Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > The Sandbox - National
test
The Sandbox - National The Sandbox is a collection of off-topic discussions. Humorous threads, Sports talk, and a wide variety of other topics can be found here.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 650
MoneyManMatt 490
Jon Bon 400
Still Looking 399
samcruz 399
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 282
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70831
biomed163762
Yssup Rider61304
gman4453376
LexusLover51038
offshoredrilling48840
WTF48267
pyramider46370
bambino43221
The_Waco_Kid37431
CryptKicker37231
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 12-16-2012, 06:47 AM   #1
Whirlaway
Account Disabled
 
Join Date: Jan 3, 2010
Location: Here.
Posts: 13,781
Encounters: 28
Default U.S. Terrorism Agency to Tap a Vast Database of Citizens

Real Stuff; Not Sky-Is-Falling.................

U.S. Terrorism Agency to Tap a Vast Database of Citizens

By JULIA ANGWIN at WSJ

Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime.


Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens-even people suspected of no crime. Julia Angwin reports on digits. Photo: Getty Images.

Not everyone was on board. "This is a sea change in the way that the government interacts with the general public," Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect.

Through Freedom of Information Act requests and interviews with officials at numerous agencies, The Wall Street Journal has reconstructed the clash over the counter terrorism program within the administration of President Barack Obama. The debate was a confrontation between some who viewed it as a matter of efficiency—how long to keep data, for instance, or where it should be stored—and others who saw it as granting authority for unprecedented government surveillance of U.S. citizens.

The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans "reasonably believed to constitute terrorism information" may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.

"It's breathtaking" in its scope, said a former senior administration official familiar with the White House debate.

Counterterrorism officials say they will be circumspect with the data. "The guidelines provide rigorous oversight to protect the information that we have, for authorized and narrow purposes," said Alexander Joel, Civil Liberties Protection Officer for the Office of the Director of National Intelligence, the parent agency for the National Counterterrorism Center.

The Fourth Amendment of the Constitution says that searches of "persons, houses, papers and effects" shouldn't be conducted without "probable cause" that a crime has been committed. But that doesn't cover records the government creates in the normal course of business with citizens.

Congress specifically sought to prevent government agents from rifling through government files indiscriminately when it passed the Federal Privacy Act in 1974. The act prohibits government agencies from sharing data with each other for purposes that aren't "compatible" with the reason the data were originally collected.

But the Federal Privacy Act allows agencies to exempt themselves from many requirements by placing notices in the Federal Register, the government's daily publication of proposed rules. In practice, these privacy-act notices are rarely contested by government watchdogs or members of the public. "All you have to do is publish a notice in the Federal Register and you can do whatever you want," says Robert Gellman, a privacy consultant who advises agencies on how to comply with the Privacy Act.

As a result, the National Counterterrorism Center program's opponents within the administration—led by Ms. Callahan of Homeland Security—couldn't argue that the program would violate the law. Instead, they were left to question whether the rules were good policy.

Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is "reasonably believed" to contain "terrorism information." The list could potentially include almost any government database, from financial forms submitted by people seeking federally backed mortgages to the health records of people who sought treatment at Veterans Administration hospitals.

Previous government proposals to scrutinize massive amounts of data about innocent people have caused an uproar. In 2002, the Pentagon's research arm proposed a program called Total Information Awareness that sought to analyze both public and private databases for terror clues. It would have been far broader than the NCTC's current program, examining many nongovernmental pools of data as well.

"If terrorist organizations are going to plan and execute attacks against the United States, their people must engage in transactions and they will leave signatures," the program's promoter, Admiral John Poindexter, said at the time. "We must be able to pick this signal out of the noise."

Adm. Poindexter's plans drew fire from across the political spectrum over the privacy implications of sorting through every single document available about U.S. citizens. Conservative columnist William Safire called the plan a "supersnoop's dream." Liberal columnist Molly Ivins suggested it could be akin to fascism. Congress eventually defunded the program.

The National Counterterrorism Center's ideas faced no similar public resistance. For one thing, the debate happened behind closed doors. In addition, unlike the Pentagon, the NCTC was created in 2004 specifically to use data to connect the dots in the fight against terrorism.

Even after eight years in existence, the agency isn't well known. "We're still a bit of a startup and still having to prove ourselves," said director Matthew Olsen in a rare public appearance this summer at the Aspen Institute, a leadership think tank.

The agency's offices are tucked away in an unmarked building set back from the road in the woodsy suburban neighborhood of McLean, Va. Many employees are on loan from other agencies, and they don't conduct surveillance or gather clues directly. Instead, they analyze data provided by others.

The agency's best-known product is a database called TIDE, which stands for the Terrorist Identities Datamart Environment. TIDE contains more than 500,000 identities suspected of terror links. Some names are known or suspected terrorists; others are terrorists' friends and families; still more are people with some loose affiliation to a terrorist.

TIDE files are important because they are used by the Federal Bureau of Investigation to compile terrorist "watchlists." These are lists that can block a person from boarding an airplane or obtaining a visa.

The watchlist system failed spectacularly on Christmas Day 2009 when Umar Farouk Abdulmutallab, a 23-year-old Nigerian man, boarded a flight to Detroit from Amsterdam wearing explosives sewn into his undergarments. He wasn't on the watchlist.

He eventually pleaded guilty to terror-related charges and is imprisoned. His bomb didn't properly detonate.

However, Mr. Abdulmutallab and his underwear did alter U.S. intelligence-gathering. A Senate investigation revealed that NCTC had received information about him but had failed to query other government databases about him. In a scathing finding, the Senate report said, "the NCTC was not organized adequately to fulfill its missions."

"This was not a failure to collect or share intelligence," said John Brennan, the president's chief counterterrorism adviser, at a White House press conference in January 2010. "It was a failure to connect and integrate and understand the intelligence we had."

As result, Mr. Obama demanded a watchlist overhaul. Agencies were ordered to send all their leads to NCTC, and NCTC was ordered to "pursue thoroughly and exhaustively terrorism threat threads."

Quickly, NCTC was flooded with terror tips—each of which it was obligated to "exhaustively" pursue. By May 2010 there was a huge backlog, according a report by the Government Accountability Office.

Legal obstacles emerged. NCTC analysts were permitted to query federal-agency databases only for "terrorism datapoints," say, one specific person's name, or the passengers on one particular flight. They couldn't look through the databases trolling for general "patterns." And, if they wanted to copy entire data sets, they were required to remove information about innocent U.S. people "upon discovery."

But they didn't always know who was innocent. A person might seem innocent today, until new details emerge tomorrow.

"What we learned from Christmas Day"—from the failed underwear bomb—was that some information "might seem more relevant later," says Mr. Joel, the national intelligence agency's civil liberties officer. "We realized we needed it to be retained longer."

Late last year, for instance, NCTC obtained an entire database from Homeland Security for analysis, according to a person familiar with the transaction. Homeland Security provided the disks on the condition that NCTC would remove all innocent U.S. person data after 30 days.

After 30 days, a Homeland Security team visited and found that the data hadn't yet been removed. In fact, NCTC hadn't even finished uploading the files to its own computers, that person said. It can take weeks simply to upload and organize the mammoth data sets.

Homeland Security granted a 30-day extension. That deadline was missed, too. So Homeland Security revoked NCTC's access to the data.

To fix problems like these that had cropped up since the Abdulmutallab incident, NCTC proposed the major expansion of its powers that would ultimately get debated at the March meeting in the White House. It moved to ditch the requirement that it discard the innocent-person data. And it asked for broader authority to troll for patterns in the data.

As early as February 2011, NCTC's proposal was raising concerns at the privacy offices of both Homeland Security and the Department of Justice, according to emails reviewed by the Journal.

Privacy offices are a relatively new phenomenon in the intelligence community. Most were created at the recommendation of the 9/11 Commission. Privacy officers are often in the uncomfortable position of identifying obstacles to plans proposed by their superiors.

At the Department of Justice, Chief Privacy Officer Nancy Libin raised concerns about whether the guidelines could unfairly target innocent people, these people said. Some research suggests that, statistically speaking, there are too few terror attacks for predictive patterns to emerge. The risk, then, is that innocent behavior gets misunderstood—say, a man buying chemicals (for a child's science fair) and a timer (for the sprinkler) sets off false alarms.

An August government report indicates that, as of last year, NCTC wasn't doing predictive pattern-matching.

The internal debate was more heated at Homeland Security. Ms. Callahan and colleague Margo Schlanger, who headed the 100-person Homeland Security office for civil rights and civil liberties, were concerned about the implications of turning over vast troves of data to the counterterrorism center, these people said.

They and Ms. Libin at the Justice Department argued that the failure to catch Mr. Abdulmutallab wasn't caused by the lack of a suspect—he had already been flagged—but by a failure to investigate him fully. So amassing more data about innocent people wasn't necessarily the right solution.

The most sensitive Homeland Security data trove at stake was the Advanced Passenger Information System. It contains the name, gender, birth date and travel information for every airline passenger entering the U.S.

Previously, Homeland Security had pledged to keep passenger data only for 12 months. But NCTC was proposing to copy and keep it for up to five years. Ms. Callahan argued this would break promises the agency had made to the public about its use of personal data, these people said.

