FBI breaks the law again
F.B.I. Data Mining Went Beyond Targets
By ERIC LICHTBLAU
New York Times
WASHINGTON, Sept. 8 — The F.B.I. cast a much wider net in its terrorism investigations than it has previously acknowledged by relying on telecommunications companies to analyze phone-call and e-mail patterns of the associates of Americans who had come under suspicion, according to newly obtained bureau records.
The documents indicate that the F.B.I. used secret demands for records to obtain data not only on the person it was targeting but also details on his or her “community of interest” — the network of people that the target in turn was in contact with. The F.B.I. recently stopped the practice in part because of broader questions raised about its aggressive use of the records demands, which are known as national security letters, officials said Friday after being asked about it.
The community of interest data sought by the F.B.I. is central to a data-mining technique intelligence officials call “link analysis.” Since the attacks of Sept. 11, 2001, American counterterrorism officials have turned more frequently to the technique, using communications patterns and other data to identify suspects who may not have any other known links to extremists.
The concept has strong government proponents who see it as a vital tool in predicting and preventing attacks, and it is also thought to have helped the National Security Agency identify targets for its domestic eavesdropping program. But privacy advocates, civil rights leaders and even some counterterrorism officials warn that link analysis can be misused to establish tenuous links to people who have no real connection to terrorism but may be drawn into an investigation nonetheless.
(Continued here.)
By ERIC LICHTBLAU
New York Times
WASHINGTON, Sept. 8 — The F.B.I. cast a much wider net in its terrorism investigations than it has previously acknowledged by relying on telecommunications companies to analyze phone-call and e-mail patterns of the associates of Americans who had come under suspicion, according to newly obtained bureau records.
The documents indicate that the F.B.I. used secret demands for records to obtain data not only on the person it was targeting but also details on his or her “community of interest” — the network of people that the target in turn was in contact with. The F.B.I. recently stopped the practice in part because of broader questions raised about its aggressive use of the records demands, which are known as national security letters, officials said Friday after being asked about it.
The community of interest data sought by the F.B.I. is central to a data-mining technique intelligence officials call “link analysis.” Since the attacks of Sept. 11, 2001, American counterterrorism officials have turned more frequently to the technique, using communications patterns and other data to identify suspects who may not have any other known links to extremists.
The concept has strong government proponents who see it as a vital tool in predicting and preventing attacks, and it is also thought to have helped the National Security Agency identify targets for its domestic eavesdropping program. But privacy advocates, civil rights leaders and even some counterterrorism officials warn that link analysis can be misused to establish tenuous links to people who have no real connection to terrorism but may be drawn into an investigation nonetheless.
(Continued here.)
0 Comments:
Post a Comment
<< Home