On US Homeland Security, Data Mining and Civil Liberties
نویسنده
چکیده
The US Defense Department’s DARPA (Defense Advanced Research Projects Agency) has recently launched a Total Information Awareness (TIA) Initiative as part of national efforts to safeguard the US homeland from future terrorist threats. The vision behind the Initiative is to integrate public and private databases of all data relevant to monitoring the activities of potential terrorists and their supporters, and querying, analyzing, and mining the data. The databases are to include such information as records of deposits and withdrawals from banks, money transfers through banks, enrollment in schools, records of entry into and departure from the US, records of travels via airlines and car rentals, purchase records for goods and services using credit cards, etc. Further, US President Bush has authorized the creation of Terrorist Threat Integration Center, in part to allow integrated access to various databases of the US federal government, including the Department of Homeland Security, the CIA, the FBI, the INS (Naturalization and Immigration Services), etc. in order to identify terrorist suspects and supporters, and to track their activities in a more timely and coherent manner. What the US government is actually attempting to do is to create a central database out of hitherto disparate databases, and query, analyze, and mine the central database to determine terrorist activities in a much more timely, coherent, and accurate manner than has been possible up to now.
منابع مشابه
Beyond Counterterrorism: Data Sharing, Privacy, and Organizational Histories of DHS Fusion Centers
Decentralized organizational approaches to security provision introduce new challenges for controlling information-sharing practices, safeguarding civil liberties, and ensuring accountability. Department of Homeland Security “fusion centers,” and the multiple organizations and databases that are part of fusion centers, engender an environment in which information is migrating beyond original pu...
متن کاملAn Isi Research Framework: Information Sharing and Data Mining
To address the data and technical challenges facing ISI, we present a research framework with a primary focus on KDD (Knowledge Discovery from Databases) technologies. The framework is discussed in the context of crime types and security implications. Selected data mining techniques, including information sharing and collaboration, association mining, classification and clustering, text mining,...
متن کاملCivil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America
In the tradition of research on political tolerance and democratic rights in context, this study uses a national survey of Americans conducted shortly after the September 11, 2001 attack on America to investigate people’s willingness to trade off civil liberties for greater personal safety and security. We find that the greater people’s sense of threat, the lower their support for civil liberti...
متن کاملNondiscrimination in Matters Pertaining to Faith-Based Organizations
This proposed rule would implement revised Executive Branch policy that, consistent with constitutional church-state parameters, faith-based organizations compete on an equal footing with other organizations for direct Federal financial assistance, and to fully participate in Federally supported social service programs, while beneficiaries under those programs receive appropriate protections. T...
متن کاملHomeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon to help enhance the government’s ability to fight terrorism and other crimes. Keeping in mind the special characteristics of crimes and securityrelated data, data mining techniques can contribute in six areas of resear...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Object Technology
دوره 2 شماره
صفحات -
تاریخ انتشار 2003