Log in

View Full Version : Total Awareness Project



Ghost Writer
26th May 2003, 10:44
Admiral John Poindexter, a former Navy man, and co-conspirator in the Iran Contra scandal has been appointed as head of DARPA's www.darpa.mil/iao/+iao+logo&hl=en&ie=UTF-8]Information (http://216.239.33.100/search?q=cache:GiKBckIECkoC:[url) Awareness Office[/url]. This office was set up to compile an intelligent database that tracks credit card purchases, signal transmissions both digital and analog, and even advocates compiling this data with human biometrics.

Notice that the purpose of this project is to curtail terrorists ability "to move freely throughout the world, to hide when necessary, to find unpunished sponsorship and support, to operate in small, independent cells, and to strike infrequently, exploiting weapons of mass effects and media response to influence governments." I submit that the only freedom of movement that will be supressed is that of the American people's.

Let's face it we have done a number of things to aid ourselves in this war on terror, and many of them have been to the detriment of those citizens that the measures are designed to protect. This is coupled with a hapharzard approach to waging war on those people who threaten us. While attempting to wage a politically correct war on the terms of the international community, we spend money combating the foreign threat in a predicatable manner. In short, we are being goaded into spending mass amounts of the national treasury. At the same time we are operating under the largest trade imbalances in history, we are giving away some of the largest political handouts to causes like AIDS in Africa. If our enemies plan is to bankrupt us and erode the rights of the citizens of the United States; one must ask what side our government is on?

Quite frankly, I am getting a little wary of living in a society where all people are treated as suspect before any specific crime has been comitted. Prior to 9-11, there were specific laws that prevented the intelligence community from turning the apparatus inward on its own citizens. However, this was often bipassed through the use of corporate marketing and data-mining operations. Throughout the last ten years, the level of intrusion has increased, as corporate policy has become more brazen in its methods of obtaining this data. From grocery cards, cookies, spyware, check cashing protocol, employee drug screening, credit reporting, and medical record keeping; we are entering a most precarious turning points in the information age. Because of terrorism, the information generated by those faceless entities is being compiled into large data-mining programs owned by the government, for the sole purpose of tracking the movements and activities of its own citizens.

We have a real choice. Will we take prudent measures to combat terrorism, or will we ignore the issue in order to capitalize on an opportunity to subvert the privacy, and overall freedom of the American people? Will we allow Orwell's Big Brother to materialize, and if so, how can freedom and democracy be used as the mantra to accomplish those ends?

To me the answer if simple. Let's forget about the nonsense that we have been taught regarding immigration. Frequently, I hear the language of the left sighting the importance that immigration has had on the development of our nation. Obviously, the terrorist threat is more or less foreign, and we have a good idea about what regions of the world, and what type of fanatacism is causing such rampant destruction. Why not focus most of the energy on those factions which aim to destroy us.

Deporting those who fit into a certain category might be the cheapest and most rational means by which to secure the safety of the American people. That's is not to say that there is only one source of terrorism. However, if this step were taken, the risk factor would decrease, leaving us in a position to better evaluate the use of methods that most certainly run anti to the spirit of the 4th Amendment.

I propose a Constitutional Convention, where privacy discussed, and the merits of the 4th Amendment are carried over to the electronic medium of the American citizens.

This is not to say that some groups do not deserve serious investigation. However, I think FISA and the previous modes of protection were more than adequate. They were just not being used properly. Blanket coverage of the entire population, is not only impossible and intrusive, but it is a waste of valuable resources. Proceeding in the present manner, will do nothing to advance to safety of the world from terrorism. If anything, it will saturate the law enforcement and intelligence agencies with useless information that complicates the machinations of those agencies, leaving the American public more vulnerable to the violence that the device aims to prevent.

Luckily, I am not the only one who remains vary of this situation. Others within Congress, and the media are also suspicious. In fact, legislation has been introduced to put a stop to this nonsense. Ultimately, I think this may be a decision the U.S. Supreme Court issues a ruling on in the near future. This is a case where I am hopeful that Judicial review plays an important role. Otherwise, we may be headed in the wrong direction as a society.

(Edited by Ghost Writer at 12:12 pm on May 26, 2003)

187
27th May 2003, 00:29
Don't they have a system like this already known as ECHELON?

Ghost Writer
27th May 2003, 11:52
Take a look at the logo (http://www.sew-lexicon.com/Logo_TIA.htm) used by the Information Awareness Office, which has since been removed due to criticism by computer science publications, and civil libertarians.

Note the motto, "Scientia est Potentia". A rough translation of this phrase would be "Knowledge is Power". The word potentia has inevitability associated with it. Generally, it is taken to imply some sort of future prospect. One might translate this motto to read the "Capacity for Knowledge of the Future".

A certain movie comes to mind when I read this, specifically Minority Report, where suspects were convicted of crimes they would have committed in the future. Perhaps that is a bit paranoid, but I am always suspect of governmental programs that aim to sift through my garbage and make sure that my life is in order.

