Editorial: Maintaining control

After years of being just talk, data mining is in vogue

After years of being just talk, data mining is in vogue. After years of collecting data, technologies are in place that allow agencies to find a needle in a haystack.

In 2003, the Defense Advanced Research Projects Agency launched the ominous sounding Total Information Awareness program — later renamed Terrorism Information Awareness (TIA). That program sought to scour databases run by airlines, financial institutions and schools for trends that might offer leads on potential terrorists. But DARPA eventually killed that program.

Now most agencies — in fact, most organizations — are looking to use data mining. Perhaps the best-known case is the National Security Agency, which is collecting phone numbers to find trends that can help in the war on terrorism.

Data-mining technology is so tantalizing. The idea that disparate data pieces can somehow yield useable conclusions seems too good to be true.

We have no doubt that there are good reasons to collect this data, but people also have good reasons to feel uncomfortable. Data-mining stories mix with the tales of the Department of Veterans Affairs losing the data of millions of people and a hacker infiltrating Energy Department records. Those incidents are instructive. If you collect the data, you are responsible for it.

Years ago, former Sun Microsystems chief executive officer Scott McNealy said, “You already have zero privacy. Get over it.” But that should not be the basis of sound public policy.

Data-mining technology can be powerful. But regarding what happened with TIA, that power can be frightening. Processes, procedures and guidelines should be in place to guide the use of this technology so that it can be effective without scaring people.

Off-topic: Just a reminder that nominations for Federal Computer Week’s new Rising Star awards program are being accepted through Friday, July 7. The Rising Star awards, which are being selected in conjunction with AFCEA International Bethesda, Md., chapter’s Young AFCEANS, are modeled on the Federal 100 awards. These are young people who have made a difference in the past year. Unlike the Federal 100 awards, the Rising Star awards recognize people we loosely categorize as being in the first third of their careers.

Find more information at www.fcw.com/risingstar.

cartoon

About the Author

Christopher J. Dorobek is the co-anchor of Federal News Radio’s afternoon drive program, The Daily Debrief with Chris Dorobek and Amy Morris, and the founder, publisher and editor of the DorobekInsider.com, a leading blog for the Federal IT community.

Dorobek joined Federal News Radio in 2008 with 16 years of experience covering government issues with an emphasis on government information technology. Prior to joining Federal News Radio, Dorobek was editor-in-chief of Federal Computer Week, the leading news magazine for government IT decision-makers and the flagship of the 1105 Government Information Group portfolio of publications. As editor-in-chief, Dorobek served as a member of the senior leadership team at 1105 Government Information Group, providing daily editorial direction and management for FCW magazine, FCW.com, Government Health IT and its other editorial products.

Dorobek joined FCW in 2001 as a senior reporter and assumed increasing responsibilities, becoming managing editor and executive editor before being named editor-in-chief in 2006. Prior to joining FCW, Dorobek was a technology reporter at PlanetGov.com, one of the first online community centers for current and former government employees. He also spent five years at Government Computer News, another leading industry publication, covering a variety of federal IT-related issues.

Dorobek is a frequent speaker on issues involving the government IT industry, and has appeared as a frequent contributor to NewsChannel 8’s Federal News Today program. He began his career as a reporter at the Foster’s Daily Democrat, a daily newspaper in Dover, N.H. He is a graduate of the University of Southern California. He lives in Washington, DC.


The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above