Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Dating Mining and the Curious Section 126 of the Patriot Act

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
liveoaktx Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 02:54 PM
Original message
Dating Mining and the Curious Section 126 of the Patriot Act
William Arkin

<snip>
What is it that the National Security Agency began doing after 9/11 that necessitated Presidential authorization for warantless surveillance? .....
My guess is the government decided after 9/11 to monitor everyone.

Thanks JMC for pointing out that the USA PATRIOT Improvement and Reauthorization Act Of 2005 contains a Section 126, inserted by the House, requiring the Attorney General to submit a report to Congress "on any initiative of the Department of Justice that uses or is intended to develop pattern-based data-mining technology."

Data-mining is defined in Section 126 as:

"a query or search or other analysis of one or more electronic databases, where--

(A) at least one of the databases was obtained from or remains under the control of a non-Federal entity, or the information was acquired initially by another department or agency of the Federal Government for purposes other than intelligence or law enforcement;

(B) the search does not use personal identifiers of a specific individual or does not utilize inputs that appear on their face to identify or be associated with a specified individual to acquire information; and

(C) a department or agency of the Federal Government is conducting the query or search or other analysis to find a pattern indicating terrorist or other criminal activity.
</snip>

Printer Friendly | Permalink |  | Top
antigop Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 03:13 PM
Response to Original message
1. It was the sheer number -- they couldn't get a warranty for everyone
http://www.dfw.com/mld/dfw/news/nation/13473747.htm

>>
Commercially available supercomputers and communications technologies can be used to monitor millions of calls and e-mails, trace the phone numbers and computers that send and receive them and screen them for terrorism-related keywords.
>>

If you are monitoring "millions of calls and e-mails", you won't get a warrant for each one.

Printer Friendly | Permalink |  | Top
 
FogerRox Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 03:22 PM
Response to Reply #1
2. exactly--
It may be that every phone call & Email in or out of the USA has been intercepted since Oct. 25-01.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 03:23 PM
Response to Original message
3. This is Able Danger Reborn
Arkin then goes on to describe how this Total Information Awareness-style program works, and its origins in the Able Danger program:

Massive amounts of collected data -- actual intercepts of phone calls, e-mails, etc. -- together with "transaction" data -- travel or credit card records or telephone or Internet service provider logs -- are mixed through a mind-boggling array of government and private sector software programs to look for potential matches.

In discussing the "Able Danger" program, I previously described how information targeters began data mining in the 1990's to discover new patterns of indicators to identify events of interest when they could not be directly observed. The theory is that data mining techniques applied to the intelligence take, combined with massive "transaction" databases, can uncover clandestine relationships or activities.

In Section B above, when the law says "the search does not use personal identifiers of a specific individual or does not utilize inputs that appear on their face to identify or be associated with a specified individual to acquire information," I take it to mean the new computer-based data mining isn't looking for an individual per se, it is looking at information about all individuals (at least all who make international telephone calls or send e-mails overseas or travel to foreign countries according to the government) to select individuals who may be worthy of a closer look.

In other words, with the digitization of everything and new computer and software capabilities, the government couldn't go to the Court or the Congress and say, "hey, we'd like to monitor everyone on a fishing expedition to find the next Mohamed Atta." It's one conceivable explanation. If this in fact is what the NSA has been doing since 9/11, perhaps Congress should figure out: one, whether it's legal; and two, how it can be done consistent with the Privacy Act and the Fourth Amendment.

SNIP

To which I responded with a comment about how Able Danger retains a significant legacy:

Bill - You're right, this is Able Danger, reborn. Maybe it was never really shut-down. It's unimaginable that the DoD actually scrubbed those 2.5 terabytes of data in the project's computers. Hit the delete button, and it's all gone. Not hardly!

At least, the original, classified DIA files and NSA intercepts were retained. Among them are surely the NSA intercepts that led CIA to track al-Midhar and al-Hazmi to Kuala Lumpur in early 2000. What about the audio and video tapes of the discussions inside the condo next to the golf course? Didn't the 9/11 Commission say that what was to become the "Planes Operation" hijackings and the USS Cole attacks were discussed? There's also the CIA files as the future Flight 77 hijackers and bin Atash were followed to Bangkok after the summit, and from there, the pair proceeded on to Los Angeles.

We have to wonder whether the Pentagon knew at the time that Cofer Black, then the director of the CIA Counterterrorism Center (CTC), ordered the FBI liason at CTC to withhold that cable to the Bureau's National Security Office in NY that would have notified the rest of the Bureau of the arrival of the pair.

Wouldn't the Bureau have been required to seek FISA warrants at that point? But, no warrants were applied for. As a result, 3,000 people died the following September.

What exactly was in the Able Danger files that linked Atta to the Flight 77 hijackers? I'll bet it was the very same NSA intercepts and DIA files that are still on the shelf at the Pentagon. When are we going to get a chance to see what CENTCOM knew about the Brooklyn Cell months before the attacks. Once we can see that, we'll understand a lot better why Able Danger was ordered closed down.

Mark G. Levey




Printer Friendly | Permalink |  | Top
 
liveoaktx Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 04:02 PM
Response to Reply #3
4. Is this in the hearings? If so, can you put a link to the transcript?
I recorded all of the Able Danger hearings and would like to pull that out.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Dec-24-05 03:33 PM
Response to Reply #4
7. Please let me know what specific info you need.
Sorry, I've been busy at work, so I just spotted your response.
Printer Friendly | Permalink |  | Top
 
liveoaktx Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 04:43 PM
Response to Original message
5. Crap! So, Bush is DATA-MINING information from a variety of sources
which includes records (ala Patriot Act NSA letters that can look at your bank accounts, credit card records, etc) in order to do pattern-matching to find terrorists. This, by the simple fact that it includes all kinds of stuff, includes records of United States Citizens.

IF this is what it actually is (and it certainly looks that way to me), then the question becomes, can the Presidency do data-mining on American citizens (as opposed, say to wire-tapping, etc) without a warrant? It would be very difficult if not impossible, to cull out american citizen information, particularly if you're using it to do pattern-matching.

Look, I read a book a few months ago called "No place to hide" which went into detail about some of the databases being used to collect information on people in this country. Seisint, for example, is one of those databases and they are private entity databases that are collecting and collating and analyzing for all types of reasons information about YOU-without your permission.

Seems to me that this is either THE issue or at the very least needs to be understood because wiretapping is too simplistic when massive databases exist.
Printer Friendly | Permalink |  | Top
 
Kansas Wyatt Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-23-05 05:23 PM
Response to Reply #5
6. May or may not be related, but Ken Mehlman bragged about...
Data mining in the Presidential Election to target voters, right after the election.

I'm willing to bet that they did this however they could with government help, to get information & intelligence that their alleged victory depended on.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 11:48 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC