The Data Miner - InformationWeek
IoT
IoT
Infrastructure // PC & Servers
Commentary
1/12/2005
09:42 AM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Moving UEBA Beyond the Ground Floor
Sep 20, 2017
This webinar will provide the details you need about UEBA so you can make the decisions on how bes ...Read More>>

The Data Miner

Homeland Security Secretary-designate Michael Chertoff is a big advocate of data mining as a tool to identify terrorists.

Homeland Security Secretary-designate Michael Chertoff is a big advocate of data mining as a tool to identify terrorists.In testimony presented three years ago at a Senate Banking Committee hearing on the financial war on terrorism, when he headed the Justice Department's criminal division, Chertoff characterized data mining as a promising tool to help thwart financing of terrorist efforts.

"We are using computers to analyze information obtained in the course of criminal investigations, to uncover patterns of behavior that, before the advent of such efficient technology, would have eluded us," he testified four months after the Sept. 11 terrorist attacks. "Through what has come to be called data mining and predictive technology, we seek to identify other potential terrorists and terrorism financing networks. In our search for terrorists and terrorist cells, we are employing technology that was previously utilized primarily by the business community."

Later in 2002, speaking at a Federalist Society panel in Washington, Chertoff defended the government's aggregation of large amounts of personal information in computer databases for law enforcement and national security, as recounted at the time by the National Journal's Technology Daily. Chertoff--who helped author the Patriot Act, legislation critics say intrudes on civil liberties--defended data-mining by the government, comparing it to the type of information that Amazon.com aggregates about an individual user's book preferences. "It is hard to say that my privacy has been significantly invaded because the government, in protecting me, can use the same technologies as people who want to market to me," Chertoff said.

Speaking on the same panel, according to Technology Daily, American Civil Liberties Union President Nadine Strossen called data mining the "power to snoop on every act of every American." Chertoff retorted that data analysis had "obvious utility" in detecting "certain types of money flows" in terrorist financing.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll