Home » Cyber » You can run... » “TIA” Reboots

“TIA” Reboots

by murdoc on February 9, 2006

We all knew that Total Information Awareness and its uber-database progeny weren’t going away. It was just a question of what names TIA’s bastard children were now using, and what government agencies had decided to give ‘em a home.
iaologo.gifToday, we find out about two of the not-so-little stinkers. Newsweek, in a brutal assessment of the NSA and other intelligence agencies (“Wanted: Competent Big Brothers”), tucks in this nugget:

Today, very quietly, the core of TIA survives with a new codename of Topsail… two officials privy to the intelligence tell NEWSWEEK. It is in programs like these that real data mining is going on andconsidering the furor over TIAwith fewer intrusions on civil liberties than occur under the NSA surveillance program. “Its the best thing to come out of American intelligence in decades,” says John Arquilla, an intelligence expert at the Naval Postgraduate School in Monterey, Calif. “It is truly Poindexters brainchild. Of all the people in the intelligence business, he has the keenest appreciation of using advanced information technology for intelligence gathering.” Poindexter, who lives just outside Washington in Rockville, Md., could not be reached for comment on whether he is still involved with Topsail.

Meanwhile, the Christian Science Monitor has discovered a new data-mining program over at the Homeland Security Department. It’s called Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement — “ADVISE,” for short.

What sets ADVISE apart is its scope. It would collect a vast array of corporate and public online information — from financial records to CNN news stories — and cross-reference it against US intelligence and law-enforcement records. The system would then store it as “entities” — linked data about people, places, things, organizations, and events, according to a report summarizing a 2004 DHS conference in Alexandria, Va. The storage requirements alone are huge — enough to retain information about 1 quadrillion entities, the report estimated. If each entity were a penny, they would collectively form a cube a half-mile high — roughly double the height of the Empire State Building.
But ADVISE and related DHS technologies aim to do much more, according to Joseph Kielman, manager of the TVTA [Threat and Vulnerability, Testing and Assessment] portfolio. The key is not merely to identify terrorists, or sift for key words, but to identify critical patterns in data that illumine their motives and intentions, he wrote in a presentation at a November conference in Richland, Wash.
For example: Is a burst of Internet traffic between a few people the plotting of terrorists, or just bloggers arguing? ADVISE algorithms would try to determine that before flagging the data pattern for a human analyst’s review.

Another component of ADVISE that the Monitor doesn’t pick up on: The project seems closely tied towards WMD defense. It’ll “incorporate a comprehensive encyclopedia of chemical, biological, radiological, nuclear and explosive threat and effects data,” DHS Under Secretary for Science and Technology Charles McQueary told the House Committee on Science last year. This report sketches out one way ADVISE might use that information:

A radiation detector at a Canadian border crossing may pick up an anomalous reading that might be too ambiguous to trigger an alarm, but the incorporation of additional data (e.g., the driver is associated with a group known to be collecting nuclear materials or the same anomalous reading appears every week from the
same driver and truck) would greatly improve the threat detection ability of these systems.

(Big ups: Eric, Laura)
UPDATE 9:42 AM: “After seven weeks of refusing to provide Congress with details of its secret domestic spying program,” the L.A. Times reports, “the White House changed course Wednesday and began to describe the operations of the controversial surveillance to members of the House and Senate intelligence committees.” And the WaPo notes that “twice in the past four years, a top Justice Department lawyer warned the presiding judge of a secret surveillance court that information overheard in President Bush’s eavesdropping program may have been improperly used to obtain wiretap warrants in the court.“
UPDATE 2:04 PM: “I wonder if this is not yet another example of our countrys over-reliance on technology to try to solve its intelligence problems,” says Kris, who knows a thing or two about intel.

[Osama] probably isnt clicking around on Amazon. The bad guys are smart enough to adapt to the environment in which they live. They know when our satellites are passing over. They know that we monitor their communications and work to counter that. Theyll counter this too. Im not saying that something like this wont produce useful intelligence. Im sure it will, but well still be left with gaps.

Share |

{ 9 comments… read them below or add one }

Sarge February 9, 2006 at 3:32 pm

“[Osama] probably isnt clicking around on Amazon.”
No, but Rove’s political opponents sure are.
Gawd, if these hacks were just the least bit competent I’d be more inclined to give them the benefit of the doubt, but not any longer.
I just hope they haven’t done irreparable harm to the country’s intel & surveillance communities.

Reply

Bill Hollyday February 9, 2006 at 11:04 pm

Dear reader.
Just like another matter to the junior impeachment prosecution to the chair.
Just search in yahoo:
BUSH MIND CONTROL SCANDAL.
HAARP MIND CONTROL.
MIND CONTROL CHIPS IMPLANTS.
UN REFUGEE PEDOPHILE SCANDAL.
What happend with haliburton bribery pay to congress?
so long, Bill Hollyday

Reply

jtw February 11, 2006 at 9:14 pm

I have absolutely zero confidence in my electronic privacy. I have absolutely no confidance in the judicial system that oversees the issuance of warrants since there is no guideline that I know of that determines probable cause, etc etc.
I dont even feel confidant taking a shower in my own bathroom anymore.
I think that Steve Jones nutcase is right, TOTAL ENSLAVEMENT is coming.
If I was planning a domestic terrorist attack, I sure as hell wouldnt go looking for info on the internet. And I would’nt goto the library. And I wouldnt drive my own vehicle in doing whatever evil thing I was doing.
I think we are wrong for wanting to track vehicles, library records, and internet activity. It’s potentially too dangerous for abuse, and it will get ridiculous as technology advances a bit more and comes more into the mainstream.
But the government is screwed anyways, they don’t even protect our 2nd Amendment rights. The founding fathers said this would happen. The gradual encroachment on rights, a standing army, and a disarmed populace.
I think we’re screwed personally.

Reply

Al October 10, 2007 at 9:44 pm

Dear reader.
Im so glad to contact you for comment about The Three World War was Bush will detonate bombing Iran.
If Iran are bombing by Israel, Iranian retaliation will be inmediatly with nuclear warhead response, was Iran purchase to North Korea and Pakistan since intelligence information confirmed, vaporizate the entire Israel. And Israeli Dolphin Class Submarines armed with nuclear warhead missiles will blow up the entire mideast, thing Russian don’t want intervine in the conflict talk with Chinese ally to nuke USA and all occident less Latinamerica.
If USA bombing Iran, Iran will sink a USS Carrier and will nuke USA by commercial sea ship over container launcher near U.S. shore, create the U.S. pride aument till USA blow up the entire Iran, thing was Russian and Chinese allies don’t want nuke USA and all occident less Latinamerica, and probably Australia Japan and Taiwan.
MUST DETAIN PEDOPHILE BUSH WITH THE IMPEACHMENT BEFORE BE LATE.
ONE.

Reply

Home August 15, 2008 at 3:12 am

I think we are wrong for wanting to track vehicles, library records, and internet activity. It’s potentially too dangerous for abuse, and it will get ridiculous as technology advances a bit more and comes more into the mainstream.

Reply

Home August 15, 2008 at 3:13 am

Gawd, if these hacks were just the least bit competent I’d be more inclined to give them the benefit of the doubt, but not any longer.

Reply

cheap Lunia gold August 20, 2008 at 2:34 am

My friends also told me that there is a web site http://www.hameim.com supplies cheap Lunia gold. If one day you want to buy Lunia gold you can go to the above company.

Reply

Sword of the New World Vis August 20, 2008 at 2:35 am

Now I have more Sword of the New World Vis in this game. Of course the Sword of the New World Gold is gained by I upgrade and kill the monsters. If you kill a big monsters you can get more Sword of the New World money.

Reply

jane August 29, 2008 at 2:54 am

2moons power leveling

Reply

Leave a Comment

Previous post:

Next post: