Monday, September 27, 2010

PRIVACY AND FREEDOM - ALAN WESTIN

TIA INFORMATION AWARENESS
PRIVACY AND FREEDOM ALAN WESTON

[Ed Note: The limits of freedom is inversely related to privacy. The computerization of medical records is the last step in total Information Awareness TIC that the central committee has been seeking for a long time. The Wikipedia is about to close and delete this web site data for obvious reasons as people are not being told about TIA. Copy this data to your WORD and save in a backup file. It will prove useful in the future the data is about to be suppressed and censored in interests of "national security" Arden Gifford MD]


http://www.privacilla.org/fundamentals/privacyandfreedom.html

http://en.wikipedia.org/wiki/Information_Awareness_Office

Privacilla.Org


Privacy and Freedom, by Alan Westin,

Considering the influence of 1967's Privacy and Freedom and its author Alan Westin even today, one picks up this book with high expectations. The book is not disappointing, but it is quite different from what the reader expects.

Privacy and Freedom does not elucidate a general theory of privacy as implied by the sweeping title. Rather, it is a window onto the privacy concerns of an important past era. Developments since the book was written make some of its sections quaint, while other sections have had influence well beyond what Westin apparently anticipated, given the time and attention he gave them.

As to a general theory, Westin opens the book as follows: "Few values so fundamental to society have been left so undefined in social theory or have been the subject of such vague and confused writing by social scientists." Amen, brother.

Westin briefly states a theory on that same opening page. It is perhaps the best theory of privacy yet put into print: "Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others."

The first chapter follows these delights with as good an opening discussion as a privacy book could have: a review of privacy from a sociological perspective. It includes discussions of information-sharing and -protecting behaviors among non-Western people who live very differently from modern Americans and Europeans. The chapter shows that Westin "gets" privacy - inductively, at least.

Subsequent chapters begin to wander from this solid privacy vision, however, to a greater and greater extent. While rightly emphasizing the importance of privacy to modern democracy, Westin imports the odd concept of "organizational privacy," for example. This is a misdescription of anonymity for individuals participating in some organizations.

A series of chapters deal with surveillance technology and "psychological surveillance" through personality testing. Personality testing may or may not be a privacy issue and, in contemporary times, these chapters may seem paranoid. The reader must actively recall that the book was written on the heels of the McCarthy era. Threats loomed of both Soviet and U.S. government infiltration of civil society, and social unrest was beginning to bubble among the nation's youth.

Remarkably (again, in retrospect) short shrift is given to "data surveillance" - monitoring of information collected in databases - compared to traditional surveillance devices like spike mics, phone taps, and parabolic microphones. The latter devices all exist today, but their threat to privacy is not substantial, society-wide - a caution to those who believe they can predict the direction of technology, society, and privacy threats.

Rather long and slightly tedious studies dominate the center of the book, but an exceedingly brief section on "The Computer and Privacy" lays out important early thinking on what came to be "Fair Information Practices" so vaunted by advocates of regulation and European bureaucrats.

In his discussion of database issues, it is very notable that Westin had in mind just one or a small number of mainframe computers: If his fair information rules were violated, "the strongest sanction of all would be to exclude any person or agency from 'the' information system . . ." (quotation added). Later, Westin imagines, "[W]ill the organs of criticism get their own computers and try to monitor selectively the operations of the big public and private systems?" Hello, Jobs and Wozniak. Hello, Internet.

Westin's final chapters do a creditable job of outlining the constitutional and common law responses to privacy threats from government and private surveillance respectively. The final chapter, "Restoring the Balance or Privacy in America," is an interesting discussion, but it carries no revelations and has not been influential to the present day.

Privacy and Freeedom has made an important contribution to debates on privacy over the last twenty-five years. It is more a product of its times than one would expect for a book so influential. Though it has some tidbits of badly needed insight, the full exposition on privacy and freedom implied by this book's bold title remains to be written.

Links:

Comments? comments@privacilla.org (Subject: Privacy and Freedom)

[updated 11/24/04]


©2000-2004 Privacilla.org. All content subject to the Privacilla Public License.


http://en.wikipedia.org/wiki/Information_Awareness_Office

[close]
Information Awareness Office
From Wikipedia, the free encyclopedia
Jump to: navigation, search
This miscellaneous page is being considered for deletion in accordance with Wikipedia's deletion policy. This nomination is part of a discussion of several related miscellaneous pages.

Please discuss the matter at this page's entry on the Miscellany for Deletion page.

Information Awareness Office seal

The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social network analysis, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.[1] This information would then be analyzed to look for suspicious activities, connections between individuals, and "threats".[2] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[2]

Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names.[3][4][5]
Contents
[hide]

* 1 History
* 2 IAO research
o 2.1 Human Identification at a Distance (HumanID)
o 2.2 Evidence Extraction and Link Discovery
o 2.3 Genisys
o 2.4 Scalable Social Network Analysis
o 2.5 Futures Markets Applied to Prediction (FutureMAP)
o 2.6 TIDES
o 2.7 Genoa / Genoa II
o 2.8 Wargaming the Asymmetric Environment (WAE)
o 2.9 Effective Affordable Reusable Speech-to-text (EARS)
o 2.10 Babylon
o 2.11 Bio-Surveillance
o 2.12 Communicator
* 3 Components of TIA projects that continue to be developed
* 4 Media coverage and criticism
* 5 See also
* 6 References
* 7 Further reading
* 8 External links
o 8.1 Media coverage
o 8.2 Academic articles
o 8.3 Critical views
o 8.4 Proponent views

[edit] History
Diagram of Total Information Awareness system, taken from official (decommissioned) Information Awareness Office website (click to enlarge)

The IAO was established after Admiral John Poindexter, former United States National Security Advisor to President Ronald Reagan and SAIC executive Brian Hicks approached the US Department of Defense with the idea for an information awareness program after the attacks of September 11, 2001.[4]

Poindexter and Hicks had previously worked together on intelligence-technology programs for the Defense Advanced Research Projects Agency. DARPA agreed to host the program and appointed Poindexter to run it in 2002

The IAO began funding research and development of the Total Information Awareness (TIA) Program in February 2003 but renamed the program the Terrorism Information Awareness Program in May that year after an adverse media reaction to the program's implications for public surveillance. Although TIA was only one of several IAO projects, many critics and news reports conflated TIA with other related research projects of the IAO, with the result that TIA came in popular usage to stand for an entire subset of IAO programs.

The TIA program itself was the "systems-level" program of the IAO that intended to integrate information technologies into a prototype system to provide tools to better detect, classify, and identify potential foreign terrorists with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. As a systems-level program of programs, TIA's goal was the creation of a "counterterrorism information architecture" that integrated technologies from other IAO programs (and elsewhere, as appropriate). The TIA program was researching, developing, and integrating technologies to virtually aggregate data, to follow subject-oriented link analysis, to develop descriptive and predictive models through data mining or human hypothesis, and to apply such models to additional datasets to identify terrorists and terrorist groups.

Among the other IAO programs that were intended to provide TIA with component data aggregation and automated analysis technologies were the Genisys, Genisys Privacy Protection, Evidence Extraction and Link Discovery, and Scalable Social Network Analysis programs.

On August 2, 2002, Dr. Poindexter gave a speech at DARPAtech 2002 entitled "Overview of the Information Awareness Office"[6] in which he described the TIA program.

In addition to the program itself, the involvement of Poindexter as director of the IAO also raised concerns among some, since he had been earlier convicted of lying to Congress and altering and destroying documents pertaining to the Iran-Contra Affair, although those convictions were later overturned on the grounds that the testimony used against him was protected.

On January 16, 2003, Senator Russ Feingold introduced legislation to suspend the activity of the IAO and the Total Information Awareness program pending a Congressional review of privacy issues involved.[7] A similar measure introduced by Senator Ron Wyden would have prohibited the IAO from operating within the United States unless specifically authorized to do so by Congress, and would have shut the IAO down entirely 60 days after passage unless either the Pentagon prepared a report to Congress assessing the impact of IAO activities on individual privacy and civil liberties or the President certified the program's research as vital to national security interests. In February 2003, Congress passed legislation suspending activities of the IAO pending a Congressional report of the office's activities (Consolidated Appropriations Resolution, 2003, No.108–7, Division M, §111(b) [signed Feb. 20, 2003]).

In response to this legislation, DARPA provided Congress on May 20, 2003 with a report on its activities.[8] In this report, IAO changed the name of the program to the Terrorism Information Awareness Program and emphasized that the program was not designed to compile dossiers on US citizens, but rather to research and develop the tools that would allow authorized agencies to gather information on terrorist networks. Despite the name change and these assurances, the critics continued to see the system as prone to potential misuse or abuse.

As a result House and Senate negotiators moved to prohibit further funding for the TIA program by adding provisions to the Department of Defense Appropriations Act, 2004[9] (signed into law by President Bush on October 1, 2003). Further, the Joint Explanatory Statement included in the conference committee report specifically directed that the IAO as program manager for TIA be terminated immediately.[10]
[edit] IAO research

IAO research was conducted along five major investigative paths: secure collaboration problem solving; structured discovery; link and group understanding; context aware visualization; and decision making with corporate memory.

Among the IAO projects were:
[edit] Human Identification at a Distance (HumanID)
Diagram (from official IAO site) describing capabilities of the "Human Identification at a Distance (HumanID)" project[11]

The Human Identification at a Distance (HumanID) project developed automated biometric identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.[11]

Its goals included programs to:[11]

* Develop algorithms for locating and acquiring subjects out to 150 meters (500 ft) in range.
* Fuse face and gait recognition into a 24/7 human identification system.
* Develop and demonstrate a human identification system that operates out to 150 meters (500 ft) using visible imagery.
* Develop a low power millimeter wave radar system for wide field of view detection and narrow field of view gait classification.
* Characterize gait performance from video for human identification at a distance.
* Develop a multi-spectral infrared and visible face recognition system.

[edit] Evidence Extraction and Link Discovery

Evidence Extraction and Link Discovery (EELD) development of technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources (such as phone call records from the NSA call database, internet histories, or bank records).[12]

EELD was designed to design systems with the ability to extract data from multiple sources (e.g., text messages, social networking sites, financial records, and web pages). It was to develop the ability to detect patterns comprising multiple types of links between data items or people communicating (e.g., financial transactions, communications, travel, etc.).[12]

It is designed to link items relating potential "terrorist" groups and scenarios, and to learn patterns of different groups or scenarios to identify new organizations and emerging threats.[12]
[edit] Genisys

Genisys aimed at developing technologies which would enable "ultra-large, all-source information repositories".[13]

Vast amounts of information were going to be collected and analyzed, and the available database technology at the time was insufficient for storing and organizing such enormous quantities of data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the World Wide Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data—such as a database containing criminal records, a phone call database and a foreign intelligence database. The World Wide Web is considered an "unstructured public data source" because it is publicly accessible and contains many different types of data—such as blogs, emails, records of visits to web sites, etc—all of which need to be analyzed and stored efficiently.[13]

Another goal was to develop "a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows us to retain important data indefinitely."[13]
[edit] Scalable Social Network Analysis

Scalable Social Network Analysis (SSNA) aimed at developing techniques based on social network analysis for modeling the key characteristics of terrorist groups and discriminating these groups from other types of societal groups.[14]

Sean McGahan, of Northeastern University said the following in his study of SSNA:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
—Sean McGahan[14]

[edit] Futures Markets Applied to Prediction (FutureMAP)

Futures Markets Applied to Prediction (FutureMAP) was intended to harness collective intelligence by researching prediction market techniques for avoiding surprise and predicting future events. The intent was to explore the feasibility of market-based trading mechanisms to predict political instability, threats to national security, and other major events in the near future.[15] In laymans terms, FutureMap would be website that allowed people to bet on when a terrorist attack would occur.[16] The bookie would have been the federal government.[16] Several Senators were outraged at the very notion of such a program.[16] Then Senate Minority Leader Tom Daschle said on the floor of the Senate "I couldn't believe that we would actually commit $8 million to create a Web site that would encourage investors to bet on futures involving terrorist attacks and public assassinations. ... I can't believe that anybody would seriously propose that we trade in death. ... How long would it be before you saw traders investing in a way that would bring about the desired result?"[16] Democratic Senator from Oregon, Ron Wyden said, "The idea of a federal betting parlor on atrocities and terrorism is ridiculous and it's grotesque."[16] The ranking Democrat on the Armed Services Committee, Sen. Carl Levin of Michigan, thought the program was so ridiculous that he thought initial reports of it were the result of a hoax.[16] The program was then dropped.
[edit] TIDES

Translingual Information Detection, Extraction and Summarization (TIDES) developing advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages.[17]

Outside groups (such as universities, corporations, etc) were invited to participate in the annual information retrieval, topic detection and tracking, automatic content extraction, and machine translation evaluations run by NIST.[17]
[edit] Genoa / Genoa II

