Posted on 11/09/2002 9:31:25 AM PST by rs79bm
By JOHN MARKOFF
he Pentagon is constructing a computer system that could create a vast electronic dragnet, searching for personal information as part of the hunt for terrorists around the globe including the United States.
As the director of the effort, Vice Adm. John M. Poindexter, has described the system in Pentagon documents and in speeches, it will provide intelligence analysts and law enforcement officials with instant access to information from Internet mail and calling records to credit card and banking transactions and travel documents, without a search warrant.
Historically, military and intelligence agencies have not been permitted to spy on Americans without extraordinary legal authorization. But Admiral Poindexter, the former national security adviser in the Reagan administration, has argued that the government needs broad new powers to process, store and mine billions of minute details of electronic life in the United States.
Admiral Poindexter, who has described the plan in public documents and speeches but declined to be interviewed, has said that the government needs to "break down the stovepipes" that separate commercial and government databases, allowing teams of intelligence agency analysts to hunt for hidden patterns of activity with powerful computers.
"We must become much more efficient and more clever in the ways we find new sources of data, mine information from the new and old, generate information, make it available for analysis, convert it to knowledge, and create actionable options," he said in a speech in California earlier this year.
Admiral Poindexter quietly returned to the government in January to take charge of the Office of Information Awareness at the Defense Advanced Research Projects Agency, known as Darpa. The office is responsible for developing new surveillance technologies in the wake of the Sept. 11 attacks.
In order to deploy such a system, known as Total Information Awareness, new legislation would be needed, some of which has been proposed by the Bush administration in the Homeland Security Act that is now before Congress. That legislation would amend the Privacy Act of 1974, which was intended to limit what government agencies could do with private information.
The possibility that the system might be deployed domestically to let intelligence officials look into commercial transactions worries civil liberties proponents.
"This could be the perfect storm for civil liberties in America," said Marc Rotenberg, director of the Electronic Privacy Information Center in Washington "The vehicle is the Homeland Security Act, the technology is Darpa and the agency is the F.B.I. The outcome is a system of national surveillance of the American public."
Secretary of Defense Donald H. Rumsfeld has been briefed on the project by Admiral Poindexter and the two had a lunch to discuss it, according to a Pentagon spokesman.
"As part of our development process, we hope to coordinate with a variety of organizations, to include the law enforcement community," a Pentagon spokeswoman said.
An F.B.I. official, who spoke on the condition that he not be identified, said the bureau had had preliminary discussions with the Pentagon about the project but that no final decision had been made about what information the F.B.I. might add to the system.
A spokesman for the White House Office of Homeland Security, Gordon Johndroe, said officials in the office were not familiar with the computer project and he declined to discuss concerns raised by the project's critics without knowing more about it.
He referred all questions to the Defense Department, where officials said they could not address civil liberties concerns because they too were not familiar enough with the project.
Some members of a panel of computer scientists and policy experts who were asked by the Pentagon to review the privacy implications this summer said terrorists might find ways to avoid detection and that the system might be easily abused.
"A lot of my colleagues are uncomfortable about this and worry about the potential uses that this technology might be put, if not by this administration then by a future one," said Barbara Simon, a computer scientist who is past president of the Association of Computing Machinery. "Once you've got it in place you can't control it."
Other technology policy experts dispute that assessment and support Admiral Poindexter's position that linking of databases is necessary to track potential enemies operating inside the United States.
"They're conceptualizing the problem in the way we've suggested it needs to be understood," said Philip Zelikow, a historian who is executive director of the Markle Foundation task force on National Security in the Information Age. "They have a pretty good vision of the need to make the tradeoffs in favor of more sharing and openness."
On Wednesday morning, the panel reported its findings to Dr. Tony Tether, the director of the defense research agency, urging development of technologies to protect privacy as well as surveillance, according to several people who attended the meeting.
If deployed, civil libertarians argue, the computer system would rapidly bring a surveillance state. They assert that potential terrorists would soon learn how to avoid detection in any case.
The new system will rely on a set of computer-based pattern recognition techniques known as "data mining," a set of statistical techniques used by scientists as well as by marketers searching for potential customers.
The system would permit a team of intelligence analysts to gather and view information from databases, pursue links between individuals and groups, respond to automatic alerts, and share information efficiently, all from their individual computers.
The project calls for the development of a prototype based on test data that would be deployed at the Army Intelligence and Security Command at Fort Belvoir, Va. Officials would not say when the system would be put into operation.
The system is one of a number of projects now under way inside the government to lash together both commercial and government data to hunt for patterns of terrorist activities.
"What we are doing is developing technologies and a prototype system to revolutionize the ability of the United States to detect, classify and identify foreign terrorists, and decipher their plans, and thereby enable the U.S. to take timely action to successfully pre-empt and defeat terrorist acts," said Jan Walker, the spokeswoman for the defense research agency.
Before taking the position at the Pentagon, Admiral Poindexter, who was convicted in 1990 for his role in the Iran-contra affair, had worked as a contractor on one of the projects he now controls. Admiral Poindexter's conviction was reversed in 1991 by a federal appeals court because he had been granted immunity for his testimony before Congress about the case.
From the above link;
The New York Times reported today that the Pentagons Office of Strategic Influence is developing plans to provide news items, possibly even false ones, to foreign media organizations in an effort to influence public sentiment and policy makers in both friendly and unfriendly countries.
The OSI was created shortly after September 11 to publicize the U.S. governments perspective in Islamic countries and to generate support for the U.S.s war on terror. This latest announcement raises grave concerns that far from being an honest effort to explain U.S. policy, the OSI may be a profoundly undemocratic program devoted to spreading disinformation and misleading the public, both at home and abroad. At the same time, involving reporters in Pentagon disinformation puts the lives of working journalists at risk.
Some day soon, all you folks who believe this crap,...like this poor soul, are gonna' wake up and smell the coffee, and by then, it will be too late.
This is not a war on terror. That's just the distraction. This is really a war on the American People. There's no other way to look at the rediculous combination of the concepts of "homeland security" and "open borders". The two don't mix. But they're not supposed to. ...Yes, let's all remember. WE'RE THE ENEMY IN THE EYES OF UNCLE SAMMY-RAY.
Excellent point.
I would be shocked if "preliminary discussions" were not held. But this is just the Democrat's tying to turn the public against us. The motives of this publication needs to be publicly attacked and fast or they may succeed.
Actually, it should make everyone nervous since the more information the government gets the less time it seems to spend actually looking for real criminals.
In the D.C. area, federal government agents harassed people who bought .223 rifles in that area who also happened to own white vans. This, despite the fact that not only had the perps not bought a rifle in that area, and not only were they not driving a white van, but there were other obvious leads (such as a blue Caprice whose plate was recorded at 10 of the post-shooting roadblocks) the police were ignoring.
Perhaps if there was some evidence that new intelligence-gathering abilities would actually be used to solve crimes, there might be at least some merit to supporting them. As it is, though, it seems the government so mis-uses its intelligence-gathering facilities that adding more would likely just further impede effective law enforcement.
The same was said about the RICO - that only the members of Mafia should be nervous. And now it is being applied against pro-life activists and many others. The only thing common between a nun praying before the abortion clinic and John Giotti might be Roman Catholic background, but RICO is being applied to non-Catholics as well.
Total Information Awareness (TIA) System
Program Manager: Dr. John Poindexter
Deputy PM: Dr. Robert PoppProgram Objective:
The Total Information Awareness (TIA) program is a FY02 new-start program. The goal of the Total Information Awareness (TIA) program is to revolutionize the ability of the United States to detect, classify and identify foreign terrorists and decipher their plans and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. To that end, the TIA program objective is to create a counter-terrorism information system that: (1) increases information coverage by an order of magnitude, and affords easy future scaling; (2) provides focused warnings within an hour after a triggering event occurs or an evidence threshold is passed; (3) can automatically queue analysts based on partial pattern matches and has patterns that cover 90% of all previously known foreign terrorist attacks; and, (4) supports collaboration, analytical reasoning and information sharing so that analysts can hypothesize, test and propose theories and mitigating strategies about possible futures, so decision-makers can effectively evaluate the impact of current or future policies and prospective courses of action.
Program Strategy:
The TIA program strategy is to integrate technologies developed by DARPA (and elsewhere as appropriate) into a series of increasingly powerful prototype systems that can be stress-tested in operationally relevant environments, using real-time feedback to refine concepts of operation and performance requirements down to the component level. The TIA program will develop and integrate information technologies into fully functional, leave-behind prototypes that are reliable, easy to install, and packaged with documentation and source code (though not necessarily complete in terms of desired features) that will enable the intelligence community to evaluate new technologies through experimentation, and rapidly transition it to operational use, as appropriate. Accordingly, the TIA program will work in close collaboration with one or more U.S. intelligence agencies that will provide operational guidance and technology evaluation, and act as TIA system transition partners.
Technically, the TIA program is focusing on the development of: 1) architectures for a large-scale counter-terrorism database, for system elements associated with database population, and for integrating algorithms and mixed-initiative analytical tools; 2) novel methods for populating the database from existing sources, create innovative new sources, and invent new algorithms for mining, combining, and refining information for subsequent inclusion into the database; and, 3) revolutionary new models, algorithms, methods, tools, and techniques for analyzing and correlating information in the database to derive actionable intelligence.
Words to remember. I sincerly hope that people wake up, if it's not already too late. How many people here are going to lobby against Homeland Security to Congress though I wonder?
BTW, excellent profile page.
Ah, but we have nothing to fear from a REPUBLICAN controlled Congress according to most people here on FR. Right.
As Gerald Ford said (paraphrase), "A government big enough to give you everything you want is big enough to take everything you've got."
HE said that? I knew there was a reason that I voted for him.. :)
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.