/. [More Details of the NSA's Social Network Analysis]
Link: http://slashdot.org/article.pl?sid=06/05/31/1321208 Posted by: CmdrTaco, on 2006-05-31 15:08:00 mrogers writes "USA Today has a story describing how the NSA looks for [1]suspicious calling patterns in the [2]huge volumes of traffic data it [3]collects. "Templates" such as a call from overseas followed by a flurry of domestic calls are used to identify leads, which are forwarded to the FBI for investigation. There have been complaints that low-quality leads are drawing agents away from other cases, and similar pattern-matching approaches have been [4]found wanting in the past. Can data mining identify terrorists?" References 1. http://www.usatoday.com/news/washington/2006-05-22-nsa-template_x.htm 2. http://www.nytimes.com/2005/12/24/politics/24spy.html?ex=1293080400&en=016edb 46b79bde83&ei=5090 3. http://www.wired.com/news/technology/0,70908-0.html?tw=rss.technology 4. http://www-tech.mit.edu/V122/N48/48secure.48n.html ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
participants (1)
-
Eugen Leitl