/. [More Details of the NSA's Social Network Analysis]
Eugen Leitl
eugen at leitl.org
Wed May 31 09:27:59 PDT 2006
Link: http://slashdot.org/article.pl?sid=06/05/31/1321208
Posted by: CmdrTaco, on 2006-05-31 15:08:00
mrogers writes "USA Today has a story describing how the NSA looks for
[1]suspicious calling patterns in the [2]huge volumes of traffic data
it [3]collects. "Templates" such as a call from overseas followed by a
flurry of domestic calls are used to identify leads, which are
forwarded to the FBI for investigation. There have been complaints
that low-quality leads are drawing agents away from other cases, and
similar pattern-matching approaches have been [4]found wanting in the
past. Can data mining identify terrorists?"
References
1. http://www.usatoday.com/news/washington/2006-05-22-nsa-template_x.htm
2.
http://www.nytimes.com/2005/12/24/politics/24spy.html?ex=1293080400&en=016edb
46b79bde83&ei=5090
3. http://www.wired.com/news/technology/0,70908-0.html?tw=rss.technology
4. http://www-tech.mit.edu/V122/N48/48secure.48n.html
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
More information about the cypherpunks-legacy
mailing list