词条 | Total Information Awareness |
释义 |
Based on the concept of predictive policing, TIA aimed to gather detailed information about individuals in order to anticipate and prevent crimes before they are committed.[2] As part of efforts to win the War on Terror, the program searched for all sorts of personal information in the hunt for terrorists around the globe.[3] Admiral John Poindexter referred to it as a "Manhattan Project for Counter-Terrorism".[4] According to Senator Ron Wyden (D-Ore.), TIA was the "biggest surveillance program in the history of the United States".[5] The program was defunded alongside the Information Awareness Office in late 2003 by the United States Congress after media reports criticized the government for attempting to establish "Total Information Awareness" over all citizens.[6][8][7] Although the program was formally suspended, its data mining software was later adopted by other government agencies, with only superficial changes being made. The core architecture of TIA continued development under the code name "Basketball." According to a 2012 New York Times article, the legacy of Total Information Awareness is "quietly thriving" at the National Security Agency (NSA).[8] Program synopsisTotal Information Awareness (TIA) was intended to be a five year long research project by the Defense Advanced Research Projects Agency (DARPA). The goal was to integrate components from previous and brand new government intelligence and surveillance programs, including Genoa, Genoa II, Genisys, SSNA, EELD, WAE, TIDES, Communicator, HumanID and Bio-Surveillance with data mining knowledge gleamed from the private sector to create a resource for the intelligence, counterintelligence, and law enforcement communities.[9][10] These components consisted of information analysis, collaboration, decision-support tools, language translation, data-searching, pattern recognition, and privacy-protection technologies.[11] TIA research included or planned to include the participation of nine government entities: INSCOM, NSA, DIA, CIA, CIFA, STRATCOM, SOCOM, JFCOM, JWAC.[11] These agencies were to be able to access TIA's programs through a series of dedicated nodes.[15] TIA's hardware was to be housed by INSCOM in Fort Belvoir, Virginia.[12] Companies that were contracted to work on TIA included the Science Applications International Corporation,[17] Booz Allen Hamilton, Lockheed Martin Corporation, Schafer Corporation, SRS Technologies, Adroit Systems, CACI Dynamic Systems, ASI Systems International, and Syntek Technologies.[18] Universities enlisted to assist with research and development included Berkeley, Colorado State, Carnegie Mellon, Columbia, Cornell, Dallas, GeorgiaTech, Maryland, MIT, and Southampton.[18][20] MissionThe goal of the Total Information Awareness program was to revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. To that end, the TIA program objective was to create a counter-terrorism information system that:[13] 1. Increases information coverage by an order of magnitude, and affords easy future scaling 2. Provides focused warnings within an hour after a triggering event occurs or an evidence threshold is passed 3. Automatically queues analysts based on partial pattern matches and has patterns that cover 90% of all previously known foreign terrorist attacks 4. Supports collaboration, analytical reasoning and information sharing so that analysts can hypothesize, test and propose theories and mitigating strategies about possible futures, so decision-makers can effectively evaluate the impact of current or future policies and prospective courses of action. ComponentsGenoa{{main|Project Genoa}}Unlike the other program components, Genoa predated Total Information Awareness and provided a basis for it.[14] Genoa's primary function was intelligence analysis in order to assist human analysts.[23] The program was designed to support both top-down and bottom-up approaches; a policy maker could hypothesize a possible attack and use Genoa to look for supporting evidence of such a plot, or it would compile pieces of intelligence into a diagram and suggest possible outcomes. Human analysts would then be able to modify the diagram to test various cases.[24] Genoa, which had been independently commissioned in 1996, was completed in 2002 as scheduled. Genoa II{{main|Project Genoa II}}While Genoa primarily focused on intelligence analyses, Genoa II was aimed towards providing means with which computers, software agents, policy makers, and field operatives could collaborate.[15] GenisysGenisys aimed at developing technologies which would enable "ultra-large, all-source information repositories".[16] Vast amounts of information were going to be collected and analyzed, and the available database technology at the time was insufficient for storing and organizing such enormous quantities of data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the World Wide Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data—such as a database containing criminal records, a phone call database and a foreign intelligence database. The World Wide Web is considered an "unstructured public data source" because it is publicly accessible and contains many different types of data—such as blogs, emails, records of visits to web sites, etc.—all of which need to be analyzed and stored efficiently.[16] Another goal was to develop "a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows us to retain important data indefinitely."[16] Scalable Social Network AnalysisScalable Social Network Analysis (SSNA) aimed at developing techniques based on social network analysis for modeling the key characteristics of terrorist groups and discriminating these groups from other types of societal groups.[17] Evidence Extraction and Link DiscoveryEvidence Extraction and Link Discovery (EELD) developed technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources (such as phone call records from the NSA call database, internet histories, or bank records).[18] EELD was designed to design systems with the ability to extract data from multiple sources (e.g., text messages, social networking sites, financial records, and web pages). It was to develop the ability to detect patterns comprising multiple types of links between data items or people communicating (e.g., financial transactions, communications, travel, etc.).[18] It is designed to link items relating potential "terrorist" groups and scenarios, and to learn patterns of different groups or scenarios to identify new organizations and emerging threats.[18] Wargaming the Asymmetric EnvironmentWargaming the Asymmetric Environment (WAE) focused on developing automated technology capable of identifying predictive indicators of terrorist activity or impending attacks by examining individual and group behavior in broad environmental context and examining the motivation of specific terrorists.[19] Translingual Information Detection, Extraction and SummarizationTranslingual Information Detection, Extraction and Summarization (TIDES) developing advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages.[20] Outside groups (such as universities, corporations, etc.) were invited to participate in the annual information retrieval, topic detection and tracking, automatic content extraction, and machine translation evaluations run by NIST.[20] Cornell University, Columbia University, and the University of California, Berkeley were given grants to work on TIDES.[18] CommunicatorCommunicator was to develop "dialogue interaction" technology that enabled warfighters to talk with computers, such that information would be accessible on the battlefield or in command centers without ever using a keyboard-based interface . The Communicator Platform was to be both wireless and mobile, and to be designed to function in a networked environment.[21] The dialogue interaction software was to interpret the context of the dialogue in order to improve performance, and to be capable of automatically adapting to new topics so conversation could be natural and efficient. The Communicator program emphasized task knowledge to compensate for natural language effects and noisy environments. Unlike automated translation of natural language speech, which is much more complex due to an essentially unlimited vocabulary and grammar, the Communicator program is directed task specific issues so that there are constrained vocabularies (the system only needs to be able to understand language related to war). Research was also started to focus on foreign language computer interaction for use in supporting coalition operations.[21] Live exercises were conducted involving small unit logistics operations with the United States Marines to test the technology in extreme environments.[21] Human Identification at a DistanceThe Human Identification at a Distance (HumanID) project developed automated biometric identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.[22] The goals of HumanID were to:[22]
A number of universities were included to assist in designing certain areas of HumanID. The Georgia Institute of Technology's College of Computing focused on gait recognition. Gait recognition was key component of HumanID, because it could be employed on low-resolution video feeds and therefore help to identify subjects at a distance.[23] They planned on developing a system that recovered static body and stride parameters of subjects as they walked, while also looking into the ability of time-normalized joint angle trajectories in the walking plane as a means of recognizing gait. The university also did related work in locating and tracking faces with expressions and speech.[24] Carnegie Mellon University's Robotics Institute (part of the School of Computer Science) worked on dynamic face recognition. The research focused primarily the extraction of body biometric features from video and identifying subjects from the extracted body biometric features. To conduct its studies, the university created databases of synchronized multi-camera video sequences of body motion, human faces under a wide range of imaging conditions, AU coded expression videos, and hyperspectal and polarimetric images of human faces.[25] The video sequences of body motion data consisted of six separate viewpoints of 25 subjects walking on a treadmill. Four separate 11-second gaits were tested for each: slow walk, fast walk, inclined, and carrying a ball.[23]The University of Maryland's Institute for Advanced Computer Studies' research focused on the recognition of an individual at a distance through gait and face information. Also to be utilized were infrared and 5-degree-of-freedom cameras.[26] Test conducted included filming 38 male and 6 female subjects of different ethnicity and physical features walking along a T-shaped path from various angles.[27] The University of Southampton's Department of Electronics and Computer Science was developing an "Automatic Gait Recognition" system and was in charge of compiling a database to test it.[28] The University of Texas at Dallas was compiling a database to test facial systems. The data included a set of nine static pictures taken from different viewpoints, a video of each subject looking around a room, a video of the subject speaking, and one or more videos of the subject showing facial expressions.[29] Colorado State University developed multiple systems for identification via facial recognition.[30] Columbia University participated in implementing HumanID in poor weather.[25] Bio-SurveillanceThe Bio-Surveillance project was designed to predict and respond to bioterrorism by monitoring non-traditional data sources such as animal sentinels, behavioral indicators, and pre-diagnostic medical data. It would leverage existing disease models, identify abnormal health early indicators, and mine existing databases to determine the most valuable early indicators for abnormal health conditions.[53] Scope of surveillanceAs a "virtual, centralized, grand database",[31] the scope of surveillance includes, among others, credit card purchases, magazine subscriptions, web browsing histories, phone records, academic grades, bank deposits, gambling histories, passport applications, airline and railway tickets, driver's licenses, gun licenses, toll records, judicial records, divorce records, etc.[8][10] Health and biological information collected by TIA included drug prescriptions,[8] medical records,[32] fingerprints, gait, face and iris data,[10] and individual DNA.[33] PrivacyThe Genisys component of TIA, in addition to integrating and organizing separate databases, was to run an internal "Privacy Protection Program." This was intended to restrict analysts' access to irrelevant information on private U.S. citizens, enforce privacy laws and policies via software mechanisms, and report misuse of data.[34] There were also plans for TIA to have an application that could "anonymize" data, so that information could be linked to an individual only through a court order (especially for medical records gathered by the Bio-Surveillance project).[35] A set of audit logs were to be kept, which would keep track of whether innocent Americans' communications were getting caught up in relevant data.[8] HistoryThe term "total information awareness" was first coined at the annual DARPAtech conference of 1999 in [https://web.archive.org/web/20081125153748/http://www.darpa.mil/darpatech99/Presentations/isopdf/isotia.pdf a presentation] by the deputy director of the Office of Information Systems Management, Brian Sharkey. Sharkey applied the phrase to a conceptual method by which the government could sift through massive amounts of data becoming available via digitization and draw important conclusions.[36] Early developmentsTIA was proposed as program shortly after the September 11 attacks in 2001 by Rear Admiral John Poindexter. A former national security adviser to President Ronald Reagan and a key player in the Iran–Contra affair, he was working with Syntek Technologies, a company often contracted out by the government for work on defense projects. TIA was officially commissioned during the 2002 fiscal year.[37] Poindexter was appointed Director of the newly created Information Awareness Office division of DARPA in January 2002, which managed TIA's development.[38] The office temporarily operated out of the fourth floor of DARPA's headquarters, while Poindexter looked around for a place which could permanently house TIA's researchers.[12] Soon Project Genoa was successfully completed and its research moved on to Genoa II.[39][40] Late that year, the Science Applications International Corporation (SAIC) was awarded a $19 million contract by the Information Awareness Office to develop the "Information Awareness Prototype System", the core architecture to integrate all of TIA's information extraction, analysis, and dissemination tools. This was done through its consulting arm, Hicks & Associates, which employed many former Department of Defense and military officials.[17] The earliest version of TIA employed a software called Groove, which had been developed in 2000 by Ray Ozzie. Groove made it possible for analysts from many different government agencies to share intelligence data instantly, and it linked specialized programs that were designed to look for patterns of suspicious behavior.[41] Congressional restrictions and terminationOn 24 January 2003, the United States Senate voted to limit the TIA program by restricting its ability to gather information from emails and the commercial databases of health, financial and travel companies.[42] According to the Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, § 111(b) passed in February, the Department of Defense was given 90 days to compile a report laying out a schedule of TIA's development and the intended use of allotted funds or face a cutoff of support.[43] The report arrived on May 20. It disclosed that the program's computer tools were still in their preliminary testing phase. Concerning the pattern recognition of transaction information, only synthetic data created by researchers was being processed. The report also conceded that a full prototype of TIA wasn't scheduled to be ready until the 2007 fiscal year.[11] Also in May, Total Information Awareness was renamed Terrorism Information Awareness in an attempt to stem the flow of criticism on its information gathering practices on average citizens.[44] At some point in early 2003, the National Security Agency began installing access nodes on TIA's classified network.[4] The NSA then started running stacks of emails and intercepted communications through TIA's various programs.[15] Following a scandal in the Department of Defense involving a proposal to reward investors who predicted terrorist attacks, John Poindexter resigned from office on 29 August.[45] On September 30, 2003, Congress officially cut off funding for TIA and the Information Awareness Office (with the Senate voting unanimously against it)[46] because of its unpopular perception with the general public and the media.[7][47] The effort was led by Senators Ron Wyden and Byron L. Dorgan.[48] After 2003Reports began to emerge in February 2006 that TIA's components had been transferred to the authority of the National Security Agency. In the Department of Defense appropriations bill for the 2004 fiscal year, a classified annex provided the funding. It was stipulated that the technologies were limited for military or foreign intelligence purposes against non-U.S. citizens.[49] Most of the original project goals and research findings were preserved, but the privacy protection mechanics were abandoned.[4][8] TopsailGenoa II, which focused on collaboration between machines and humans, was renamed "Topsail" and handed over to the NSA's Advanced Research and Development Activity, or ARDA (ARDA was later moved to the Director of National Intelligence's control as the Disruptive Technologies Office). Tools from the program were utilized in the war in Afghanistan and in other efforts as part of the War on Terror.[17] In October 2005, the SAIC signed a $3.7 million contract for work on Topsail.[36] In early 2006 a spokesman for the Air Force Research Laboratory said that Topsail was "in the process of being canceled due to lack of funds." When inquired about Topsail in a Senate Intelligence Committee hearing that February, both National Intelligence Director John Negroponte and FBI Director Robert Mueller said they didn't know about the program's status. Negroponte's deputy, former NSA Director Michael V. Hayden said, "I'd like to answer in closed session."