Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The 'Privacy' Jihad: "Total Information Awareness" falls to total Luddite hysteria.
The Wall Street Journal Opinion Journal ^ | April 1, 2004 | Heather MacĀ Donald

Posted on 03/31/2004 10:34:51 PM PST by quidnunc

The 9/11 Commission hearings have focused public attention again on the intelligence failures leading up to the September attacks. Yet since 9/11, virtually every proposal to use intelligence more effectively — to connect the dots — has been shot down by left- and right-wing libertarians as an assault on "privacy." The consequence has been devastating: Just when the country should be unleashing its technological ingenuity to defend against future attacks, scientists stand irresolute, cowed into inaction.

The privacy advocates — who range from liberal groups focused on electronic privacy, such as the Electronic Privacy Information Center, to traditional conservative libertarians, such as Americans for Tax Reform — are fixated on a technique called "data mining." By now, however, they have killed enough different programs that their operating principle can only be formulated as this: No use of computer data or technology anywhere at any time for national defense, if there's the slightest possibility that a rogue use of that technology will offend someone's sense of privacy. They are pushing intelligence agencies back to a pre-9/11 mentality, when the mere potential for a privacy or civil liberties controversy trumped security concerns.

The privacy advocates' greatest triumph was shutting down the Defense Department's Total Information Awareness (TIA) program. Goaded on by New York Times columnist William Safire, the advocates presented the program as the diabolical plan of John Poindexter, the former Reagan national security adviser and director of Pentagon research, to spy on "every public and private act of every American" — in Mr. Safire's words.

The advocates' distortion of TIA was unrelenting. Most egregiously, they concealed TIA's purpose: to prevent another attack on American soil by uncovering the electronic footprints terrorists leave as they plan and rehearse their assaults. Before terrorists strike, they must enter the country, receive funds, case their targets, buy supplies, and send phone and e-mail messages. Many of those activities will leave a trail in electronic databases. TIA researchers hoped that cutting-edge computer analysis could find that trail in government intelligence files and, possibly, in commercial databases as well.

TIA would have been the most advanced application yet of "data mining," a young technology which attempts to make sense of the explosion of data in government, scientific and commercial databases. Through complex algorithms, the technique can extract patterns or anomalies in data collections that a human analyst could not possibly discern. Public health authorities have mined medical data to spot the outbreak of infectious disease, and credit-card companies have found fraudulent credit-card purchases with the method, among other applications.

But according to the "privacy community," data mining was a dangerous, unconstitutional technology, and the Bush administration had to be stopped from using it for any national-security or law-enforcement purpose. By September 2003, the hysteria against TIA had reached a fevered pitch and Congress ended the research project entirely, before learning the technology's potential and without a single "privacy violation" ever having been committed.

The overreaction is stunning. Without question, TIA represented a radical leap ahead in both data-mining technology and intelligence analysis. Had it used commercial data, it would have given intelligence agencies instantaneous access to a volume of information about the public that had previously only been available through slower physical searches. As with any public or private power, TIA's capabilities could have been abused — which is why the Pentagon research team planned to build in powerful safeguards to protect individual privacy. But the most important thing to remember about TIA is this: It would have used only data to which the government was already legally entitled. It differed from existing law-enforcement and intelligence techniques only in degree, not kind. Pattern analysis — the heart of data mining — is conventional crime-solving, whether the suspicious patterns are spotted on a crime pin map, on a city street, or in an electronic database.

-snip-

(Excerpt) Read more at opinionjournal.com ...


TOPICS: Extended News; Government; War on Terror
KEYWORDS: homelandsecurity; privacy; tia
Navigation: use the links below to view more comments.
first 1-2021 next last

1 posted on 03/31/2004 10:34:52 PM PST by quidnunc
[ Post Reply | Private Reply | View Replies]

To: quidnunc
Sorry, but I wasn't a big proponent of this plan anyway. It is to open to abuse, and although Bush might not use it in that way the next Clintonite would.
2 posted on 03/31/2004 10:37:24 PM PST by DeuceTraveler ((fight terrorism, give your local democrat a wedgie))
[ Post Reply | Private Reply | To 1 | View Replies]

To: quidnunc
Congress ended the research project entirely, before learning the technology's potential and without a single "privacy violation" ever having been committed.


Thank God.
It would be wise to keep in mind that Americans did not commit the atrocities of 9-11. Our friends the saudis did.

Maybe some brainiac ought to deal with reality and send the data mining crews over there along with our bombers and troops, and deal with the real culprits, and leave us loyal americans alone.

the tia was an attempt to use a national tragedy to create a very large, intrusive, big brother society in our moment of panic and sorrow.

the borders, are still WIDE open to invasion from the north and south. and we are being invaded from the south every day. some of them, are arab muslims.
3 posted on 03/31/2004 10:47:54 PM PST by Robert_Paulson2 (the madridification of our election is now officially underway.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: quidnunc
It strikes me as being absurd that we restrict nail clippers from passengers on airways in a bid to 'protect them', whereas you can have nearly foot long knitting needles without a concern.

It is this mentality that everything that isn't a weapon can be a weapon, and things that are obviously a possible weapon isn't that is echoed by our fear that government should be forbidden the powers needed to investigate potential threats.

So what if there is a huge computer system that can scan every e-mail sent; the shear mass of data prevents anyone from invading any one person's privacy, whereas it might just catch some idiotic terrorist plot in it's infancy. But because there is the possibility that an abuse might occur, we ban all tools. No nail clippers.

It reminds me of the outcry over 'spying' on members of the security council. What, indeed, makes such a thing wrong? Are these not foreign nationals of interest? Aren't they part of the policy making apparatus that we're supposed to be watching, in the interests of our national security?

The NSA needs to put their minds back to the task at hand, mining any technological resource that is out there so as to provide our national leadership the information that they need to make policy decisions that affect the world.

Ask yourself; had the NSA been on the job and mining just government e-mail, might it had been possible for someone to discover e-mails by a shocked government drone who had just denied a loan for a crop duster to a future member of the teams who brought down the Twin Towers?

Put in heavy fines and punishments for the abuse of the information and a mechanism to ensure that such punishments are enforced. Don't abandon reasonable technological tools in fear of an unnamed future abuse.
4 posted on 03/31/2004 10:57:42 PM PST by kingu (Which would you bet on? Iraq and Afghanistan? Or Haiti and Kosovo?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Robert_Paulson2
Jay Leno is not a politician, but he said that the blame for 9/11 should be put just where it belongs on bin laden, (and Islam.) An American is doubtful to be able to think in such and evil way about the destruction of human life, for life is just not that cheap.
This "blame game" being played in Washington has the Islamics laughing for it directs the attention away from them. I am really angry with politicians who try to make Americans look like fools for not being able to predict
9/11.
5 posted on 03/31/2004 10:57:44 PM PST by tessalu
[ Post Reply | Private Reply | To 3 | View Replies]

To: quidnunc
She argues that this technology would be useful against terrorists, then she argued that it was cut off at the knees before its usefulness was ever more than a hunch.

And well it was cut off. Can you imagine this kind of informational power in the hands of a Hillary?

What we know from the 9/11 commission is that without the will to act, intelligence is useless. And we have had administrations of both parties that neglected foreign enemies to dwell on imagined internal ones... we don't need it, and it's a potential hazard that ought to be strangled in its crib.

d.o.l.

Criminal Number 18F
6 posted on 03/31/2004 11:16:18 PM PST by Criminal Number 18F (You can't ride your old patriotism; you must constantly renew your service to America.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tessalu
Jay Leno is not a politician

That might be the reason he's free to speak his mind.

d.o.l.

Criminal Number 18F

7 posted on 03/31/2004 11:19:12 PM PST by Criminal Number 18F (You can't ride your old patriotism; you must constantly renew your service to America.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: quidnunc
I am glad TIA has failed. Gubbermint has no business wrt a lot of my personal information.
8 posted on 04/01/2004 4:47:13 AM PST by sauropod (Life is too short to read articles written by Upper West Side twits)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Robert_Paulson2
"the tia was an attempt to use a national tragedy to create a very large, intrusive, big brother society in our moment of panic and sorrow."

Bingo. Very well put. I am happy to see that almost all the posts on this thread, despite being on a "right wing extremist" web site, (lol) are decidedly in favor of civil liberties. Conservatives are by definition the true guardians of civil liberties.

9 posted on 04/01/2004 6:00:44 AM PST by joebuck
[ Post Reply | Private Reply | To 3 | View Replies]

To: quidnunc; DeuceTraveler
The op-ed concludes:

The bottom line is clear: The privacy battalions oppose not just particular technologies, but technological innovation itself. Any effort to use computerized information more efficiently will be tarred with the predictable buzzwords: "surveillance," "Orwellian," "Poindexter." This Luddite approach to counterterrorism could not be more ominous. The volume of information in government intelligence files long ago overwhelmed the capacity of humans to understand it. Agents miss connections between people and events every day. Machine analysis is essential in an intelligence tidal wave.

Before the privacy onslaught, scientists and intelligence officials were trying to find ways of identifying those fanatics who seek to destroy America before they strike again. Now many avenues are closed to them. This despite the fact that proposals for assessing risk in such areas as aviation do not grow out of an omnivorous desire to "spy on citizens" but out of a concrete need to protect people from a clear threat. And since 9/11, no one's "privacy rights" have been violated by terror pre-emption research.

The "privocrats" will rightly tell you that eternal vigilance is the price of liberty. Trouble is, they're aiming their vigilance at the wrong target.

The key is this: TIPS and Capps II target PATTERNS, not PEOPLE. This is NOT a privacy issue but rather a national security measure the 9/11 Panel should be recommending!

N.B. Better to post the entire article.

10 posted on 04/01/2004 6:13:42 AM PST by OESY
[ Post Reply | Private Reply | To 1 | View Replies]

To: sauropod

We are satisfied knowing that the Trotskyite and UberConservative civil libertarians will enjoy their intact privacy at the base of the rubble of the former Sears Tower.

11 posted on 04/01/2004 6:20:00 AM PST by Cultural Jihad
[ Post Reply | Private Reply | To 8 | View Replies]

To: quidnunc
The "Open to abuse" argument people have a greatly exaggerated sense of their own importance. Hint: no serious people are interested in what you do.

We will, I fear, regret the smearing of Poindexter and his efforts.
12 posted on 04/01/2004 6:28:34 AM PST by aculeus
[ Post Reply | Private Reply | To 1 | View Replies]

To: quidnunc
The German police were able to locate a terrorist 'safe house' by comparing electric bills with a list of electric utility customers. The empty apartment (rented by terrorists for future use) stood out like a sore thumb.

The "privacy morons" would prevent this sort of efficient police work.
13 posted on 04/01/2004 6:34:28 AM PST by aculeus
[ Post Reply | Private Reply | To 1 | View Replies]

To: quidnunc
Goaded on by New York Times columnist William Safire

Who both wrongly claimed that TIA was part of the Homeland Security Act (it wasn't) and significantly overstated the data that TIA was slated to gather.

There are pros and cons to TIA's demise. We have seen that the feds had a few scattered data points that might have revealed the developing 9/11 plot before it happened. What the feds should do first, before attempting to create a system such as TIA, is to figure out how to mine their existing data stream effectively. Throwing more data into a process that already is failing accomplishes nothing.

In addition, one only needs to look at the limited effectiveness of marketing models to see that commercially-available data that TIA would use would not be very effective for the much more stringent and demanding task of narrowing modelling down to the individual level to predict possible criminal behavior. There may be credit-card transactions that show someone spent $127.38 at Wal-Mart - but what did they buy? Shopping at Wal-Mart can yield some predictive value to a marketer, who may generate behavior segments holding tens of thousands of individuals linked by shopping and financial behavior, but it sure isn't useful for criminal investigations.

Having said that, the political reaction to TIA and associated data mining proposals has probably significantly set back efforts to improve data mining capabilities of the feds - and those efforts have a long way to go. For all the fancy talk about data mining, much of it is a mix of drudgery and the application of insights into data. The classic example of failed data mining is the DC sniper database. The Caprice used by the snipers was in the database several times - but it apparently didn't occur to anyone to run a SELECT COUNT(*) on the database for all instances where a license plate appears multiple times, sort the list descending and start working down it. That kind of mining is SQL 101 stuff - but apparently beyond the grasp of the investigators for that case.

