Download here

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Nonlinear dimensionality reduction wikipedia , lookup

Transcript
FP7-SEC-2007-217862
DETECTER
Detection Technologies, Terrorism, Ethics and Human Rights
Collaborative Project
Survey of Counter-Terrorism Data Mining and Related Programmes
D08.1
Due date of deliverable: 30 November 2009
Actual submission date: 11 December 2009
Start date of project: 1.12.2008
Duration: 36 months
Work Package number and lead: WP06 Dr. Daniel Moeckli
Author(s): Dr. Daniel Moeckli, University of Zurich; James Thurman, University of
Project co-funded by the European Commission within the Seventh Framework Programme
(2002-2006)
Dissemination
Level
PU
PP
RE
CO
Zurich
Public
Restricted to other programme participants (including the Commission Services)
Restricted to a group specified by the consortium (including the Commission
Services)
Confidential,
only for members of the consortium (including the Commission
Services)
x
Survey of Counter-Terrorism Data Mining and Related Programmes
Executive Summary
1. The survey reflects a broad definition of data mining and also includes coverage of
related programmes relating to data collection and database construction.
2. In the West, collection activities have increased dramatically in the name of
countering terrorism. In addition to data collection involving air passengers, this
survey also describes general law enforcement collection activities as well as those
specifically targeting terrorist activity.
3. Air passenger information: in the United States, data mining in this area was
proposed in order to identify terrorist suspects who might not otherwise raise
suspicions. In the European Union, too, there seems to be interest in analyzing a
passenger’s travel activities in order to identify suspicious patterns which might
indicate criminal activity.
4. Private companies and non-law enforcement databases: in the US there has been
concern about the incorporation of data from these sources into general law
enforcement data bases.
5. Data analysis programmes that have been proposed and in some cases implemented
for counter-terrorism purposes are also considered. These include not only data
mining programmes but also a discernable trend of providing tools which guide
users in their analysis and decision-making.
1. Introduction
Data mining, also known as knowledge discovery, may be defined in a number of
different ways. The Two Crows Corporation, for example, defines data mining as “a
process that uses a variety of data analysis tools to discover patterns and
relationships in data that may be used to make valid predictions.”1 Hand, Mannila,
and Smyth, on the other hand, have defined it simply as “the analysis of (often large)
observational data sets to find unsuspected relationships and to summarize the data
in novel ways that are both understandable and useful to the data owner.”2 We take
a very broad definition of the term which may be paraphrased as the use of
information technology to attempt to derive useful knowledge from (usually) very
large data sets. We adopt this broad definition at this stage in light of the privacy
and human rights concerns raised by forms of data analysis that might not meet a
narrow definition of data mining.
1
Two Crows Corp. (2005). Introduction to Data Mining and Knowledge Discovery.
http://www.twocrows.com/intro-dm.pdf.
2
Hand, D. J., Mannila, H., & Smyth, P. (2001). Principles of data mining. Cambridge, Mass.: MIT
Press, p. 1.
1
At the same time, we note that data mining and other forms of data analysis that are
being carried out or explored in the counter-terrorism context represent one stage
in a series of data-related practices, each of which presents particular issues with
respect to privacy, ethics, and human rights. In order to perform data mining, there
must be data available. Thus, data has to be collected or recorded. Collected data
may be assembled in an organized fashion to build a database (data warehousing).
One or more databases may then provide the source of data on which data mining
tasks are performed. Particularly, the desire to effectively aggregate numerous,
disparate data sources through data mining has been common in the United States.
Preparation of data forms an intermediate stage prior to mining, and tasks such as
cleaning and transforming data have significant consequences for the quality and
reliability results. Any two databases may not contain the same kinds of data and
even if they do, that data may not be organized or labelled in the same way. Thus,
such dissimilar data will have to be put into the same kind of structure to allow data
mining tasks to be carried out. This kind of preparation of data is often necessary
when data is from different databases is analyzed.
Although data mining necessarily relies on the availability of data, the collection or
warehousing of data may take place without any deliberate form of data analysis in
mind—for example data may be collected merely to provide a record for interested
parties. Yet, any set of data which is available to the data miner may theoretically be
made subject to data mining tasks. We include in this survey some databases which
have been mentioned in the context of data mining in the counter-terrorism context,
but pre-existing databases which might primarily serve completely different
purposes have also been used as data sources for counter-terrorism intelligence. It
is also worth noting that an ongoing field of study is concerned with eliminating the
need to have an organized database: The universe of information available on the
internet represents a remarkable set of data, and the development of “web mining”
tools seeks to render as much of this data as possible susceptible to analysis.
Compared to a database, free text is relatively unstructured. Thus, tools may be
necessary to structure the data for analysis—to identify dates, for example, so that
dates are put in the same category and not mixed up with other numbers, such as
distance measurements or pagination.
There are a number of basic functions which data mining may perform. We briefly
discuss a few types which appear most frequently in the programmes in this survey.
Clustering seeks to identify “natural” groupings within a set of data.3 We use the
term link analysis to refer to methods aimed at exposing relationships between
data—often in the form of social links with terrorist suspects. Pattern analysis
attempts to identify patterns of unusual or anomalous deviation among data. Such
tasks may seek to identify common characteristics among suspects. Event detection
may represent a subset of pattern analysis which has the goal of predicting or
detecting the development of a threat. We use the term search to refer to the
retrieval of items of interest including the application of filters. Search might rely
simply on Boolean operators or sophisticated algorithms such as Google’s PageRank.
3
Ibid., p. 12.
2
Lastly, simple matching seeks to identify whether a particular set of data items
matches an item on an established list. This type of function occurs most typically
where information technology is applied to determine whether a potential airline
passenger is on a terrorist watch list or other list of law enforcement interest.
In the survey below, we attempt to preface each description of a programme with a
number of attributes of potential interest. In each instance, we identify the agency
that initiated or sponsored the programme and the current status of the
programme. In the case of data analysis programmes, we attempt to give the type
of general function or functions which the programme is designed to perform,
although in many instances this is quite speculative due to the limited amount of
information available. With respect to databases or other collections of data, we try
to identify the sources from which the data is taken or made available, as well as the
entities that have access to the data.
This document represents the first deliverable under Work Package 6 of the
DETECTER project but is still very much a work in progress. The survey is exploratory
in nature and serves as an initial building block for subsequent work.4 Deliverables
D08.2 and D08.3 of Work Package 6 will provide analytic assessment of data mining
programmes and their application. This survey and subsequent versions of it will
furnish input for the analysis within those reports.
Our survey currently has a marked concentration on activities in the United States. There are
several reasons for this. By far the most prominent discussion of data mining plans and
activities for counter-terrorism purposes has been in the US, making it an obvious starting
point. Additionally, the US has long been a leader in the information technology industry,
and it would thus be no surprise that the use and development of data mining technology
and techniques may be more advanced and diffuse within US law enforcement and
intelligence communities. Moreover, the US—long noted for its massive defence spending—
probably has allocated a much larger budget to counter-terrorism research and
development than any country in Europe. A longer tradition of freedom of information
legislation may also have resulted in greater disclosure of data mining and related activities
in the US than in Europe. While for all these reasons it is easier to identify counter-terrorism
data mining activities in the US, we hope to be able to include more coverage of European
activities in future versions of this survey.
Lastly, we note that due to the nature of the topic, comprehensive information concerning
the exact nature and function of the programmes here included is generally not available.
Thus, in many instances, we are left to extrapolate and speculate based on secondary or
often cryptic primary sources.
2. Survey of Selected Programmes
4
Comments and corrections are welcome and may be submitted to the authors directly at
[email protected] and [email protected].
3
2.1. International
CAHORS
Agency:
North Atlantic Treaty Organisation
Data Sources: The World Wide Web, data collected by end users
Access:
Unknown
Functions:
Clustering, Search, Pattern Analysis
Status: Under development
CAHORS is a NATO project spearheaded by the French-based concern, Thales, and
supported by the French National Research Agency.5 The project aims to provide a
comprehensive platform to meet the needs of various end users throughout the
entire intelligence process from collection to decision-making. One aspect of the
project seeks to develop web mining tools for textual data on the World Wide Web
in order to identify documents of interest for anti-terrorism efforts. Part of this
endeavour would involve the automatic collection of data from open sources.6 The
project seeks to provide tools for data preparation as well as importance-ranking of
data elements based on an original model of information value.7
2.2. United States
Pre-flight and Border Collection
2.2.1. Computer Assisted Passenger Pre-Screening System II (CAPPS II)
Agency:
Transportation Security Administration
Data Entry: Transportation Security Administration & Commercial Airlines
Maintenance: Transportation Security Administration
Access:
Transportation Security Administration
Functions:
Matching, Event detection
Status: Replaced by Secure Flight Programme
CAPPS II was a proposed programme for pre-screening airline passengers in the US
that was ultimately abandoned in 2004. Following the events of Sept. 11, 2001, the
US government saw the need to improve on the CAPPS system that had been in use.
The predecessor CAPPS system relied on matching passenger names to those names
that appeared on watch lists as well as flagging those passengers or itineraries which
had certain characteristics (the “CAPPS I rules”).8 The Government Accountability
5
Thomas Delavallade & Philippe Capet, Information Evaluation as a Decision Support for CounterTerrorism, RTO-MP-IST-086, available at http://ftp.rta.nato.int/public//PubFullText/RTO/MP/RTOMP-IST-086///MP-IST-086-14.doc, p. 14-2.
6
See ibid., p. 14-3.
7
See ibid., pp. 14-5–14-6.
8
Ryan Singel (16 July 2004). Life After Death for CAPPS II? Wired,
http://www.wired.com/politics/security/news/2004/07/64240; US Government Accountability Office,
4
Office (GAO) has described these “rules” as a “set of weighted characteristics and
behaviors … that TSA has determined correlate closely with the characteristics and
behaviors of terrorists.”9 At least one report has suggested that the purchase of a
one-way flight or the submission of cash payment for flights were among the “rules”
which triggered more intense security screening.10 The CAPPS II system would
supplement passenger name records with a home telephone number, home
address, and the individual’s date of birth. The system would represent an
additional expansion beyond the initial CAPPS in that all passengers would be subject
to the screening rather than simply those passengers who check luggage, and every
airline and airport would be subject to the programme.11 Most significantly,
whereas the CAPPS system had been administered by the airline companies, CAPPS II
was to be administered by a government agency, the Transportation Security
Administration (TSA). The passenger information passed on to the TSA reportedly
would have been checked against information contained in commercial and
governmental databases.12 Based on this analysis, each passenger would be
assigned a colour code to indicate their suspected potential threat level: “Green”
indicated no threat; “yellow” represented a potential threat which meant that the
passenger should be subjected to further security checks before being allowed to
board the flight; and “red” indicated that the individual likely represented
“‘imminent threat’ to the physical safety of the people on the plane” and should be
prohibited from boarding the flight.13
The Government Accountability Office (GAO) lists seven aspects of the programme,
and notes that there was an eighth aspect which was not disclosed for security
reasons.14 In addition to the watch list matching and application of CAPPS I rules
mentioned above, the other aspects were to include the verification of passengers’
identities by checking name records against commercial databases as well as
matching passenger names against lists of international fugitives and wanted lists,
lists of participants in security credentialing programmes, and temporary watch lists
such as involving stolen passports.15 With respect to data mining, it has been
reported that the CAPPS II system would involve the application of algorithms to
assist in the screening process and/ or identify patterns among data sets within the
databases that would be available to the system.16 One data mining application that
(March 2005). Aviation Security: Secure Flight Development and Testing Under Way, but Risks Should
Be Managed as System Is Further Developed. (GAO-05-356 ), p. 10
9
US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key Activities
Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate Risks.
(GAO-09-292). Retrieved October 01, 2009, pp. 8-9.
10
Ryan Singel (16 July 2004). Life After Death for CAPPS II? Wired,
http://www.wired.com/politics/security/news/2004/07/64240.
11
Electronic Frontier Foundation, CAPPS II: Government Surveillance via Passenger Profiling,
http://w2.eff.org/Privacy/cappsii/background.php.
12
Electronic Frontier Foundation, CAPPS II: Government Surveillance via Passenger Profiling,
http://w2.eff.org/Privacy/cappsii/.
13
Ibid.
14
US Government Accountability Office, (March 2005). GAO-05-356 Aviation Security: Secure Flight
Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed.
Retrieved September 22, 2009, p. 10. and n. 9, p. 9.
15
Ibid.
16
Ryan Singel (16 July 2004). Life After Death for CAPPS II? Wired,
5
was identified by the GAO was a programme that would seek to identify unknown
terrorist suspects based on an individual’s travel or transactional patterns. 17
Presumably, this programme would rely on models of terrorist activity developed on
the basis of previous intelligence work. At least one member of Congress expressed
concern that the system would rely on information-sharing with private contractors
and fail to comply with US legal requirements pertaining to data handling.18
2.2.2. Secure Flight
Agency:
Transportation Security Administration
Data Entry: Transportation Security Administration & Commercial Airlines
Maintenance: Transportation Security Administration
Access:
Transportation Security Administration
Functions:
Matching
Status: In use
Secure Flight is the successor to the abandoned CAPPS II programme.19 According to
a GAO report, the initial plans for the programme were similar to those for CAPPS II
and would build upon technology and processes that had been developed under
CAPPS II; however, Secure Flight would only implement some of the aspects of
CAPPS II and be limited to the pre-screening of passengers en route domestically
within the US as opposed to those flying in or out of the country.20 International
flights would initially be covered by the APIS system administered by Customs and
Border Patrol. Ultimately, however, screening for international flights would also be
handled by TSA.21 As of 2005, the programme intended to check passenger name
records against an extended watch list provided by the FBI’s Terrorist Screening
Center and was also exploring whether the inclusion of commercial data would make
watch list matching more effective.22 Initial testing also involved matching against
CAPPS I rules.23 Those passengers who are matched (referred to as “selectees”)
http://www.wired.com/politics/security/news/2004/07/64240; Electronic Privacy Information Center,
Passenger Profiling, http://epic.org/privacy/airtravel/profiling.html
17
US Government Accountability Office, (March 2005). GAO-05-356 Aviation Security: Secure Flight
Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed.
Retrieved September 22, 2009, p. 10.
18
Ryan Singel (16 July 2004). Life After Death for CAPPS II? Wired,
http://www.wired.com/politics/security/news/2004/07/64240.
19
Seifert, J. W. (January 18, 2007). Data Mining and Homeland Security: An Overview. Congressional
Research Service. Retrieved June 26, 2009, p. CRS-5.
20
US Government Accountability Office (2005). GAO-05-356 Aviation Security: Secure Flight
Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed.
Retrieved September 22, 2009, p. 11.
21
Transportation Security Administration, DHS (28.10.2008). Secure Flight Program. 73 FR 64018,
64020. Retrieved October 01, 2009.
22
US Government Accountability Office (2005). GAO-05-356 Aviation Security: Secure Flight
Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed.
Retrieved September 22, 2009, p. 12.
23
US Government Accountability Office (2005). GAO-05-356 Aviation Security: Secure Flight
Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed.
Retrieved September 22, 2009, p. 23.
6
would be subjected to additional screening.24 CAPPS is separate from Secure Flight
and operations of one do not influence the operations of the other.25 With respect
to the Secure Flight matching system, the TSA has some level of discretion, according
to the GAO. This discretion manifests itself in the relative importance that is
assigned to the various items of personal information, the scoring function that is
used to determine what level of correspondence between data items results in a
“match,” and the level and manner of variations in data items (e.g. name spellings,
etc.) that are permitted to result in the correlation of data items.26
Final Rules issued in October of 2008 indicated that the TSA intended to implement
at least a two-tier system of watch list matching. Generally, the TSA would merely
perform matching against the “No Fly” and “Selectee” lists within the Terrorist
Screening Database (TSDB). When higher threat levels were present, however, the
TSA would consider running matching against a broader array of data, such as all
components of the TSDB.27
Data matching would be conducted between data provided by air carriers and that in
selected database components as mentioned immediately above. The TSA
determined during initial development of Secure Flight that effective matching
would be greatly benefitted by the addition of passengers’ gender and date of birth
to passenger name records. The final rule indicated that these data elements would
be mandatory once the Secure Flight programme had been implemented.28
Passenger data would either be submitted to the TSA electronically where air
carriers used an automatic reservation system or entered by the air carrier via a
web-based access system known as eSecure Flight.29 Once the TSA has performed
matching, it will submit boarding pass instructions to the air carrier. These
instructions will either indicate that: 1) the carrier may issue an unrestricted
boarding pass to the passenger; 2) the carrier may issue a boarding pass indicating
that the passenger has been selected for enhanced screening; or 3) the carrier may
not issue a boarding pass and must await TSA instructions after the passenger has
arrived at the airport and presented a valid identification document.30 The final rule
24
US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key Activities
Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate Risks.
GAO-09-292 (GAO-09-292). Retrieved October 01, 2009, p. 9.
25
US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key Activities
Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate Risks.
GAO-09-292 (GAO-09-292). Retrieved October 01, 2009, p. 9.
26
US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key Activities
Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate Risks.
GAO-09-292 (GAO-09-292). Retrieved October 01, 2009, p. 8.
27
Transportation Security Administration, DHS (28.10.2008). Secure Flight Program. 73 FR 64018,
64019. Retrieved October 01, 2009.
28
Transportation Security Administration, DHS (28.10.2008). Secure Flight Program. 73 FR 64018,
64020. Retrieved October 01, 2009 (see chart at page below); see also at 64021.
29
US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key
Activities Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate
Risks. GAO-09-292 (GAO-09-292). Retrieved October 01, 2009, p. 6.
30
Transportation Security Administration, DHS (28.10.2008). Secure Flight Program. 73 FR 64018,
64019-20. Retrieved October 01, 2009.
7
does not indicate whether only those individuals who have been “matched” by the
system will be subject to the enhanced screening. Anecdotal reports have suggested
that existing screening systems have been set up to return occasional false positives
in order to introduce an element of randomness to the system. For instance, metal
detectors have reportedly been programmed to produce a beep on certain occasions
despite the fact that the system has detected no metal.
The Secure Flight system would initially apply only to domestic flights, while
international flights would continue to fall under the Customs and Border Patrol’s
APIS programme. Ultimately, however, screening for international flights would also
be handled by TSA.31
The GAO placed 10 conditions on the development of Secure Flight which had to
have been met before Secure Flight could go into operation. One condition was the
availability of some form of redress process through which passengers who claimed
to have been falsely included on a watch list could seek resolution and ultimately
freedom from enhanced security procedures that were inappropriately imposed.
Ultimately, TSA developed a system through which these passengers would be
issued a redress number to provide a permanent reference to that individual’s
request for redress.32 In cases where there did not appear to be a false match, TSA
would refer the matter to the FBI’s Terrorist Screening Center for resolution.33
Ideally, the redress number would allow those who had been cleared of watch list
status to avoid future security complications while travelling.
2.2.3. Automated Targeting System (ATS)
Agency:
Department of Homeland Security
Data Sources: Several Customs and Border Protection databases & Passenger Name
Records
Access:
US Customs and Border Protection & DHS contractors; other federal
and Canadian agencies may have access to underlying data sets
through ATS interface
Functions:
Pattern Analysis, Rule checking
Status:
In use
ATS was a system developed to screen cargo going in and out of the US. In 2006, the
Dept. of Homeland Security announced that it would be extending the program to
screen travelers entering the US. This action has evidently already taken place as a
US citizen was able to receive passenger data pertaining to himself which was held
31
Transportation Security Administration, DHS (28.10.2008). Secure Flight Program. 73 FR 64018,
64020. Retrieved October 01, 2009.
32
See US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key
Activities Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate
Risks. GAO-09-292 (GAO-09-292). Retrieved October 01, 2009, p. 11.
