Scientia Est Potentia

  • Wanna Join? New users you can now register lightning fast using your Facebook or Twitter accounts.
Jul 6, 2002
1,193
12
0
43
#1
By Robert O'Harrow Jr.
Washington Post Staff Writer
Tuesday, November 12, 2002; Page A04


A new Pentagon research office has started designing a global computer-surveillance system to give U.S. counterterrorism officials access to personal information in government and commercial databases around the world.

The Information Awareness Office, run by former national security adviser John M. Poindexter, aims to develop new technologies to sift through "ultra-large" data warehouses and networked computers in search of threatening patterns among everyday transactions, such as credit card purchases and travel reservations, according to interviews and documents.

Authorities already have access to a wealth of information about individual terrorists, but they typically have to obtain court approval in the United States or make laborious diplomatic and intelligence efforts overseas. The system proposed by Poindexter and funded by the Defense Advanced Research Projects Agency (DARPA) at about $200 million a year, would be able to sweep up and analyze data in a much more systematic way. It would provide a more detailed look at data than the super-secret National Security Agency now has, the former Navy admiral said.

"How are we going to find terrorists and preempt them, except by following their trail," said Poindexter, who brought the idea to the Pentagon after the Sept. 11, 2001, terrorist attacks and now is beginning to award contracts to high-technology vendors.

"The problem is much more complex, I believe, than we've faced before," he said. "It's how do we harness with technology the street smarts of people on the ground, on a global scale."

Although formidable foreign policy and privacy hurdles remain before any prototype becomes operational, the initiative shows how far the government has come in its willingness to use information technology and expanded surveillance authorities in the war on terrorism.

Poindexter said it will take years to realize his vision, but the office has already begun providing some technology to government agencies. For example, Poindexter recently agreed to help the FBI build its data-warehousing system. He's also spoken to the Transportation Security Administration about aiding its development of a massive passenger-profiling system.

In his first interview since he started the "information awareness" program, Poindexter, who figured prominently in the Iran-contra scandal more than a decade ago, said the systems under development would, among other things, help analysts search randomly for indications of travel to risky areas, suspicious e-mails, odd fund transfers and improbable medical activity, such as the treatments of anthrax sores. Much of the data would be collected through computer "appliances" -- some mixture of hardware and software -- that would, with permission of governments and businesses, enable intelligence agencies to routinely extract information.

Some specialists question whether the technology Poindexter envisions is even feasible, given the immense amount of data it would handle. Others question whether it is diplomatically possible, given the sensitivities about privacy around the world. But many agree, if implemented as planned, it probably would be the largest data-surveillance system ever built.

Paul Werbos, a computing and artificial-intelligence specialist at the National Science Foundation, doubted whether such "appliances" can be calibrated to adequately filter out details about innocent people that should not be in the hands of the government. "By definition, they're going to send highly sensitive, private personal data," he said. "How many innocent people are going to get falsely pinged? How many terrorists are going to slip through?"

Former senator Gary Hart (D-Colo.), a member of the U.S. Commission on National Security/21st Century, said there's no question about the need to use data more effectively. But he criticized the scope of Poindexter's program, saying it is "total overkill of intelligence" and a potentially "huge waste of money."

"There's an Orwellian concept if I've ever heard one," Hart said when told about the program.

Poindexter said any operational system would include safeguards to govern the collection of information. He said rules built into the software would identify users, create an audit trail and govern the information that is available. But he added that his mission is to develop the technology, not the policy. It would be up to Congress and policymakers to debate the issue and establish the limits that would make the system politically acceptable.

"We can develop the best technology in the world and unless there is public acceptance and understanding of the necessity, it will never be implemented," he said. "We're just as concerned as the next person with protecting privacy."

Getting the Defense Department job is something of a comeback for Poindexter. The Reagan administration national security adviser was convicted in 1990 of five felony counts of lying to Congress, destroying official documents and obstructing congressional inquiries into the Iran-contra affair, which involved the secret sale of arms to Iran in the mid-1980s and diversion of profits to help the contra rebels in Nicaragua.

Poindexter, a retired Navy rear admiral, was the highest-ranking Regan administration official found guilty in the scandal. He was sentenced to six months in jail by a federal judge who called him "the decision-making head" of a scheme to deceive Congress. The U.S. Court of Appeals overturned that conviction in 1991, saying Poindexter's rights had been violated through the use of testimony he had given to Congress after being granted immunity.

In recent years, he has worked as a DARPA contractor at Syntek Technologies Inc., an Arlington consulting firm that helped develop technology to search through large amounts of data. Poindexter now has a corner office at a DARPA facility in Arlington. He still wears cuff links with the White House seal and a large ring from the Naval Academy, where he graduated at the top of his class in 1958.

As Poindexter views the plan, counterterrorism officials will use "transformational" technology to sift through almost unimaginably large amounts of data, something Poindexter calls "noise," to find a discernable "signal" indicating terrorist activity or planning. In addition to gathering data, the tools he is trying to develop would give analysts a way to visually represent what that information means. The system also would include the technology to identify people at a distance, based on known details about their faces and gaits.

He cited the recent sniper case as an example of something that would have benefited from such technology. The suspects' car, a 1990 Chevrolet Caprice, was repeatedly seen by police near the shooting scenes. Had investigators been able to know that, Poindexter said, they might have detained the suspects sooner.

The office already has several substantial contracts in the works with technology vendors. They include Hicks & Associates Inc., a national security consultant in McLean; Booz Allen Hamilton Inc., a management and technology consultant in McLean; and Ratheon Corp., a technology company that will provide search and data-mining tools. "Poindexter made the argument to the right players, so they asked him back into the government," said Mike McConnell, a vice president at Booz Allen and former director of the NSA.

The office already has an emblem that features a variation of the great seal of the United States: An eye looms over a pyramid and appears to scan the world. The motto reads: Scientia Est Potentia, or "knowledge is power."
 
May 17, 2002
1,016
6
38
46
www.xianex.com
#4
darpa used to be arpa who responsible in many ways for the internets inception.

the internet was first known as the arpanet.

also "Scientia Est Potentia" is closer to "Intelligence has the Capability" in translation
 
Jul 24, 2002
4,878
5
0
48
www.soundclick.com
#7
Foetwin,

That's some very good info!

You know it's a trip that there is no solid definition for the word "Terrorist" in the eyes of uncle Sam.
For instance, this post can be considered domestic terrorism ya know?
The eye can be watching us all as possible threats as far was we know....
The excuse of terrorism has now given "them" the authority to invade our privacy.
It's no coincedence, this is what "they" were shooting for in the first place....
 
Jul 6, 2002
1,193
12
0
43
#8
Getting personal: 'Smart' ID cards linked to databases gain favor

http://seattletimes.nwsource.com/html/healthscience/134382084_idcard23.html

Sunday, December 23, 2001

Navy Petty Officer Wellington Jimenez walked into the room at Fort Hamilton in Brooklyn and provided his name, rank and fingerprint. In return, he got a token of the future: a plastic ID card embedded with a computer chip.

More than 120,000 active-duty military personnel, selected reserves, Defense Department civilians and some contractors have received the cards in recent months. About 4 million are to be issued over the next two years.

When Jimenez sits down at a computer on his next ship, the USS George Washington, he'll slip the card — which includes two photos, two bar codes, a magnetic strip and an etched gold chip — into a device that will electronically scramble his e-mail to prevent outsiders from reading it. The same card will automatically give him access to secure rooms across the world. At a military hospital, its chip will one day summon his medical records.

And more than ever, the cards will enable Defense Department officials to look into their databases and know the doorways he passes through, the computers he accesses and the doctors he sees, all of which is fine with Jimenez.

The high-tech IDs were designed for tracking military personnel across the globe. Now they're models for something that was unthinkable before Sept. 11: national identification cards for all U.S. citizens.

Members of Congress, security experts and high-tech executives have endorsed the idea of a new identification system. They believe the cards would prevent terrorists from operating under assumed names and identities.

Such proposals foundered in the past. Opponents raised the specter of prying bureaucrats accessing databases full of personal information and the kind of unchecked police authority that would erode constitutional protections.

Simon Davies, director of Privacy International, a London-based advocacy group that has studied national IDs, said the computers and networks in a centralized system also would become targets of hackers. In recent years, scores of private and government databases, containing financial, medical and other personal information, have been breached by hackers, some who publicized the data or used it in fraud schemes.

It also could make it easier for a successful forger or hacker to maintain a false identity, since authorities would trust a new, high-tech system. A lost or stolen card under such a system "will paralyze your card or your identity for days or weeks," he said.

A new consciousness

The nation's new consciousness of terrorism, however, has changed the way Americans think about security, surveillance and their civil liberties. For many people, the trade-off of privacy for security now seems reasonable.


Congress in October approved a sweeping anti-terrorism bill that gives authorities much broader powers to monitor e-mail, listen to phone calls and secretly gather records.

About 70 percent of those recently polled by the Pew Research Center said they favor a system that would require people to show an ID card to authorities who request it.

The political hurdles for a national ID card remain huge. President Bush has publicly downplayed its benefits, saying it's unnecessary.

Logistical problems and costs also make it unlikely that a mandatory, national ID system could soon be adopted.

But a range of steps now under way could lead to a de facto national ID system.

The American Association of Motor Vehicle Administrators, a group of state officials, is devising a plan for a national identification system linking all driver databases to driver's licenses with computer chips, bar codes and identifiers such as fingerprints or other unique physical characteristics.

Technology specialists at the Justice Department and General Services Administration have acknowledged they're working with motor-vehicle officials and commercial vendors to develop a standard for some sort of ID system, mandatory or not.

The Air Transport Association, meanwhile, has called for a similar voluntary travel card for passengers that would link to a system of government databases including criminal, intelligence and financial records. Passengers who agreed to use the card would have easier access to airplanes.

A bill introduced in Congress by Rep. Stephen Horn, R-Calif., would establish a Commission on Homeland Security to study the federal government's efforts to protect U.S. security, including the use of national ID systems.

"This commission is not intended to resolve the national identification issue," said Horn. "It is merely to advance the debate in light of the Sept. 11 attacks."


Much of the momentum for a card has been generated by the fact that five of the 19 terrorists involved in the attacks on New York and the Pentagon were able to obtain Social Security numbers by using false identities. The other 14 probably made up or appropriated other numbers and used them for false identification, according to Social Security officials. At least seven also obtained Virginia state ID cards.

Over the years, the government has found myriad ways to get involved in the identity business — passports, for one, and state-issued driver's licenses. A Social Security number is an ubiquitous identifier.

Social Security cards, however, contain no authenticating information, such as pictures, and can be easily forged. Pilot licenses are often printed on paper. Driver's licenses, even those now designed to be tamperproof, can be obtained with fraudulent birth certificates, Social Security cards and other documentation.

Tamperproof smart cards don't necessarily worry privacy advocates, who have made identity theft a banner issue in recent years. What does trouble them is the more complex question of whether a national ID system should go beyond simple authentication of an individual's identity.

Proponents argue that security can be achieved only with a smart card that can cross-check various storehouses of personal data to determine whether someone should be viewed with suspicion. That would mean, for example, that an airline ticket agent swiping a card would be warned, by law-enforcement, intelligence and some private databases, about an individual who overstayed a tourist visa, is on a government watch list or is wanted for a crime.

In the world before Sept. 11, a large majority of Americans expressed concerns in surveys about personal privacy, and those concerns focused on the increasing collection of data — names, addresses, buying habits and movements — by businesses interested in developing sophisticated marketing campaigns.

At the same time, they also demonstrated a willingness to surrender personal information for discounts or conveniences, such as cheaper groceries, faster passage through toll booths and upgrades on airline travel, one reason for an enormous growth in databases in recent years.

"Massive" database growth

"It's massive," said Judith DeCew, a Clark University professor and author of "In Pursuit of Privacy: Law, Ethics and the Rise of Technology." "It's financial information. It's credit information. It's medical records, insurance records, what you buy, calls you make. Almost every action or activity ... generates a huge database about you."

State and federal governments also have expanded their data networks and use of personal information. Nearly every time police make a traffic stop, for example, they tap into National Crime Information Center databases to check whether the driver is a known criminal or suspect.

As part of an aggressive effort to track down parents who owe child support, the federal government created a data-monitoring system that includes all individuals with new jobs and the names, addresses, Social Security numbers and wages of nearly every working adult in the United States. Banks are obligated to search through lists of accounts for deadbeats, or turn the data over to the government.

Government agencies have contracted with private companies for information. The Internal Revenue Service, for example, hired ChoicePoint to give about 20,000 employees instant access to 10 billion public records containing housing, financial and other personal information. ChoicePoint provides data to the FBI and other agencies as well.

Acxiom is lobbying Congress to change a relatively new law that limits their use of driver's-license numbers. Acxiom wants to use those numbers to create a new authentication system at airports, improving the ability of clerks to ask travelers personal questions that would help verify who they are.

Deirdre Mulligan, director of the Samuelson Law, Technology and Public Policy Clinic at the University of California, Berkeley, said any decision to adopt such a system should be made by elected officials, not motor-vehicle bureaucrats or private companies.
 
Jul 6, 2002
1,193
12
0
43
#9
Pluses and minuses

A centralized ID database would speed verification and make life more convenient for travelers, airlines and others. The disadvantage, according to civil-liberties activists, is that agencies would gain access to unprecedented amounts of aggregated data. Questions about who would maintain the database and gain access to it would be thorny. Accuracy and currency also pose challenges.

An alternative would be to configure databases to allow certain pieces of information, or fields of data, to be accessed by the smart card.

If a new ID-card system is developed in the United States, the initial users are likely to be immigrants and foreign visitors. Last month, Sen. Dianne Feinstein, D-Calif., and Sen. Jon Kyl, R-Ariz., introduced legislation that would require foreign nationals to use high-tech visa cards containing a fingerprint, retinal scan or other unique identifier. It also would create a centralized "lookout database" containing information about known terrorists and other U.S. visitors deemed threatening. The driver's-license proposal stands as an alternative to a single national card. A technical standard would define the security features of the card, but states would have the freedom of creative design and bear the burden of administering it. Proponents acknowledge it could easily assume all the features of a national ID card once other government agencies and private companies begin tailoring their computers to capture information from the card.

Even if it were approved today, proponents say, the card would take years to take hold, as motor-vehicle administrators arranged funding and drivers reapplied for licenses.

A national identification system would raise privacy questions, said Tate Preston, vice president at Datacard Group, which creates high-tech IDs. But the need for a better identification system is beyond question.

