KDnuggets : News : 2004 : n11 : item4 | PREVIOUS | NEXT |
FeaturesSubject: Pentagon Technology and Privacy Advisory Committee urges data mining framework May 28, 2004 -- Dawn S. Onley -- GCN Staff A special committee has released findings on ways the Defense Department can use data mining to help identify terrorists while also protecting the privacy of private citizens. Among other things, the committee calls for a regulatory framework for all DOD data mining, a policy-level privacy officer and a panel of external advisers to identify and resolve privacy issues. The Technology and Privacy Advisory Committee (TAPAC), appointed by Defense secretary Donald Rumsfeld, came together in February 2003 to examine ways the government could use advanced information technologies to identify terrorists before they act. The committee was appointed around the same time legislators were in heated battle with officials in the Defense Advanced Research Projects Agency over its Terrorism Information Awareness program. TIA was a computerized terrorist tracking system designed to collect and correlate information from disparate databases ranging from financial to health, to help the government track down potential terrorists. Congress terminated most of the program�s funding last fall. The committee was asked to come up with ways DOD could develop safeguards to ensure that data mining techniques are consistent with U.S. law concerning privacy. Over the course of its background briefings, research and public hearings, committee members called more than 60 witnesses from DOD, other government agencies, industry, academia and advocacy groups, to testify. Although TAPAC's final report (available from http://www.sainc.com/tapac/finalReport.htm) was sent to Rumsfeld in March, it was released Thursday. Among the 12 recommendations:
TAPAC RecommendationsRecommendations Concerning DOD Data Mining
RECOMMENDATION 1
RECOMMENDATION 2
RECOMMENDATION 2.1
An agency head may make the written finding described above either for programs that include data mining as one element, and data mining concerning U.S. persons may occur, or for specific applications of data mining where the use of information known or likely to concern U.S. persons is clearly anticipated.
RECOMMENDATION 2.2
RECOMMENDATION 2.3
RECOMMENDATION 2.4
An agency within DOD may engage in data mining using personally identifiable information known or reasonably likely to concern U.S. persons on the condition that, prior to the commencement of the search, DOD obtains from the Foreign Intelligence Surveillance Court a written order authorizing the search based on the existence of specific and articulable facts that meet the requirements of this recommendation. DOD may seek the approval from the Foreign Intelligence Surveillance Court either for programs that include data mining as one element, and data mining of personally identifiable information known or likely to include information on U.S. persons may arise, or for specific applications of data mining where the use of personally identifiable information known or likely to include information on U.S. persons is clearly anticipated. An agency may reidentify previously anonymized data known or reasonably likely to concern a U.S. person on the condition that DOD obtains from the Foreign Intelligence Surveillance Court a written order authorizing the reidentification based on the existence of specific and articulable facts that meet the requirements of this recommendation. Without obtaining a court order, the government may, in exigent circumstances, search personally identifiable information or reidentify anonymized information obtained through data mining if it meets the requirements of this recommendation. RECOMMENDATION 2.5 Auditing for compliance. Any program or activity that involves data mining known or reasonably likely to include personally identifiable information about U.S. persons should be audited not less than annually to ensure compliance with the provisions of this recommendation and other applicable laws and regulations.
RECOMMENDATION 3
... For additional information, see for example Epic story and GCN story. See also Washington Post Story: Common Sense and Computer Analysis, by By Heather Mac Donald (May 31, 2004), critical of TAPAC recommendations. |
KDnuggets : News : 2004 : n11 : item4 | PREVIOUS | NEXT |
Copyright © 2004 KDnuggets. Subscribe to KDnuggets News!