Skip to: Content
Skip to: Site Navigation
Skip to: Search


Mining data to nab terrorists: fair?

Digital minutiae could be used to track terror networks, but it could produce false positives.

By Staff writer of The Christian Science Monitor / May 15, 2006



What can the United States government really glean from the phone-call histories - records of who called whom, when, and for how long - of millions of Americans?

Skip to next paragraph

After all, it's the same information that has long been available to authorities armed with a subpoena, though not sought en masse until after the 9/11 terror attacks. Its value, say computer experts and others, is that it can be used to identify a "social network" of interconnected people - including, perhaps, would-be terrorists.

"From phone records you can learn who are my friends - and who their friends are - what services I use, where I shop," says Johannes Gehrke, a computer scientist at Cornell University who has written search algorithms for government analysis programs. "Our social interactions leave a digital trail. [Phone-record analysis] is government learning about human behavior from analyzing that trail."

Moreover, they assert, phone records are just one part of a much larger government effort to analyze the digital minutiae of American life in the hope of uncovering terrorist networks buried within it. Potentially invasive, such counterterror activity aims to build databases that can be cross-referenced in the hope of matching patterns, relationships, and activities that bear investigating, experts say.

"You should presume that phone numbers are being collated with Internet records, credit-card records, everything," says Bruce Schneier, a security technologist with Counterpane Internet Security in Mountain View, Calif.

Cross-indexing phone records can reveal a social profile of friends and acquaintances and a geographic profile. Each individual in that chain might then be cross-indexed against his or her retail purchases, credit history, e-mail, medical records, airline reservations, Social Security number, fingerprints - anything that can be digitized and stored in databases, and assuming that the government has access to them. Such activity is potentially invasive, many experts acknowledge, but will it work?

"In the commercial and consumer world, data mining has seemed quite successful," says George Cybenko, an engineering professor at Dartmouth College. "We don't have that many new technologies in our repertoire to address this new terrorist threat. So we have to explore them."

Others argue that this "social network analysis" - the computer data-mining technique rapidly gaining ground in intelligence and law-enforcement circles - carries legal and practical risks. As the effort gains momentum, it may collide with law, invade Americans' privacy, undermine civil liberties, or grow to such an enormous size that it may actually make finding terrorists harder by producing too many "false positives," some say.

A USA Today report last week indicated that the National Security Agency is well along that technological path. Using data from phone company computers, the NSA has been building a gargantuan database containing the detailed calling histories of most Americans, the report said.

The idea is for computer algorithms to identify digital calling patterns that authorities would expect a terrorist might follow.

While congressmen of both parties fumed last week, President Bush defended government surveillance activity in general, saying it "strictly targets Al Qaeda and its known affiliates." Americans' privacy is being "fiercely protected," he said.

Assurances of privacy protection

Contacted by the Monitor, the NSA did not offer a response to specific questions about its role as described by the USA Today report.

Permissions