ODNI report says office did no data mining in 2010

But two tools in development could support data mining in the future

The Office of the Director of National Intelligence performed no data mining in 2010, but at least two programs in development could be used for data mining in the future, according to the office’s most recent Data Mining Report.

Under a 2007 law, the office is required to provide an annual data-mining report to Congress. The Federation of American Scientists published the most recent report online May 10.

The law defines data mining as pattern-based queries of one or more databases that seek to identify anomalous events and patterns, are not subject-based and use no personal identifiers. In its most recent report, ODNI said its techniques do not fall under that definition because their queries generally start with a known subject.

“Unlike the predictive, pattern-based technologies envisioned by the act, these tools and techniques start with a known or suspected terrorist,” the report states. Various methods are used to link the subject and potential associates to other people with whom the subject has a relationship. “Thus, such analytic tools and techniques do not fall within the statutory definition of data mining.”


Related stories:

Clarifications sought on data mining

DHS' data mining sparks more controversy


“The ODNI did not engage in any activities to use or develop data mining functionality in the reporting period,” the report states.

However, at least two analysis tools are being developed that might be used for data mining in the future, and two other tools are being developed that might be used for pattern analysis, the report states. A fifth tool is being used for privacy and security. ODNI said it was disclosing the tool development in the interests of transparency.

The two analysis tools in development are both projects of the Intelligence Advanced Research Projects Activity. They are known as Knowledge Discovery and Dissemination (KDD) and Automated Low-level Analysis and Description of Diverse Intelligence Video.

The KDD program is intended to quickly integrate new, disparate datasets into a database for analysis. The video program will be used to search large numbers of videos for specific data.

KDD and the video program are included “because technologies investigated by, or later developed from, those programs could be used to support data mining,” the report states. “Such technologies would then be subject to reporting under the Data Mining Reporting Act” of 2007.

Additional programs described in the report include Catalyst, which involves tools for querying larger and disconnected databases. Steven Aftergood, “Secrecy News” blogger for the Federation of American Scientists, refers to it as a glorified search engine. The other tools are the Automatic Privacy Protection program and DataSphere, which is used for exploring communication networks and travel information.

“Catalyst and DataSphere are in development stages, and while such development does not currently include pattern-based functionality, both programs contemplate potential pattern-based functionality in future stages,” the report states.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

Featured

  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.