Risk
10/3/2008
06:13 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Counterterrorist Data Mining Needs Privacy Protection

A National Research Council report represents an attempt to address privacy concerns that have dogged past counterterrorist data mining programs like Total Information Awareness.

In a sweeping new report that examines the balance between security and privacy, The National Research Council (NRC) recommends that the U.S. government rethink its approach to counterterrorism in light of the privacy risks posed by unchecked data mining and behavioral surveillance.

The NRC report, "Protecting Individual Privacy In The Struggle Against Terrorists," is the culmination of three years of discussions and research aimed at providing the government with a framework for thinking about existing and future information-based counterterrorism programs. Former U.S. Secretary of Defense William Perry co-chaired the study committee.

The proposed framework represents an attempt to address privacy concerns that have dogged past counterterrorist data mining programs like Total Information Awareness.

The report acknowledges the utility of a variety of technologies in the context of security, but cautions that counterterrorism programs need to be operated lawfully, with oversight, and with some recognition of the limits of technology.

Automated terrorist identification, the report says, "is neither feasible as an objective nor desirable as a goal of technology development efforts."

"To address [the threat of terrorism], new technologies have been created and are creating dramatic new ways to observe and identify people, keep track of their location, and perhaps even deduce things about their thoughts and behaviors," the report says. "The task for policy makers now is to determine who should have access to these new data and capabilities and for what purposes they should be used. These new technologies, coupled with the unprecedented nature of the threat, are likely to bring great pressure to apply these technologies and measures, some of which might intrude on the fundamental rights of U.S. citizens."

Privacy is one such fundamental right, and the report finds that current government policy doesn’t respect that right sufficiently.

"The current policy regime does not adequately address violations of privacy that arise from information-based programs using advanced analytical techniques, such as state-of-the-art data mining and record linkage," the report states.

Data mining techniques may have proven value in a commercial context, but the report warns that identifying terrorists this way is less reliable and prone to error.

"One might argue that the consequences of a false negative (a terrorist plan is not detected and many people die) are in some sense much larger than the consequences of a false positive (an innocent person loses privacy or is detained)," the report says. "For this reason, many decision makers assert that it is better to be safe than sorry. But this argument is fallacious. There is no reason to expect that false negatives and false positives trade off against one another in a one-for-one manner."

The report recommends that the government be particularly careful when using behavioral surveillance to predict dangerous intent. There's no scientific consensus about whether such technology -- brain scanning, for example -- actually works, says the report.

"[P]lacing people under suspicion because of their associations and intellectual explorations is a step toward abhorrent government behavior, such as guilt by association and thought crime," the report says. "This does not mean that government authorities should be categorically proscribed from examining indicators of intent under all circumstances -- only that special precautions should be taken when such examination is deemed necessary."

The report presents two major recommendations. It argues that the U.S. government should follow a framework, such as the one proposed in the report, to evaluate the effectiveness, lawfulness, and consistency with U.S. values of every information-based program for counterterrorism. And it calls for a periodic review of laws and policies related to privacy in light of changing technologies and circumstances.

The NRC plans to discuss its findings in a one-hour public briefing at 12:30 p.m. EDT today at the National Academy of Sciences in Washington, D.C. A live audio Webcast should be available at the National Academies site.

InformationWeek has produced an independent security analysis that relates to this topic. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio