US Suspends Vast ADVISE Data-Sifting System Series: "We Have No Idea What Information or How Much Was Used." Larry Orluskie, a Spokesman for the DHS Science and Technology Directorate, Says a DHS Privacy Office Review of ADVISE Last Month Corroborates the OIG Finding That ADVISE "Was Maybe Too Zealous in Its Testing," He Says. Even So, He Says, the ADVISE System Is Back on Track, Though He Is Unsure If the Privacy Assessment Was Complete or If Operations Had Resumed. A Request for Interviews with Undersecretary Cohen or Other ADVISE Officials Went Unanswered. One Conclusion, However, Is That the Privacy Failure Has Cost ADVISE Dearly. despite Some Early Successes - ADVISE's Weapons of Mass Destruction Pilot Program Identified a Link between Organized Crime and Terrorism - the Failure to Abide by Privacy Laws and Costs of Compliance Have Now Reduced Interest within DHS in ADVISE, the OIG Reports.(c) Copyright 2007. the Christian Science Monitor

By Clayton, Mark | The Christian Science Monitor, August 28, 2007 | Go to article overview

US Suspends Vast ADVISE Data-Sifting System Series: "We Have No Idea What Information or How Much Was Used." Larry Orluskie, a Spokesman for the DHS Science and Technology Directorate, Says a DHS Privacy Office Review of ADVISE Last Month Corroborates the OIG Finding That ADVISE "Was Maybe Too Zealous in Its Testing," He Says. Even So, He Says, the ADVISE System Is Back on Track, Though He Is Unsure If the Privacy Assessment Was Complete or If Operations Had Resumed. A Request for Interviews with Undersecretary Cohen or Other ADVISE Officials Went Unanswered. One Conclusion, However, Is That the Privacy Failure Has Cost ADVISE Dearly. despite Some Early Successes - ADVISE's Weapons of Mass Destruction Pilot Program Identified a Link between Organized Crime and Terrorism - the Failure to Abide by Privacy Laws and Costs of Compliance Have Now Reduced Interest within DHS in ADVISE, the OIG Reports.(c) Copyright 2007. the Christian Science Monitor


Clayton, Mark, The Christian Science Monitor


From late 2004 until mid-2006, a little-known data-mining computer system developed by the US Department of Homeland Security to hunt terrorists, weapons of mass destruction, and biological weapons sifted through Americans' personal data with little regard for federal privacy laws.

Now the $42 million cutting-edge system, designed to process trillions of pieces of data, has been halted and could be canceled pending data-privacy reviews, according to a newly released report to Congress by the DHS's own internal watchdog.

Data mining to help fight the war on terror has become an accepted, even mandated, method to provide timely security information. The DHS operates at least a dozen such programs; intelligence agencies and the Department of Defense employ many others.

But ADVISE (AnalyA-sis, DisseminaA-tion, VisuA-aliA-zation, Insight and Semantic EnhanceA-ment) was special. An electronic omnivore conceived in 2003, it was designed to ingest information from scores of databases, blogs, e-mail traffic, intelligence reports, and other sources, government documents and researchers say.

Sifting that enormous mass at lightning speed, ADVISE was to display data patterns visually as "semantic graphs" - a sort of illuminated information constellation - in which an analyst's eye could spot links between people, places, events, travel, calls, and organizations worldwide.

Report: DHS didn't follow guidelines

Yet ADVISE, whose existence and scope were first detailed by the Monitor in February 2006, seems to have run afoul of its own ambitious scope. It failed to incorporate federal privacy laws into its system design. From its earliest days, the system's pilot programs used "live data, including personally identifiable information, from multiple sources in attempts to identify potential terrorist activity," but without taking steps required by federal law and DHS's own internal guidelines to keep that data from being misused, the DHS Office of Inspector General (OIG) said in a June report to Congress, which was made public Aug. 13.

In a rebuttal attached to the report, the DHS Directorate for Science and Technology disagreed with most of the OIG's findings. "The ADVISE tool set is little more than an empty framework to which data must be applied," wrote Jay Cohen, DHS undersecretary for science and technology, in a letter accompanying the rebuttal. He said no privacy laws were violated.

Even in searching for terrorists, data-mining programs are supposed to ensure that Americans' personal information is used only when necessary and lawful - and only for specific and proper uses. One problem is that even data that look anonymous aren't necessarily so. For instance, even when names and Social Security numbers are stripped from data files, programmers can still identify 87 percent of Americans through their date of birth, gender, and five-digit Zip Code, researchers say. So a system has to be carefully designed and use encryption and other computer techniques to comply with the law.

Last week the Pentagon shut down its TALON terrorism database program, which had been found to hold files on peace activists. In 2003, another military data-mining project - the Total Information Awareness project - was also ended following a congressional uproar over privacy fears.

Congress last fall ordered its Government Accountability Office to audit the program for privacy and effectiveness. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

US Suspends Vast ADVISE Data-Sifting System Series: "We Have No Idea What Information or How Much Was Used." Larry Orluskie, a Spokesman for the DHS Science and Technology Directorate, Says a DHS Privacy Office Review of ADVISE Last Month Corroborates the OIG Finding That ADVISE "Was Maybe Too Zealous in Its Testing," He Says. Even So, He Says, the ADVISE System Is Back on Track, Though He Is Unsure If the Privacy Assessment Was Complete or If Operations Had Resumed. A Request for Interviews with Undersecretary Cohen or Other ADVISE Officials Went Unanswered. One Conclusion, However, Is That the Privacy Failure Has Cost ADVISE Dearly. despite Some Early Successes - ADVISE's Weapons of Mass Destruction Pilot Program Identified a Link between Organized Crime and Terrorism - the Failure to Abide by Privacy Laws and Costs of Compliance Have Now Reduced Interest within DHS in ADVISE, the OIG Reports.(c) Copyright 2007. the Christian Science Monitor
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.