Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

F.B.I. Data Mining Went Beyond Targets

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
spanone Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:07 PM
Original message
F.B.I. Data Mining Went Beyond Targets
Edited on Sat Sep-08-07 12:08 PM by spanone
~snip~ WASHINGTON, Sept. 8 — The F.B.I. cast a much wider net in its terrorism investigations than it has previously acknowledged by relying on telecommunications companies to analyze phone-call and e-mail patterns of the associates of Americans who had come under suspicion, according to newly obtained bureau records.

The documents indicate that the F.B.I. used secret demands for records to obtain data not only on the person it was targeting but also details on his or her “community of interest” — the network of people that the target in turn was in contact with.~snip~\

IN OTHER WORDS, THEY BROKE THE LAW

http://www.nytimes.com/2007/09/09/washington/09fbi.html?_r=1&hp=&adxnnl=1&oref=slogin&adxnnlx=1189271068-x70IVa3AhqCOkzd4JmmV1Q&pagewanted=print
Printer Friendly | Permalink |  | Top
Trillo Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:16 PM
Response to Original message
1. Better give those telecommunication corporations
retroactive legal immunity.
/sarcasm
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:19 PM
Response to Original message
2. We're all no more than six degrees of separation from Osama bin Laden
Edited on Sat Sep-08-07 12:20 PM by leveymg
That makes all of America a "community of interest" under this criteria.
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:28 PM
Response to Reply #2
4. GMTA
Edited on Sat Sep-08-07 12:32 PM by TahitiNut
I was composing my post below at the same time you posted. Since I've actually been peripherally involved in the research, I'm aware of (at least some of) the data mining strategies being employed.

In order to identify those (comparatively few) individuals with one or two "degrees of separation" from a "known" (or suspected) 'terrorist' they must travel the (lower) 'landscape' upon which such 'pinnacles' of association exist.
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:25 PM
Response to Original message
3. Some methods of data-mining rely on "degrees of separation"
For over 15 years, the problem of detecting 'deposits' of relevant information in some enormous collection of data has been the subject of many funded comp-sci/IT research efforts, particularly in the DOE National Laboratories and NSA/DIA. The paradigm of "mining" is an important one - where's the gold? To locate the 'gold' the associations between entities/terms are mapped topologically, offering a visual, color-coded 'terran' with a graphical interface that permits "drill-down' to the particular 'deposits' of data. Clearly, the problem of locating specific data of interest for further perusal involves the elimination of data of little relevance to the exploration. It's like panning for gold - wash away the dirt.

When we're talking about collaboration and coordination between people, the analysis requires some definable method whereby contact is accomplished coupled with some measure of proximity. Clearly, this is akin to the "Six Degrees of Separation" hypothesis that has been the subject of studies by Milgram and others.

This is what's so pernicious about this program. It puts the cart before the horse. It's based on the premise that the seeker (government) must have a priori access to all the "dirt" (ordinary citizens engaged in communication or collaboration) in order to 'mine' the purported 'gold' - illegal conspiracies. It's a surveillance approach that is driven by a technology ... irrespective of the application and the inherent rights of human beings.

Like many things, it's the existence of a 'solution' that drives the myopic to claim that the "ends justify the (use of the) means" in an application of a tool developed for unrelated purposes.

Succinctly, it's the abuse of a tool - a repeated corruption throughout the history of humanity since the discovery of fire.

Printer Friendly | Permalink |  | Top
 
spanone Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:36 PM
Response to Reply #3
5. here is the part i don't believe
Edited on Sat Sep-08-07 12:39 PM by spanone
The F.B.I. recently stopped the practice in part because of broader questions raised about its aggressive use of the records demands, which are known as national security letters, officials said Friday after being asked about it.

?who raised the broader question? When?

so essentially the FBI could look into ANYONE associated with one of their targets...anyone...relatives, friends, business associates, on and on, if i'm reading this correctly.
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 01:00 PM
Response to Reply #5
7. Yep. In essense, however, they've already collected SOME data.
When composing some topology of contacts, it's impossible to filter the relevant from the irrelevant unless the contextual data is present. In fact, it's essential when contact/collaboration is presumed to be a combination of two or three transactions. Consider, for a simple example, an internet "message drop" where people make entries on some neutral sites. In order to associate person 'A' with person 'B' through the 'coincidental' access to internet site '32' all such accesses need to be obtained and the topology wherein some measure of 'proximity' (time and frequency) is aggregated and portrayed as having a high degree of connectedness must be portrayed against some low degree of connectedness. (You can't see a mountain without seeing the surrounding valleys and plains.)

It's literally collecting ALL the data in order to ELIMINATE that which would otherwise be regarded as a violation of privacy. Cart before horse. The association can only be seen if one sees it against a background of ordinary private activity. This is why they think they're faced with a conundrum ... it's the nature of the tool/technique they want to use.
Printer Friendly | Permalink |  | Top
 
DemReadingDU Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 02:36 PM
Response to Reply #5
9. I doubt that this was stopped permanently
Probably stopped while the questions were being asked, then resumed shortly thereafter ;-)
Printer Friendly | Permalink |  | Top
 
Bitwit1234 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 12:41 PM
Response to Original message
6. The main reason they wiretapped in this country
was to spy on the democrats, running for office, in congress and they groups that opposed bush. That is the only reason we all know it and you'll never convince me otherwise.
Printer Friendly | Permalink |  | Top
 
MissWaverly Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 02:48 PM
Response to Reply #6
10. yes and all the anti war folks and anyone who criticized him
and anybody like Andy Stephenson who said the elections were stolen.
Printer Friendly | Permalink |  | Top
 
tom_paine Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 01:05 PM
Response to Original message
8. Oh THAT'S SURPRISING
Edited on Sat Sep-08-07 01:05 PM by tom_paine
At least as surprising as learning Hitler was industrially extermination the Jews.

That surprising, no less and no more.
Printer Friendly | Permalink |  | Top
 
libodem Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 02:49 PM
Response to Original message
11. Oh, say it isn't so
Printer Friendly | Permalink |  | Top
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-08-07 04:14 PM
Response to Original message
12. I want to know if anyone actively went into our records.
If so, we deserve restitution for the invasion of privacy. Especially if they took the information and used it to invade our privacy even further by using the inside information to affect our personal lives.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 19th 2024, 02:55 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC