Issue 12 describes how Deep Data Mining is used to hunt terrorists |
(1) The Automated Targeting System (ATS), which
is administered by U.S. Customs and Border Protection (CBP) and includes
modules for inbound (ATS-N) and outbound (ATS-AT) cargo, land border crossings
(ATS-L), and passengers (ATS-UPAX);
(2) The Analytical Framework for Intelligence
(AFI), which is administered by CBP;
(3) The Data Analysis and Research for Trade
Transparency System (DARTTS), which is administered by U.S. Immigration and
Customs Enforcement (ICE);
(4) The FALCON-Roadrunner system, which is
administered by ICE; and
(5)
The DHS Data Framework, which is a DHS-wide initiative.
Fortunately, there
is a human aspect to DHS data mining activities. While the DHS uses the data
mining programs listed above, it does not make decisions about individuals solely on the
basis of data mining results. DHS employees, as in human beings, conduct
investigations to verify (or disprove) any suspicious results of data mining,
and then bring their own judgment and experience to bear in making
determinations about individuals initially identified through data mining
activities.
Robert Morton, M.Ed., Ed.S. is an adjunct professor, a member of the Association Of Former Intelligence Officers (AFIO) and authors the online spy series "Corey Pearson- CIA Spymaster in the Caribbean". His views are his own and do not represent those of any organization he is a member of.
No comments:
Post a Comment