{"id":10829,"date":"2013-11-19T14:15:45","date_gmt":"2013-11-19T03:15:45","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=10829"},"modified":"2013-11-20T09:21:09","modified_gmt":"2013-11-19T22:21:09","slug":"reader-response-the-risks-of-restraining-big-data","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/","title":{"rendered":"Reader response: the risks of restraining big data"},"content":{"rendered":"

Thanks to Ed Snowden, the whole world now knows about the NSA\u2019s surveillance capabilities. In his thoughtful and timely piece on The Strategist<\/i><\/a>, Klee Aiken asks if the mass surveillance of big data really keeps us safe.<\/p>\n

Data mining technologies now allow our intelligence and security agencies to collect unprecedented amounts of personal information. Quoting a former US intelligence official, Klee describes the current approach as not so much looking for a needle in a haystack, rather \u2018collecting the whole haystack.\u2019<\/p>\n

There\u2019s probably no way to prove whether this is an effective approach: as Klee observes, this is all hidden behind \u2018layers of security clearance\u2019. Coincidentally, the day that Klee\u2019s post was published, the US National Journal<\/i> magazine ran a long article by Michael Hirsh<\/a>, which examines the NSA\u2019s very wide data-trawling methods in the context of the changing threat from al-Qaeda.<\/p>\n

Hirsh argues that AQ is moving from the 9\/11 spectacular type attacks on iconic targets to more lone wolf opportunistic strikes, like the Tsarnaev brothers at the Boston marathon. Hirsh describes how Abu Musab al-Suri (a nom de guerre<\/i> that means \u2018the Syrian\u2019) has emerged as an increasingly influential jihadist leader, and how al-Suri has long argued for lower-level attacks.<\/p>\n

In his post, Klee states that bulk data gathering won\u2019t always identify and thwart the \u2018lone wolves\u2019, with lower levels of organisation and competence. But Hirsh argues that the NSA\u2019s seemingly indiscriminate scouring of phone data and emails is \u2018precisely what intelligence officials say they need to detect the kinds of plots al-Suri favors\u2019.<\/p>\n

Hirsh cites Michael Hayden, former NSA Director, as saying these kinds of attacks will be harder to track and that the US should expect more, less lethal attacks than in the past. Hirsh also quotes Mike Rogers, chairman of the US House Intelligence Committee pointing out that AQ\u2019s capabilities for a strike in the US are more dangerous and numerous than before 9\/11. Also cited is a US government official ‘well versed in NSA practices’ who says that trying to tie specific intelligence ‘tidbits’ to specific foiled plots is too simplistic:<\/p>\n

That entirely misses the point. It doesn’t account for the reality of how intelligence works. It’s not that pods or cells are disrupted by one piece of information from one authority. It’s a complex endeavor that puts different pieces together to rule things out.<\/p><\/blockquote>\n

Hirsh\u2019s answer to Klee\u2019s question on the effectiveness of big data is that if we\u2019re to find the needle of al-Suri style plots, then we\u2019ll probably need the \u2018whole haystack\u2019 approach to phone and email data for some time: \u2018for better or worse, the only hope to track them all is an exceptionally deep, organized, and free-ranging intelligence apparatus\u2019.<\/p>\n

Klee’s post concluded by pointing to big data’s cost to privacy. If Hirsh\u2019s judgement is right about the need for a big data approach, then we\u2019re going to need to devote much greater efforts to developing a coherent privacy doctrine that addresses the challenges of our enhanced ability to collect, analyse and distribute personal information.<\/p>\n

Anthony Bergin is the deputy director at ASPI.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"

Thanks to Ed Snowden, the whole world now knows about the NSA\u2019s surveillance capabilities. In his thoughtful and timely piece on The Strategist, Klee Aiken asks if the mass surveillance of big data really keeps …<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[273,170,301,127],"class_list":["post-10829","post","type-post","status-publish","format-standard","hentry","category-general","tag-counterterrorism","tag-intelligence","tag-national-security-2","tag-terrorism"],"acf":[],"yoast_head":"\nReader response: the risks of restraining big data | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reader response: the risks of restraining big data | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Thanks to Ed Snowden, the whole world now knows about the NSA\u2019s surveillance capabilities. In his thoughtful and timely piece on The Strategist, Klee Aiken asks if the mass surveillance of big data really keeps ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-19T03:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-11-19T22:21:09+00:00\" \/>\n<meta name=\"author\" content=\"Anthony Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/\",\"name\":\"Reader response: the risks of restraining big data | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"datePublished\":\"2013-11-19T03:15:45+00:00\",\"dateModified\":\"2013-11-19T22:21:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reader response: the risks of restraining big data\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564\",\"name\":\"Anthony Bergin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g\",\"caption\":\"Anthony Bergin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/anthony-bergin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reader response: the risks of restraining big data | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/","og_locale":"en_US","og_type":"article","og_title":"Reader response: the risks of restraining big data | The Strategist","og_description":"Thanks to Ed Snowden, the whole world now knows about the NSA\u2019s surveillance capabilities. In his thoughtful and timely piece on The Strategist, Klee Aiken asks if the mass surveillance of big data really keeps ...","og_url":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-11-19T03:15:45+00:00","article_modified_time":"2013-11-19T22:21:09+00:00","author":"Anthony Bergin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Anthony Bergin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/","url":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/","name":"Reader response: the risks of restraining big data | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"datePublished":"2013-11-19T03:15:45+00:00","dateModified":"2013-11-19T22:21:09+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/reader-response-the-risks-of-restraining-big-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Reader response: the risks of restraining big data"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a057a968d3f01faeb5273fc8af831564","name":"Anthony Bergin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/992e5536861e30520d738a28175a5ee0?s=96&d=mm&r=g","caption":"Anthony Bergin"},"url":"https:\/\/www.aspistrategist.ru\/author\/anthony-bergin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10829"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=10829"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10829\/revisions"}],"predecessor-version":[{"id":10855,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10829\/revisions\/10855"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=10829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=10829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=10829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}