Just what has the NSA been doing with the phone logs being handed over to the agency as reported by the New York Times, the Los Angeles Times and USA Today?
Well, last week, USA Today's John Diamond and Leslie Cauley (who broke the Verizon/Bellsouth story) reported that the NSA was using templates to find calling patterns that look like a terrorist network.
That sounds exactly like the general principle behind the now ostensibly moth-balled Total Information Awareness program, which aimed to scour through databases of Americans' transactions and communications to find patterns of activity that looked similar to a pattern of actions that terrorists might take. (For example, make overseas phone calls, rent a truck, and buy fertilizer from a hardware store)
The hurdles that the NSA data-mining program faces are much the same as those that were faced by TIA:
What does that mean in real life?†
Leads that dead end at the local pizza joint, according to former NSA analyst Ira Winkler.
New York Times reporters found the same thing:
It's still unclear if there's any nexus between the old Total Information Awareness program and the ongoing NSA program.
But stay tuned for tomorrow's takedown of the specious arguments that when Congress killed off the TIA program, it neglected to note how privacy-conscious the program was and thus, inadvertently killed off important privacy research when it defunded part of the program.
Tags: totalinformationawareness, nsa, privacy, tia, CanADataMiningProgramFindTheBestThinCrustPizzaParlorWestOfTheMississippiIfQwestWon'tTurnOverItsPhoneRecords?