33
US Government Accountability Office (2009). Aviation Security: TSA Has Completed Key
Activities Associated with Implementing Secure Flight, but Additional Actions Are Needed to Mitigate
Risks. GAO-09-292 (GAO-09-292). Retrieved October 01, 2009, p. 11.
8
within the ATS system on January 13, 2008 through a Freedom of Information
request. Notably, the information that was revealed in the FOI response included
data from airline booking processes such as credit card numbers, frequent flyer
numbers, and hotel reservations.34 A notice in the Federal Register stated that the
system “both collects information directly, and derives other information from
various systems.”35 The system reportedly consists of six components, one of which
represents an analytical module evidently aimed at deriving trends from system
data.36
According to a 2006 Privacy Impact Assessment, data for the ATS is pulled from the
Automated Commercial System (ACS), the Automated Export System (AES), the
Automated Commercial Environment (ACE), and the Treasury Enforcement
Communication System (TECS). Additionally, information from other federal
databases such as the National Crime Information Center is also obtained. 37 Among
this information is vehicle registration data for those individuals who enter the US
via ground transport.38 The system also receives Passenger Name Records
submitted by commercial airlines.39 Similar to the CAPPS system, ATS involves the
application of a set of rules to system data to identify shipments and travellers who
represent a security or criminal risk.40
Access evaluations and other audits are reportedly conducted on a periodic basis.41
Data Analysis Programmes and Tools
2.2.4. Total Information Awareness/ Terrorist Information Awareness (TIA)
Agency:
Data Sources:
Access:
Functions:
Status:
DARPA
Unspecified
DARPA, Project Contractors, reportedly NSA42
Link Analysis, Pattern detection, Search, Event Detection, Human
Analytic Aids
Officially terminated; believed to have been transferred to one or
more other agencies, including as the projects “Tangram” and
“Topsail”43
34
Customs and Border Patrol Travel Record, FOIA Request DIS-4-OT: FD SU,
http://philosecurity.org/wp-content/uploads/2009/09/DHS-Travel-Record.pdf.
35
71 FR 64546 (02.11.2006).
36
Department of Homeland Security (22.11.2006). Privacy Impact Assessment for the Automated
Targeting System, p. 3.
37
Ibid., p. 7.
38
Ibid., p. 6.
39
Department of Homeland Security (22.11.2006). Privacy Impact Assessment for the Automated
Targeting System, p. 2.
40
Department of Homeland Security (22.11.2006). Privacy Impact Assessment for the Automated
Targeting System, p. 3.
41
Ibid., p. 21.
42
See Harris, S. (16.06.2006). Signals and Noise, http://www.shaneharris.net/2006/06/signals-andnoise.html.
9
TIA was a programme developed by the Defense Advanced Research Projects Agency
(DARPA). The phrase “Total Information Awareness” was in use at DARPA as early as
1999,44 but TIA came to be particularly associated with the activities of the post-9/11
Information Awareness Office under the leadership of Admiral John Poindexter.
According to official sources, the programme sought to “develop a modular system
architecture using open standards that will enable a spiral development effort that
will allow the insertion of new components when they are available.”45 Several
component projects were named by Admiral Poindexter in a speech he delivered at
the DARPATech 2002 Conference:
Project Genoa: Project Genoa was under development at least as
early as 1999. It is described as being “aimed primarily at
supporting intelligence analysis.” The objective appears to have
been to assist multiple analysts to assess and interpret data
together and arrive at a decision with respect to that data.
Human Identification at Distance (HumanID): HumanID sought to
develop a system for the positive identification of individuals
based on “multi-modal biometric technologies.” The elements
that the system would incorporate included facial and other body
part recognition, gait recognition, remote iris scan, infrared and
hyper-spectral imagery, and non-image-based biometrics.
Genysis: The Genysis project aimed to develop an “ultra-largescale” database. One objective was to develop ways to gain
access to existing databases that were previously unconnected.
The project also sought to develop privacy-enhancing
technologies.
TIDES & EARS: These projects concerned IT-based linguistic analysis
tools. The objectives were reported to have been to provide
search tools for finding information in foreign languages and make
possible the conversion of speech to text.
Evidence Extraction and Link Discovery (EELD): As the name of the
project suggests, it aimed to cull information from various
classified and unclassified data sources. Reportedly it would
include extracting data from “message traffic.” Based on this
extracted data, the programme would establish links with
relevance to terrorism, such as relationships between people,
organizations, and activities. The programme would also learn
patterns that represent terrorist groups and scenarios.
War Gaming the Asymmetric Environment (WAE): This project
aimed at developing predictive indicators of terrorist attacks and
43
Harris, S. (Oct. 20, 2006). Terrorist Profiling, Version 2.0. National Journal. Retrieved June 29,
2009; Harris, S. (Feb. 23, 2006). TIA Lives On. National Journal,
http://www.nationaljournal.com/about/njweekly/stories/2006/0223nj1.htm#.
44
See Sharky, B. Total Information Awareness, DARPATech 1999 Conference,
http://www.darpa.mil/darpatech99/Presentations/Scripts/ISO/ISO_TIA_Sharkey_Script.txt.
45
Remarks as prepared for delivery by Dr. John Poindexter, Director, Information Awareness
Office of DARPA, at DARPATech 2002 Conference, Anaheim, Calif., August 2, 2002, available at
http://www.fas.org/irp/agency/dod/poindexter.html.
10
behaviour. The model relies on the past behaviour of known
terrorists to predict what activities they will take next and where
they will take them. Validation of the programme was carried out
by comparing against archival data relating to 66 attacks which
occurred over a span of 17 years.
Bio-Surveillance: The Bio-Surveillance project was aimed at
addressing biological attacks. It sought to develop a programme
that would examine data sources to provide early warning of the
release of biological agents.
Genoa II: Genoa II sought to improve upon the original Genoa
programme. One focus was on increasing the speed of analysis
and decision-making. To this end, the project sought to automate
the data collection process as well as the presentation of analyses.
The presentation process was geared to build a knowledge
repository which would facilitate re-use of previously acquired
knowledge. The project also sought to develop tools to assist
analysts in organizing information and “thinking together” in
groups. An additional goal of the project was to develop tools to
assist and speed up collaboration among individuals in different
organizations. Among the tasks that the system would assist with
were resource identification, role allocation, planning, and policy
development and enforcement.46
Due to negative public reaction to the programme, Congress suspended funding for
TIA in 2003.47 Yet, reports have surfaced that the programme has not been
terminated altogether but merely renamed and moved to one or more other
agencies. Shane Harris of the National Journal sees TIA’s continuation in a
programme known as Tangram which is sponsored by the US Air Force Materiel
Command and reportedly also under the auspices of the coordinating agency
Advanced Research and Development Activity (ARDA).48 In an information packet
provided by the federal government, Tangram is characterized as a continuation of
the “Evidence Assessment, Grouping. Linking and Evaluation” (EAGLE) programme.49
EAGLE may likely be the successor of the EELD programme following TIA’s
suspension. Tangram is further described as having the goals of improving the
scalability and performance of the most promising algorithms developed under the
EAGLE project. Additionally, Tangram seeks to transform EAGLE into a continually
46
Ibid; See also Statement by Dr. Tony Tether, Director Defense Advanced Research Projects Agency
Before the Subcommittee on Military Research and Development Committee on Armed Services
House of Representatives (26.06.2001), available at
http://armedservices.house.gov/comdocs/openingstatementsandpressreleases/107thcongress/01-0626tether.html.
47
See, e.g., Harris, S. (20.10.2006). Terrorist Profiling, Version 2.0. National Journal,
http://www.nationaljournal.com/about/njweekly/stories/2006/1020nj3.htm#; Harris, S. (23.02.2006).
TIA Lives On. National Journal,
http://www.nationaljournal.com/about/njweekly/stories/2006/0223nj1.htm#.
48
See, e.g., Harris, S. (20.10.2006). Terrorist Profiling, Version 2.0. National Journal,
http://www.nationaljournal.com/about/njweekly/stories/2006/1020nj3.htm#.
49
Advanced Research and Development Activity & AFRL (2005). TANGRAM Proposer’s Information
Packet (PIP), https://www.fbo.gov/utils/view?id=8b216e2d32c807806164266b9996b7a8.
11
operating, consolidated, more user-friendly analysis system for broader deployment
throughout the US intelligence community. Other aspects of the Tangram
programme include: the development of a theoretical model of terrorist entity and
threat detection to assist the technical aspects of the system; building upon
experiences in fraud detection systems to develop a system for terrorist threat
detection; developing a system of “suspicion scoring” that could attach a particular
threat value to individual fragments of information; developing a system to fill in
information gaps by projecting suspicion scores based on available information;
providing a method to address the problem posed by the dynamic nature of human
behaviour to the suspicion scoring project.50
2.2.5. Multi-State Anti Terrorism Information Exchange (MATRIX)
Agency:
Data Sources:
Access:
Functions:
Status:
Multi-State Consortium
Various law enforcement databases
State law enforcement personnel
Search, Link Analysis
Officially terminated
The MATRIX was a plan to build upon a digital intelligence system that has been in
use in the State of Florida. The plan intended to bring together State resources from
multiple States so that law enforcement agencies in all the participating States would
have access to the totality of the information held in those resources within a single
system.51 The databases that the system would incorporate information from were
criminal history databases, corrections information and images, sexual offender lists,
driver’s license databases, and motor vehicle registration.52 Other sources indicated
that information from commercial databases would be included as well. The ACLU,
for instance, claimed that the system would also have access to:
 Credit information
 Driver’s license photographs
 Marriage and divorce records
 Past addresses and telephone numbers
 Names and addresses of family members
 Neighbours’ addresses and telephone numbers
 Business associates
 Social security numbers and dates of birth53
50
Ibid., pp. 8-9.
