Begin forwarded message:

From: "Eric Stewart" <[EMAIL PROTECTED]>
Date: November 3, 2006 2:56:57 AM PST
Subject: Total Information Oppression



Terrorist Profiling, Version 2.0
By Shane Harris, National Journal
© National Journal Group Inc.

The government's top intelligence agency is building a computerized
system to search very large stores of information for patterns of
activity that look like terrorist planning. The system, which is run by
the Office of the Director of National Intelligence, is in the early
research phases and is being tested, in part, with government
intelligence that may contain information on U.S. citizens and other
people inside the country.

It encompasses existing profiling and detection systems, including those
that create "suspicion scores" for suspected terrorists by analyzing
very large databases of government intelligence, as well as records of
individuals' private communications, financial transactions, and other
everyday activities.

The details of the program, called Tangram, are contained in an
unclassified document that National Journal obtained from a government
contracting Web site. The document, called a "proposer's information
packet," is a technical description of Tangram written for potential
contractors who would help design and test the system. The document was
written by officials in the research-and-development section of the
national intelligence office. A tangram is an old Chinese puzzle that
takes seven geometric shapes -- five triangles, a square, and a
parallelogram -- and rearranges them into different pictures.

In addition to descriptions of Tangram, the document offers a rare and
surprisingly candid analysis of intelligence agencies' fits and starts
-- and failures -- in other efforts to profile terrorists through data
mining: Researchers, for example, haven't moved beyond
"guilt-by-association models" that link suspected terrorists to other,
potentially innocent people, and then rank the suspects by level of
suspicion.

"To date, the predominant approaches have used a guilt-by-association
model to derive suspicion scores," the Tangram document states. "In the
cases where we have knowledge of a seed entity [a known person] in an
unknown group, we have been very successful at detecting the entire
group. However, in the absence of a known seed entity, how do we score a
person if nothing is known about their associates? In such an instance,
guilt-by-association fails."

Intelligence and privacy experts who reviewed the document said that it
reaffirms their long-held belief that many computerized
terrorist-profiling methods are largely ineffective. It also raises
significant privacy concerns, because to distinguish terrorists from
innocent people, a system that's as broad as Tangram purports to be
would require access to many databases that contain private information
about Americans, the experts said, including credit card transactions,
communications records, and even Internet purchases.

"There is no other way that they could do this," said David Holtzman,
former chief technology officer of Network Solutions, the company that
runs the Internet's domain-naming system, and author of the book Privacy
Lost. "They want to investigate real-time ways of spotting patterns"
that might indicate terrorist activity, he said. "Telephone calls, for
instance, would be an obvious thing you'd feed into this."

The Tangram document doesn't mention privacy protections or a process
for monitoring the system's use to guard against abuse. In an interview,
Tim Edgar, the deputy civil-liberties protection officer for the
national intelligence director, said that Tangram "is a
research-and-development program. We have been assured that it's not
deployed for operational use."

Asked whether the intelligence used to test Tangram contains information
about U.S. persons, defined as U.S. citizens and permanent resident
aliens, Edgar said, "It's not being tested with any data that has
unminimized information about U.S. persons in it." Minimization
procedures are used by intelligence agencies to expunge people's names
from official reports and replace them with an anonymous designation,
such as U.S. Person No. 1. Tangram is being tested "only with synthetic
data or foreign-intelligence data already being used by analysts that
meet Defense Department guidelines for handling of U.S. person
information," Edgar said. The Office of the Director of National
Intelligence "has not funded and is not planning to fund any contracts
for the Tangram program using unminimized data with U.S. persons in it,"
he said.

Tangram drew skeptical reviews from technology and privacy experts
because of its links to Total Information Awareness, a controversial
research program started by the Pentagon in 2002. TIA also aimed to
detect patterns of terrorist behavior. Congress ended all public funding
for the program in 2003, but allowed research to continue through the
classified intelligence budget. In February, National Journal revealed
that names of component TIA programs were simply changed and transferred
to a research-and-development unit principally overseen by the National
Security Agency. The unit, now under the control of the Office of the
Director of National Intelligence, also runs Tangram.

The Tangram document cites several TIA programs -- by their new names --
as forming the latest phase of research upon which Tangram will build.
In a prepared statement, the intelligence director's office said,
"Tangram is addressing the problem that the intelligence community
receives vast amounts of data a day and there are a wide variety of
algorithms -- mathematical procedures -- for figuring out what is
relevant. Different algorithms serve different purposes, but we believe
that combining them will provide us new insights in detecting terrorist
plans and activities. The project will allow analysts to mix and match
various methods to connect the dots."

TIA was similarly envisioned as a vast combination of detection methods.
In Tangram, "I see the system of systems that is essentially TIA about
to be born," said Tim Sparapani, the legislative counsel on privacy
issues for the American Civil Liberties Union. "TIA was designed to be
one unified system," he said. "This is the vision, I think, made
practical."

Robert Popp, who was the TIA program's deputy director, also saw
parallels to Tangram. "They seem to be doing something very similar in
concept," Popp said. "Taking data, doing all the sense-making and
path-finding, and turning it into a form which a decision maker can act
upon."

According to the document, Tangram "takes a systematic view of the
[terrorist-detection] process, applying what is now a set of disjointed,
cumbersome-to-configure technologies that are difficult for nontechnical
users to apply, into a self-configuring, continuously operating
intelligence analysis support system." Tangram will be "aware" of the
various patterns, relationships, and contexts expressed in data, and
will automatically configure itself to choose the best algorithm for
exploiting that data, the document explains. As envisioned, the system
"can reason about how best to produce an answer" on its own.

"Conceptually, the approach would be to perform a succession of
automated 'what if' scenarios that compute the expected value of
acquiring additional information," the document states. The system
would, effectively, suggest other questions for the analyst to ask, and
perhaps where to look for answers.

Last month, the government awarded three contracts for Tangram research
and design totaling almost $12 million. Total funding for the program is
approximately $49 million. Two of the firms receiving awards -- Booz
Allen Hamilton and 21st Century Technologies -- were principal
contractors on the TIA program. The third company, SRI International,
worked on one of TIA's predecessors, the Genoa program. Spokeswomen for
Booz Allen Hamilton and SRI declined to comment for this article.
Repeated calls and e-mails to the Austin offices of 21st Century
Technologies went unanswered.

The apparent lack of privacy protections in Tangram dismayed some
experts. "Given the history of TIA and other programs, one would expect
the proponents of a system like this would at least pay lip service to
privacy issues," said David Sobel, senior counsel for the Electronic
Frontier Foundation, a privacy watchdog. "The absence of that is a bit
surprising."

The TIA program devoted more than $4 million to research aimed at ways
to protect privacy while it was sifting databases, and former officials
have said that although it was admittedly controversial, TIA was being
designed all along with privacy protection and auditable logs to track
those who used it. The privacy research, however, was abandoned when the
program moved into the classified budget in the NSA.

Administration officials have singled out the importance of new
technologies in the war on terrorism. President Bush said that the NSA's
warrantless surveillance and analysis of phone calls and e-mails
protects Americans from attack. Gen. Michael Hayden, the former NSA
director, said that were such a system in place before the September 11
attacks, "we would have detected some of the 9/11 Al Qaeda operatives in
the United States, and we would have identified them as such."

But the Tangram document presents a more pessimistic assessment of the
state of terrorist detection. For instance, researchers want to find
ways to distinguish individuals' innocuous activity from that which
might appear normal but is really indicative of terrorist plotting.
However, the document states that, in large measure, terrorism
researchers "cannot readily distinguish the absolute scale of normal
behaviors" either for innocent people or for terrorists.

The ACLU's Sparapani called that admission "a bombshell," because the
government is acknowledging that current detection systems aren't
sophisticated enough to separate terrorists from everyday people. Other
outside experts were troubled that such shortcomings also mean that
individuals intent on doing harm could be mistaken for innocent people.

Popp said that attempts to separate terrorists' activities from those of
normal people are perilous. "When you try to capture what is normal
behavior, and then determine non-normal, that's highly intractable," he
said.

Several times, Popp said, TIA researchers discussed how to characterize
nonterrorist behavior. "We avoided it. It was too hard. We had no idea
how on God's earth you would characterize and capture normal behavior.
We wouldn't know where to start." Instead, TIA researchers proposed
looking for specific indicators of terrorist planning -- people
purchasing airline tickets at the last minute with cash, for instance,
or other transactions that fit the narrative of an attack.

Current detection techniques have raised the specter of what the Tangram
document calls "runaway false detections." If analysts tie a terrorist
suspect to five other individuals, say through phone calls, how can they
be certain that these five people constitute a terrorist network and
aren't simply people with whom the suspect has had innocuous, everyday
interactions? The document says that research has been conducted on "the
sensitivities of guilt-by-association models to runaway false
detections."

Researchers have made other attempts to move beyond the
guilt-by-association model, the document states. One technique, an
obscure methodology known as "collective inferencing," in which the
suspicion score of an entire network of people is computed at once, has
apparently garnered some interest. But "existing techniques are far too
simple" for real-world problems, the document acknowledges.

The Tangram document states that gaps in current detection techniques
also owe to the difficulty of tracking terrorist behaviors, which are
constantly changing. "The underlying assumption of existing approaches
is that behaviors are constant," the authors write. "Yet, behaviors are
not constant.... How can we profile dynamic behavior well enough to be
able to identify, with more-or-less confidence, entities who want to
remain anonymous?" The answer to that question apparently eludes the
researchers, who hope that Tangram might provide it.

SOURCE: National Journal

Also see:

Tinker, Tailor, Miner, Spy

Total Information Awareness Lives On Inside the National Security Agency

Total Information Awareness Lives Again

-- 
http://www.fastmail.fm - Or how I learned to stop worrying and

                          love email again


__._,_.___

Complete archives at http://www.sitbot.net/

Please let us stay on topic and be civil.

OM





SPONSORED LINKS
Independent broker dealer Independent director Central intelligence agency
Central intelligence agency employment

Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___ =

Reply via email to