Feeds

Pentagon bins home-front threat database

Nobody in it but boring pacifists

Intelligent flash storage arrays

The Pentagon moved yesterday to shut down a controversial military database used to record possible threats to the US services inside America.

Reuters reports that officials gave a cutoff date of 17 September for the so-called Talon system. After this, defence personnel will still report suspicious activities around military bases - the main source of Talon information - but the data will henceforth be sent to the FBI.

Talon has been understood to stand for Threat and Local Observation Notices, but a Pentagon spokesman said yesterday that originally it was just a name.

The system has been widely criticised in America for maintaining information on harmless anti-war protesters, rather than potentially violent threats to US forces and facilities. The Pentagon itself said in 2006 that there was information of this kind in the system which should have been deleted, and pledged to do so in future cases.

Opponents of the system criticised the decision to maintain Talon in operation at that point, but it went ahead anyway. Now the Pentagon says it is closing Talon, not due to criticism but because it isn't any use.

"The analytical value of it was pretty slim," Colonel Gary Keck told reporters yesterday.

Undersecretary of Defense for Intelligence James Clapper assessed the results of a year's Talon collections this April and concluded that the system wasn't worthwhile. It wasn't clear whether this was because the database was still full of worthless reports on peacenik hippies, or because it didn't have anything in it at all.

The American Civil Liberties Union (ACLU) watchdog was glad the database had been shut down, but said there were still questions to be answered.

"The TALON program could be just the tip of the iceberg," according to a statement by Caroline Fredericks of the ACLU Washington legislative office.

"It remains critical that Congress investigate how the abuse of the TALON database happened in the first place and conduct proper oversight of other intrusive surveillance by the executive branch."

The Reuters report is here. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.