06:13 PM
Connect Directly

Counterterrorist Data Mining Needs Privacy Protection

A National Research Council report represents an attempt to address privacy concerns that have dogged past counterterrorist data mining programs like Total Information Awareness.

In a sweeping new report that examines the balance between security and privacy, The National Research Council (NRC) recommends that the U.S. government rethink its approach to counterterrorism in light of the privacy risks posed by unchecked data mining and behavioral surveillance.

The NRC report, "Protecting Individual Privacy In The Struggle Against Terrorists," is the culmination of three years of discussions and research aimed at providing the government with a framework for thinking about existing and future information-based counterterrorism programs. Former U.S. Secretary of Defense William Perry co-chaired the study committee.

The proposed framework represents an attempt to address privacy concerns that have dogged past counterterrorist data mining programs like Total Information Awareness.

The report acknowledges the utility of a variety of technologies in the context of security, but cautions that counterterrorism programs need to be operated lawfully, with oversight, and with some recognition of the limits of technology.

Automated terrorist identification, the report says, "is neither feasible as an objective nor desirable as a goal of technology development efforts."

"To address [the threat of terrorism], new technologies have been created and are creating dramatic new ways to observe and identify people, keep track of their location, and perhaps even deduce things about their thoughts and behaviors," the report says. "The task for policy makers now is to determine who should have access to these new data and capabilities and for what purposes they should be used. These new technologies, coupled with the unprecedented nature of the threat, are likely to bring great pressure to apply these technologies and measures, some of which might intrude on the fundamental rights of U.S. citizens."

Privacy is one such fundamental right, and the report finds that current government policy doesn’t respect that right sufficiently.

"The current policy regime does not adequately address violations of privacy that arise from information-based programs using advanced analytical techniques, such as state-of-the-art data mining and record linkage," the report states.

Data mining techniques may have proven value in a commercial context, but the report warns that identifying terrorists this way is less reliable and prone to error.

"One might argue that the consequences of a false negative (a terrorist plan is not detected and many people die) are in some sense much larger than the consequences of a false positive (an innocent person loses privacy or is detained)," the report says. "For this reason, many decision makers assert that it is better to be safe than sorry. But this argument is fallacious. There is no reason to expect that false negatives and false positives trade off against one another in a one-for-one manner."

The report recommends that the government be particularly careful when using behavioral surveillance to predict dangerous intent. There's no scientific consensus about whether such technology -- brain scanning, for example -- actually works, says the report.

"[P]lacing people under suspicion because of their associations and intellectual explorations is a step toward abhorrent government behavior, such as guilt by association and thought crime," the report says. "This does not mean that government authorities should be categorically proscribed from examining indicators of intent under all circumstances -- only that special precautions should be taken when such examination is deemed necessary."

The report presents two major recommendations. It argues that the U.S. government should follow a framework, such as the one proposed in the report, to evaluate the effectiveness, lawfulness, and consistency with U.S. values of every information-based program for counterterrorism. And it calls for a periodic review of laws and policies related to privacy in light of changing technologies and circumstances.

The NRC plans to discuss its findings in a one-hour public briefing at 12:30 p.m. EDT today at the National Academy of Sciences in Washington, D.C. A live audio Webcast should be available at the National Academies site.

InformationWeek has produced an independent security analysis that relates to this topic. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.