Feeds

NSA searches for advanced data mining tech

Silicon Valley shopping spree

The Essential Guide to IT Transformation

The National Security Agency (NSA) visited Silicon Valley this month on the hunt for private sector technology to beef up its already formidable snooping and signals intelligence portfolio. Data mining technologies to search for connections between seemingly unrelated snippets of information was top of the NSA's shopping list, according to venture capitalists who held meetings with agency officials.

The New York Times reports that the agency is hunting for technology that fits with its increased emphasis on scanning millions of ordinary Americans' phone calls and emails for 'suspicious' patterns. "The theory is that the automated tool that is conducting the search is not violating the law. [But] anytime a tool or a human is looking at the content of your communication, it invades your privacy," Mark D Rasch, former head of computer-crime investigations for the Justice Department and current SVP of computer security firm Solutionary, said.

According to the NYT, the NSA is seeking to extend data mining techniques (already widely used in the private sector by credit card companies and the like) by applying analysis tools used by law enforcement agencies in the search for potential terrorists. It lists a crime investigation spreadsheet called Analyst's Notebook, which allows investigators to view telephone and financial records of suspects, and visualisation tools from firms such as i2, as examples of the types of technologies the agency is interested in.

One security expert said the surveillance tools adopted as part of the Bush administration's anti-terrorist eavesdropping program are misguided. "In many respects, we're fighting the last intelligence war," John Arquilla, a professor of defence analysis at the Naval Postgraduate School in Monterey, California and a consultant on the Total Information Awareness project said. "We have not pursued data mining in the way we should."

Arquilla argued that the estimated $40bn a year spent on data mining programs would be better redirected in matching up information available from public source, such as "internet chat rooms used by Al Qaeda". ®

Build a business case: developing custom apps

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.