Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

More Details of the NSA's Social Network Analysis 367

mrogers writes "USA Today has a story describing how the NSA looks for suspicious calling patterns in the huge volumes of traffic data it collects. "Templates" such as a call from overseas followed by a flurry of domestic calls are used to identify leads, which are forwarded to the FBI for investigation. There have been complaints that low-quality leads are drawing agents away from other cases, and similar pattern-matching approaches have been found wanting in the past. Can data mining identify terrorists?"
This discussion has been archived. No new comments can be posted.

More Details of the NSA's Social Network Analysis

Comments Filter:
  • Beside the point. (Score:5, Insightful)

    by TripMaster Monkey ( 862126 ) * on Wednesday May 31, 2006 @11:12AM (#15435673)

    If this wholesale data mining works, then the government will tout this success as justification for its acts. If it doesn't work, the government will complain that we're not letting them do enough to ensure our safety, and use the failure to justify even more outrageous violations of our privacy.

    Whether it works or not, however, is beside the point. The point is: is it legal? Enough people have maintained that it is not to warrant a serious investigation into the matter.
  • by scorp1us ( 235526 ) on Wednesday May 31, 2006 @11:13AM (#15435680) Journal
    The monitered person can distribute the calls through multiple phone lines. With cooperation, a group of individuals can pool phones to use and this system won't detect them. What is detectible is how many phone lines are registered to a person.

    However the government has yet to catch up to the real world. I can disitalyl distribute the message through the internet using techniques that would not arouse suspicion, partivularly with al the online gaming of today.

    Roger wilco anyone?

  • Attitude (Score:5, Insightful)

    by symbolic ( 11752 ) on Wednesday May 31, 2006 @11:14AM (#15435692)

    Aside from this being patently illegal, what bothers me is the cavalier attitude behind it, and the fact that it is already being abused to track down people who aren't terrorists, but who are merely doing their job to keep government entities like the NSA under some semblance of control - the journalists. There is no end to the manner in which this kind of information could be abused.
  • Raise it to orange (Score:5, Insightful)

    by Trails ( 629752 ) on Wednesday May 31, 2006 @11:15AM (#15435695)
    "Hey Akbar, just calling to let you know Mohamed and Alimah just had a healthy baby boy!"

    "Oh great, I'll let the family over here know!"

    *meanwhile, in the basement of a bunker somewhere*

    "My God! It's nine eleven times ten thousand! Nine million one hundred and ten thousand!"

  • Terrorists? (Score:5, Insightful)

    by RsG ( 809189 ) on Wednesday May 31, 2006 @11:15AM (#15435702)
    Whoever said this was about "terrorists"?

    A country of 300 million people cannot have that many actual terrorists in it, even if you count domestic lunies like Timothy McVeigh and the Unabomber in the category (or more accurately the next generation of bomb making lunies). Monitoring a sizable fraction of that 300m can't possibly be just about finding "terrorists" - for one thing it's a needle in a haystack, and for another the number of other uses/abuses of such a system are too many to count.

    Bet good money that most of the people who are or will be advesely affected by this surveilance have little or no connection with terrorism. Even if there was once some noble intent of protecting people by finding monsters hidden among them, it won't just be used for that. Any time you have a major source of power in polical hands, you can bet on it being abused eventually - and what greater power over a domestic population is there than widespread spying without judicial oversight?
  • by Red Flayer ( 890720 ) on Wednesday May 31, 2006 @11:21AM (#15435756) Journal
    "Can data mining identify terrorists?"

    No. It can identify people who have calling patterns associated with terrorist activity, regardless of whether they are a terrorist or not.

    Note that these calling patterns cannot be used to associate that person with a committed or planned crime in the normal data mining scenario.

    Data mining is unreasonable search.

    Now, I have no problem if they've got evidence of a crime or plan of a crime, and use known information to deduce who might else be involved. That's investigative work.

    Data mining is speculative work, not investigative, so regardless of whether it *can* be used for speculative 'research' into the activity of American citizens, it *shouldn't* be.
  • by Daniel_Staal ( 609844 ) <DStaal@usa.net> on Wednesday May 31, 2006 @11:24AM (#15435783)
    Next question: Do we want it to be legal?
  • by plague3106 ( 71849 ) on Wednesday May 31, 2006 @11:24AM (#15435790)
    This won't work at all.

    They are operating under a logical fallacy. A flurry of calls after an overseas call does not mean the two are related in any way. Perhaps (and more likely than the person being a terrorist) is that the person which received the overseas call and then calls domestically is just relaying family information.

    I know my family operated like this (although completely within the US). All you had to do was tell my grandmother something, and you could rest assured she'd spread the news to the rest of the family for you.
  • by beheaderaswp ( 549877 ) * on Wednesday May 31, 2006 @11:25AM (#15435794)
    What ever happened to "Live free or die", "Give me liberty or give me death", or "Those who are willing to sacrifice their basic liberties to assure their security deserve neither."?

    Those quotes are not just platitudes... they are *good ideas*.

    Keep the canned patriotism, give me my rights, and I'll just take my chances.
  • by P3NIS_CLEAVER ( 860022 ) on Wednesday May 31, 2006 @11:26AM (#15435806) Journal
    The worst thing about it is that I am paying for this shit! When did our goverment get so out of control?
  • by Anonymous Coward on Wednesday May 31, 2006 @11:27AM (#15435821)
    The last question in the post is ill posed: can data mining find terrorists -- the answer is yes. Simply set the threshold low: select anyone who has used a phone at any time and you'll likely get most terrorists. The problem is not sensitivity -- the real problem is specificity. If you have no or low specificity then the FBI will be investigating everyone (even those who "have nothing to fear since they have nothing to hide"). Specificity is where the search process interfaces with the Bill of Rights on right to privacy and protection from unlawful search and seizure. High specificity would allow the courts to work by granting warrants; low specificity degenerates into witch hunting.
  • by Dareth ( 47614 ) on Wednesday May 31, 2006 @11:28AM (#15435826)
    It is easy to spot "distinct patterns" after you know all the players and can put the pieces together in context. As they say, Hindsight is 20/20.

    I have a sister over-seas. If/when she calls anyone else in the family with news/updates/etc it will generate this pattern of many domestic calls as we have a large extended family who wants to know how she and her family is doing.

    This does not mean we are terrorist, even though we might fit this "pattern" of suspicious calls. I bet calls to 900 numbers are suspicious and need lots of monitoring as well.

    Many ways to abuse this.
  • by HangingChad ( 677530 ) on Wednesday May 31, 2006 @11:35AM (#15435894) Homepage
    Cheney accuses those he disagrees with of hoping our oceans defend us against terrorism, yet this bungling administration picks technologies that are both invasive to the innocent and ineffective in locating the guilty. We're spending billions on efforts that, at best, won't work and at worst will draw resources away from things that will be effective.

    There was a local news story about a terrorism suspect who was picked up locally because of a tip from a flight school. Not from monitoring his phone calls, not by fingerprinting him when he came into the country, not by spy plane, satellite or any other whiz bang technology. Just a clerk at a airport counter in the middle of bf nowhere. And that's the sensor net that offers the best hope we have of combating terrorism. The clerk at the store, the landlord they rent from, the agent at the ticket counter, the hotel clerk, rental car company, bell hops, and neighbors. It's not depending on the government to keep us safe because they can't. Government is too big and too slow to respond to a ever changing threat landscape. Had we not spent the last five years alienating the muslim and mid-eastern communities in this country and abusing the few Arab allies we have in the mid-east, we might have been able to develop a community network that would have been effective and inexpensive (in relative terms).

    No one seriously believes oceans can defend us, just like no one can seriously believe all the invasive technology being loosed on the people paying the bills is going to be any more effective.

    It's all really quite insane.

  • by dhasenan ( 758719 ) on Wednesday May 31, 2006 @11:36AM (#15435905)
    Because in order for your vote to count, it has to agree with a large number of other votes. If we got a libertarian for President--say, Michael Badnarik--then the NSA would have to hide its spying from the President, as well. But for any national candidate to succeed, they need media coverage. For some reason, Ralph Nader, who was only on the ballot in 36 states, got far more coverage than Badnarik, who was on the ballot in (I believe) 49 states. Why? Because Nader couldn't have won, so the media could safely involve him.

    So, your choices for every election are between media coalitions. Which generally means that each of the major US parties supports slightly differing sections of the economy--service sector for the Democrats, production for the Republicans. That's the major difference.

    Now, armed resistance is ridiculous when the government has billions of dollars of military equipment. And other technological countermeasures will likely prove ineffective in a short period of time.
  • Disarm them. (Score:5, Insightful)

    by babbling ( 952366 ) on Wednesday May 31, 2006 @11:37AM (#15435918)
    The most effective way of stopping terrorists is taking away their cause. Believe it or not, terrorists don't blow up hundreds of people as well as themselves because they "hate freedom" or any of that rubbish.
  • by mrchaotica ( 681592 ) * on Wednesday May 31, 2006 @11:38AM (#15435920)
    Indeed, all this bullshit about "stopping terrorists" or even "supporting the troops" does not represent patriotism, but the quotes you mentioned do. All American citizens ought to be reminded of that.
  • Pipe Dreams (Score:5, Insightful)

    by Khammurabi ( 962376 ) on Wednesday May 31, 2006 @11:40AM (#15435943)
    Can data mining identify terrorists?
    Not really. Computers are good at recognizing patterns only when there is a large repository of data to "train" the computer with. For example, neural networks [wikipedia.org] are often better at recognizing patterns than if a person were to program a set of rules into a system. Man-made rules are often incomplete or lack the depth that a computer can bring to the table. A good example of this is Google Translate [google.com], which is considered one of the better translation programs and is essentially an advanced neural net that was fed a huge wad of data to train from.

    America's data set on terrorism is in the single digits, and the data they do have is only partially complete. This means the only system that can be programmed is a set of user-created rules that "flag" questionable behavior. The solution is a poor one and will only improve our chances at detection by a fraction of a percent. (Seems a huge price to pay for privacy trampling to me.)

    In order to detect terrorism on American soil effectively, we'd need a larger data set. Otherwise we're just attempting to reverse engineer a process that essentially defines itself as dynamic enough to avoid detection. We'd need a frequent source of terrorism that we could derive models and nets off of. The immediate source that comes to mind is Iraq. If I were in charge of the NSA program, I think the best course of action would be to harness the call-traffic (satellite and domestic), email activity and other "data" that precedes suicide bombers (or other known acts of terrorism) in Iraq. Using this data you could train a system to recognize similarities in America. Short of that, anything the NSA is trying is a crap shoot.

    No. Freeing up lines of communication, preparing quick and actionable responses to warnings, and better general population awareness are probably more effective than grabbing a billion pieces of data and sifting through it for answers. It's impossible for a human to know what to look for, and until the NSA comes clean in what it's actualy doing, there's no justification for stomping out the few freedoms we still have. There are better alternatives out there that can be done with the help of the community and still preserve the integrity of our privacy.
  • by Anonymous Coward on Wednesday May 31, 2006 @11:41AM (#15435952)

    What ever happened to "Live free or die", "Give me liberty or give me death", or "Those who are willing to sacrifice their basic liberties to assure their security deserve neither."?

    The people who said those things died a long time ago, and their descendants value the ability to watch television, eat McDonalds and shop at Walmart much more than any abstract concept of freedom. If you want to know what the American Dream has turned into, switch on your television. Perhaps American Idol, which is literally based around the country idolising people not for their intelligence or their contribution to humanity, but for their looks and ability to carry a tune.

    Keep the canned patriotism, give me my rights, and I'll just take my chances.

    "Give me my rights"? Rights are not something you ask for, they are something you always have and must defend. What have you done to defend them?

  • by IIH ( 33751 ) on Wednesday May 31, 2006 @11:45AM (#15435992)
    Or, a foreign visitor gets a call that a close family member is seriously ill, they make a flurry of phone calls to cancel hotels, ring the airline, book taxies, and then try and get on a plane home. NSA see "foreign call, flurry of calls, trying to get on a plane in a clearly agitated state - panic, panic, red flag!" and "Oh, we're sorry you couldn't get home before your father died, national security, you know."
  • Simple answer (Score:4, Insightful)

    by radtea ( 464814 ) on Wednesday May 31, 2006 @11:52AM (#15436048)
    Can data mining identify terrorists?

    No.

    But it can identify people with large extended families who have relatives overseas and get an important call about a death in the family, notify all their North American relatives, and then have government agents show up on their door.

    Every single pattern-based terrorist screening method I have heard about sounds like something dreamed up in an air-conditioned office by some dork who never gets out very much and thinks all people are basically like him (and anyone who isn't ought to be subject to government investigation.)

    Hanging around public buildings taking pictures? Must be a terrorist. As opposed to say, just interested in taking pictures of public buildings because modern-day monumental architecture happens to turn you on.

    Want to learn to fly a 747 but don't have any interest in a career as a pilot? Must be a terrorist. Unless you happen to be fascinated by aircraft and think that a few weeks of flight school would give you bragging rights to die for at your local RC club.

    Like to pay with cash, even for purchases in the thousands like furniture or maybe a car? Must be a terrorist. Or maybe you don't qualify for a chequing account, or are just a little bit paranoid, or just don't fucking feel like doing anything else.

    These sorts of unvalidated, non-empirical, "feels like the right thing to me", ad hoc, imaginary "patterns of suspicious activity" are a major threat to freedom because they demonize and may even criminalize deviancy from the norm. It is a characteristic of unfree societies that deviancy from the norm is not just looked at asscance by the majority of the population, but is viewed as grounds for suspicion of the most heinious acts.

    Furthermore, such datamining solutions are not able to identify terrorists reliably even when they have all kinds of intelligence data entered into them. A report on the chilling-named MATRIX [fas.org] system indicates that the system was only able to identify 5 of the original 9/11 hijackers in a retrospective test, a 75% false negative rate, and it further identifed 120,000 other Americans who had a "high terrorism factor." Supposedly "scores of arrests" resulted from that list, although no one knows what the arrests were for or how many of those were sucessfully prosecuted. The odds are most of them were for drug possession charges that were laid as a result of the increased scrutiny certain individuals got by virtue of wholey baseless suspicions of terrorism. But let us grant 60 successful prosecutions for terrorist-related activities. That's a false positive rate of over 99.9%

    And that was when the system was loaded with specific intelligence data, which is no longer the case.

    Given the complete failure of such systems to detect terrorists in retrospective studies, and the horrifically high false positive rate, and the chilling effect such programs have on the freedom to be different, it is very hard to believe that their real purpose is to spy on Americans and impose a high degree of conformity on American society.

  • by Lumpy ( 12016 ) on Wednesday May 31, 2006 @11:55AM (#15436074) Homepage
    Honestly though, why not a simple alternative?

    Terrorists are very well funded if we are to believe the crap that spews forth from our leaders so why dont they take an approach that is different from normal?

    Bin laden can buy all his terrorists a SIP Wifi Phone and use Free World Dialup to keep in touch or simply dial a direct IP. Throw away prepay cellphones are easy to come by, why dont these terrorists buy a "boost mobile" and simply buy only a single airtime card and then throw the whole thing away when done and use a different unit/carrier? and to hell with phones, meet in second life or some other online pc/mac based communication system.

    Either the terrorists are far more stupid than the NSA and FBI (yes, amazing to even think about) agents and leaders are or the NSA is simply using this whole Terrorism thing as a front to try and gain tighter control over american citizens.

    I am betting firmly on the latter.
  • by i am kman ( 972584 ) on Wednesday May 31, 2006 @11:59AM (#15436107)
    I don't think the question should be is it legal?

    The question should be is it consistent with America's values? Or is it moral? And I think the answer is a resounding NO!

    The problem when you ask about legality is that you get legal opinions with obscure analysis that circumvents the broader question of whether America SHOULD do this.

    It's alot like the debate surrounding our system of legalized bribery (except we call it lobbying). "Oh, they paid for a plane trip, let's make those illegal." The debates center around the legal technicalities, but largely ignore the larger problem of targeted contributions directly affecting specific votes and the immoral culture of lobbying.
  • by robertdfeinman ( 829025 ) on Wednesday May 31, 2006 @12:01PM (#15436131) Homepage
    As many have already pointed out trying to find unknown actors via data mining is not going to work very well.

    If we assume that the people at the NSA and other spy agencies are smart enough to know this too, then one has to ask what are they really trying to do.

    The answer is that monitoring known actors (such as political dissidents) who are members of known groups works well with these techniques.

    Here's my little essay on the subject (with some historical examples thrown in): http://robertdfeinman.com/society/surveillance_vs_ liberty.html [robertdfeinman.com]

    The bottom line is that secret police functions rapidly become tools for suppression of domestic dissent.

  • by paulbd ( 118132 ) on Wednesday May 31, 2006 @12:01PM (#15436134) Homepage

    you have to be kidding! you're claiming that the media covered Nader because he could not have won, but Badnarik could have won and so they didn't cover him? they didn't cover Badnarik because even if he was on the ballot in 150 states, he still could not have won. i agree - its a poor reason to avoid covering Badnarik and his party's ideas, but lets get serious about the reasons here.

  • by vought ( 160908 ) on Wednesday May 31, 2006 @12:06PM (#15436170)
    I am betting firmly on the latter.

    I think you're right.

    I have a friend whose dad emigrated from Iraq over fifty years ago. The stateside family regularly calls the Iraqi-born family members who live in Iraq to say hello and catch up on current events - like how many schools have been painted that week or whether the electricity is on this month, or whether the price of gas in Baghdad is higher than in the U.S. honestly, I don't know what they talk about. But they do talk.

    Now, I have beers with my friend once or twice a week. We e-mail and call each other occasionally. I'm only separated by one phone call from his relatives in Iraq.

    You'd better bet my name is in one of these FBI "leads", and it's entirely inappropriate. Maybe they're checking out my surfing habits, too, because there's been a long stall lately whenever I check Slashdot's front page...hope I don't go to your page and involuntarily make you part of the conspiracy.

    At the top of the tree is my friend's family, calling relatives in Iraq. At the bottom, there's me, a critic of this administration. We're all connected by a single phone call from one "suspect" party to a "suspect" place. And yet I have no affiliations with terrorists somehow.

    I guess the guy with the microphone in his I.P.A. is the Feeb. See you at the pub!
  • by DragonWriter ( 970822 ) on Wednesday May 31, 2006 @12:15PM (#15436248)
    Obviously, everyone wants the government to stay out of the public's provate life, but there is a big difference between listening to peoples phone calls and looking for calling patterns.


    There is a difference in that one is expressly and well-established to be unconstitutional, and the other is merely of dubious constitutionality and prohibited by statute (or, at least, the telcos turning over the information si generally prohibited by statute.)

    OTOH, they are both the same in that they involve the gathering of information in which individuals have a legitimate, and recognized-in-law expectation of privacy, and therefore should not be done by the government in a free country except with a showing that there is some credible reason to expect evidence to be uncovered by the examination of the information associated with a particular target.

    The government is in a tough situation where people demand protection, but want to maintain their civil rights rightfully so. It's a tough task in which there is no easy solution.


    There is an easy solution which was known by our founders -- to intrude into the private information of a citizen, the executive takes specific information justifying the particular inquiry to a court, and gets a warrant if indeed that information shows probable cause.

  • by size1one ( 630807 ) on Wednesday May 31, 2006 @12:15PM (#15436253)
    The scary part is sooner or later they will be. When enough rights have been infringed on and our way of life has changed enough, other americans will realize they no longer truely have freedom. At that point they will come to realize what real patriotism is. Its unfortunate that they take thier freedom for granted so much that they have to be reminded what it is in the worst possible way: Losing it.
  • Re:Disarm them. (Score:3, Insightful)

    by homer_ca ( 144738 ) on Wednesday May 31, 2006 @12:17PM (#15436273)
    Sure, if we didn't need to secure their oil for our energy companies, we could disengage from the Middle East. However that still leaves the question of Israel. I don't see how we'll resolve that issue to the satisfaction of the Arab world short of resettling all of Israel on land donated by Europe or America (lots of federal BLM land in the west).
  • by noewun ( 591275 ) on Wednesday May 31, 2006 @12:18PM (#15436293) Journal
    Was about to say the same thing. Traffic pattern analysis doesn't work at all for sleeper cells, like the people who carried out the 9/11 attacks. Sleeper cells, by definition, tend to be quiet for long periods of time with only intermittent contact between members and any organizing force. To someone looking at traffic pattern analysis, this will look no different from me talking to my cousin in Atlanta or my uncle in DC, which we do once in a long while. Analysis of the 9/11 hijackers would've shown normal, suburban usage.

    The trend in terrorism lately is decentralization: the guys who carried out the Madrid train bombings were home-grown, were not known terrorists, and were not previoiusly involved in any high level attacks or meetings. They didn't show up on anyone's radar precisely because they didn't fit any profile, nor would they be found with traffic pattern analysis. Add to this the recent news that the AQ higher ups have ceased using satellite or cel phones and you have the basic problem with asymetrical warfare, one which the White House and DoD refuse to learn: you can't fight a guy wearing a suicide vest with satellites and computers, and you can't find a loosely organized, ad hoc group of people by looking for organized cells. The top down model of terrorism is dead, and it seems to be the only thing we're still looking for.

    What we need, and what the White House and DoD are steadfastly refusing to develop, is old-fashioned HUMINT, human intelligence. We need speakers of Arab in all of the various dialects, we need people schooled in Middle Eastern politics, history, religion and socities, and we need to get people with Middle Eastern backgrounds into the intelligence services and up the command chain. One of the reasons the CIA was as efficient as it was in the 60s and 70s was the large number of working agents from countries in which they were working. Gust Avrakotos [wikipedia.org] was such an effective agent in Greece and elsewhere because he spoke the native languages and knew the local customs. He wasn't viewing the space by satellite from DC. He was in the mix.

    Here endeth the rant.

  • by Roblimo ( 357 ) on Wednesday May 31, 2006 @12:22PM (#15436334) Homepage Journal
    A not-unlikely scenario:

    1) A Pakistani developer starts an interesting FOSS project.

    2) I test a copy and like it. He then calls me or I call him for a phone interview.

    3) My next step is to call a bunch of sources in the U.S. and elsewhere, ask what they think of the software.

    So with no family or friends in Pakistan, I am suddenly a potential terrorist threat by NSA standards. Uh huh.

    It doesn't need to be a story about software, either. One about anti-terrorism activities could generate a similar call pattern.

    On the other hand, I suppose that by current U.S. government standards, any journalist who makes a lot of calls to verify a story, instead of being a Good Little Boy and sticking to "official sources," is nearly as dangerous as a terrorist, anyway.

    (sigh)
  • Self-defeating (Score:2, Insightful)

    by ZarfMouse ( 154055 ) on Wednesday May 31, 2006 @12:29PM (#15436412) Homepage Journal
    It's amusing to me that this whole program is self-defeating, even if there was any chance that it could work in the first place.

    You just can't gather that much data from that many sources and not expect that someone will find out. Once the well organized terrorists know that the data is being gathered then they'll simply change their calling habits. These are smart folks, they'll figure out ways to obfuscate their calling patterns (use internet methods, call from payphones and hotel rooms, make only local calls, route calls through non-cooperating foreign phone networks using e.g. 3-way calling, etc).

    But the government will still have the data and the only people left vulnerable to the database will be non-terrorists.

    The smart people at the NSA must have known this when they designed the program.
  • by advocate_one ( 662832 ) on Wednesday May 31, 2006 @12:37PM (#15436470)
    they would really, really have to work hard to establish links between postings in high traffic usenet groups and the people reading them... an awfull lot of info can be put into a subject line without making it too obvious and the recipient merely has to download the headers, doesn't actually have to access the body at all... so there's absolutely no way to ascertain who, out of the thousands of people using that group, is actually receiving commands.

    Similarly with blog comments... a lot of it looks like spam, but it could be disguised commands, and it can be seen by people using search engines so there's a disconnect (cutout) between the poster and the recipient. All the reader would have to do would be to search on an innocent phrase agreed between the poster and the recipient and then view the cache of the page that matches that content...

    they could be using Slashdot right now to coordinate the next big one...

  • by Dausha ( 546002 ) on Wednesday May 31, 2006 @12:41PM (#15436517) Homepage
    "Terrorists are very well funded if we are to believe the crap that spews forth from our leaders so why dont they take an approach that is different from normal?"

    In the mid-90s, I took a course in Introduction to International Terrorism. The professor's master's thesis was on terrorist funding resources in the United States. He told us the story of how his thesis came together and the argument he got into with his advisor.

    He was studying somewhere in the Mid-West, I forget where. Anyway, the thesis ended up as a sort of bet: how active is terrorist funding in the following X Mid-Western cities? In the end, he found that several big-named groups (in the 1980s) were actively receving funds in those cities. He said his research was illuminating as to just how well-funded these groups were based only on activity in the U.S., not to mention other potential sources.

    So, while you may want to discount what the government says about terrorist funding, I say to you that without hearing this from the government I can assure you that terrorists are at least as well-funded as the government would have you believe. Just because the government says it does not make it false.
  • by morgan_greywolf ( 835522 ) on Wednesday May 31, 2006 @12:43PM (#15436537) Homepage Journal
    Now, armed resistance is ridiculous when the government has billions of dollars of military equipment. And other technological countermeasures will likely prove ineffective in a short period of time.

    The American revolutionaries at the time of the War for Independence were severely outgunned, outmanned, outequipped and out-trained compared to their contemporary British counterparts.

    Guess which side one?

  • by Roduku ( 950552 ) on Wednesday May 31, 2006 @12:51PM (#15436602)
    The template, the officials say, was created from a secret database of phone call records collected by the spy agency.

    Secret database??? They snatched records from the phone company.

    Calls coming into the country from Pakistan, Afghanistan or the Middle East, for example, are flagged by NSA computers if they are followed by a flood of calls from the number that received the call to other U.S. numbers.

    So if one of our servicepersons calls his/her worried mother to reassure her that he/she is ok after a particularly hostile engagement and she wants to let the rest of the family know, which one is the terrorist?

    The spy agency then checks the numbers against databases of phone numbers linked to terrorism, the officials say. Those include numbers found during searches of computers or cellphones that belonged to terrorists.

    If they find something suspicious, they check to see if it's connected to a known terrorist phone number? If they already have a list of known terrorist phone numbers, then just what the hell are they looking for?

  • by Goldenhawk ( 242867 ) on Wednesday May 31, 2006 @12:54PM (#15436623) Homepage
    Just to play devil's advocate for a moment... the majority of the comments about this article have been responding to the specific example given in the article. What makes everyone think that the NSA is stupid enough to limit their search to that specific pattern? Whether you like them or not, it's a big agency with a very highly trained and intelligent staff. And security procedures mandate that you don't give out your really important secrets (other than perhaps occasional leaks to the Washington Post or NYTimes, that is). Logically, it seems you can assume they've thought of all these issues, right?

    Before you answer, please set aside the "any data mining is wrong" mantra...

    To answer my own question, I don't believe for a minute that this specific example is even a small fraction of the number games that they play with the data. That's exactly why you folks complaining about the risk posed by your Aunt Zelda's goiter surgery phone calls have NOT been bothered by the NSA. They're smarter than that.

    This question has been posed several times by conservative journalists: if they're doing such a lousy job, don't you find it curious that there has NOT been another successful attack in four and a half years, despite repeated hate-filled threats from Bin Laden and others like him? Either we're just lucky, or DHS has something going right.
  • Re:Attitude (Score:2, Insightful)

    by Mr. Slippery ( 47854 ) <.tms. .at. .infamous.net.> on Wednesday May 31, 2006 @12:55PM (#15436637) Homepage
    I guess as the US is a democratic country, it's alright to do so. Democracy means, literally, rule by the people.

    The U.S. is a constitutional democratic republic - it is an indirect democracy, yes, but one where the rightful powers of the government are limited by prior arangement, to prevent mob rule from trampling on citizen's rights.

    I.e., even if in the grip of some mass hysteria, 90% of the population thinks it's ok to do something, that doesn't make it legal. If that 90% maintains that belief, then eventually the Constitution will be changed, but that process takes long enough for cooler heads to usually prevail.

  • by GPS Pilot ( 3683 ) on Wednesday May 31, 2006 @12:58PM (#15436669)
    "Able Danger" identified Atta and three of the other hijackers pre-9/11.

    http://en.wikipedia.org/wiki/Able_Danger [wikipedia.org]

    Instead of the government trying to cover up the success of Able Danger, it should be initiating twenty or so Able Danger-like data mining programs.
  • by gstoddart ( 321705 ) on Wednesday May 31, 2006 @01:02PM (#15436715) Homepage
    At the top of the tree is my friend's family, calling relatives in Iraq. At the bottom, there's me, a critic of this administration. We're all connected by a single phone call from one "suspect" party to a "suspect" place. And yet I have no affiliations with terrorists somehow.

    Ah, but what you fail to realize (begin sarcasm) is that clearly there is a link between terrotists and those critical of this administration (end sarcasm).

    The prevailing attitude seems to be that it's unpatriotic to criticise them, and if you're a foreign person criticizing their actions, then you must be a terrorist. There's no middle ground for many.

    I'm glad my passport has expired, now I have an excuse to tell anyone who wants me to go the US to PFO. I'm tired of the bullshit. I used to hold the US constitution and system of government as an ideal, and one which wouldn't fall prey to this sort of crap. However, I'm being proven wrong on a weekly basis. Now they're just trying very hard to completely undermine all of those elements.

    The terrorists have not only won, but played into the hands of those who have always wanted to do this.
  • Re:Disarm them. (Score:1, Insightful)

    by Anonymous Coward on Wednesday May 31, 2006 @01:12PM (#15436837)
    Let's meet halfway: you take away radical Islam from them, and they take away the religious right from you, okay? Then everyone can join the 21st century and be happy.
  • by kbielefe ( 606566 ) * <karl.bielefeldt@ ... om minus painter> on Wednesday May 31, 2006 @02:28PM (#15437618)
    Not to mention that the vast majority of suicide bombers never commit a second offense.
  • by TubeSteak ( 669689 ) on Wednesday May 31, 2006 @03:04PM (#15437990) Journal
    I'm guessing PFO stands for "Piss the Fark Off"

    If you're in the UK, the next time you need a passport, you're going to get a biometric thingamajigger, instead of a paper book with your photo, a barcode and some holograms.

    I'd suggest, to anyone in a country which has decided biometric (or RFID) passports are The Next Step (tm), that you renew your passport before they make the switch.
  • by Red Flayer ( 890720 ) on Wednesday May 31, 2006 @03:25PM (#15438171) Journal
    "If I'm sitting outside of a gas station at 1:30 am with a ski mask on and a cop pulls up, no crime has been committed but the officer would have probable cause to stop me and search my car because I'm behaving in a suspicious manner and the officer could reasonably speculate that a crime was about to be committed or had been committed."

    Not at all. I think you need to research your rights better. The cop could stop you, he could ask to search your car, but would not be allowed to search it without a warrant unless you gave him permission -- same with your personal effects (like what's in your pockets). If he smelled marijuana or gunpowder residue, or saw blood, then he'd have grounds. But it's absolutely scary to me that people would believe that wearing a ski mask is grounds to be searched.

    If you're not even aware of your rights, how do you know when they are taken from you?
  • by be-fan ( 61476 ) on Wednesday May 31, 2006 @03:42PM (#15438295)
    The fact that there hasn't been another attack doesn't really prove anything more than the fact that there was no attack for three years prior to 9/11, or five years prior to that. If you could show that the number of terrorist attacks per unit time under the current security policy are lower than the number per unit time under our old policies, then you'd have a case. But just saying "there hasn't been any attacks for five years" doesn't mean anything --- it could simply mean that terrorist attacks are rare regardless of your policy.

    Of course, there is also the "we're at war" aspect. Why should terrorists go to the trouble of trying to kill Americans in the US when there are a whole bunch of Americans in Iraq that are much easier to target. You could just as easily argue that the lack of attacks over the last several years is due not to better security policies at home, but the fact that terrorists are occupied killing Americans abroad.

    On the other hand, you have some fairly strong evidence to suggest that our current security policy really isn't any more secure than it used to be. Just last month, auditors tried to sneak weapons onboard airplanes, and succeeded in the vast majority of attempts, despite consciously making the weapons easy to discover. At the same time, you had the Israeli guys audit our airplane security, and conclude that it was "not so much a system for protecting Americans as it was a system for annoying them."
  • by chiph ( 523845 ) on Wednesday May 31, 2006 @05:10PM (#15439145)
    I agree with the parent.
    His winning the election (or even being allowed to attend the presidential debates) would have been disruptive to their entrenched interests, so the mass media only presented the two candidates which were known quantities.

    Chip H.
  • by Anonymous Coward on Wednesday May 31, 2006 @07:06PM (#15440100)
    - American Revolution
    - In a move that will become quite familiar to future Americans, France claims a win even though the English colonists saw far more action. This is later known as "de Gaulle Syndrome", and leads to the Second Rule of French Warfare; "France only wins when America does most of the fighting."
  • by duffbeer703 ( 177751 ) on Wednesday May 31, 2006 @07:35PM (#15440315)
    Millions isn't enough -- you need tens of millions of people. Most government activity centers around entitlement programs and the military, both of which have large, vocal & immensely power trade and civic groups rallying on their behalf. Nearly every American benefits in some way from bloated government, and only a miniscule minority are willing to give up granny's free nursing home or overfunded local schools & police.

The one day you'd sell your soul for something, souls are a glut.

Working...