In reality, such an intrusive tool probably won’t affect me. However, the potential for serious abuses on the part of those in control of such a system should be of concern to all citizens of the United States. Simply imagine the damage a credit reporting agency can do to an individual's life at the present time. Then imagine how a person's life could be virtually ended by a few keystrokes, under the control of a bureau that has little oversight.

I often wonder how many bums on the street have had their lives taken from them in this fashion, because they went barking up the wrong tree. Of course, I think that most of them put themselves in that situation. However, such a possibility is not all that unthinkable. Who knows maybe one or two of them were great scientists, CEO's, ex-government employees, and possibly investigative reporters.

Now that I have added further analysis of the Information Awareness Office motto, I will address the difference between Echelon and the Total Information Awareness Project. First, it is necessary to look to a couple of brief definitions of the two projects. These glossary definitions come from the " SPACE & ELECTRONIC WARFARE LEXICON" website devoted to providing information about space and electronic warfare terminology. I will give a brief rundown of the various terms important to the present discussion.

ECHELON - An intelligence global surveillance network for intercepting and processing the world's communications using numerous satellites, microwave listening stations and subsurface assets.

TOTAL INFORMATION AWARENESS (TIA) - A new (2002) DARPA program. The purpose of the TIA program is to revolutionize the ability of the United States to detect, classify and identify foreign terrorists, and to decipher their plans, thereby enabling the U.S. to take timely action to successfully preempt and defeat terrorist acts. To that end, the TIA program objective is to create a counter-terrorism information system that: (1) increases information coverage by an order of magnitude, and affords easy future scaling; (2) provides focused warnings within an hour after a triggering event occurs or an evidence threshold is passed; (3) can automatically queue analysts based on partial pattern matches and has patterns that cover 90% of all previously known foreign terrorist attacks; and, (4) supports collaboration, analytical reasoning and information sharing so that analysts can hypothesize, test and propose theories and mitigating strategies about possible futures, so decision-makers can effectively evaluate the impact of current or future policies and prospective courses of action. [www.darpa.mil/iao/TIASystems.htm] NOTE: The TIA program strategy (2002) is to integrate technologies developed by DARPA (and elsewhere as appropriate) into a series of increasingly powerful prototype systems that can be stress-tested in operationally relevant environments, using real-time feedback to refine concepts of operation and performance requirements down to the component level . . . .

SURVEILLANCE - (1) The systematic observation of aerospace, surface or subsurface areas, places, persons, or things, by visual, aural, electronic, photographic, or other means.

DATA MINING - (1) The attempt to find patterns, especially those which are hidden and unexpected, in data. [10:2833] (2) An iterative process of extracting patterns from a set of data, such as from those in a DATA WAREHOUSE, in order to deduce implicit, previously unknown, and potentially useful information. Data mining uses machine learning, statistical and visualization techniques to discover and present knowledge in a from that can be comprehended easily by humans. [] Also called DATA ARCHEOLOGY, DATA DREDGING, DATA PATTERN PROCESSING, INFORMATION DISCOVERY, INFORMATION HARVESTING, KNOWLEDGE DISCOVERY IN DATABASES (KDD), KNOWLEDGE EXTRACTION. See also GENETIC DATA MINING. NOTE: Methodological approaches to data mining include cluster analysis, linkage analysis, visualization, algorithms, categorization analysis. Technologies used in data mining include NEURAL NETWORKS, decision trees, time series analysis, GENETIC ALGORITHMS, hybrid approaches, FUZZY LOGIC and statistics. [10:2833]

DATA REASONING - The primary symbolic process which combines related measurement and decision data to infer the classification or intent of individual targets or larger target aggregates. See also EXPERT SYSTEM, DATA ASSOCIATION, DATA COMBINATION, DATA FUSION. [5:2]

DATA FUSION - The fully automated method of merging diverse data into a single, coherent representation of the tactical, operational or strategic situation. See also DATA ASSOCIATION, DATA COMBINATION, DATA REASONING. [5:2]

DATA WAREHOUSE - A sophisticated database which comprises a complete repository of historical data for an organization. Its design emphasizes data storage efficiency and data reliability, rather than speed of extraction or currency of data. [10:2766] Compare with OPERATIONAL DATA STORE. See also DATA MINING. NOTE: In a data warehouse, data are stored at the lowest level of detail possible so that they can be searched, collected and re-shaped for any purpose.

BIOMETRICS - The automatic identification of a person based on his/her physiological or behavioral characteristics. Refer to the table below for a list of biometric technologies . Biometrics fall into two categories: PHYSIOLOGICAL BIOMETRICS and BEHAVIORAL BIOMETRICS. [10:2622] NOTE: (1) The person to be identified is required to be physically present at the point-of-identification.

BIOMETRIC TECHNOLOGIES
Dynamic Signature Verification (DSV)
Face Geometry
Finger Scan
Hand Geometry
Iris Scan
Keystroke Dynamics
Speaker Verification
Retina Scan

Thanks again to the Space and Electronic Warfare Lexicon.

Now that we have an elementary understanding of the technologies we are discussing, I think that we can proceed. Let us now discuss the difference between Echelon and the Total Information Awareness Project. Of course, I have no inside knowledge of these programs, but I can offer an educated guess about the similarities and differences between the two programs.

Echelon is a NSA joint venture with a variety of allied partners to monitor virtually all communication transmissions around the world. The countries that aid us include Canada, Great Britain, Australia, and Japan. A glossary provided by the NSA contains an extensive list of keywords that are of interest to the Agency. This program mines the data, filters it, and then prioritizes those channels, which the system determines to warrant further surveillance. A certain amount of data reasoning is required for this primary objective. This allows our human intelligence to be allocated effectively. It is easy to see how data fusion and data warehousing apply to this application of our SIGINT resources.

Clearly, Echelon is the predecessor of the newly created Total Information Awareness Program. It can be said that Echelon is only one component of the type of data that is to be mined under the new system. The new system will integrate the most useful Echelon program with biometrics, marketing information, credit reports, psychological profiles, and medical information. With these other data sets further analysis can be done to prioritize future surveillance of an interesting candidate. Clearly, this last point marks a primary similarity of the to missions.

Both Echelon and TIA are tools managed in an effort to narrow the scope of the search, and allow the use of human resources in a concise manner. However, huge differences exist. This can be seen in the very definition of the TIA project. The keywords being "revolutionize", "increases information coverage by an order of magnitude", "supports collaboration, analytical reasoning and information sharing so that analysts can hypothesize, test and propose theories".

First, "revolutionize" indicates a change in methods, and overall effectiveness. Of course, integrating the type of data previously off limits to the intelligence networks would enhance the ability of a data mining and pattern processing system to derive the heuristics associated with enemy behavior. However, there is a price to be paid. There was a reason for the prior limitations concerning the surveillance of our own citizens, just as there was a reason for a separation between military and police organizations under the Posse Comitatus Act, just as there were reasons for bureaucratic compartmentalization. By "revolutionize", they generally mean revamping all of the previous restrictions on joint military and law enforcement operations. Furthermore, 4th amendment considerations will be ignored in an effort to revolutionize the government’s capacity for up to date threat assessment.

Next, it is important to understand that this is an extension on the current modes of collecting this type of information. You are right to assume that Echelon and TIA are invariably linked through some similarity in it intent. TIA wishes to expand the role of Echelon, increase the size of the data warehouse, and further refine the means of data reasoning. The assertion that DARPA wants to scale this project up by "an order of magnitude" speaks to the intent of integrating more advanced systems to the current surveillance technologies. Considering what many think Echelon can do now, it seems like a dangerous prospect for the future of freedom and democracy.

Finally, a key difference between the Echelon Program and TIA lies in the intent to collaborate between agencies. Prior to 9-11, intelligence and law enforcement collaboration was limited to ensure the privacy of the American demographic. Echelon was a NSA program. Now that collaboration is being encouraged, with limited success, those lines are being blurred. We saw this when DoD surveillance birds where used during the Beltway Sniper case. The Posse Comitatus Act can be repealed in a moment’s notice, if the Civilian Defense Condition reaches a certain level.

What is most troubling about these developments is a general attitude that is being created. Is it wise for a government to treat its own citizens as the enemy, or does this immediate need to integrate a broader population to the list of surveyed parties suggest a failure on the part of those parties responsible for keeping the enemy out of our borders? In fact, the prospect of enemy infiltration within our borders is precisely the reason the DoD was created. Have political considerations prevented the Congress from applying the necessary pressures to those responsible bureaus and agencies? Has the American people's lack of critical thinking at the voting booths, and in their everyday lives betrayed them? Is it an accident that a participatory democracy whose demographic is shifting to more of a subject political culture is in danger of losing the principles that important to such a democratic framework?

Ghost Writer
29th May 2003, 11:50
I would have thought the communists here would have had more to say about such an important topic. Could it be that you support this kind of intrusion into the lives of a nation's citizenry? Judging from the records of all those Marxst-Leninist systems that have been created, my guess would be this is a communist's wet-dream.

Ghost Writer
2nd June 2003, 12:12
I am going to bring this back in a final attempt to generate some discussion on this topic. I am not sure if my initial response to this project was a good one. More opinions might help me determine whether my initial suspicion of this system was warranted.

Sabocat
2nd June 2003, 13:37
I was taken aback somewhat Ghost. I would have figured that you were all for the TIA. I'm glad to see you are not.

Eschalon, Carnivore and the TIA, partnered with the new and improved (pending) Patriot Act II are a serious threats to freedoms for people in the U$. The ammount of information that can be gathered on citizens is staggering. There is also talk of a more in depth mining of personal data. There is talk of a Nation Data Base that contains information on ALL citizens. They are in theoretical discussion of construction and implementation as we speak. Let's hope that the politicrits have the common sense to stop this before it get's further along.

What I think we're witnessing is a very quiet move to paranoid Fascism.