What's new

FBI "DATA MINING"

Where's my tin-foil hat when I need it... 😛
Not so fast. Please read the following.

Tinfoil hats attract mind-control signals, boffins learn

By Thomas C Greene in Washington (thomas.greene at theregister.co.uk)
Published Friday 11th November 2005 02:05 GMT

Wearing a tinfoil hat to deflect government mind-control radio waves is even more foolish than most people think. According to several (apparent) students from MIT who tested several hat designs, there was "a 30 db amplification at 2.6 Ghz and a 20 db amplification at 1.2 Ghz, regardless of the position of the antenna on the cranium."

The students note that "the helmets amplify frequency bands that coincide with those allocated to the US government between 1.2 Ghz and 1.4 Ghz. According to the FCC, These bands are supposedly reserved for 'radio location' (ie, GPS), and other communications with satellites."

The researchers speculate that the government is behind the rumour that tinfoil hats protect people from invasive radio signals in order to encourage their use and therefore to enhance the effectiveness of their radio control program.

We're no experts, but the researchers did admit to using Reynolds brand aluminum foil, rather than the classic tin foil, and we wonder if this could have skewed the results. We wonder also if a tinfoil propeller beanie might scatter the signals more effectively than a plain hat, and offer this humble suggestion for the benefit of the paranoiac community until further testing is complete
 
I admit I haven't read the article yet, but this sort of thing identified several of the 9/11 hijackers as suspect. Considering all the digital information flying around, its pretty easy to figure out a lot about someone if you have access to it.
 
I admit I haven't read the article yet, but this sort of thing identified several of the 9/11 hijackers as suspect. Considering all the digital information flying around, its pretty easy to figure out a lot about someone if you have access to it.

This is true but they are not citizens of the United States. Being non citizens they are not protected by the following:

Amendment IV

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Data Mining is searching without probable cause to find probable cause.
 
while its true THE HIJACKERS werent citizens, I am sure they were looking at a lot of data from people that were.
 
while its true THE HIJACKERS werent citizens, I am sure they were looking at a lot of data from people that were.

Here's a article about NORA this software if in use at the time of the hijacking would have connected the dots so to speak. Also, in my opinion if NORA picks your name for what ever reason there would be probable cause to check in to your habits. As I said before random searches with out probable cause to find probable cause violates the fourth amendment.

Tracking Terrorists the Las Vegas Way
CIA-funded firm uses techniques for catching gambling cheaters to help government identify terrorists.
Kim Zetter, special to PCWorld.com

LAS VEGAS--It might not seem that gambling sharks and Al Qaeda terrorists have much in common. But a firm here that helps casinos catch cheaters is now using its software to help the government track people suspected of being terrorists.

Jeff Jonas, founder and chief scientist of Systems Research and Development, offered a glimpse of his company's NORA (Non-Obvious Relationship Awareness) technology at the recent Black Hat security conference.

NORA could just as well be called In Search of Kevin Bacon, as it crunches data to find the six degrees of separation that folklorists say connect all people in the world. SRD designed the program to catch card counters and other cheaters at casino gaming tables, and to detect collusion between corrupt dealers and gamblers.

Fuzzy Logic
The version of the software used by casinos can use face recognition to quickly match a surveillance-camera image with a database of known cheaters. It also uses fuzzy logic to help detect less obvious relationships between casino personnel and known cheaters who appear on the Nevada Gaming Commission's blacklist, by comparing and cross-checking employee data on resumes and company applications.

NORA evaluates information such as names, addresses, social security and credit card numbers, and emergency contact numbers in company records, searching for similarities among employees and cheaters. Companies can also get data from firms like Choicepoint that aggregate information such as driver's license and vehicle registration information, land deed records, and credit histories.

For instance, NORA might reveal that a dealer was once married to a woman whose maiden name matches the surname of a suspected cheater, raising the possibility that the dealer and the cheater were once in-laws.

Jonas cautions that such data alone doesn't establish guilt. Still, it could help investigators optimize their surveillance resources by homing in on the likeliest possible suspects.

Investigators first funnel raw data through a clean-up process to reconcile conflicting information. For instance, someone named Francis George might appear on one list with an address at 224 Washington Street and on another list as George Francis at the same address or as Frank George at 242 Washington Street.

NORA looks for all permutations of a name or address to identify a possible alias, to reconcile mistakes in data entry, and to deliberate attempts to alter data. Something as simple as transposed numbers or misspelled street names, for example, could throw a standard background check off track.

Government Potential
NORA's analytical capabilities could prove useful to government intelligence agencies trying to ferret out terrorist cells entrenched in communities.

U.S. intelligence agencies endured criticism following reports that information on terrorists was not properly analyzed or disseminated before September 11. The government amassed a large amount of data, but was slow to process and analyze it.

"Many organizations have applications that hold a lot of data," says chief executive officer John Slitz of SRD. "But these applications don't accept a query, so you can't analyze the data." NORA creates a data warehouse for storing information where users can quickly add new information and cross-check it with other entries.

The FBI could cross-check lists of Al Qaeda and Taliban prisoners at the Guantanamo Bay naval base, or trace relationships among suspected terrorists being held in the United States.

Likewise, the FBI could quickly check airline passenger lists to determine whether a suspect at a Cleveland airport is the nephew of a known Egyptian terrorist, once shared an address with another terrorist suspect in Germany, or uses the same credit card or bank account number as a suspect in Texas. NORA analyzes data in near real-time, returning query results in about 8 seconds, according to Slitz.

The program collects data from the FBI's Most Wanted Terrorist List as well as from the Treasury Department's Office of Foreign Asset Control. The Most Wanted Terrorist List compiles names of individuals and organizations considered a threat to the United States, including terrorists and drug traffickers.

SRD itself is backed by the CIA's venture-capital firm In-Q-Tel, which invests in companies that develop products useful to intelligence operations.

Employment Opportunities
Beyond its value to government agencies, the NORA software could be used by airlines, weapons manufacturers, or nuclear facilities to conduct background checks of prospective employees for relationships that could cause concern.

"If you found out that an employee previously lived in an apartment with four other people, one of whom had been picked up for overstaying a visa, you would take a look at all other people in that apartment and others that this person had been associated with," Slitz says.

SRD has approached the Food Marketing Institute about putting NORA to work in its 1500 member companies in 60 countries. The software could detect relationships between employees of food and beverage plants and terrorist suspects, to prevent possible tampering with food and beverage supplies. FMI members, which include retail supermarkets and grocery wholesalers, provide 75 percent of all groceries in the United States.
 
I dont know if it would violate the amendment, thats up to the supreme court I guess. I think the real issue is how the data could be used. Is it unreasonable to search data about you for no reason? The fact that it is digital info may make it a grey area, but a search without probable cause that leads to some data that creats the possible cause is kind of like putting the cart before the horse in my opinion. Your also assuming that this data will only be used to identify possible criminals, the long history of human nature doubts that would be the case.
 
The logic of surrendering civil liberties in the cause of defending freedom is similar to that of giving up your virginity in the cause of defending chastity.
 
That explains why I keep hearing the radio in my head. Those fillings are radio wave magnets. I had thought to offer my services as a US listening post on a remote hilltop once, but the goats started to look at me funny. 😛
i had to protect my pets from spurious transmissions.....
 
This is true but they are not citizens of the United States. Being non citizens they are not protected by the following:

Amendment IV

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Data Mining is searching without probable cause to find probable cause.
The key word here, and the most overlooked by the general public, is REASONABLE. Is it reasonable to spy on potential terrorists? Under current CA law, if your son borrows your car to cruise in, and gets popped with a joint, the cops can take the vehicle on the spot. YOU have to fight and pay up the wazoo to get it back. (By the way, this in no way means I am in favor of drug legalisation. It serves to illustrate that we as a nation have not been secure in our possesions for decades.
 
The logic of surrendering civil liberties in the cause of defending freedom is similar to that of giving up your virginity in the cause of defending chastity.
I couldnt agree more. Unfortunately, we as a nation have been doing just that for decades. Under the current administration, we surrender information security for national security. Under the the clinton administration we surrendered private property rights for enviromental security. This erosion of our rights is due heavily to activist court system that feels the constitution can be made to mean anything it wants, with some amendments, such as the 2nd, 9th, and 10th, being totalling ignored, while others such as the 1st, 4th, and 5th have become so bloated and corrupt as to have lost most if not all of thier original intent. The sad part is that the first people who scream " I got rights!", are often the least likely to know exactly what those right are.

i had to protect my pets from spurious transmissions.....
Dear God forgive me, but thats funny as hell!
 

Latest posts

Back
Top