See, e.g., MATRIX: Multi-State Anti TeRrorism Information Exchange, available at
http://www.aclu.org/files/FilesPDFs/matrix%20brochure.pdf; Sole Source Criteria for the Multi-State
Anti Terrorism Information Exchange (MATRIX) Project, available at
http://www.aclu.org/files/FilesPDFs/sole%20source%20criteria%20for%20matrix.pdf; Seisint,
Inc.(Sept. 29, 2003). Seisint's FACTS for the MATRIX Project, available at
http://www.aclu.org/FilesPDFs/seisint_facts_83.pdf, p. 5.
52
Seisint, Inc.( 29 Sept. 2003). Seisint's FACTS for the MATRIX Project, available at
http://www.aclu.org/FilesPDFs/seisint_facts_83.pdf, p. 6.
53
American Civil Liberties Union (2004). Data Mining Moves into the States.
http://www.aclu.org/FilesPDFs/matrix%20report.pdf, p. 2.
51
12
And a Congressional Research Service report from 2004 indicated that the MATRIX
website had identified a number of public sector information that would be available
to the system, including corporate filings, state Commercial Code filings, bankruptcy
filings, professional licenses, and property registries.54 The system in use in Florida
was reportedly able to run various search queries at a much faster rate than with
standard processing.55 In addition to search capabilities, the MATRIX system would
be able to display relationship networks, provide geographic mapping of
information, display photo montages of multiple driver’s licenses, and generate
photo lineups for witness viewing.56
MATRIX was earmarked to receive federal funding for its development, and there
was some anxiety and speculation that it might be extended to the federal
government at some point later in time.57 The project was ultimately terminated
after the programme came under increased public scrutiny and the number of States
willing to participate began to dwindle.58
2.2.6. Novel Intelligence From Massive Data (NIMD)
Agency:
Data Sources:
Access:
Functions:
Status:
US National Security Agency (NSA)
Unknown
Unknown
Human Analytic Aids
Unknown
This programme is sponsored by the US National Security agency, and aims to reveal
interesting intelligence which might not otherwise be disclosed through traditional
methods of intelligence analysis. Sources indicate that, like TIA, NIMD seeks both to
bring together information from a variety of data sources and to assist human
analysts in overcoming natural limits and failures in human cognition so that they
may recognize the significance of intelligence data and evaluate it properly.59
Reportedly, the NSA was provided access to TIA during its early development and
54
Krouse, W. J. (18.08.2004). The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot
Project. : Congressional Research Service, p. CRS-6.
55
Seisint, Inc.( 29 Sept. 2003). Seisint's FACTS for the MATRIX Project, available at
http://www.aclu.org/FilesPDFs/seisint_facts_83.pdf, p. 8.
56
See generally, Seisint, Inc.( 29 Sept. 2003). Seisint's FACTS for the MATRIX Project, available at
http://www.aclu.org/FilesPDFs/seisint_facts_83.pdf.
57
American Civil Liberties Union (2004). Data Mining Moves into the States.
http://www.aclu.org/FilesPDFs/matrix%20report.pdf, p. 2.
58
ACLU Applauds End Of "Matrix" Program, 15.04.2005, http://www.aclu.org/technology-andliberty/aclu-applauds-end-matrix-program; see also Singel, R. (15.03.2004) Wisconsin, New York
Unplug Matrix. Wired, http://www.wired.com/politics/security/news/2004/03/62645.
59
See, e.g., MITRE Corp.(09.2002). New Research Center Focuses on IT and the Intelligence
Community. Retrieved December 09, 2009, from
http://www.mitre.org/news/digest/defense_intelligence/09_02/di_research_nnrc.html, Harris, S.
(20.01.2006). NSA spy program hinges on state-of-the-art technology. National Journal, available at
http://www.govexec.com/story_page_pf.cfm?articleid=33212.
13
appropriated tools that had been developed under TIA.60 Thus, it may be possible
that NIMD incorporates elements of TIA.
Reportedly, part of the NIMD programme consists of a programme known as Glass
Box.61 The purpose of Glass Box may consist of culling information from various
public data sources for use by NIMD, evaluating data mining algorithms developed in
other elements of the NIMD programme, providing analytic assistance, evaluating
the analytic process employed by intelligence analysts, or all of the above.62
2.2.7. Analyst Notebook I2
Agency:
Data Sources:
Access:
Functions:
Status:
Department of Homeland Security
Unknown
Unknown
Pattern Analysis, Link Analysis
In use
I2 Analyst’s Notebook is a commercially-available data mining and analysis product
from i2, Inc. which focuses on fraud detection, and criminal and anti-terrorist
intelligence. The product is designed to analyze large data sets and display analyses
such as patterns, trends, or link analysis in graphical form. The product also permits
the manual or automatic creation of tables and charts as well as briefing charts for
intelligence sharing.63 The product permits the importation of structured data from
sources such as Lexis-Nexis, Dun & Bradstreet, and the FBI’s Regional Information
Sharing Systems.64 Other i2 products that may be used in conjunction with Analyst’s
Notebook permit the importation of data from multiple sources simultaneously and
the conversion of unstructured text into structured data.65 Analyst’s Notebook also
enables geographical mapping of locations of interest via Google Earth.66 According
to a 2004 report from the GAO, the product has been used by the Dept. of Homeland
Security to “[c]orrelate[ ] events and people to specific information.”67
2.2.8. Secure Collaborative Operational Prototype Environment (SCOPE)
Agency:
Department of Justice/ FBI
Data Sources: Unspecified
60
Harris, S. (16.06.2006). Signals and Noise, http://www.shaneharris.net/2006/06/signals-andnoise.htm.
61
Dillard, W.P. III. (17.06.2005). NSA searches for novel intel answers in the Glass Box. Government
Computer News, http://gcn.com/articles/2005/06/17/nsa-searches-for-novel-intel-answers-in-the-glassbox.aspx?sc_lang=en.
62
See ibid.
63
See http://www.i2inc.com/products/analysts_notebook/#capabilities.
64
Ibid.
65
See ibid. See Introduction for an explanation of “structured” versus “unstructured” data.
66
http://www.i2inc.com/products/analysts_notebook/#new.
67
US General Accounting Office. (May 2004). GAO-04-548 Data Mining: Federal Efforts Cover a
Wide Range of Uses, p. 44.
14
Access:
Functions:
Status:
FBI
Search, possibly Link or Relationship Analysis
In use
SCOPE provides data processing functionality for the Investigative Data Warehouse.
It represents a single interface through which FBI agents may conduct searches
across multiple data sources in order “to uncover terrorist and criminal activities and
relationships.”68 SCOPE can handle both structured and unstructured textual data. 69
It was listed as operational in 2004.70
2.2.9. Insight Smart Discovery
Agency:
Data Sources:
Access:
Functions:
Status:
Defense Intelligence Agency
Unspecified public sector data
Unknown
Data Preparation
Under development in 2004
The short description of Insight Smart Discovery provided in the GAO’s 2004 report
suggests that it is a programme designed to prepare unstructured data for data
mining processes and provide visual analysis of data in terms of charts and
diagrams.71
2.2.10. Verity K2 Enterprise
Agency:
Data Sources:
Access:
Functions:
Status:
Defense Intelligence Agency
Unspecified private and public sector data
Unknown
Unknown
Listed as operational in 2004
Verity K2 Enterprise is a data mining programme aimed at identifying terrorist
suspects, including among US citizens.72
2.2.11. PATHFINDER
Agency:
Data Sources:
Access:
Functions:
Defense Intelligence Agency
Unspecified private and public sector data
Unknown
Unknown
68
US General Accounting Office. (May 2004). GAO-04-548 Data Mining: Federal Efforts Cover a
Wide Range of Uses, p. 47.
69
Ibid.
70
Ibid.
71
See ibid., p. 30.
72
Ibid.
15
Status:
Listed as operational in 2004
The GAO Report provides virtually nothing in terms of specifics with respect to this
data mining programme. Information as to whether the programme would utilize
private sector data is also contradictory.73
2.2.12. Autonomy
Agency:
Data Sources:
Access:
Functions:
Status:
Defense Intelligence Agency
Unspecified public sector data
Unknown
Search
Listed as operational in 2004
Autonomy is search engine designed to perform searches on textual data.74
2.2.13. Counterintelligence Automated Investigative Management System
(CI-AIMS)
Agency:
Data Sources:
Access:
Functions:
Status:
Department of Energy
Unspecified public sector data
Unknown
Potentially Pattern Analysis and/or Event Detection
Listed as operational in 2004
CI-AIMS is described as a system for tracking cases related to individuals or countries
that represent a threat to US energy infrastructure. The “purpose” of the system is
listed as detecting criminal activities or patterns, suggesting that it contains data
mining tools which perform either pattern or event detection or both.75
2.2.14. Autonomy
Agency:
Data Sources:
Access:
Functions:
Status:
Department of Energy
Unspecified public sector databases
Unknown
Potentially Pattern Analysis and/or Event Detection
Under development in 2004
The Autonomy programme sought to detect threats to US Dept. of Energy assets.
Data sources were referred to as “intelligence-related” databases although the 2004
GAO report indicates that other agency data would not be utilized.76
73
Ibid.
Ibid.
75
See ibid., p. 40.
76
Ibid.
74
16
2.2.15. Counterintelligence Analytical Research Data System (CARDS)
Agency:
Data Sources:
Access:
Functions:
Status:
Department of Energy
DoE briefing and debriefing reports
Unknown
Pattern Analysis and/or Event Detection
Listed as operational in 2004
CARDS is a system designed to analyse reports filed with respect to briefing and
debriefing Department of Energy (DoE) personnel who travel to foreign countries or
interact with foreign visitors to DoE facilities. The aim of analysis is to detect
potential threats to DoE assets.77
2.2.16. BioSense
Agency:
Data Sources:
Access:
Functions:
Status:
Center for Disease Control
Unspecified public and private sector data
Unknown
Event Detection
Listed as operational in 2004
A system designed to detect bioterrorist threats.78
2.2.17. Foreign Terrorist Tracking Task Force Activity
Agency:
Data Sources:
Access:
Functions:
Status:
Federal Bureau of Investigation
Unspecified public sector data and DHS and FBI data
Unknown
Event Detection
Listed as operational in 2004
This data mining programme is designed to identify instances of unlawful entry into
the United States and support deportation actions and prosecutions against foreign
nationals in the US.79
2.2.18. NETLEADS
Agency:
Department of Homeland Security, Immigration and Customs
Enforcement, Customs and Border Patrol
77
Ibid.
Ibid., p. 41.
79
Ibid., p. 47.
78
17
Data Sources: Multiple DHS databases and commercial databases
Access:
Department of Homeland Security, Immigration and Customs
Enforcement, Customs and Border Patrol (various levels of access)
Functions:
Search, Pattern Analysis
Status:
In operation
NETLEADS represents a suite of software tools that provides search capabilities over
multiple databases as well as trend and pattern analysis of data. The tools are used
by the Dept. of Homeland Security, Immigration and Customs Enforcement (ICE), and
Customs and Border Control.80 The software accesses data from internal databases
that are maintained by the Dept. of Homeland Security as well as from public
sources such as geographical location data and news feeds.81
Raw data going in to the system is evidently organized automatically in indexed
records.82 It is these records that are available to the search and analysis tools. The
search capabilities of the tool suite permit search of both unstructured and
structured data. The software also includes graphical analysis tools which have been
referred to as link analysis and trend analysis.83 Link analysis depicts relationships
and connections between and among both individuals and organizations. There is
also a “Timeline Analysis” feature which permits the comparison of different link
analysis graphs representing connections existing at different points in time. The
trend analysis feature permits users to look for trends across immigration cases.84
In 2006, it was reported that the ICE was seeking to establish appropriate
agreements to permit information sharing with other state and federal agencies. 85
The DHS has indicated that users are provided with data handling training prior to
receiving access and that the ability to audit the activities of users is in place. 86 The
system automatically generates audit logs which are examined daily for evidence of
anomalous activity.87
2.2.19. ICE Pattern Analysis and Information Collection System (ICEPIC)
Agency:
Immigration and Customs Enforcement
Data Sources: Multiple DHS, Department of State, Department of Justice, and Social
Security Administration databases
Access:
Immigration and Customs Enforcement
Functions:
Link Analysis, Search
80
DHS Privacy Office. (6 July 2006). Data Mining Report: Report to Congress on the Impact of Data
Mining Technologies on Privacy and Civil Liberties. : Dept. of Homeland Security (DHS Privacy
Office Response to House Report 108-774), p. 22.
81
Ibid., p. 23.
82
See ibid., p. 23.
83
Ibid., p. 22.
84
Ibid.
85
Ibid., pp. 22-23.
86
Ibid., pp. 23, 24.
87
Ibid., p. 24.
18
Status:
Deployment date 2006
ICEPIC is a programme implemented by the ICE which is specifically designed to
assist in counter-terrorism efforts. The program makes use of IBM’s Non-Obvious
Relationship Technology (NORA) to draw out connections between individuals and
organizations which may have used or been known under different names at
different times.88 The program assists analysts in generating leads for further
investigation. It also offers users search capabilities over multiple databases using a
simple search query.89 In 2006, it was reported that ICEPIC’s search functionalities
did not access commercial databases.90 The primary source for data consists of
databases maintained by the Dept. of Homeland Security, but databases maintained
by the Department of State, the Department of Justice, and the Social Security
Administration are also available. One issue identified with the programme was that
there was no way to identify whether source data had been modified.91 This fact
could be particularly significant in light of the fact that NORA required local
replication and storage of data.92 If future tasks relied on data stored from previous
tasks, results might not reflect the most up-to-date information and data identified
as erroneous might persist in the system.
2.2.20. Intelligence and Information Fusion (I2F)
Agency:
Data Sources:
Access:
Functions:
Status:
Office of Intelligence and Analysis
Multiple DHS and commercial databases
Office of Intelligence and Analysis
Link Analysis, Entity Resolution, Geospatial and Temporal Analysis
Under development in 2006
The I2F programme was listed as under development in 2006. Its aim was to provide
an interface for viewing, searching and analyzing multiple data sources. It was
planned that the program would consist of commercially available “off-the-shelf”
software products rather than a specially designed system. The program potentially
envisioned the capability to derive “unpredicated patterns, relationships and rules”
from data sources. Data sources would include both commercial as well as
government databases.93
88
DHS Privacy Office. (6 July 2006). Data Mining Report: Report to Congress on the Impact of Data
Mining Technologies on Privacy and Civil Liberties. : Dept. of Homeland Security (DHS Privacy
Office Response to House Report 108-774), p. 24.
89
Ibid., p. 24.
90
Ibid., p. 25.
91
Ibid., p. 26.
92
Ibid., p. 25.
93
DHS Privacy Office. (6 July 2006). Data Mining Report: Report to Congress on the Impact of Data
Mining Technologies on Privacy and Civil Liberties. : Dept. of Homeland Security (DHS Privacy
Office Response to House Report 108-774), p. 26.
19
2.2.21. ProActive Intelligence (PAINT)
Agency:
Data Sources:
Access:
Functions:
Status:
Office of Intelligence and Analysis
Multiple DHS and commercial databases
Office of Intelligence and Analysis
Link Analysis, Entity Resolution, Geospatial and Temporal Analysis
Under development in 2006
According to the 2008 ODNI Report, this program was aimed at studying “the
dynamics of complex intelligence targets . . . by examining causal relationships that
are indicative of nefarious activity.”94
2.2.22. Knowledge Discovery and Dissemination
Agency:
Data Sources:
Access:
Functions:
Status:
Intelligence Advanced Research Projects Activity
Multiple undisclosed intelligence databases
Unspecified
Network Tomography, Predictive Analysis, Hypothesis Generation and
Validation
Under development in 2008
This project was part of the Incisive Analysis portfolio of IARPA. It sought to develop
tools for accessing and utilizing data in numerous databases which were maintained
by separate agencies and offices within the US intelligence community. According to
a report from the Office of the Director of National Intelligence, the project did not
initially perform data mining; however, there Office expressed some possibility that
the tools developed under the project might be used for data mining purposes at
some later date. These tools the Office characterized as “network tomography,
predictive analysis, and hypothesis generation and validation tools.”95 Network
tomography, according to the report, is being used to identify patterns of deceptive
behaviour.96 The term “network tomography” is often used in the context of
evaluating computer networks—in particular the internet.97 It is unclear whether
the term is used in this sense or whether the networks of interest in this context
refer to networks of persons.
2.2.23. Video Analysis and Content Extraction (VACE)
Agency:
Intelligence Advanced Research Projects Activity
Data Sources: Unspecified, testing on foreign public footage and NIST TRECVID
material
Access:
Unspecified
94
Office of the Director of National Intelligence (15.02.2008). Data Mining Report, p. 5.
Office of the Director of National Intelligence (15.02.2008). Data Mining Report, p. 3.
96
Ibid.
97
See, e.g., “Network Tomography,” Wikipedia, http://en.wikipedia.org/wiki/Network_tomography.
95
20
Functions:
Status:
Object & Event Detection, Video Mining
Under development in 2008
VACE is a project aimed at developing tools for the automated evaluation of video
materials for matter of intelligence significance. The primary function of the
software is to permit subject-based queries for searching databases of video
content. However, the ODNI identified two aspects of the project which might
involve some form of pattern-based data mining. One aspect involves computer
vision and machine learning functions such as “(a) object detection, tracking, event
detection and understanding, (b) scene classification, recognition, and modeling, (c)
intelligent content services such as indexing, video browsing, summarization,
content browsing, video mining, and change detection.”98 The other aspect is the
application of these techniques to pattern-based issues such as would be involved in
the automated evaluation of surveillance footage from CCTV systems and the
identification of specific events within video content such as news footage. 99
According to the ODNI Report, the project uses footage collected lawfully from
public places outside of the US as well as footage from the NIST TRECVID project.100
2.2.24. Rapid Knowledge Formulation
Agency:
DARPA
Data Sources: Unspecified, testing on foreign public footage and NIST TRECVID
material
Access:
Unspecified
Functions:
Search, Human Analytic Aid
Status:
Under development in 2001
The Rapid Knowledge Formulation project was aimed at developing methods for
conducting quick database searches, build massive “knowledge bases” within a
relatively short time frame, and “draw inferences for key information.”101 The
project also strove to enable users to construct formal theories without referring to
the use of formal logic. Some of the things which the program evidently sought to
address were the identification of terrorist sleepers and weapons of mass
destruction capabilities.102
2.2.25. Analysis, Dissemination, Visualization, Insight and Semantic
Enhancement (ADVISE)
Agency:
Department of Homeland Security
Data Sources: Unknown
98
Office of the Director of National Intelligence (15.02.2008). Data Mining Report, p. 4.
Ibid.
100
Ibid., p. 8.
101
Statement by Dr. Tony Tether, Defense Advanced Research Projects Agency, Subcommittee on
Military Research and Development Committee on Armed Services House of Representatives, 26 June
2001, p. 23.
102
Ibid.
99
21
Access:
Functions:
Status:
Intended for numerous DHS bodies
Link Analysis
Terminated
ADVISE was a DHS research project which aimed to mine data from multiple
databases and provide results in the form of visual analysis.103 Descriptions of the
project suggest that data mining technology would include link and relationship
analysis tools.104 The program also sought to provide suspicious activity alerts.105
One DHS official was quoted in 2004 as stated that the program would be able to
import one billion pieces of structured data per hour and one million pieces of
information from unstructured text per hour.106 The program was discontinued in
2007. The revelation that testing was conducted on real data and that results had
been used as input for at least one intelligence report may have played a role in this
decision in addition to criticism that required procedural steps had failed to have
been taken in association with the project.107 DHS officials, however, also cited the
program’s high maintenance cost as well as the availability of less expensive
commercial off-the-shelf products which could also perform the same or similar
tasks.108
2.2.26. Able Danger
Agency:
Data Sources:
Access:
Functions:
Status:
Department of the Army
Unknown
Army Land Information Warfare Agency
Link Analysis
Terminated
Able Danger was a project under the auspices of the Army’s Land Information
Warfare Agency carried out between 1999-2000. The project had reportedly been
requested by the Special Operations Command to assist in counter-terrorism
efforts.109 The Defense Dept. described the project as a test project to assess the
application of certain analytic methods and technology on large amounts of data.
The project reportedly used link analysis to uncover non-obvious relationships
between individuals and relied on data from both classified and public data sources
amounting to 2.5 terabytes.110 The data and results were reportedly destroyed after
103
DHS, O.I. G. (2007). ADVISE Could Support Intelligence Analysis More Effectively. OIG-07-56
(OIG-07-56). Retrieved October 08, 2009, p. 4.
104
DHS, O.I. G. (2007). ADVISE Could Support Intelligence Analysis More Effectively. OIG-07-56
(OIG-07-56). Retrieved October 08, 2009, p. 4.
105
DHS, O.I. G. (2007). ADVISE Could Support Intelligence Analysis More Effectively. OIG-07-56
(OIG-07-56). Retrieved October 08, 2009, p. 5.
106
Sniffen, M.J. (05.09.2007). DHS Ends Criticized Data-Mining Program. Washington Post.
107
See ibid.; see generally, DHS, O.I. G. (2007). ADVISE Could Support Intelligence Analysis More
Effectively. OIG-07-56 (OIG-07-56). Retrieved October 08, 2009.
108
Sniffen, M.J. (05.09.2007). DHS Ends Criticized Data-Mining Program. Washington Post.
109
Seifert, J. W. (03.04.2008). Data Mining and Homeland Security: An Overview. Congressional
Research Service. p. CRS-18.
110
Ibid.
22
conclusion of the project in accordance with US Army regulations since it included
data on US individuals.111
Collection & Warehousing Activities
2.2.27. Threat and Local Observation Notice (TALON)
Agency:
US Department of Defense
Data Entry: All branches of military112
Maintenance: Counterintelligence Field Activity/ US Northern Command
Access:
Defense Intelligence Agency, Joint Intelligence Task Force-Combating
Terrorism, Northern Command
Sharing:
Believed to be limited sharing with local law enforcement
Status: Officially terminated, although a system of reporting still exists
The Threat and Local Observation Notice Program was an operation initiated by the
US Department of Defense (DoD) in an effort to create a central database of
suspicious activity reports associated with DoD activities and installations. TALON
was initially developed as a report format for the Air Force Office of Special
Investigations in 2001.113 This practice was then adopted throughout the entire DoD
on May 2, 2003.114 The input for the reports was supplied by civilians, military
personnel, and law enforcement.115 It was widely acknowledged that the
information that went into TALON reports was “non-validated, may or may not be
related to an actual threat, and by its very nature may be fragmented and
incomplete.”116 According to the 2003 memorandum, it was envisioned that the
following categories of information would be collected: “(1) non-specific threats to
DoD interests; (2) suspected surveillance of DoD facilities and personnel; (3)
elicitation, attempts, suspicious questioning or other suspected intelligence
collection activities focused on DoD interests; (4) tests of security; (5) unusual
repetitive activity; (6) bomb threats; and (7) any other suspicious activity and
incidents reasonably believed to be related to terrorist activity directed against DoD
personnel, property, and activities within the United States.”117
The DoD’s Counterintelligence Field Activity (CIFA) unit incorporated TALON reports
onto a database known as Cornerstone.118 Full access was to be provided to the
Ibid., pp. CRS-18 – CRS-19.
Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local Observation Notice
(TALON) Report Program (Report No. 07-1 NTEL-09), p. 7.
113
Ibid., p. 1.
114
Ibid.
115
Ibid., pp. 25-26.
116
Deputy Secretary of Defense, Memorandum for Secretaries of the Military Departments et al.
(02.05.2003), reprinted in Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local
Observation Notice (TALON) Report Program (Report No. 07-1 NTEL-09), p. 30.
117
Ibid., p. 31.
118
Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local Observation Notice
(TALON) Report Program (Report No. 07-1 NTEL-09), pp. 1, 5.
111
112
23
Defense Intelligence Agency, Joint Intelligence Task Force-Combating Terrorism.119
Another branch of the Defense Department, the US Northern Command, also held
TALON reports in its Joint Protection Enterprise Network (JPEN).120
The TALON system came under increased scrutiny after news reports surfaced that
the database contained numerous reports on anti-war demonstrators and pacifist
organizations.121 The Office of the Inspector General of the Defense Department
was subsequently prompted by members of Congress to perform an audit of the
system.122 At the time of the audit in December 2005, there were about 13,000
reports in the Cornerstone database.123 The audit determined that initially only ITpersonnel were capable of deleting reports from Cornerstone.124 Thus, those
individuals who might be charged with evaluating the content of the reports and
ensuring compliance with relevant laws and regulations were unable to delete
reports, nor, evidently, were IT-personnel routinely instructed to delete any reports.
Between 2 December 2005 and 18 January 2006, however, CIFA began evaluating
the contents of the database and deleted 1,131 TALON reports which were
determined not to fall within the categories provided in the 2003 memorandum or
which did not meet DoD regulations on document retention.125 According to the
Inspector General’s report, these TALON entries “pertained to criminal activity such
as Be On the Look Out (BOLO) reports; resolved activity with no DoD threat or
foreign terrorist link, such as innocent photography by tourists or private citizens;
bomb threats; and other activity not related to potential international terrorists.”126
Examining the 1,131 reports that had been deleted, the Office of the Inspector
General determined that 263 of those related to protests and demonstrations. Of
those 263 reports, the Inspector General found that 157 identified some “action or
event that took place” of which 75 involved “criminal actions . . . that resulted in
arrests, required court appearances, violence, destruction, and required police
intervention.”127 The Inspector General took these numbers as an indication that
“creating TALON reports to inform local commanders of protests and
demonstrations planned for their vicinity appears to be justified”.128 Personal
information contained in reports concerning protests or demonstrations included
“names of individuals and organizations, phone numbers, addresses, e-mail
addresses and websites associated with the protestors.”129 It is unclear whether
TALON reports were shared with local law enforcement, but at least one report
suggests that they were used to alert local law enforcement of potential threats.130
119
Ibid., p. 1.
Ibid., p. 2.
121
See, e.g., Walter Pincus (2005, December 15). Pentagon Will Review Database on US Citizens.
Washington Post, A01.
122
Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local Observation Notice
(TALON) Report Program (Report No. 07-1 NTEL-09), p. i.
123
Ibid., p. 26.
124
Ibid., p. 5.
125
Ibid., p. 10.
126
Ibid.
127
Ibid.
128
Ibid.
129
Ibid., p. 25.
130
See Robert Block & Jay Solomon (2006, April 27). Pentagon Steps Up Intelligence Efforts Inside
120
24
As for TALON reports held in the Northern Command’s JPEN, the Inspector General
discovered that all TALON reports had been deleted from the JPEN in November
2005 and the maintenance of the entire system was terminated in June 2006.131
Thus, although the the Office of the Inspector General was able to determine that
the CFIA had failed to comply with Department of Defense retention regulations
which required that information pertaining to non-DoD US persons and
organizations be deleted within 90 days unless retention was required by law or
authorized by the Secretary of Defense, it was unable to determine if the Northern
Command had complied with respect to the TALON reports it maintained until
November 2005.132
Significant changes were introduced in 2006, probably due to the increased
attention that the system came under both from within and without the Department
of Defense. The Under Secretary of Defense for Intelligence issued a memorandum
on 2 February 2006 which shifted the function of the reporting system. The memo
indicated that TALON would no longer be considered primarily a “law enforcement”
database, but rather a “counterintelligence” database.133 This meant that different
DoD regulations would be implicated with respect to the handling of data concerning
US persons. On 30 March 2006, a memorandum from the Deputy Secretary of
Defense stipulated that TALON “should be used only to report information regarding
possible international terrorist activity”.134 By April 2006, changes had also been
made to the technical aspects of the Cornerstone system. As a result, a select group
of CIFA analysts was provided with the ability to edit US person information located
anywhere within any TALON report. Additionally, the system provided alerts on any
reports which required review within 90 days of entry and also implemented a
tracking mechanism for edits to US person information.135 The CIFA also introduced
a process of review before reports were entered into the Cornerstone database. As
a result, the CIFA began to reject a substantial number of newly incoming reports
that had been filed.136
On 21 August 2007, it was announced that the TALON system would be
discontinued. The DoD press release indicated that there were plans to introduce a
US Borders. Wall Street Journal, A1, A14, available at
http://www.umaryland.edu/healthsecurity/related/1%20Pentagon%20Steps%20Up%20Intelligence%20
Efforts%20Inside%20USpdf.
131
Ibid., p. 8.
132
Ibid., p. 5; see also DoD Directive 5200.27, Acquisition of Information Concerning Persons and
Organizations not Affiliated with the Department of Defense, 07.01.1980.
133
See, Under Secretary of Defense, Memorandum for Director, Counterintelligence Field Activity, 2
Feb. 2006, available at http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB230/11.pdf; see also Dept.
of Defense, Inspector General. (19.06.2007). The Threat and Local Observation Notice (TALON)
Report Program (Report No. 07-1 NTEL-09, p. 9.
134
Deputy Secretary of Defense, Memorandum for Secretaries of the Military Departments et al., 30
Mar. 2006, reprinted in Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local
Observation Notice (TALON) Report Program (Report No. 07-1 NTEL-09, p. 32.
135
Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local Observation Notice
(TALON) Report Program (Report No. 07-1 NTEL-09, p. 9.
136
Dept. of Defense, Inspector General. (19.06.2007). The Threat and Local Observation Notice
(TALON) Report Program (Report No. 07-1 NTEL-09, p. 9; and in particular n. 8.
25
better system for threat reporting and that existing TALON reports would be sent to
the FBI for incorporation in its Guardian database.137 In news reports, it was
suggested that TALON was being shutting down because “‘the analytical value had
declined’” rather than due to public complaints.138
2.2.28. TIDE (Datamart)
Agency:
Data Entry:
Department of Homeland Security
Department of Homeland Security, National Counterterrorism Center,
although entries may be suggested by “federal agencies”139
Maintenance: Department of Homeland Security, National Counterterrorism Center
Access:
Unknown
Sharing:
Some entries shared with FBI for addition to no-fly lists
Status: In operation
TIDE represents a central database containing the names of individuals who have
been connected with terrorist activity. The database, however, does not include
“purely domestic terrorism information.”140 The database is maintained by an office
known as the Terrorist Identities Group under the auspices of the National
Counterterrorism Center (DHS). A subset of the data is submitted to the FBI to be
added to the national watchlists such as the no-fly list.141 Among the activities that
have been identified as triggering inclusion in the database are: committing
international terrorist activity; preparing or planning international terrorist activity;
gathering information on potential targets for international terrorist activity;
soliciting funds or other things of value for international terrorist activity or for a
terrorist organization; soliciting membership in an international terrorist
organization; providing material support to international terrorists or to advance
international terrorist activity; being a member or representative of an international
terrorist organization.142 In January, 2009, the database contained approximately
564,000 entries which corresponded to about 500,000 individuals. US persons
(including legal permanent residents) were believed to make up about 5% of the
database at that time.143
2.2.29. FBI Intelligence Community Data Marts
137
Department of Defense.( 21.08.2007). DoD to Implement Interim Threat Reporting Procedures.
Retrieved November 18, 2009, from
http://www.defenselink.mil/releases/release.aspx?releaseid=11251, also available at
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB230/18.pdf.
138
Associated Press (2007, Aug. 21). Pentagon to shut down controversial database. MSNBC,
http://www.msnbc.msn.com/id/20375361/.
139
National Counterterrorism Center. (2009). Terrorist Identities Datamart Environment (TIDE).
Retrieved September 03, 2009, from http://www.nctc.gov/docs/Tide_Fact_Sheet.pdf.
140
Ibid.
141
Ibid.
142
Ibid.
143
Ibid.
26
Agency:
Federal Bureau of Investigation
Data Entry: Unspecified
Maintenance: Federal Bureau of Investigation
Access:
Federal Bureau of Investigation analysts & other members of
intelligence community
Sharing:
Unspecified intelligence agencies
Status: Under development
These data marts were planned as a means to isolate certain portions of FBI
databases for sharing with other intelligence agencies.144
2.2.30. Investigative Data Warehouse (IDW)
Agency:
Federal Bureau of Investigation
Data Entry: Various
Maintenance: Federal Bureau of Investigation & Private Contractors
Access:
Federal Bureau of Investigation analysts & contractors (different levels
of access for different personnel)
Sharing:
Unknown
Status: In operation
The Investigative Data Warehouse represents a platform that provides access to
numerous databases through a single interface—essentially a virtual repository.145
The platform incorporates search and analysis tools. In 2003, one goal of the
development of the IDW was to enable mining of the data within the various data
sources to which the platform had access.146 In 2005, the Chief Information Officer
of the FBI indicated that the system was able to read data from “more than 47
sources of counterterrorism data, including information from FBI files, other
government agency data, and open source news feeds, that were previously
available only through separate, stove-piped systems.”147 Among the data sources
that were available to the system in 2004, according to the Electronic Frontier
Foundation, were the FBI’s digital case management system—the Automated Case
System (ACS)—copies of certain messages and documents circulated between the
FBI and various other federal agencies, a database of individuals the FBI associated
with violent gang or terrorist activity which included biographical information and
photos, structured data derived from a set of online newspapers from around the
world, the names of individuals on the TSA’s “selectee” and no-fly lists, names,
aliases, and biographical information associated with individuals on the FBI’s
144
Ibid., p. 48.
Chiliad. (2006). Chiliad Success Story: Federal Bureau of Investigation. Retrieved November 23,
2009, from http://www.chiliad.com/docs/ChiliadCaseStudy_FBI.pdf, p. 2.
146
Federal Bureau of Investigation. (26.03.2004). Description of the IDW Project., available at
http://www.eff.org/files/filenode/foia_idw/20080408_idw01-Project-Description.pdf.
147
Zalmai Azmi (2005, January 26). Re: DRAFT AUDIT REPORT -THE FEDERAL BUREAU OF
INVESTIGATION'S MANAGEMENT OF THE TRILOGY INFORMATION TECHNOLOGY
MODERNIZATION PROJECT (Letter), reprinted in: Office of the Inspector General, Audit Report
No. 05-07, Appendix 7.
145
27
Terrorist Screening Database, databases of the names of individuals who were the
subject of an FBI investigation as well as those individuals referred to in an FBI case
file, several databases containing scanned documents from FBI terrorist files, files
related to terrorist financing including the Financial Crimes Enforcement Network
(FinCen) Databases, and databases containing biographical data supplied by foreign
financial institutions on individuals suspected of having connections with terrorist
financing, the State Department’s list of lost and stolen passports as well as
documents from passport fraud investigations.148
With regard to the analytic features of the system, a 2007 report indicated that the
IDW made use of commercial off-the-shelf products as well as open source
applications and scripting languages.149 The reference to scripting languages
suggests that in-house IT specialists may be able to introduce custom features on an
ad hoc basis.150 Initial plans for IDW used images from i2’s Analyst Notebook to
illustrate the analytic tools that IDW would incorporate,151 suggesting that Analyst
Notebook might be one off-the-shelf product that is being used to provide data
mining functions for the IDW. Reports also indicate that IDW includes automatic
notifications to alert interested parties when new information of relevance to their
case needs becomes available.152 Flexible search functions were designed to
alleviate issues arising from misspellings, alternative spellings, and various
nomenclatures for rendering dates.153 The FBI cited remarkable reductions in
processing time resulting from the implementation of the system. One official for
instance suggested that the time to complete certain tasks had been reduced from
32,000 hours to ½ hour.154
2.3. European Developments
2.3.1. Creation of European Terrorist Profiles
On 18 November 2002, the Article 36 Committee of the European Union submitted a
draft Council Decision which would establish terrorist profiles to be used in European
148
Electronic Frontier Foundation (April 2009). Report on the Investigative Data Warehouse,
http://www.eff.org/issues/foia/investigative-data-warehouse-report; see also Federal Bureau of
Investigation (22.04.2004). Investigative Data Warehouse Integration System (IDW-I) System Security
Plan, Version 0.6, available at https://www.eff.org/files/filenode/foia_idw/20080508_idw01.pdf.
149
Office of the Inspector General. (August 2007). Audit of the Department of Justice Information
Technology Studies, Plans, and Evaluations (Audit Report 07-39), Appendix 6, available at
http://www.justice.gov/oig/reports/plus/a0739/app6.htm.
150
Scripting languages represent computer code which runs on top of another application. Java, for
instance, is a common scripting language that can be used to execute commands within a browser
environment such as Microsoft’s Internet Explorer or Mozilla’s Firefox.
151
See Federal Bureau of Investigation (14.04.2004). The FBI’s Counterterrorism Program Since
September 2001, available at http://www.fbi.gov/publications/commission/9-11commissionrep.pdf,
pp.55-56.
152
Ibid., p. 54; Chiliad. (2006). Chiliad Success Story: Federal Bureau of Investigation. Retrieved
November 23, 2009, from http://www.chiliad.com/docs/ChiliadCaseStudy_FBI.pdf, p. 3.
153
Chiliad. (2006). Chiliad Success Story: Federal Bureau of Investigation. Retrieved November 23,
2009, from http://www.chiliad.com/docs/ChiliadCaseStudy_FBI.pdf, p. 3
154
Ibid.
28
counter-terrorism efforts. The document foresaw that the Member States would
exchange information among themselves and with Europol and cooperate to
develop profiles.155 The Committee defined the creation of terrorist profiles as
involving “putting together a set of physical, psychological or behavioural variables,
which have been identified, as typical of persons involved in terrorist activities and
which may have some predictive value in that respect.”156 It also listed suggested
variables which Europol and the Member States might consider including in the
terrorist profiles. Those variables were:
 nationality
 travel document
 method and means of travel
 age
 sex
 physical distinguishing features (e.g. battle scars)
 education
 choice of cover identity
 use of techniques to prevent discovery or counter questioning
 places of stay
 methods of communication
 place of birth
 psycho-sociological features
 family situation
 expertise in advanced technologies
 skills at using non-conventional weapons (CBRN)
 attendance at training courses in paramilitary, flying and other specialist
techniques157
The profiles would not be set in stone but rather be subject to change whenever
terrorists changed their operational methods.158
This proposal came under criticism from the European Parliament’s Committee on
Civil Liberties, Justice and Home Affairs.159 In 2008, the Committee issued a draft
report on profiling which included a number of recommendations for the Council,
including that “the collection of data and use of profiling techniques in respect of
persons not suspected of a specific crime or threat must be subject to a particularly
strict “necessity” and “proportionality” test” and that “reliance by private or public
bodies on computers to take decisions on individuals without human assessment
should only be allowed exceptionally under strict safeguards”.160
Article 36 Committee, “I/A Item Note” to COREPR/ Council, 11858/3/02 REV 3 (Annex),
18.11.2002, p. 3.
156
Ibid., p. 5.
157
Ibid., p. 7.
158
Ibid., p. 6.
159
See, e.g., Sarah Ludford, WRITTEN QUESTION P-3694/03 reprinted in: DRAFT REPLY TO
WRITTEN QUESTION P-3694/03 put by Sarah LUDFORD on 5 December 2003, 7846/04, p. 2.
160
European Parliament, Committee on Civil Liberties, Justice and Home Affairs, DRAFT REPORT
with a proposal for a European Parliament recommendation to the Council on the problem of profiling,
notably on the basis of ethnicity and race, in counterterrorism, law enforcement, immigration, customs
and border control, 2008/2020(INI), 12.02.2008, p. 10.
155
29
2.3.2. European Passenger Name Records System
The European Council has expressed interest in developing a European passenger
name records (PNR) system for law enforcement purposes and is working toward
drafting a Framework Decision on the matter.161 In describing the utility of such
systems, the language of the Council is reminiscent of reports on data mining
programmes in the US. They state that PNR data, “gives access to specific
information about offenders' behaviour, such as the itineraries for and frequency of
their journeys, the circumstances in which their plane tickets are bought (travel
agency, means of payment, credit card details, group purchases, etc.) and other
matters connected with the trip (hotel reservation, car hire etc). It makes it possible
to detect offences because of suspicious behaviour, to find those suspected of
crimes, to reveal links between a person and a known criminal, or links between a
person and a particular criminal case.”162 There has been resistance, however, to
the idea of having a centralized system,163 and there is thus some likelihood that an
EU PNR system would be distributed. Additionally, the Council has acknowledged
the need to provide independent oversight and implement auditing capabilities.164
Issues concerning the appropriateness of the inclusion of sensitive data, the proper
period of retention of PNR data, and the scope of exchange of PNR data have also
been raised.165
2.3.3. European Security Research
The Seventh Framework Programme is primarily concerned with the development of
security technologies. Of the current FP7 projects, only one explicitly mentions data
mining in its project description. The ODYSSEY project aims to develop systems to
analyse ballistics data and provide alerts to assist law enforcement in addressing
organized crime.166 The project will reportedly not make use of any personal data,
but does contemplate the demonstration of “how migration to other data sources
can take place.”167 Additionally, three of the current FP7 Security programmes are
concerned with detecting “abnormal” or threatening behaviour: INDECT,168
161
See European Council, Proposal for a Council Framework Decision on the use of Passenger Name
Records (PNR) for law enforcement purposes - Report on thematic work carried out from July to
November 2008, 15319/0, 28.11.2008.
162
Ibid., p. 7.
163
Ibid., p. 9.
164
See ibid., pp. 15-16.
165
See ibid., p. 17.
166
See European Commission, Towards a more secure society and increased industrial
competitiveness, available at ftp://ftp.cordis.europa.eu/pub/fp7/security/docs/towards-a-moresecure_en.pdf, p. 62.
167
Strategic pan-European ballistics intelligence platform for combating organised crime and terrorism
(ODYSSEY),
http://cordis.europa.eu/fetch?CALLER=FP7_PROJ_EN&ACTION=D&DOC=12&CAT=PROJ&QUE
RY=01257560c1da:b844:4f90acbf&RCN=89324.
168
indect Homepage, http://www.indect-project.eu/.
30
SAMURAI,169 and ADABTS.170 As seen in several US-based programmes, this kind of
event detection may rely on data mining algorithms.
2.4. Germany
2.4.1. Terrorist Rasterfahndung
Agency:
Data Sources:
Access:
Functions:
Status:
Federal Criminal Police Office (Bundeskriminalamt)
Various public and private databases
Unknown
Search
Terminated
The system of methods known as the Rasterfahndung was reportedly first used in
connection with investigations concerning the Rote Armee Faktion in the 1970s.171
The method applied in that instance consisted of determining a set of characteristics
which were believed to match the persons sought. These characteristics were then
applied to search through public or private databases to filter out all individuals
except those who fulfilled the set of characteristics.172 The original implementation
ultimately revealed only one RAF conspirator, who was taken into custody as a
result, as well as another individual who was reportedly engaged in drug-dealing.173
Both Germany and Austria passed national laws which enabled the use of data
processing methods on personal data for criminal law enforcement purposes.174 The
law in Germany limited the use to law enforcement efforts targeting illegal drug
trade and organised crime.175 Reportedly, however, more far-reaching enabling laws
and regulations were introduced at the local level of the German Länder.176
Following the September 11 attacks, the Bundeskriminalamt organized a nation-wide
implementation of a Rasterfahndung which sought to turn up the names of males
between the ages of 18 and 40 who were from certain Islamic states and were either
169
Suspicious and abnormal behaviour monitoring using a network of cameras & sensors for situation
awareness enhancement,
http://cordis.europa.eu/fetch?CALLER=FP7_SECURITY_PROJ_EN&ACTION=D&DOC=29&CAT=
PROJ&QUERY=012572cd757e:70ce:7aa94bb4&RCN=89343.
170
Automatic Detection of Abnormal Behaviour and Threats in crowded Spaces,
http://cordis.europa.eu/fetch?CALLER=FP7_SECURITY_PROJ_EN&ACTION=D&DOC=3&CAT=
PROJ&QUERY=012572cd757e:70ce:7aa94bb4&RCN=91158.
171
1 BvR 518/02, para. 3.
172
See, e.g., (2007.18.09). Rasterfahndung: nur bedingt effektiv. heise online,
http://www.heise.de/newsticker/Rasterfahndung-Nur-bedingt-effektiv--/meldung/96183.
173
“Rasterfahndung”, Wikipedia, http://de.wikipedia.org/wiki/Rasterfahndung (citing Die Position der
RAF hat sich verbessert, Der Spiegel 37/1986 (08.09.1986), pp. 38-61; see also Kett-Straub, G.
Rasterfahndung fällt durch das Raster des Grundgesetzes, ZIS 9/2006, p. 2, available at
http://www.zis-online.com/dat/artikel/2006_9_69.pdf.
174
1 BvR 518/02, para. 4, “Rasterfahndung”, Wikipedia, http://de.wikipedia.org/wiki/Rasterfahndung.
175
1 BvR 518/02, para. 4.
176
Ibid., para. 6.
31
current or former students. The aim was to uncover “sleepers” who were somehow
involved in terrorist activity or planning.177 The data processing was carried out by
the local police agencies with the results offered up to the federal
Bundeskriminalamt.178 Ultimately, upwards of around 300,000 individuals were
singled out,179 although reportedly the action did not result in any prosecutions of
terrorists.
This use of a Rasterfahndung became the subject of a controversy before the
German Constitutional Court. The decision of the Court, rendered in 2006, found
that the implementation of the Rasterfahndung violated the subjects’ rights to
informational self-determination180—a relatively novel concept which has been
derived as an implicit right stemming from other explicit basic rights provided in the
German Constitution (Grundgesetz). The Court held that such an action could only
be justified in the face of a tangible danger to high-ranking legal interests. A general
sense of a heightened threat level in the wake of 9/11 was insufficient to justify the
use of the methods.181
2.4.2. Case of Andrej Holm
Agency:
Bundeskriminalamt
Data Sources:World Wide Web
Access:
Unknown
Functions:
Search
Status:
Ended
According to news reports, the Bundeskriminalamt conducted ordinary web searches
in an investigation concerning a group known as the “militante gruppe” (“militant
group”) and was lead to link the urban sociologist Andrej Holm to the group.182
Allegedly, a search for selected key words such as “Gentrification” and
“Prekarisierung”183 turned up links to the writings of Prof. Holm.184 One news
correspondent suggested that the similarity in the use of words in writings by
members of the militante gruppe and Prof. Holm was thus the basis of initial
suspicion.185 This suspicion then allegedly led to nearly a year-long period of
177
Ibid., para. 7.
Ibid., para. 9.
179
Ibid.
180
Ibid., para. 66.
181
Ibid., paras. 160 et seq.
182
(22.08.2007). Kommissar Google jagt Terroristen, Tageszeitung,
http://www.taz.de/index.php?id=start&art=3471&id=deutschland-artikel&cHash=5218eee73a.
183
Describes the process through which the number of secure, quality, and legal jobs are pushed out by
less secure and even illegal work. “Prekarisierung”, Wikipedia,
http://de.wikipedia.org/wiki/Prekarisierung.
184
(22.08.2007). Kommissar Google jagt Terroristen, Tageszeitung,
http://www.taz.de/index.php?id=start&art=3471&id=deutschland-artikel&cHash=5218eee73a.
185
Robert Siegel (21.08.2007). Professor's Research Results in Terrorism Charges, NPR All Things
Considered, 2007 WLNR 16296717.
178
32
surveillance.186 Within this period, Holm was observed meeting with at least one
member of the militante gruppe on more than one occasion,187 and suspicion grew
when it was observed that Holm did not bring his mobile phone with him to one of
these meetings—a sign the authorities took to mean that he was attempting to
avoid detection.188 Holm was subsequently arrested but the arrest order was
ultimately lifted by the Bundesgerichtshof, Germany’s highest court, since there was
insufficient evidence to suggest that Holm was a member of the group.189
3. Programmes of Potential Future Interest
The following programmes may warrant inclusion in future drafts of this survey:
3.1. REVEAL (US)
3.2. SCION (US)
3.3. National Security Branch Analysis Center (US)
3.4. Guardian (US)
3.5. Eurodac (EU)
3.6. Schengen Information System II (EU)
3.7. Europol Information System (EU)
3.8. Visa Information System (EU)
3.9. EDVIGE/ EDVIPR (FR)
3.10.
CHRISTINA (FR)
3.11.
Project Rich Picture (UK)
3.12.
National Public Order Intelligence Unit Database (UK)
186
(22.08.2007). Kommissar Google jagt Terroristen, Tageszeitung,
http://www.taz.de/index.php?id=start&art=3471&id=deutschland-artikel&cHash=5218eee73a.
187
Compare (22.08.2007). Kommissar Google jagt Terroristen, Tageszeitung,
http://www.taz.de/index.php?id=start&art=3471&id=deutschland-artikel&cHash=5218eee73a and
Robert Siegel (21.08.2007). Professor's Research Results in Terrorism Charges, NPR All Things
Considered, 2007 WLNR 16296717.
188
Robert Siegel (21.08.2007). Professor's Research Results in Terrorism Charges, NPR All Things
Considered, 2007 WLNR 16296717.
189
See (24.10.2007). Haftbefehl gegen Berliner Soziologen aufgehoben, 154/2007 (Press Release),
available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh&Art=pm&Datum=2007&Sort=3&nr=41477&pos=0&a
nz=154.
33