Genoa and Genoa II focused on providing advanced decision-support and collaboration tools to rapidly deal with and adjust to dynamic crisis management and allow for inter-agency collaboration in real-time.[18][19] Another function was to be able to make estimates of possible future scenarios to assist intelligence officials in deciding what to do[20], in a manner similar to the DARPA's Deep Green program which is designed to assist Army commanders in making battlefield decisions.
[edit] Wargaming the Asymmetric Environment (WAE)

Wargaming the Asymmetric Environment (WAE) focused on developing automated technology capable of identifying predictive indicators of terrorist activity or impending attacks by examining individual and group behavior in broad environmental context and examining the motivation of specific terrorists.[21]
[edit] Effective Affordable Reusable Speech-to-text (EARS)

Effective Affordable Reusable Speech-to-text (EARS) to develop automatic speech-to-text transcription technology whose output is substantially richer and much more accurate than previously possible. EARS was to focus on everyday human-to-human speech from broadcasts and telephone conversations in multiple languages.[22] It is expected to increase the speed with which speech can be processed by computers by 100 times or more.[20]

The intent is to create a core enabling technology (technology that is used as a component for future technologies) suitable for a wide range of future surveillance applications.[22]
[edit] Babylon

Babylon to develop rapid, two-way, natural language speech translation interfaces and platforms for the warfighter for use in field environments for force protection, refugee processing, and medical triage.[23]
[edit] Bio-Surveillance

Bio-Surveillance to develop the necessary information technologies and resulting prototype capable of detecting the covert release of a biological pathogen automatically, and significantly earlier than traditional approaches.[24]
[edit] Communicator
Diagram (from official IAO site) describing capabilities of the "Communicator" project

Communicator was to develop "dialogue interaction" technology that enables warfighters to talk with computers, such that information will be accessible on the battlefield or in command centers without ever having to touch a keyboard. The Communicator Platform was to be both wireless and mobile, and to be designed to function in a networked environment.[25]

The dialogue interaction software was to interpret the context of the dialogue in order to improve performance, and to be capable of automatically adapting to new topics (because situations quickly change in war) so conversation is natural and efficient. The Communicator program emphasized task knowledge to compensate for natural language effects and noisy environments. Unlike automated translation of natural language speech, which is much more complex due to an essentially unlimited vocabulary and grammar, the Communicator program is directed task specific issues so that there are constrained vocabularies (the system only needs to be able to understand language related to war). Research was also started to focus on foreign language computer interaction for use in supporting coalition operations.[25]

Live exercises were conducted involving small unit logistics operations involving the United States Marines to test the technology in extreme environments.[25]
[edit] Components of TIA projects that continue to be developed

Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived[4][5][26]. Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies only be used for military or foreign intelligence purposes against foreigners.[27]

TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the Disruptive Technology Office (run by to the Director of National Intelligence). They are funded by National Foreign Intelligence Program for foreign counterterrorism intelligence purposes.

One technology, codenamed "Basketball" is the Information Awareness Prototype System, the core architecture to integrated all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by SAIC through its former Hicks & Associates consulting arm run by former Defense and military officials and which had originally been awarded US$19 million IAO contract to build the prototype system in late 2002.[28]

The other project has been re-designated "TopSail" (formerly Genoa II) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005.
[edit] Media coverage and criticism

The first mention of the IAO in the mainstream media came from The New York Times reporter John Markoff on February 13, 2002.[29] Initial reports contained few details about the program. In the following months, as more information emerged about the scope of the TIA project, civil libertarians became concerned over what they saw as the potential for the development of an Orwellian mass surveillance system.

On November 14, 2002, The New York Times published a column by William Safire in which he claimed "[TIA] has been given a $200 million budget to create computer dossiers on 300 million Americans."[30] Safire has been credited with triggering the anti-TIA movement.[31]
[edit] See also

* ADVISE
* Carnivore, FBI US digital interception program
* Combat Zones That See, or CTS, a project to link up all security cameras citywide and "track everything that moves".
* Communications Assistance For Law Enforcement Act
* ECHELON, NSA worldwide digital interception program
* Information Processing Technology Office
* Intellipedia, a collection of wikis used by the U.S. intelligence community to "connect the dots" between pieces of intelligence
* MALINTENT -- similar program to HumanID
* Mass surveillance
* Multistate Anti-Terrorism Information Exchange
* Synthetic Environment for Analysis and Simulations
* TALON

[edit] References

1. ^ John Markoff (November 22, 2002). "Pentagon Plans a Computer System That Would Peek at Personal Data of Americans". The New York Times.
2. ^ a b Total Information Awareness (TIA), Electronic Privacy Information Center (EPIC)
3. ^ "Total/Terrorism Information Awareness (TIA): Is It Truly Dead?". Electronic Frontier Foundation (official website). 2003. http://w2.eff.org/Privacy/TIA/20031003_comments.php. Retrieved 2009-03-15.
4. ^ a b c Harris, Shane (Feb. 23, 2006). "TIA Lives On". National Journal. http://nationaljournal.com/about/njweekly/stories/2006/0223nj1.htm. Retrieved 2009-03-16.
5. ^ a b "U.S. Still Mining Terror Data". Wired News. February 23, 2004. http://www.wired.com/politics/law/news/2004/02/62390.
6. ^ Overview of the Information Awareness Office
7. ^ Search Results - THOMAS (Library of Congress)
8. ^ The Global Information Society Project
9. ^ Department of Defense Appropriations Act, 2004, Pub. L. No. 108–87, § 8131, 117 Stat. 1054, 1102 (2003)
10. ^ 149 Cong. Rec. H8755—H8771 (24 September 2003)
11. ^ a b c "Human Identification at a distance". Information Awareness Office (official website -- mirror). http://infowar.net/tia/www.darpa.mil/iao/HID.htm. Retrieved 2009-03-15.
12. ^ a b c "Evidence Extraction and Link Discovery". Information Awareness Office (official website -- mirror). http://infowar.net/tia/www.darpa.mil/iao/EELD.htm. Retrieved 2009-03-15.
13. ^ a b c "Genisys". Information Awareness Office (official website). http://infowar.net/tia/www.darpa.mil/iao/Genisys.htm. Retrieved 2009-03-15.
14. ^ a b Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. http://www.ccs.neu.edu/home/perrolle/archive/Ethier-SocialNetworks.html. Retrieved 2009-03-15.
15. ^ FutureMap
16. ^ a b c d e f CNN
17. ^ a b "TIDES". Information Awareness Office (official website -- mirror). http://infowar.net/tia/www.darpa.mil/iao/TIDES.htm. Retrieved 2009-03-15.
18. ^ "Genoa". Information Awareness Office (official website). http://infowar.net/tia/www.darpa.mil/iao/Genoa.htm. Retrieved 2009-03-15.
19. ^ "Genoa II". Information Awareness Office (official website). http://infowar.net/tia/www.darpa.mil/iao/GenoaII.htm. Retrieved 2009-03-15.
20. ^ a b Belasco, Amy (January 21, 2003). "EFF: Memorandum Regarding TIA Funding". Electronic Frontier Foundation. http://w2.eff.org/Privacy/TIA/belasco-memo.php. Retrieved 2009-03-15.
21. ^ WAE
22. ^ a b "EARS". Information Awareness Office (official website -- mirror). http://infowar.net/tia/www.darpa.mil/iao/EARS.htm. Retrieved 2009-03-15.
23. ^ Babylon
24. ^ BSS
25. ^ a b c "Communicator". Information Awareness Office (official website). http://infowar.net/tia/www.darpa.mil/iao/Communicator.htm. Retrieved 2009-03-15.
26. ^ Wanted: Competent Big Brothers, Newsweek, 8 February 2006, retrieved 27 July 2007
27. ^ The Total Information Awareness Project Lives On, Technology Review, 26 April 2006, retrieved 27 July 2007
28. ^ TIA Lives On, National Journal, 23 February 2006, retrieved 27 July 2007
29. ^ Markoff, John (February 13, 2002). "Chief Takes Over at Agency To Thwart Attacks on U.S". The New York Times. http://select.nytimes.com/gst/abstract.html?res=F20A11F734580C708DDDAB0894DA404482. Retrieved May 5, 2010.
30. ^ Safire, William (November 14, 2002). "You Are a Suspect". The New York Times. http://www.nytimes.com/2002/11/14/opinion/14SAFI.html. Retrieved May 5, 2010.
31. ^ Big Brother ...

[edit] Further reading

* Copies of the original IAO web pages formerly available at http://www.darpa.mil/iao/ (June 12, 2002–June 3, 2003) can be found at Archive.org, Internet Archive
* John Poindexter, Overview of the Information Awareness Office (Remarks as prepared for delivery by Dr. John Poindexter, Director, Information Awareness Office, at the DARPATech 2002 Conference) (August 2, 2002).