Discussions sometimes got testy, according to emails reviewed by the Journal. In one case, Ms. Callahan sent an email complaining that "examples" provided to her by an unnamed intelligence official were "complete non-sequiturs" and "non-responsive."

In May 2011, Ms. Callahan and Ms. Schlanger raised their concerns with the chief of their agency, Janet Napolitano. They fired off a memo under the longwinded title, "How Best to Express the Department's Privacy and Civil Liberties Concerns over Draft Guidelines Proposed by the Office of the Director of National Intelligence and the National Counterterrorism Center," according to an email obtained through the Freedom of Information Act. The contents of the memo, which appears to run several pages, were redacted.

The two also kept pushing the NCTC officials to justify why they couldn't search for terrorism clues less invasively, these people said. "I'm not sure I'm totally prepared with the firestorm we're about to create," Ms. Schlanger emailed Ms. Callahan in November, referring to the fact that the two wanted more privacy protections. Ms. Schlanger returned to her faculty position at the University of Michigan Law School soon after but remains an adviser to Homeland Security.

To resolve the issue, Homeland Security's deputy secretary, Jane Holl Lute, requested the March meeting at the White House. The second in command from Homeland Security, the Justice Department, the FBI, NCTC and the office of the director of national intelligence sat at the small conference table. Normal protocol for such meeting is for staffers such as Ms. Callahan to sit against the walls of the room and keep silent.

By this point, Ms. Libin's concern that innocent people could be inadvertently targeted had been largely overruled at the Department of Justice, these people said. Colleagues there were more concerned about missing the next terrorist threat.

That left Ms. Callahan as the most prominent opponent of the proposed changes. In an unusual move, Ms. Lute asked Ms. Callahan to speak about Homeland Security's privacy concerns. Ms. Callahan argued that the rules would constitute a "sea change" because, whenever citizens interact with the government, the first question asked will be, are they a terrorist?

Mr. Brennan considered the arguments. And within a few days, the attorney general, Eric Holder, had signed the new guidelines. The Justice Department declined to comment about the debate over the guidelines.

Under the new rules, every federal agency must negotiate terms under which it would hand over databases to NCTC. This year, Ms. Callahan left Homeland Security for private practice, and Ms. Libin left the Justice Department to join a private firm.

Homeland Security is currently working out the details to give the NCTC three data sets—the airline-passenger database known as APIS; another airline-passenger database containing information about non-U.S. citizen visitors to the U.S.; and a database about people seeking refugee asylum. It previously agreed to share databases containing information about foreign-exchange students and visa applications.

Once the terms are set, Homeland Security is likely to post a notice in the Federal Register. The public can submit comments to the Federal Register about proposed changes, although Homeland Security isn't required to make changes based on the comments.

Write to Julia Angwin at julia.angwin@wsj.com

A version of this article appeared December 13, 2012, on page A1 in the U.S. edition of The Wall Street Journal, with the headline: U.S. Terror Agency To Tap Citizen Files.

http://online.wsj.com/article/SB1000...040640006.html
Whirlaway is offline   Quote
Old 12-16-2012, 06:48 AM   #2
Whirlaway
Account Disabled
 
Join Date: Jan 3, 2010
Location: Here.
Posts: 13,781
Encounters: 28
Default

And if you want to read the WSJ's 3-year investigation into privacy rights...go here:

http://online.wsj.com/public/page/wh...topnav_na_tech
Whirlaway is offline   Quote
Old 12-16-2012, 07:40 AM   #3
Guest040616
Account Disabled
 
Join Date: Dec 23, 2009
Location: Central Texas
Posts: 15,047
Encounters: 8
Default

Quote:
Originally Posted by Whirlaway View Post
And if you want to read the WSJ's 3-year investigation into privacy rights...go here:
No thank you, I'll pass! Instead, I believe I will read Bill Clinton's "My Life." No doubt it will be a much more interesting read!
Guest040616 is offline   Quote
Old 12-16-2012, 08:49 AM   #4
Whirlaway
Account Disabled
 
Join Date: Jan 3, 2010
Location: Here.
Posts: 13,781
Encounters: 28
Default

Read it. Boring.

I am now reading "Why Me?" autobiography by Sammy Davis Jr......really good so far.

I can understand that a "Village Idiot" is handicapped and can only consume one thing at a time. Having several reading items at one time can be a challenge for the challenged!



