In particular, Tice describes a system of information gathering that is less direct eavesdropping than it is data mining: "This is garnered from algorithms that have been put together to try to just dream-up scenarios that might be information that is associated with how a terrorist could operate," Tice said. "And once that information gets to the NSA, and they start to put it through the filters there . . . and they start looking for word-recognition, if someone just talked about the daily news and mentioned something about the Middle East they could easily be brought to the forefront of having that little flag put by their name that says 'potential terrorist'." The process he talks about is similar to earlier speculation as to how such surveillance would operate.
If true, Tice's claims raise obvious Fourth Amendment issues. They also paint the rather sad picture of some of our country's best intelligence analysts toiling away at tasks that are little different than those practiced by junior associates and contract attorneys in law firms and e-discovery companies from New York to New Dehli. It would be adding insult to injury, of course, if Tice's allegations are true and the analysis is being directed at the analysts' fellow citizens.
No comments:
Post a Comment