In addition, Poindexter had proposed two privacy initiatives as part of TIA - and those have been thrown by the wayside. My primary objective to TIA was that it would be worthless for modelling possible terrorist activity, and instead could have been used as a lookup database, where the name of a polical opponent is entered and all his data is dumped out to use for intimidation. Poindexter proposed that identification information be hidden (a process already used by financial organizations, who separate name data from credit and behavioral data until they are ready to make an offer of credit). And the only way to access the name would be through a court order, which means the data around the name would have to reach some kind of probable cause threshhold.

When it is all said and done, the parties involved in this debate all need to change their approach. The fedgov needs to learn to walk before it tries to run when it comes to data mining. The critics need to tone down the hysterics, learn something about data and databases themselves, offer constructive criticism and make sure that their activism doesn't cause more harm than good. And the politicians need to exercise some leadership.

14 posted on 04/01/2004 6:36:07 AM PST by dirtboy (Howard, we hardly knew ye. Not that we're complaining, mind you...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeuceTraveler
"Sorry, but I wasn't a big proponent of this plan anyway. It is to open to abuse, and although Bush might not use it in that way the next Clintonite would."

Unfortunately that's correct. I am of the same mind. Which is why it is utterly important that dims just don't get into the WH. I know that's a pipe dream, but that's the reality. It is a tough problem.

15 posted on 04/01/2004 6:43:33 AM PST by wingster
[ Post Reply | Private Reply | To 2 | View Replies]

BTW, having said that it's something we need to risk.
16 posted on 04/01/2004 6:44:28 AM PST by wingster
[ Post Reply | Private Reply | To 15 | View Replies]

To: joebuck
It seems to me that how you come down on this issue depends on how you picture the next attack.

If you see it as being not worse than 9/11, ie. deaths under 10,000, then you might be more inclined to fear the misuse of this technology in the hands of somebody like Bitch Clinton more than you fear the attack.

If you see an eventual attack which vaporizes Pittsburg with a small nuke causing upwards of a hundred thousand deaths, you might be less inclined to worry about privacy considerations in the rubble.

I have no answer to this nor do I know how necessary this counter terrorism measure is. I am inclined to believe that, in the fullness of time, the odds are with the bad guys in getting some WMD off somewhere in America before we can extirpate them abroad so long as we are relying on "conventional" methods of homeland defense. Of course, if Kerry wins, the odds for the bad guys improve dramatically because they will not be relentlessly hunted abroad and they will be able recruit, regroup, refinance and counter attack. So we would then need the techno defenses the more, but at a time when the dems are in power - at a time when our privacy would be invaded by exactly the people most threatening to our civil rights.

Not an a column A or B solution.
17 posted on 04/01/2004 6:53:17 AM PST by nathanbedford
[ Post Reply | Private Reply | To 9 | View Replies]

To: Cultural Jihad
We are satisfied knowing that the Trotskyite and UberConservative civil libertarians will enjoy their intact privacy at the base of the rubble of the former Sears Tower.

Thank God your opinion of this is in the minority here on FR. Quit living in fear. Otherwise the terrorists have succeeded.

18 posted on 04/01/2004 10:11:24 AM PST by jmc813 (Help save a life - www.marrow.org)
[ Post Reply | Private Reply | To 11 | View Replies]

To: kingu
Put in heavy fines and punishments for the abuse of the information and a mechanism to ensure that such punishments are enforced.


19 posted on 04/01/2004 10:20:03 AM PST by freeeee ("Owning" property in the US just means you have one less landlord)
[ Post Reply | Private Reply | To 4 | View Replies]

To: quidnunc
I would prefer that it remain illegal and that they do it anyway. That will make it a bit more difficult to abuse without endangering the country.
20 posted on 04/01/2004 10:23:01 AM PST by js1138 (In a minute there is time -- for decisions and revisions which a minute will reverse.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson