Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

TIA wasn't just passive surveillance, "Program X" is Universal Terrorist Profiling

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:04 PM
Original message
TIA wasn't just passive surveillance, "Program X" is Universal Terrorist Profiling
Edited on Fri Jul-27-07 02:55 PM by leveymg
The scandal that seems most likely to bring down Attorney General Gonzalez centers on the warrantless surveillance program. His refusal to cooperate with Congress, and inconsistencies in his testimony, have finally forced public attention on continued illegal wiretapping, even after a 2004 confronation with career Department of Justice officials who tried desperately to shut it down.

But, the actual scope of the illegal domestic spying program that followed Total Information Awareness (TIA), what is being called Program X, looks to be far broader -- and more politicized and dangerous -- than has been publicly suggested. Read this, and then consider the brief photo essay that follows:

Analysis: Gonzales Testimony Part of Broader Effort to Conceal Surveillance Program
By Spencer Ackerman and Paul Kiel - July 26, 2007, 6:54 PM

http://www.tpmmuckraker.com/archives/003787.php

Alberto Gonzales' testimony that there was "no serious disagreement" within the Bush Administration about the NSA warrantless surveillance program has left senators sputtering and fulminating about the attorney general's apparent prevarications. But a closer examination of Gonzales' testimony and other public statements from the Administration suggest that there may be a method to the madness.

SNIP

In essence, the issue is this: if Gonzales succeeds in convincing the committee that there really is a material distinction between the program as it existed before and after Comey’s intervention, he won't just save himself from perjury. He will perhaps have preserved an administration strategy of concealing the scope of Program X from the public and most of Congress -- making it appear that the program that Bush disclosed in December 2005, incorporating Comey's objections, is the same program that existed since October 2001, long before Comey put the brakes on at least some aspects of it. That may be at the heart of the White House's claim of executive privilege to prevent the Senate Judiciary Committee from seeing documents detailing the genesis of Program X.

SNIP


Interesting, but hardly surprising. We already know what they can do with the billions provided in various budgets for DHS and NSA for surveillance. Here's a brief overview.

By 2004, the technology and political will existed to do the folowing: using private sector contractors and telecoms, DHS, NSA, CIA, DIA combined their files and intercepts with all the commercially available data to create one enormous database containing all known electronic records of all the people in the United States and in a host of foreign countries.

This data was then fed into a series of NSA supercomputers programmed to produce a profile and social link chart that was supposed to measure and predict the probabilities that any individual is willing, able and ready to carry out terrorist acts.

NSA supercomputers



This isn't just speculation and Science Fiction. These profiling systems are under development by various agencies: http://www.eweek.com/article2/0%2c1895%2c2158541%2c00.asp


The Bush administration is itching to update a snooping law to encompass new technologies, even as a DOJ report shows the FBI is using data mining on a dizzying array of U.S. citizens' non-terrorist activities: Think auto insurance fraud and Medicare claims abuse.
...
The report covers six data-mining initiatives. Their summaries, as quoted from the DOJ's report:

The System-to-Assess Risk (STAR) Initiative, which is not yet operational, will be designed to help FBI analysts prioritize the risks associated with individuals who have already been identified as persons of interest in connection with a specified terror threat. The initiative will not label anyone a terrorist, but is designed to save time in helping to narrow the field of individuals who may potentially merit further scrutiny with respect to a specific terrorist threat.

The Identity Theft Intelligence Initiative examines and analyzes consumer complaints about identity theft in order to identify commonalities that may be indicative of major identity theft rings in a given geographic area. The initiative helps identify possible offenders who are the subject of multiple, similar consumer complaints in a given geographic area. This initiative has been used to identify major identity theft trends and organizations as well as generate leads for FBI field offices since 2003.

The Health Care Fraud Initiative examines summary health care billing records in government and private insurance claims databases to help the FBI identify anomalies that may be indicative of fraud or over-billing by health care providers. Introduced in 2003, this initiative has resulted in the initiation of more than 50 FBI investigations and nearly 200 referrals to state and local and other federal agencies, resulting in numerous criminal convictions and civil settlements for violations of health care fraud statutes.


You may have seen Spielberg's adaption of Philip K. Dick's, MINORITY REPORT, about the near-future where all murders are predicted in advance, and those found capable of them are arrested and put into permanent lockup. Everything from a person's diet to his or her credit history and publicly-known political expressions was factored in to create a risk quotient. It's something like Dick's dark prophesy of an (almost) perfect system to prevent political crime, only using computer algorithms instead of clairvoyance.

A graphic algorithm



The major problem with this program is that it's more effective at drawing up lists of the Bush Administration's political enemies, and spying on them, then 'neutralizing' them in various ways, than detecting and preventing actual terrorism.

All computer (and government) programs reflect the biases of their creators:

Printer Friendly | Permalink |  | Top
antigop Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:09 PM
Response to Original message
1. Government seeks broader tech snooping powers
http://www.eweek.com/article2/0%2c1895%2c2158541%2c00.asp

>>
The Bush administration is itching to update a snooping law to encompass new technologies, even as a DOJ report shows the FBI is using data mining on a dizzying array of U.S. citizens' non-terrorist activities: Think auto insurance fraud and Medicare claims abuse.
...
The report covers six data-mining initiatives. Their summaries, as quoted from the DOJ's report:

The System-to-Assess Risk (STAR) Initiative, which is not yet operational, will be designed to help FBI analysts prioritize the risks associated with individuals who have already been identified as persons of interest in connection with a specified terror threat. The initiative will not label anyone a terrorist, but is designed to save time in helping to narrow the field of individuals who may potentially merit further scrutiny with respect to a specific terrorist threat.

The Identity Theft Intelligence Initiative examines and analyzes consumer complaints about identity theft in order to identify commonalities that may be indicative of major identity theft rings in a given geographic area. The initiative helps identify possible offenders who are the subject of multiple, similar consumer complaints in a given geographic area. This initiative has been used to identify major identity theft trends and organizations as well as generate leads for FBI field offices since 2003.

The Health Care Fraud Initiative examines summary health care billing records in government and private insurance claims databases to help the FBI identify anomalies that may be indicative of fraud or over-billing by health care providers. Introduced in 2003, this initiative has resulted in the initiation of more than 50 FBI investigations and nearly 200 referrals to state and local and other federal agencies, resulting in numerous criminal convictions and civil settlements for violations of health care fraud statutes.
....
>>
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:18 PM
Response to Reply #1
4. Exactly.
Thanks for that link.

Depending upon what variables one plugs into the program, the STAR program and others like it offer Government control freaks a whole new vista of snooping powers. There isn't a single excuse for privacy left, or any area of our lives that can't be mapped and modified.

Printer Friendly | Permalink |  | Top
 
HeraldSquare212 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:10 PM
Response to Original message
2. Something must be coming...
...some big surprise. I don't know why everyone is so willing to reject the fact that there may indeed be some other program in the mix here. I sure wouldn't put it past this Admin to have something else going on.

Gonzalez may be smug but he's not as much of an idiot as the news reports about his testimony would suggest. There must be some other program and it will be the basis for a claim of national security to defeat attempts to prosecute or hold Gonzalez accountable for his alleged perjury.
Printer Friendly | Permalink |  | Top
 
cdsilv Donating Member (883 posts) Send PM | Profile | Ignore Fri Jul-27-07 02:11 PM
Response to Original message
3. Visit Corey Station in Pensacola, FL - aka 'The Center for Information Dominance' n/t
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:24 PM
Response to Reply #3
6. Isn't it nice that all that applied know-how that took us to the moon is now being
used to transport the human race back to the Middle Ages. From Apollo to Information Dominance in 3 short decades.
Printer Friendly | Permalink |  | Top
 
wakeme2008 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:20 PM
Response to Original message
5. See my review of John Sandfords "fiction" book The Hanged Man Song
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=208x9904

From my post

In Sandford's world, the people behind TIA are targeting members of Congress and more so the members of the ruling party. Top committee chairpersons are very very powerful people. Sandford has the TIA people starting with a name and data mining their databases for all knowledge and connections to that person. This is not from the book just an example What IF, you had a say 14 yo boy flying all over the country and always showing up in a town at the exact same time Senator McKain is in that town alone without his wife... MMMMM,,, Oh look here, the boy's airfare was paid by a credit card that could be linked back to the Senator... Oh lookie here the boy never checks into a hotel ... You get the idea. Then say the powers to be need Senator McKain to flip-flop on say allowing people to be tortured. Just showing him some pictures of a nice 14 yo boy may get him to change his mind on torture.

Once you create these databases, the mining of data could be done starting with general items going in OR one item going out. Very Very troubling.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:39 PM
Response to Reply #5
8. Forgeries are as old as dirty tricks. Forging data to frame people is the logical follow-on.
Only, McCain didn't have to be blackmailed into sponsoring the Military Commissions Act, I'm afraid. He knows his role in this play. A lot of people in Washington might go down over mass negligent homicide, warrantless surveillance, torture, illegal invasions, outing CIA programs, and the other crimes committed since January 2001.

This isn't about McCain, in particular.

You don't become a GOP Senate Committee Chair unless you've done more than your fair share of favors to powerful people, the exact details of which everyone works damn hard to make sure the public never hears about. All that Middle East money flowing into Republican coffers is another major scandal just waiting to pull these guys down into the bowels of the earth.
Printer Friendly | Permalink |  | Top
 
C_U_L8R Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:31 PM
Response to Original message
7. A Blackmail Machine
Perhaps the only thing holding both Rs and Ds in check
and keeping Bush in power.
Printer Friendly | Permalink |  | Top
 
shadowknows69 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 02:41 PM
Response to Original message
9. Pre-crime
exactly what jumped into my mind. Dick was a prophet.
Printer Friendly | Permalink |  | Top
 
Old and In the Way Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 03:23 PM
Response to Original message
10. This was the tool that would keep the republican Syndicate in power forever.
Edited on Fri Jul-27-07 03:25 PM by Old and In the Way
Bush was the right front person, Cheney had the crimes and paranoia to want to make it happen. They could care less about Al Qaeda. It was never about a bunch of ME fundie-loonies. It was about $100TT worth of oil and total dominance of the domestic population. TIA is undoubtably focused on politicians and the media. If they can catalogue every detail of your life....couldn't they add/modify their own details and use that to blackmail or destroy their political opposition? It's all about absolute power and freedom from criminal prosecution.

But somewhere along the way, people got smart and events in Iraq didn't go to plan. The voting of 2006 was too overwhelmingly against them to steal. Now they are hanging by a thread. The question to me is...what will they do between now and election day 2008? How are they going to maintain their control? They are all in, there's no turning back. We're talking war crimes, crimes against the country, real capital offenses. What are these people willing to do to avoid accountability on this scale?
Printer Friendly | Permalink |  | Top
 
John Q. Citizen Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 03:38 PM
Response to Original message
11. Hey, that's copyright infringement. Project X is ours and they are trying to steal it!
Printer Friendly | Permalink |  | Top
 
hootinholler Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 05:10 PM
Response to Original message
12. Google JITF-CT n/t
Printer Friendly | Permalink |  | Top
 
bonito Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 05:14 PM
Response to Original message
13. K&R n/t
Printer Friendly | Permalink |  | Top
 
seemslikeadream Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 05:17 PM
Response to Original message
14. The Other Side Of Life:
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-27-07 05:48 PM
Response to Original message
15. Bump...up
up
Printer Friendly | Permalink |  | Top
 
On the Road Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-28-07 09:38 AM
Response to Original message
16. It is Critical That This Type of Investigation Have a Public Airing and Discussion
I actually think that a lot of what the problem is doing is probably legal and helpful. Identifying identity theft rings, illegal real estate flipping, and online pharmacy fraud probably need data mining to be truly effective. Parts of it sound like what Bill Clinton was trying to do.

Bush has obviously abused data mining in very serious ways. And gone far beyond public information sources into illegal espionage. This is why the program has got to be subject to oversight and legislative and judicial review.

Printer Friendly | Permalink |  | Top
 
shance Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-30-07 04:12 PM
Response to Reply #16
19. However when those running the hearings and being blackmailed/bribed.
We've got to impeach first and fire those who are preventing justice and accountability from being served.
Printer Friendly | Permalink |  | Top
 
angelsguard Donating Member (1 posts) Send PM | Profile | Ignore Sat Jul-28-07 02:12 PM
Response to Original message
17. Sentient war games on the grandest scale
Edited on Sat Jul-28-07 02:13 PM by angelsguard
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-30-07 11:42 AM
Response to Reply #17
18. Thanks, and welcome to DU!
Interesting how closely the Perdue bioterrorism simulation -- http://misrc.umn.edu/seminars/slides/01-2006-Carlson-Chaturvedi.pdf -- foreshadowed the Chinese melamine contamination in petfood.

I read somewhere that 98% of the ascorbic acid consumed in the U.S. is PRC sourced.

Who would have thought?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 02:23 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC