/. [More Details of the NSA's Social Network Analysis]

Eugen Leitl eugen at leitl.org
Wed May 31 09:27:59 PDT 2006


Link: http://slashdot.org/article.pl?sid=06/05/31/1321208
Posted by: CmdrTaco, on 2006-05-31 15:08:00

   mrogers writes "USA Today has a story describing how the NSA looks for
   [1]suspicious calling patterns in the [2]huge volumes of traffic data
   it [3]collects. "Templates" such as a call from overseas followed by a
   flurry of domestic calls are used to identify leads, which are
   forwarded to the FBI for investigation. There have been complaints
   that low-quality leads are drawing agents away from other cases, and
   similar pattern-matching approaches have been [4]found wanting in the
   past. Can data mining identify terrorists?"

References

   1. http://www.usatoday.com/news/washington/2006-05-22-nsa-template_x.htm
   2.
http://www.nytimes.com/2005/12/24/politics/24spy.html?ex=1293080400&en=016edb
46b79bde83&ei=5090
   3. http://www.wired.com/news/technology/0,70908-0.html?tw=rss.technology
   4. http://www-tech.mit.edu/V122/N48/48secure.48n.html

----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]





More information about the cypherpunks-legacy mailing list