U.S. Federal Data Mining Programs in the Context of the War on Terror

Cyber Crime ◽  
2013 ◽  
pp. 936-965
Author(s):  
Shahid M. Shahidullah ◽  
Mokerrom Hossain

This chapter examines the issues and concerns raised in the context of the recent growth of federal mining programs. The chapter argues that in the context of the war on terror, intelligence gathering on terrorist activities both within and outside the United States has emerged as one of the core strategies for homeland security. The major national security related federal agencies such as the Department of Justice, Department of Homeland Security, and the Department of Defense have developed a number of data mining programs to improve terrorism intelligence gathering and analysis in the wake of the events of September 11, 2001. Some data mining programs have, however, raised a number of issues related to privacy protections and civil liberties. These issues have given birth to a wider debate in the nation and raised new tensions about how to search for a balance between the needs for the protection of privacy and civil liberties, and the needs for national security. The authors believe that the future of this debate is intimately connected to the future of the war on terror. Currently, Congress and the federal courts seem to be more in favor of supporting the preeminent needs of protecting national security. Through a number of enactments, Congress has broadened the federal power for collecting terrorism intelligence both at home and abroad. In a number of cases, the federal courts have ruled in favor of the doctrines of the “state secret privilege” and the “inherent power of the President” to emphasize the overriding need for protecting national security in the context of the war on terror. As America has embarked on a long and protracted ideological war against radical militant Islam, issues of national security and the need for data mining for detecting and analyzing terrorist activities are likely to remain dominant for a long time.

Author(s):  
Shahid M. Shahidullah

This chapter examines the issues and concerns raised in the context of the recent growth of federal mining programs. The chapter argues that in the context of the war on terror, intelligence gathering on terrorist activities both within and outside the United States has emerged as one of the core strategies for homeland security. The major national security related federal agencies such as the Department of Justice, Department of Homeland Security, and the Department of Defense have developed a number of data mining programs to improve terrorism intelligence gathering and analysis in the wake of the events of September 11, 2001. Some data mining programs have, however, raised a number of issues related to privacy protections and civil liberties. These issues have given birth to a wider debate in the nation and raised new tensions about how to search for a balance between the needs for the protection of privacy and civil liberties, and the needs for national security. The authors believe that the future of this debate is intimately connected to the future of the war on terror. Currently, Congress and the federal courts seem to be more in favor of supporting the preeminent needs of protecting national security. Through a number of enactments, Congress has broadened the federal power for collecting terrorism intelligence both at home and abroad. In a number of cases, the federal courts have ruled in favor of the doctrines of the “state secret privilege” and the “inherent power of the President” to emphasize the overriding need for protecting national security in the context of the war on terror. As America has embarked on a long and protracted ideological war against radical militant Islam, issues of national security and the need for data mining for detecting and analyzing terrorist activities are likely to remain dominant for a long time.


Author(s):  
María Cristina García

In response to the terrorist attacks of 1993 and 2001, the Clinton and Bush administrations restructured the immigration bureaucracy, placed it within the new Department of Homeland Security, and tried to convey to Americans a greater sense of safety. Refugees, especially those from Iraq, Afghanistan, and Syria, suffered the consequences of the new national security state policies, and found it increasingly difficult to find refuge in the United States. In the post-9/11 era, refugee advocates became even more important to the admission of refugees, reminding Americans of their humanitarian obligations, especially to those refugees who came from areas of the world where US foreign policy had played a role in displacing populations.


Author(s):  
Shawn Malley

Well-known in popular culture for tomb-raiding and mummy-wrangling, the archaeologist is also a rich though often unacknowledged figure for constructing ‘strange new worlds’ from ‘strange old worlds’ in science fiction. But more than a well-spring for scenarios, SF’s archaeological imaginary is also a hermeneutic tool for excavating the ideological motivations of digging up the past buried in the future. A cultural study of an array of popular though critically neglected North American SF film and television texts–spanning the gamut of telefilms, pseudo-documentaries, teen serial drama and Hollywood blockbusters–Excavating the Future treats archaeology as a trope for exploring the popular archaeological imagination and the uses to which it is being put by the U.S. state and its adversaries. By treating SF texts as documents of archaeological experience circulating within and between scientific and popular culture communities and media, Excavating the Future develops critical strategies for analyzing SF film and television’s critical and adaptive responses to contemporary geopolitical concerns about the war on terror, homeland security, the invasion and reconstruction of Iraq, and the ongoing fight against ISIS.


2013 ◽  
Vol 4 (3) ◽  
pp. 1-14 ◽  
Author(s):  
Priscilla M. Regan ◽  
Torin Monahan

Decentralized organizational approaches to security provision introduce new challenges for controlling information-sharing practices, safeguarding civil liberties, and ensuring accountability. Department of Homeland Security “fusion centers,” and the multiple organizations and databases that are part of fusion centers, engender an environment in which information is migrating beyond original purposes of counterterrorism. Indeed, based on intensive qualitative research, the authors have found that fusion centers that were originally oriented toward “counterterrorism” have quickly broadened their scope to include all crimes, and those that began as “all crimes” have migrated only marginally to terrorism. This is the result of three quite predictable factors: fusion centers have to be valuable to their states, there is too little activity that is clearly terrorism related, and fusion center personnel have to use their time and skills constructively. Nonetheless, even if local policing needs are met through fusion-center funding and support, many of the activities of fusion-center analysts lend themselves to mission creep and violations of civil liberties.


Subject Deepfake technology. Significance The US Senate on October 24 passed an act that requires the Department of Homeland Security to publish a yearly report on how ‘deepfake’ technology may be used to harm national security. Deepfakes are believable digital videos, audios or photos created using artificial intelligence (AI) to portray a person saying or doing something that the person never said or did, or portraying an event as real that never took place. The level of sophistication of this technology has leapfrogged over the past two years, raising a wide spectrum of concerns. Impacts A market for anti-deepfake verification technologies will emerge. Lawmakers will need to define the lines between art/entertainment and malicious deepfakes. Upcoming elections will be impacted by the existence of this technology.


2020 ◽  
Vol 18 (2) ◽  
pp. 231-243
Author(s):  
Emma Knight ◽  
Alex Gekker

Recent technological advancements in surveillance and data analysis software have drastically transformed how the United States manages its immigration and national security systems. In particular, an increased emphasis on information sharing and predictive threat modeling following the terrorist attacks of September 11, 2001, has prompted agencies such as the Department of Homeland Security to acquire powerful data analysis software from private sector vendors, including those in Silicon Valley. However, the impacts of these private sector technologies, especially in the context of privacy rights and civil liberties, are not yet fully understood. This article interrogates those potential impacts, particularly on the lives of immigrants, by analyzing the relational database system Investigative Case Management (ICM), which is used extensively by Immigration and Customs Enforcement (ICE) to track, manage, and enforce federal immigration policy. As a theoretical framework, the we use Benjamin Bratton’s concept of the “interfacial regime,” or the layered assemblages of interfaces that exist in modern networked ICT infrastructures. By conducting a document analysis, we attempt to visually situate ICM within the federal government’s larger interfacial regime that is composed by various intertwined databases both within and outside the government’s realm of management. Furthermore, we question and critique the role ICM plays in surveilling and governing the lives of immigrants and citizens alike.


Author(s):  
Roy Ladner ◽  
Fred Petry ◽  
Frank McCreedy

In this article we provide an overview of e-government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of Web services and service-oriented architectures to aid in information sharing and reduction of IT costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This article provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Author(s):  
Roy Ladner

In this chapter we provide an overview of electronic government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of web services and service oriented architectures to aid in information sharing and reduction of Information Technology (IT) costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This chapter provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Sign in / Sign up

Export Citation Format

Share Document