[edit] External links

* Information Awareness Office

[edit] Media coverage

* Harris, Shane (February 26, 2006). "TIA Lives On". The National Journal. http://nationaljournal.com/about/njweekly/stories/2006/0223nj1.htm.
* "Pentagon Defends Surveillance Program". The Washington Post. May 20, 2003.
* Webb, Cynthia L. (May 21, 2003). "The Pentagon's PR Play". The Washington Post.
* Bray, Hiawatha (April 4, 2003). "Mining Data to Fight Terror Stirs Privacy Fears". The Boston Globe. pp. C2.
* McCullagh, Declan (January 15, 2003). News.com.com "Pentagon database plan hits snag on Hill". CNET News.com. http://news.com.com/2100-1023-980889.html News.com.com.
* Markoff, John (February 13, 2002). "Chief Takes Over at Agency To Thwart Attacks on U.S.". The New York Times. pp. (first mainstream media mention of IAO). http://select.nytimes.com/gst/abstract.html?res=F20A11F734580C708DDDAB0894DA404482#.

[edit] Academic articles

* K. A. Taipale (2003). "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data". Columbia Sci. & Tech. Law Review 5 (2): 1–83 (TIA discussed 39–50). http://ssrn.com/abstract=546782.

* Robert Popp and John Poindexter (november/december 2006). "Countering Terrorism through Information and Privacy Protection Technologies" (PDF). IEEE Security & Privacy: 18 –26. http://www.simson.net/clips/academic/2006.data-surveillance.pdf.

[edit] Critical views

* "TIA: Total Information Awareness". American Civil Liberties Union. January 16, 2004. http://www.aclu.org/privacy/spying/14956res20040116.html.
* Charles V. Peña (November 22, 2002). "TIA: Information Awareness Office Makes Us a Nation of Suspects". Cato Institute. http://www.cato.org/research/articles/pena-021122.html.
* "Total/Terrorism Information Awareness (TIA): Is It Truly Dead? EFF: It's Too Early to Tell". Electronic Frontier Foundation. http://www.eff.org/Privacy/TIA/20031003_comments.php.
* Epic.org "Total "Terrorism" Information Awareness (TIA): Latest News". Electronic Privacy Information Center. http://www.epic.org/privacy/profiling/tia/ Epic.org.
* SPTimes.com "A Times Editorial: Unfocused data-mining". St. Petersburg Times. January 24, 2003. http://www.sptimes.com/2003/01/24/Opinion/Unfocused_data_mining.shtml SPTimes.com.

* Russ Kick. "Information Awareness Office Website Deletes Its Logo". The Memory Hole. http://www.thememoryhole.org/policestate/iao-logo.htm.

[edit] Proponent views

* Mac Donald, Heather (January 27, 2003). "Total Misrepresentation". The Weekly Standard. http://www.weeklystandard.com/Content/Public/Articles/000/000/002/137dvufs.asp.
* Levin, Jonathan (February 13, 2003). "Total Preparedness: The case for the Defense Department's Total Information Awareness project". National Review. http://www.nationalreview.com/comment/comment-levin021303.asp.
* Taylor, Jr., Stuart (December 10, 2002). "Big Brother and Another Overblown Privacy Scare". The Atlantic. http://www.theatlantic.com/politics/nj/taylor2002-12-10.htm.

Accord:

* Shane Ham & Robert D. Atkinson (2002). "Using Technology to Detect and Prevent Terrorism" (PDF). Progressive Policy Institute. http://www.ppionline.org/douments/IT_terrorism.pdf.
* "Safeguarding Privacy in the Fight Against Terrorism" (PDF). DOD Technology and Privacy Advisory Committee (TAPAC). March 2004. http://www.cdt.org/security/usapatriot/20040300tapac.pdf.

Also:

* Ignatius, David (August 1, 2003). "Back in the Safe Zone". The Washington Post. pp. A19 (discussing opposition to the IAO FutureMap project). http://www.washingtonpost.com/wp-dyn/articles/A10955-2003Jul31.html.

Retrieved from "http://en.wikipedia.org/wiki/Information_Awareness_Office
"

* This page was last modified on 24 September 2010 at 14:39.
* Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
* Contact us

No comments: