New User? Click here to register! Feel free to read this for beginners help.

Computer Cops
image image image image image image image image
Prime Choice
· Head Lines
· Dnld of the Week!
· Find a Cure!

· Ian T's (Article 13)
· Marcia's (Op9)
· Paul's (Article 3)

· Ian T's Archive
· Marcia's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search
· Sections
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Search

image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 9704
Comments: 94
image
Donations
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Hosted By
Computer Cops is a satisfied customer of [ JaguarPC ]
image
image prvy: The Legislature: Privacy Protecting Programs Killed image
Privacy


Privacy Protecting Programs Killed
By MICHAEL J. SNIFFEN,
Associated Press Writer

WASHINGTON - Two cutting-edge computer projects designed to preserve the privacy of Americans were quietly killed while Congress was restricting Pentagon (news - web sites) data-gathering research in a widely publicized effort to protect innocent citizens from futuristic anti-terrorism tools.

As a result, the government is quietly pressing ahead with research into high-powered computer data-mining technology without the two most advanced privacy protections developed to police those terror-fighting tools.


It's very inconsistent what they've done, said Teresa Lunt of the Palo Alto Research Center, head of one of the two government-funded privacy projects eliminated last fall.


Even members of Congress like Sen. Ron Wyden, D-Ore., who led the fight to restrict the Pentagon terrorism research, remain uncertain about the nature of the research or the safeguards. He won a temporary ban on using the tools against Americans on U.S. soil but wants to require the administration to give Congress a full description of all its data-mining research.


We feel Congress is not getting enough information about who is undertaking this research and where it's headed and how they intend to protect the civil liberties of Americans, said Chris Fitzgerald, Wyden's spokesman.


The privacy projects were small parts of the Pentagon's Terrorism Information Awareness research.


The project was the brainchild of retired Adm. John Poindexter, who was driven from the Reagan administration in 1986 over the Iran-Contra scandal. Some 15 years later, he was summoned back by the Bush administration to develop data-mining tools for the fight against terrorism.


Poindexter's new software tools, far more powerful than existing commercial products, would have allowed government agents to quickly scan the private commercial transactions and personal health records of millions of Americans and foreigners for telltale signs of terrorist activity.


Partly to appease critics, Poindexter also was developing two privacy tools that would have concealed names on records during the scans. Only if agents discovered concrete evidence of terrorist activities would they have been permitted to learn the identities of the people whose records aroused suspicion.


One privacy project worked with Poindexter's Genisys program, which scanned government and commercial records for terrorist planning. The other was part of his Bio-ALIRT program, which scanned private health records for evidence of biological attacks.


Late last year, Congress closed Poindexter's office in the Defense Advanced Research Projects Agency, or DARPA, in response to the uproar over its impact on privacy.


But Congress allowed some Poindexter projects, including some data-mining research, to be transferred to intelligence agencies. Congress also left intact similar data-mining research begun in the fall of 2002 by the Advanced Research and Development Activity, or ARDA, a little-known office that works on behalf of U.S. intelligence.


The research sponsored by ARDA, called Novel Intelligence from Massive Data, is so similar to some work done for Poindexter that Lunt offered to adapt her privacy protection software. ARDA and other agencies weren't interested because Congress had killed the original projects.


When I went to talk to them, ARDA made clear they don't want to get into any area Congress doesn't want to fund, Lunt said.


It's not clear what, if any, privacy research is being done by ARDA or by the surviving remnants of Poindexter's program.


Last fall's Intelligence Authorization Act approved continued research on the type of powerful data-mining Poindexter envisioned but said the policies and procedures necessary to safeguard individual liberties and privacy should occur concurrently with the development of these analytic tools, not as an afterthought.


ARDA said it obeys all privacy laws and hasn't given its researchers any government or private data, but it declined to say whether it is sponsoring any research on privacy protection.





Lunt, a former DARPA program manager, was developing privacy protection software for Poindexter's Genisys program. Her software shielded identities in the records the government reviewed, restricted each intelligence analyst to only the data he or she was authorized to see and created a permanent record to track cheaters.

Professor LaTanya Sweeney of Carnegie Mellon University was the principal researcher developing privacy protections for the Bio-ALIRT project. An early version of Bio-ALIRT was used to help protect President Bush (news - web sites)'s 2001 inauguration and the 2002 Olympics before Sweeney developed her privacy software.

She also presented her work last fall to officials of various agencies and said she was told they might want to continue the work. But they came through with zero dollars.

The bio-surveillance system monitors symptoms of patients at emergency rooms and doctors' offices and such less-obvious sources as increases in grocery store orange juice sales and in school absenteeism in hopes of detecting a biological attack. Names are concealed until evidence suggests victims need to be treated.

Sweeney said DARPA paid to develop the privacy software but didn't pay for a public field test. The tool just sits there unused, she said. People think they have to sacrifice privacy to get safety. And it doesn't have to be that way.

Posted on Thursday, 18 March 2004 @ 11:42:14 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Intel
· HotScripts
· W3 Consortium
· More about Privacy
· News by phoenix22


Most read story about Privacy:
Ad-aware 6 Release from Lavasoft

image
Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.