADAS CHARACTERISTICS
- WW3 THE WAVES.
Saturday, December 13, 2008
ALLTIME
-
COMMUNIST NAZI PROSTITUE PUPPET MEDIA OF CANADA IN KAHOOTS WITH COMMUNIST-NAZI LIBERAL LEADER TRUDEAU TO DESTROY TRUCKERS. THE PROPAGANDA PR...
-
JEWISH KING JESUS IS COMING AT THE RAPTURE FOR US IN THE CLOUDS-DON'T MISS IT FOR THE WORLD.THE BIBLE TAKEN LITERALLY- WHEN THE PLAIN S...
-
DEFEATING DEMONIC SPIRITS (PART 2) RELATED PART 1 http://israndjer.blogspot.ca/2006/08/defeating-demonic-powers.html GIFTS OF THE SPIR...