"In the 19th century, it was sufficient to ask who you are," he said. "In the 20th century, it was sufficient to show who you are. In the 21st century, you will have to prove who you are."

Copyright © 2003 The Seattle Times Company
 
Jul 6, 2002
1,193
12
0
43
#10
Bush Proposes Tracking System for Noncitizens

http://www.washingtonpost.com/ac2/w...ode=&contentId=A37758-2002Jan25&notFound=true

By Mike Allen and Bill Miller
Washington Post Staff Writers
Saturday, January 26, 2002; Page A11



SOUTH PORTLAND, Maine, Jan. 25 -- President Bush announced plans today to develop a federal tracking system to monitor the arrival and departure of noncitizens from airports, ports, and Mexican and Canadian border crossings.

A White House statement said the system "will dramatically improve our ability to deny access to those individuals who should not enter the United States, while speeding the entry of routine, legitimate traffic."

The "entry-exit tracking system," to be developed by the Immigration and Naturalization Service, was included in a list of White House funding proposals for border enforcement and inspection agencies, which Bush saluted for playing a crucial but underappreciated role in deterring terrorism.

"None of us ever dreamt that we'd have a two-front war to fight -- one overseas and one at home," Bush said after touring a Coast Guard cutter here. "But we do. That's reality. And as a result, we must respond and continue to respond, and stay on alert, and help defend America. The biggest chore I have -- my biggest job -- is to make sure our homeland is secure."

A White House official said a technology for the tracking system has not been chosen, but that biometric equipment -- which can identify people through biological markers, such as their faces, palms or irises -- will be considered. The system will not come in the immediate future, because the proposed funding is for the budget year that begins Oct. 1.

Several of the Sept. 11 hijackers were in the country illegally at the time of the attacks. At Portland International Jetport, where Air Force One landed this morning, two of them, including ringleader Mohamed Atta, began their flight in an apparent attempt to avoid big-city security.

Bush said that as part of an effort to beef up border security, the budget he will send to Congress on Feb. 4 will include funds for 800 additional customs agents and a doubling of the number of INS agents, as well as the Coast Guard's largest annual funding increase in history.

The administration said total spending on border security would rise by $2.1 billion, to $10.7 billion. The initiatives are the biggest part of Bush's proposed $37.7 billion budget for homeland security efforts. But they fall short of one of the early goals of his homeland security director, Tom Ridge, who had hoped to promote efficiency by consolidating the various agencies responsible for protecting U.S. borders. After running into turf battles, Ridge tabled the idea for further study. Meanwhile, the various agencies each will benefit under Bush's plan.

The speech was one in a series of preludes to Bush's State of the Union address on Tuesday, when he will announce homeland security as one of the three centerpieces of his agenda for his second year in office. Bush appeared in this snowy port town with Ridge, the former Pennsylvania governor, whom Bush called "my very close friend."

Ridge said the challenge for ports after Sept. 11 "is to keep terrorists and their deadly cargo out, while at the same time letting our invited guests, and the commerce that we need, in."

Bush spoke after a visit to the decks of the Coast Guard cutter Tahoma, which spent 40 days off the coast of New York City after the terrorist attacks. He said members of the Coast Guard "don't get nearly as much appreciation from the American people as they should."

Mark S. Krikorian, executive director of the Washington-based Center for Immigration Studies, which argues for reduced immigration, said the elements of Bush's plan were not bad but were not enough.

Ridge, who made border security one of his priorities after his office was created in November, has said he wants to tighten safeguards but at the same time keep commerce flowing smoothly, a difficult balance given the 1.4 million people and 360,000 vehicles crossing U.S. borders daily.

Coast Guard officials said that some of the new money would be used for maritime SWAT teams that could quickly be moved into place to provide protection at places such as Boston Harbor, through which shipments of liquefied natural gas sometimes move. The money also will permit the Coast Guard to continue its use of sea marshals, who provide armed escorts to vessels containing petroleum, hazardous waste and other dangerous cargo.

The Border Patrol, an arm of the Immigration and Naturalization Service, stepped up its presence on the northern border, a 3,500-mile stretch that INS Commissioner James W. Ziglar, in a recent appearance before Congress, described as "porous." The Customs Service also has been seeking help; its employees had been inspecting only 2 percent of the 50,000 cargo containers arriving in U.S. ports each day, and Customs Commissioner Robert C. Bonner recently expressed concern that one might contain crude nuclear weapons.

Miller reported from Washington.


© 2002 The Washington Post Company
 
Jul 6, 2002
1,193
12
0
43
#11
Darpa puts thought into cognitive computing

http://www.eetimes.com/at/news/OEG20021209S0062

By R. Colin Johnson

EE Times
December 10, 2002
ARLINGTON, Va. — A program that may push cognitive technology to a new level is being launched by the Department of Defense. The DOD, a longtime supporter and user of artificial-intelligence systems, aims to build what it is calling an "enduring personalized cognitive assistant," or Epca.

The system will be able to "reason, use represented knowledge, learn from experience, accumulate knowledge, explain itself, accept direction, be aware of its own behavior and capabilities as well as respond in a robust manner to surprises," according to a Defense Advanced Research Projects Agency (Darpa) Broad Agency Announcement. The BAA requests research proposals for Epca designs by Dec. 19.

Darpa expects to begin funding the new cognitive computer projects as early as the first quarter of 2003. Besides Epca, Darpa's Information Technology Processing Office will also consider funding any project fitting its characterization of a "new class of cognitive system."

"What we are really after with the enduring personalized cognitive assistant is to get people working on a multiyear path to bring all the pieces together," said director Ronald Brachman, who will co-head the initiative along with deputy director Zachary Lemnios. "It's not as if we need the world's best machine-learning algorithm. We just need something that is adequate, put together with a knowledge representation and perfected enough to see if, when you unify all these elements, that you can actually make it work."

Darpa has backed similar initiatives before. The first was for artificial intelligence, and the next for neural networks. The agency claims that both of those projects were successful, even though they did not achieve their stated goals.

"People say that neural networks and AI were not successful because we don't have humanoid robots walking around, but they don't realize that there are hundreds of applications of this technology that we use every day without thinking," Brachman said. "Machine-learning techniques are now built into a variety of commercial systems, finding credit card fraud, evaluating mortgage applications, detecting illegal telephone calls and recognizing speech." He maintained that "AI planning algorithms were successful in Desert Storm and are being used every day by the military in complicated logistic situations."

A prime reason for looking at AI designs again is the rapidly increasing speed of computer technology. Brachman cited IBM Corp.'s Deep Blue project, which bested a grand champion in chess last year.

"The speed of computers enabled IBM's Deep Blue to beat a human [grand champion] — they didn't need to discover new algorithms, but just needed the raw crunching power to get over this last hump," Brachman said.

Brachman also cited major advances in understanding the workings of the human brain as further evidence that now is the right time to move to a new level of AI capability. He is reluctant, however, to set overly ambitious goals, like the creation of an artificial brain. Instead, Brachman opts for setting what he thinks are achievable goals that may lead to breakthroughs on a longer time scale.

'Mind-blowing' potential


"We have no illusions that after four years we will have solved artificial intelligence, or that we'll have a humanoid robot walking around our offices. However, we do believe that the strength of the community, under the right leadership, has a pretty good chance of being able to prove whether or not it's doable, and maybe five or six years after we are gone, if people stay the course, we will actually have something mind-blowingly significant," Brachman said.

The specifications for Darpa's enduring personalized cognitive assistant illustrate Brachman's commitment to achievable goals. "Enduring" means that the assistant remembers what it has already learned, and "personalized" means that it applies what it learns to specific problems. "We're not looking for superhuman behavior, like reading minds," he said, "but just commonsense reasoning that one would expect even from a child.

"The main focus in the first go around will be the office — we are not going to try to build the end-all, be-all, artificial human being — that is absolutely not what we are after. But [human secretaries] . . . have certain capabilities that do seem within the realm of possibility and we don't know if we will be successful — so we're right there on the hairy edge," Brachman said.

Brachman envisions an enduring personalized cognitive assistant that could learn to help around the office by observing and interacting with office workers. Generally, human office assistants learn how an office operates over time, by interacting with others.

"Sometimes an assistant will merely watch you and draw conclusions. Sometimes you have to tell a new person, 'Please don't do it this way' or 'From now on when I say X, you do Y,' so it's a combination of learning by example and by being guided. To my knowledge, as simple as it sounds, that has never been tried before," Brachman said.

Beyond the Epca program, the BAA describes a vast area of research that it will consider funding. Darpa will keep accepting proposals for projects until June 6, 2003.

"We have not committed to a specific technology to make this work. If it takes somebody building an artificial analog-based computational device based on an understanding of the brain — let's say it's different from a neural net, something totally new that has nothing to do with AI or symbolic processing — then we want to hear about it. We don't want to discourage people who think along those lines," Brachman said.

Of the very broad call for proposals, Brachman did note that Darpa is particularly interested in "systems" aspects, because, as he contends, architecture is the rarest entity to emerge from an academic environment. The reason: Researchers have to "publish or perish" and almost never have the time to integrate all the various bits and pieces that they describe in their papers into real systems.

For architecture, the BAA specifically cites three "cognitive" aspects Darpa hopes to see fleshed out in proposals: reactive, deliberative and reflective processes. Reactive processes are quick, direct responses to real-time inputs. Deliberative processes include planning and other structured reasoning tasks, including communications tasks that "deal thoughtfully with natural language." A system's reflective processes, in the BAA view, take as their input the observations that the system makes of itself — a rudimentary form of self-awareness.

The other aspects of cognition that will likely spawn both hardware and software submodules, according to the BAA, include both long-term and short-term memories, perception, representation, reasoning, communications and actuation. By integrating those modules with a knowledge base under the control of reactive, deliberative and reflective processes, the BAA hopes that systems can be built that have "common sense." Such "cognitive systems might be best characterized as systems that know what they are doing."

Although a lot of research has gone into uncovering the mechanisms of memory, sight and hearing, with advances in understanding specific cognitive operations like speech recognition, no one is close to completing a blueprint that would show how to wire up all those computing elements. The BAA program suggests that this is due to the lack of critical research that "must be done to determine how to take advantage of huge numbers of computing elements to produce intelligent processing of the sort that we would call cognitive."

Toward 'self-awareness'


The BAA asks the question, "Can the human and animal perceptual systems give us insights into how to find important low-frequency events in huge amounts of data?" And it cautions that working "smart" is the goal, not simply copying nature. Thus, instead of wiring up transistors that mimic real neural networks in the brain and hoping for cognition to emerge, the BAA calls for researchers to consider new architectures that can "harness raw computing power in the powerful ways that brains do . . . the real power of human information processing seems to come from higher-level capabilities that use abstraction, mental simulation and planning, hypothetical reasoning, powerful language-understanding and generation capabilities, and self-awareness."

The BAA also suggests several interesting intelligent interfaces that would adapt to users, rather than requiring the user to adapt to them. For instance, a software development environment based on natural language might engage users in a dialogue to suggest new capabilities, and the system would then respond with what would have to change in its internal state to accommodate them. "In a debugging context [the system] could directly help us determine where and why its behavior strayed from the desired outcome," Brachman said.
 
Jul 6, 2002
1,193
12
0
43
#13
Outsourcing Big Brother

http://www.website101.com/arch/archive139.html

Outsourcing Big Brother: Office of Total Information Awareness Relies on Private Sector to Track Americans


By Adam Mayle and Alex Knott
WASHINGTON, Dec. 17, 2002 -- The Total Information Awareness System, the controversial Pentagon research program that aims to gather and analyze a vast array of information on Americans, has hired at least eight private companies to work on the effort. Since 1997, those companies have won contracts from the Defense Department agency that oversees the program worth $88 million, the Center for Public Integrity has learned.

The Defense Advanced Research Projects Agency (DARPA), which oversees the Total Information Awareness System (TIA), awarded 13 contracts to Booz Allen & Hamilton amounting to more than $23 million. Lockheed Martin Corporation had 23 contracts worth $27 million; the Schafer Corporation had 9 contracts totaling $15 million. Other prominent contractors involved in the TIA program include SRS Technologies, Adroit Systems, CACI Dynamic Systems, Syntek Technologies, and ASI Systems International.

TIA itself was first proposed by an employee of a private contractor. John Poindexter, who worked on DARPA projects for Syntek, an Arlington, Va.-based technical and engineering services firm, suggested the program in the wake of the Sept. 11, 2001, terrorist attacks. Poindexter, who headed the National Security Council during the Reagan administration, was convicted in 1990 on five felony counts for his role in the Iran-Contra scandal. The convictions were overturned in 1991 because he had been given immunity for his testimony during the congressional investigation of the affair. On Jan. 14, 2002, he returned to the government as the director of the Information Awareness Office.

TIA draws heavily on the private sector. Five of the eight contractors identified by the Center are involved in evaluating future contracts for the program. Grey E. Burkhart, an associate of Booz Allen Hamilton, identifies himself on his resume as “assistant project manager” of TIA system implementation. Even the phrase “Total Information Awareness” has a private pedigree—Visual Analytics, Inc., a Poolesville, Md.-based software developer and DARPA contractor, has applied for a trademark for the phrase.

In addition, the Center found that at least 24 universities received almost $10 million during the last five years to do research on TIA-related projects. Some of the largest grants went to Cornell University, Columbia University and University of California, Berkeley and dealt with the TIA's language translation program, Translingual Information Detection, Extraction, and Summarization.

"DARPA doesn’t do any of its own research,” Jan Walker, a spokeswoman for the agency, told the Center. She also said that DARPA doesn’t require private contractors to share their research solely with DARPA. “The government benefits when there are commercial applications [from DARPA research] because it keeps the cost down,” she said. Any limitations on commercial use are negotiated “on a case by case basis,” she said, adding that, “Many of the things DARPA does have commercial applications.”

DARPA employs 240 people and oversees a budget of roughly $2 billion, according to its Website. It relies heavily on outside contractors. Some act as “systems engineering technical assistance,” or SETA contractors, who assist DARPA in “managing the efforts and representing the program with Congress, the Office of the Secretary of Defense, the military services and/or involved unified commander.” Typical projects involve five to ten contractors, two universities, and budgets between $10 and $40 million. DARPA’s Website also notes that the best program managers—the agency’s employees who oversee the contractors—“have always been freewheeling zealots in pursuit of their goals…”


A lack of oversight

Congress, which exercises oversight of the executive branch and the military, has not held a single public hearing on TIA and sources on the Hill suggested that members know little about it. In a Nov. 22, 2002, letter, Sen. Charles E. Grassley (R-Iowa) asked the inspector general of the Defense Department to “conduct a complete and thorough review of the TIA program.” Noting that available information regarding TIA was not sufficient, Grassley wrote that “[the Defense Department’s] comments (about DARPA) only provide few answers and invite many more questions.”

Grassley questioned the parameters and scope of TIA, how Poindexter was selected to head it, and what protections are in place to ensure civil liberties are not violated.

The Defense Department has not begun an inquiry. “They have it under consideration,” Susan Hansen, a spokesperson at the Defense Department, told the Center. “I have not heard of any final decision about the status.”

Sen. Dianne Feinstein (D-Calif.) said that she plans to introduce legislation to address any threats to the privacy rights of Americans that TIA poses.

Despite Congress’ lack of knowledge about the program, the overall budget for TIA programs is increasing, and will nearly triple from $43 million in fiscal year 2001 to $110 million in fiscal year 2003. According to declassified budgets released recently from DARPA, some projects that have existed since 1996 will receive similar spending boosts now that the TIA office has been officially created. For instance, a TIA project called Wargaming the Asymmetric Environment grew from $6.8 million in fiscal year 2001 to $18.5 million in fiscal year 2003.


An ongoing effort

The stated goal of TIA, which began in the 2002 fiscal year, is “to revolutionize the ability of the United States to detect, classify and identify foreign terrorists—and decipher their plans—and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts.” To accomplish this, the program seeks to combine several kinds of information—financial, education, travel, medical, veterinary, transportation and housing transactional records; face, finger print, and other identifying data—into databases.

TIA draws heavily on other DARPA research projects that were ongoing long before Sept. 11, 2001. For example, Project Genoa, a computer program designed to rapidly analyze data, share it and develop plans based upon it, began prior to 1997 and was completed in the 2002 fiscal year. The Defense Intelligence Agency has agreed to use Genoa. A Genoa II project is underway at DARPA.
Syntek was a contractor for the Genoa Project providing “specialized technical and programmatic” advice for more than five years. According to his resume—which had been posted on the home page of the Information Awareness Office (which oversees TIA) until it was removed in November along with the resumes of other IAO personnel—Poindexter joined Syntek in 1996. The first documented reference to Syntek’s involvement in Genoa indicates that the company began working for DARPA by mid-1996. Since 1997 Syntek received nine contracts from DARPA totaling $1.18 million. Poindexter worked for Project Genoa via Syntek through 2001 before returning to the Defense Department as the director of the Information Awareness Office (IAO).

According to financial disclosure documents filed by Poindexter, before joining DARPA he earned $147,182 a year while working for Syntek. Poindexter worked closely with DARPA helping to develop Project Genoa, which is now a component of TIA. Under Poindexter’s guidance, IAO will continue to use Syntek as a TIA contractor. He also reports receiving income for acting as a consultant to the U.S. Government for Syntek. These days, according to the Transactional Records Access Clearinghouse, Poindexter is receiving a salary of $138,200—the most of any DARPA employee and equal to the salary of DARPA Director Tony Tether.

One month after he joined the board of directors of Saffron Technology in September 2000, the company announced it had received funding from DARPA for Genoa, which is now part of the TIA program.

Poindexter characterized the mission of IAO as “the integration and assured transition of components developed in the programs Genoa, Genoa II, GENISYS, EELD, WAE, TIDES, HumanID, and Bio-surveillance,” in an August 2002 speech at the DARPATECH conference in Anaheim, Calif. Those programs, all of which predate TIA and are under the aegis of the IAO, analyze and extract data, allow the identification of individuals by their characteristic body movements, or automatically translate Arab, Persian and other languages into English. Poindexter explained that TIA is “the overarching program that binds IAO’s efforts together.”

Many of the components of TIA, such as Genoa, have been ongoing projects since the Clinton administration. And in the May 13, 1999, issue of Commerce Business Daily, a now-superceded bulletin board for government contracts, there is a notice from DARPA that it intended to award a company named Integral Visuals, Inc. a purchase order for technical and engineering support for “Project Genoa and Total Information Awareness,” suggesting that TIA, like its components, predates the Sept. 11, 2001, terrorist attacks.

In a Nov. 20, 2002, news briefing, Undersecretary of Defense for Acquisition, Logistics, and Technology Pete Aldridge disclosed that Poindexter was the mastermind of the TIA project. Noting that Poindexter had “a passion for this project,” Aldridge explained, “He came to us with the project after September the 11th and volunteered it to DARPA. Tony Tether, the director of DARPA, came over with John and briefed it to me, and I thought it was a project worthy of pursuit.”
 
Jul 6, 2002
1,193
12
0
43
#14
...continued...

The private connection

Last April, IAO published a document with the bureaucratic title BAA 02-08 Information Awareness Proposer Information Pamphlet, which asks private companies to provide “innovative research proposals in the area of information technologies that will aid in the detection, classification, identification, and tracking of potential foreign terrorists…and to develop options to prevent their terrorist acts.”

The same document spells out the central role that contractors play in IAO, which will “…use personnel from SRS Technologies, Syntek Technologies, CACI, Schafer Corporation and Adroit Systems as special resources to assist with the logistics of administering proposal evaluation and to provide advice on specific technical areas.”

DARPA has hired diversified defense industry giants Lockheed-Martin and Booz Allen & Hamilton for TIA and related projects. Booz Allen has won what may become the largest TIA contract, potentially worth $62 million over the next five years if DARPA exercises all the contract’s options.

Booz Allen employee Grey E. Burkhart’s resume notes that he is the “assistant program manager for the implementation of an advanced collaborative analysis system for the counterterrorism and intelligence communities,” which he identifies as “Total Information Awareness (TIA) System Implementation.” DARPA spokeswoman Walker told the Center that Burkhart is not an employee of the government.

Burkhart has had more than 25 years of experience in strategic security, intelligence, and telecommunications. Working in both the private and public sectors he was a career intelligence officer, CEO of Allied Communications Engineering, and has become a “recognized expert on in the global proliferation of information technology.”

Burkhart’s resume also notes that he was a member of Booz Allen’s Homeland Security Coordination Center and Tiger Team, for which he “conducted analysis of new legislation and executive orders and assessed their impact on current and future business.”


Big brother on campus

Private companies have not been the only players in TIA research. Dozens of universities within and without the United States have also worked on the program’s components for years.


Since late 2000, researchers at Georgia Tech have been working on a new computer-based identification system called Human ID that theoretically can take video images from a camera and distinguish people by the way that they walk and their different mannerisms. The applications of this software could have unlimited potential when used with satellite imaging, government video, and even security cameras. The theory is that each person has distinctive body movements and by recording and analyzing these movements, the government could identify suspects even if they are wearing disguises or have altered their appearances.

According to unclassified budget documents recently released by the Defense Department, DARPA spent $11.8 million during the 2001 fiscal year to develop a “pilot force protection system” for Human ID as well as create prototype models and develop advanced sensors (p. 88.). DARPA’s new budget increases the program’s spending to $30.1 million during the next two fiscal years to identify the limitations of the range and accuracy of the program while fusing multi-modal technologies to derive biometric signatures.

Overall, Georgia Tech has received four federal grants totaling $1.2 million for the “HumanID from movement” project, beginning in the last quarter of 2000. The funds are part of a $50 million DARPA program to identify people from a distance that encompasses 26 research projects including two from Georgia Tech to analyze movement.

In addition to recognizing people by body movement, Human ID is working on facial recognition and iris recognition software. These uses have been tested on subjects at a distance of 25-150 feet, but future DARPA plans anticipate distances as far as 500 feet.

“I do computer vision research,” said Aaron Bobick, an associate professor at Georgia Tech researching HumanID for DARPA. “Part of it is to see how to get computers to see things. One of things that I am working on is understanding motion and recognizing people from a distance.”

Bobick told the Center that the research is still preliminary. “We’ve found it to be successful in a limited number of cases but gait recognition is really in its infancy. We don’t know how successful it will be. We are still at the point where we don’t know what will be possible.”

DARPA projects on identification go well beyond “naked eye” visual appearance. The defense agency is currently trying to identify potential suspects by their unseen traits using plumes of odorant molecules. While doing experiments on subjects as small as moths, bacteria and mammals, scientists are finding new ways of differentiating small particles to understand identity.

DARPA has spent more than $427,000 on four grants to the University of Arizona dating back to 1998 to study this identification method called “biologically-inspired search algorithms for locating unseen odor sources.”

Like gait recognition, the smell test is still in development



 
Apr 24, 2003
1,377
21
0
45
Kansas City, MO
#19
ha ha, thats funny you say tell a friend, because right after i read them, i copied them to a disk and gave them to this guy i work with to read. people should definately know about this shit. hell, i can vouch for the military id thing, being that one is in my pocket right now.
 
Jul 6, 2002
1,193
12
0
43
#20
Nightbreed said:
ha ha, thats funny you say tell a friend, because right after i read them, i copied them to a disk and gave them to this guy i work with to read.
Amen 2 "Tell a friend"

Nightbreed said:
people should definately know about this shit.
Nuff SAID !!!

Nightbreed said:
hell, i can vouch for the military id thing, being that one is in my pocket right now.
Well, you are a truely a bold souljah, I know you love America, but juz dont let them dictate and determine your ultimate future, bruh. Fight against the System in the name of justice, freedom, and real independence!!!

You are the only person on this board to have nuts enough to respond to realism, I commend you on that Nightbreed....

To the rest of y'all yeen gotta peep, juzz stay sleep

:dead:

But uh, open ya eyes and see what's in the near future round my way~way, check this article that was on today's front page

And a state that they forgot to mention that already has this technology is Anchorage, Alaska, I've seen it myself with my own eyes this past winter....