Whirlaway is offline   Quote
Old 12-16-2012, 09:08 AM   #5
Guest040616
Account Disabled
 
Join Date: Dec 23, 2009
Location: Central Texas
Posts: 15,047
Encounters: 8
Default

So you're now "Trending" to know my consumption quota!
Guest040616 is offline   Quote
Old 12-16-2012, 09:22 AM   #6
Whirlaway
Account Disabled
 
Join Date: Jan 3, 2010
Location: Here.
Posts: 13,781
Encounters: 28
Default

You admitted you couldn't read the above post because you wanted to read a Clinton love novel.
Whirlaway is offline   Quote
Old 12-16-2012, 10:20 AM   #7
Guest040616
Account Disabled
 
Join Date: Dec 23, 2009
Location: Central Texas
Posts: 15,047
Encounters: 8
Default

Quote:
Originally Posted by Whirlaway View Post
You admitted you couldn't read the above post because you wanted to read a Clinton love novel.
Uhhhhh, where did I say I "couldn't?" I clearly stated, "I'll pass." There is a significant difference, you know? Or worse yet, you might not recognize there is a difference.

You should have paid more attention in your first grade reading class! No wonder you failed first grade twice!
Guest040616 is offline   Quote
Old 12-16-2012, 11:23 AM   #8
joe bloe
Valued Poster
 
joe bloe's Avatar
 
Join Date: Mar 10, 2010
Location: Houston
Posts: 5,740
Default

All this stuff about the government knowing everything about everyone reminds me of the movie "Minority Report." The scenario, that in the future, the government will attempt to prevent all crime by knowing who fits the profile of a likely offender, seems to be where we're headed.

If we give the government permission to completely invade or privacy, hoping that in return our saftey can be guaranteed, we will be making a terrible mistake. In the end, we are at a greater risk of harm from the government than we are from each other.

He who would trade liberty for some temporary security, deserves neither liberty nor security.”
Ben Franklin
joe bloe is offline   Quote
Old 12-16-2012, 02:26 PM   #9
CJ7
Valued Poster
 
CJ7's Avatar
 
Join Date: Feb 9, 2010
Location: Here
Posts: 14,191
Default

Quote:
Originally Posted by joe bloe View Post
All this stuff about the government knowing everything about everyone reminds me of the movie "Minority Report." The scenario, that in the future, the government will attempt to prevent all crime by knowing who fits the profile of a likely offender, seems to be where we're headed.

If we give the government permission to completely invade or privacy, hoping that in return our saftey can be guaranteed, we will be making a terrible mistake. In the end, we are at a greater risk of harm from the government than we are from each other.

He who would trade liberty for some temporary security, deserves neither liberty nor security.”
Ben Franklin

I bet Ol Ben would trade a little of one for the other in todays world ... watching jets loaded with people fly into tall buildings full of other people might have had an influence on his statment
CJ7 is offline   Quote
Old 12-16-2012, 02:57 PM   #10
acp5762
Account Disabled
 
Join Date: Feb 8, 2011
Location: Louisiana
Posts: 3,979
Encounters: 4
Default

I don't get it. We have five branches of the Military. Law enforcement on the Federal level and LE agencies in every state in every city to investigate all kinds of crimes and arrest the offenders. Yet our Government feels a need to go to this extreme to thwart the efforts of terrorists, which there isn't any. I think they are just chasing a ghost.
acp5762 is offline   Quote
Old 12-16-2012, 06:13 PM   #11
CuteOldGuy
Valued Poster
 
CuteOldGuy's Avatar
 
Join Date: May 20, 2010
Location: Wichita
Posts: 28,730
Encounters: 20
Default

Quote:
Originally Posted by CJ7 View Post
I bet Ol Ben would trade a little of one for the other in todays world ... watching jets loaded with people fly into tall buildings full of other people might have had an influence on his statment
PROVE IT!!

I've got $5 Benji's that say you can't prove ol' Ben would think differently today than he did back then!

C'mon, put up or STFU! Let's see the link, whiner!
CuteOldGuy is offline   Quote
Old 12-16-2012, 07:15 PM   #12
CJ7
Valued Poster
 
CJ7's Avatar
 
Join Date: Feb 9, 2010
Location: Here
Posts: 14,191
Default

Quote:
Originally Posted by CuteOldGuy View Post
PROVE IT!!

I've got $5 Benji's that say you can't prove ol' Ben would think differently today than he did back then!

C'mon, put up or STFU! Let's see the link, whiner!


you idiot
CJ7 is offline   Quote
Old 12-16-2012, 07:38 PM   #13
CuteOldGuy
Valued Poster
 
CuteOldGuy's Avatar
 
Join Date: May 20, 2010
Location: Wichita
Posts: 28,730
Encounters: 20
Default

Nope, just an example of how BigTurd sounds when does this. Thanks for agreeing with me that he's an idiot.
CuteOldGuy is offline   Quote
Reply

Thread Tools


AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved