The Canary in the Data Mine

    Date20 Jan 2003
    CategoryPrivacy
    2935
    Posted ByAnthony Pell
    At the turn of the century just past, mining companies would use a brightly colored bird in the mine shaft to protect the lives of citizens. These canaries were more sensitive to the foul, noxious and deadly but invisible vapors that . . . At the turn of the century just past, mining companies would use a brightly colored bird in the mine shaft to protect the lives of citizens. These canaries were more sensitive to the foul, noxious and deadly but invisible vapors that would otherwise threaten the lives of the mine shaft workers. When the canaries died, the miners would know an invisible threat existed.

    On January 16, 2002 Senator Russ Feingold (D-WI) introduced the Data Mining Moratorium Act of 2003, legislation that would block implementation of a government program to collect and analyze massive quantities of information about ordinary citizens and non-citizens alike.

    For more than a year, the Department of Defense, under the leaderships of "convicted-but-reversed" Admiral John Poindexter has been developing a new "research" effort called "Total Information Awareness" (symbol: the "eye of providence" on the Great Seal looking out and examining the entire planet.) TIA will instruct the DoD research arm DARPA to develop massive data collection and analysis capabilities to cross reference gigantic databases, and create brand new ones, including databases of conversations (voice-to-text-to-language) and the comings and goings of people (Human Identification at Distance.) It is all reminiscent of the Ministry of Information Retrieval in the Terry Gilliam movie Brazil.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.