[17]BasketballThe Information Awareness Prototype System was reclassified as "Basketball" and work on it continued by SAIC, supervised by ARDA. As far in as September 2004, Basketball was fully funded by the government and being tested in a research center jointly run by ARDA and SAIC. As of 2006, it was unknown whether this research persisted.[50] CriticismCritics allege that the program could be abused by government authorities as part of their practice of mass surveillance in the United States. In an op-ed for The New York Times, the American author William Safire called it "the supersnoop's dream: a Total Information Awareness about every U.S. citizen."[51] Hans Mark, a former director of defense research and engineering at the University of Texas, called it a "dishonest misuse of DARPA".[52] The American Civil Liberties Union launched a campaign to terminate the full implementation of Total Information Awareness, claiming that if implemented, it would "kill privacy in America" because "every aspect of our lives would be catalogued".[53] The San Francisco Chronicle criticized the program for "Fighting terror by terrifying U.S. citizens".[54] In popular cultureIn the 2008 British television series The Last Enemy, Total Information Awareness (TIA) is portrayed as a UK-based surveillance database that can be used to track and monitor anybody effectively by putting all available government information in one place. See also
External links
References1. ^{{cite web|last=Ryan Singel|title=Funding for TIA All But Dead|url=https://www.wired.com/politics/law/news/2003/07/59606|publisher=Wired (magazine)|accessdate=7 December 2013|date=07.14.03}} 2. ^{{cite journal|last=Murray|first=N.|title=Profiling in the age of total information awareness|journal=Race & Class|date=4 October 2010|volume=52|issue=2|pages=3–24|url=http://rac.sagepub.com/content/52/2/3.abstract|doi=10.1177/0306396810377002}} 3. ^{{cite web|last=JOHN MARKOFF|title=Pentagon Plans a Computer System That Would Peek at Personal Data of Americans|url=https://www.nytimes.com/2002/11/09/politics/09COMP.html|publisher=The New York Times|accessdate=19 December 2013|date=November 9, 2002}} 4. ^1 2 {{cite book| last = Shorrock| first = Tim| title = Spies for Hire: The Secret World of Intelligence Outsourcing| publisher = Simon and Schuster| date = 2008| location =| pages = 221| url = https://books.google.com/books?id=qTnGl9nmNw8C&dq=&source=gbs_navlinks_s| isbn = 9780743282246}} 5. ^{{cite news|title=Pentagon's 'Terror Information Awareness' program will end|url=http://usatoday30.usatoday.com/news/washington/2003-09-25-pentagon-office_x.htm|accessdate=19 December 2013|newspaper=USA Today|date=2003-09-25|agency=AP}} 6. ^{{cite web|last=Jonathan Turley|title=George Bush's Big Brother|url=http://articles.latimes.com/2002/nov/17/opinion/oe-turley17|publisher=The Los Angeles Times|accessdate=19 December 2013|date=November 17, 2002}} 7. ^1 {{cite web|title=U.S. agencies collect, examine personal data on Americans|url=http://www.washingtontimes.com/news/2004/may/28/20040528-122605-9267r/?page=all|publisher=The Washington Times|accessdate=19 December 2013|date=May 28, 2004|quote=The most widely reported data-mining project — the Pentagon's Total Information Awareness (TIA) program — was shut down by Congress because of widespread privacy fears. The project sought to use credit-card, medical and travel records to search for terrorists and was dubbed by privacy advocates as a "supersnoop" system to spy on Americans.}} 8. ^1 2 {{cite web|last=SHANE HARRIS|title=Giving In to the Surveillance State|url=https://www.nytimes.com/2012/08/23/opinion/whos-watching-the-nsa-watchers.html|publisher=The New York Times|accessdate=19 December 2013|date=August 22, 2012}} 9. ^{{cite web| url = http://fas.org/irp/agency/dod/poindexter.html| title = OVERVIEW OF THE INFORMATION AWARENESS OFFICE | last = Poindexter| first = John| date = 2 August 2002| website = fas.org| publisher = Federation of American Scientists| access-date = 3 June 2016}} 10. ^1 2 {{cite book| last = Stevens| first = Gina Marie| title = Privacy: Total Information Awareness Programs and Latest Developments| publisher = Nova Publishers| edition = illustrated| date = 2003| url = https://books.google.com/books?id=W5bDA0EkNTgC&dq=&source=gbs_navlinks_s| isbn = 9781590338698}} 11. ^1 2 {{cite web| url = https://epic.org/privacy/profiling/tia/may03_report.pdf| title = Report to Congress Regarding the Terrorism Information Awareness Program: In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, § 111(b)| date = 20 May 2003| website = www.epic.org| publisher = DARPA| access-date = 7 June 2016}} 12. ^1 {{cite book| last = Jacobsen| first = Annie| title = The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency| publisher = Little, Brown| edition = illustrated| date = 2015| url = https://books.google.com/books?id=OYgQBgAAQBAJ&dq=| isbn = 9780316371650}} 13. ^{{cite web|title=Total Information Awareness (TIA) System|url=http://www.darpa.mil/iao/tiasystems.htm|publisher=DARPA|archiveurl=https://web.archive.org/web/20021003053651/http://www.darpa.mil/iao/tiasystems.htm|archivedate=October 3, 2002|date=October 3, 2002}} 14. ^{{cite book| title = Balancing Privacy & Security: The Privacy Implications of Government Data Mining Programs: Congressional Hearing| publisher = DIANE Publishing| pages = 126| url = https://books.google.com/books?id=5IR9z1pcQqoC&dq=| isbn = 9781422320259}} 15. ^1 {{cite magazine| author = Dan Verton | title = Genoa II: Man and Machine Thinking as One| url = https://books.google.com/books?id=N1zRvHre4noC&dq=&source=gbs_navlinks_s| magazine = Computerworld| publisher = IDG Enterprise| date = 1 September 2003| access-date= 3 June 2016}} 16. ^1 2 {{cite web|url=http://infowar.net/tia/www.darpa.mil/iao/Genisys.htm|title=Genisys|work=Information Awareness Office (official website)|accessdate=2009-03-15|deadurl=yes|archiveurl=https://web.archive.org/web/20090216080922/http://infowar.net/tia/www.darpa.mil/iao/Genisys.htm|archivedate=2009-02-16|df=}} 17. ^{{cite web|url=http://spyapps.net/current-research-in-social-network-theory/ |title=Current Research in Social Network Theory |last=Ethier |first=Jason |work=Northeastern University College of Computer and Information Science |accessdate=2009-03-15 |deadurl=yes |archiveurl=https://web.archive.org/web/20150226213456/http://spyapps.net/current-research-in-social-network-theory/ |archivedate=February 26, 2015 }} 18. ^1 2 {{cite web|url=http://infowar.net/tia/www.darpa.mil/iao/EELD.htm|title=Evidence Extraction and Link Discovery|work=Information Awareness Office (official website -- mirror)|accessdate=2009-03-15|deadurl=yes|archiveurl=https://web.archive.org/web/20090215094707/http://infowar.net/tia/www.darpa.mil/iao/EELD.htm|archivedate=2009-02-15|df=}} 19. ^{{cite web| url = http://infowar.net/tia/www.darpa.mil/iao/WAE.htm| title = Wargaming the Asymmetric Environment (WAE)| website = www.darpa.mil/iao| publisher = Information Awareness Office| access-date = 16 June 2016| deadurl = yes| archiveurl = https://web.archive.org/web/20120528103612/http://infowar.net/tia/www.darpa.mil/iao/WAE.htm| archivedate = 28 May 2012| df = }} 20. ^1 {{cite web|url=http://infowar.net/tia/www.darpa.mil/iao/TIDES.htm|title=TIDES|work=Information Awareness Office (official website -- mirror)|accessdate=2009-03-15|deadurl=yes|archiveurl=https://web.archive.org/web/20090215094744/http://infowar.net/tia/www.darpa.mil/iao/TIDES.htm|archivedate=2009-02-15|df=}} 21. ^1 2 {{cite web|url=http://infowar.net/tia/www.darpa.mil/iao/Communicator.htm|title=Communicator|work=Information Awareness Office (official website)|accessdate=2009-03-15|deadurl=yes|archiveurl=https://web.archive.org/web/20090215094648/http://infowar.net/tia/www.darpa.mil/iao/Communicator.htm|archivedate=2009-02-15|df=}} 22. ^1 2 {{cite web|url=http://infowar.net/tia/www.darpa.mil/iao/HID.htm |title=Human Identification at a distance |work=Information Awareness Office (official website -- mirror) |accessdate=2009-03-15 |deadurl=yes |archiveurl=https://web.archive.org/web/20090215094729/http://infowar.net/tia/www.darpa.mil/iao/HID.htm |archivedate=February 15, 2009 }} 23. ^1 {{cite book| last1 = Bolle| first1 = Ruud M. | last2 = Connell| first2 = Jonathan | last3 = Pankanti| first3 = Sharath| last4 = Ratha| first4 = Nalini K.| last5 = Senior| first5 = Andrew W.| title = Guide to Biometrics| publisher = Springer Science & Business Media| edition = illustrated| date = 29 June 2013| pages = 239| url = https://books.google.com/books?id=DLLbBwAAQBAJ&dq=&source=gbs_navlinks_s| isbn = 9781475740363}} 24. ^1 {{cite web| url = http://www.cc.gatech.edu/cpl/projects/hid/| title = Human Identification at a Distance| date = 2003| website = www.cc.gatech.edu| publisher = Georgia Institute of Technology College of Computing| access-date = 16 June 2016}} 25. ^1 {{cite web| url = http://www.ri.cmu.edu/research_lab_group_detail.html?lab_id=56&menu_id=263| title = Human Identification at a Distance (HumanID)| website = Carnegie Mellon University: The Robotics Institute| publisher = Carnegie Mellon University| access-date = 16 June 2016| archive-url = https://web.archive.org/web/20160809063631/http://www.ri.cmu.edu/research_lab_group_detail.html?lab_id=56&menu_id=263| archive-date = 9 August 2016| dead-url = yes| df = dmy-all}} 26. ^{{cite web| url = http://www.umiacs.umd.edu/labs/pirl/hid/overview.html| title = Human Identification at a Distance: Overview| date = 17 April 2001| website = University of Maryland Institute for Advanced Computer Studies| publisher = University of Maryland| access-date = 16 June 2016}} 27. ^{{cite book| editor = Bahram Javidi| title = Optical and Digital Techniques for Information Security| publisher = Springer Science & Business Media| series = Advanced Sciences and Technologies for Security Applications| volume = 1| edition = illustrated| date = 28 June 2005| pages = 283| url = https://books.google.com/books?id=amZSD-UJUVMC&dq=&source=gbs_navlinks_s| isbn = 9780387206165}} 28. ^{{cite web| url = http://www.gait.ecs.soton.ac.uk/| title = Automatic Gait Recognition for Human ID at a Distance| last = Nixon| first = M.S.| date = 7 August 2003| website = www.ecs.soton.ac.uk| publisher = University of Southampton| access-date = 16 June 2016| archive-url = https://web.archive.org/web/20160805154831/http://www.gait.ecs.soton.ac.uk/| archive-date = 2016-08-05| dead-url = yes| df = }} 29. ^{{cite web| url = http://www.utdallas.edu/~otoole/HID/hum_id_main.html| title = Human Identification Project| last = O'Toole| first = Alice| website = www.utdallas.edu| publisher = University of Texas at Dallas| access-date =16 June 2016}} 30. ^{{cite web| url = http://www.cs.colostate.edu/evalfacerec/index10.php| title = Evaluation of Face Recognition Algorithms| website = www.cs.colostate.edu| publisher = Colorado State University| access-date = 16 June 2016}} 31. ^{{cite web|last=Anthony M. Townsend|title=Your city is spying on you: From iPhones to cameras, you are being watched right now|url=http://www.salon.com/2013/10/13/your_city_is_spying_on_you_from_iphones_to_cameras_you_are_being_watched_right_now/|publisher=Salon (website)|accessdate=19 December 2013}} 32. ^{{cite web|last=Ron Wyden|title=Wyden Calls For Congressional Oversight, Accountability of Total Information Awareness Office|url=http://www.wyden.senate.gov/news/press-releases/wyden-calls-for-congressional-oversight-accountability-of-total-information-awareness-office|quote=On the Web site of this particular program, the Total Information Awareness Program, they cite a Latin slogan -- "Knowledge is power" -- something we would all agree with, and state: The total information awareness of transnational threats requires keeping track of individuals and understanding how they fit into models. To this end, this office would seek to develop a way to integrate databases into a "virtual centralized grand database." They would be in a position to look at education, travel, and medical records, and develop risk profiles for millions of Americans|publisher=United States Senate|accessdate=19 December 2013|date=January 15, 2003}} 33. ^{{cite web|last=Pat M. Holt|title=Driving dangerously with the Patriot Act|url=http://www.csmonitor.com/layout/set/r14/2003/1002/p09s01-coop.html|accessdate=19 December 2013|date=October 2, 2003|quote=The Defense Department is leading the charge for what it calls Total Information Awareness, a massive database including DNA.}} 34. ^{{cite book| last = Lee| first = Newton| title = Counterterrorism and Cybersecurity: Total Information Awareness| publisher = Springer| edition = 2, illustrated, revised| date = 7 April 2015| pages = 141| url = https://books.google.com/books?id=zSv3BwAAQBAJ&dq=&source=gbs_navlinks_s| isbn = 9783319172446}} 35. ^1 {{cite web| url = http://infowar.net/tia/www.darpa.mil/iao/BSS.htm| title = Bio- Surveillance| website = www.darpa.mil/iao| publisher = Information Awareness Office| deadurl = yes| archiveurl = https://web.archive.org/web/20060919113254/http://infowar.net/tia/www.darpa.mil/iao/BSS.htm| archivedate = 2006-09-19| df = }} 36. ^1 2 {{cite book| last = Harris| first = Shane| title = The Watchers: The Rise of America's Surveillance State| publisher = Penguin| edition = reprint| date = 18 February 2010| url = https://books.google.com/books?id=kGEMwv0VHL4C&dq=&source=gbs_navlinks_s| isbn = 9781101195741}} 37. ^1 2 3 {{cite web| url = https://www.publicintegrity.org/2002/12/17/3164/outsourcing-big-brother| title = Outsourcing Big Brother: Office of Total Information Awareness relies on private sector to track Americans| last1 = Mayle| first1 = Adam| last2 = Knott| first2 = Alex| date = 17 December 2002| website = www.publicintegrity.org| publisher = Center for Public Integrity| access-date = 6 June 2016}} 38. ^{{cite web| url = http://www.au.af.mil/au/awc/awcgate/crs/rl31786.pdf| title = Total Information Awareness Programs: Funding, Composition, and Oversight Issues| last = Belasco| first = Amy| date = 21 March 2003| website = www.au.af.mil/au| publisher = Congressional Research Service | access-date = 7 June 2016}} 39. ^{{cite web| url = https://w2.eff.org/Privacy/TIA/darpatech2002/speeches/ARMOUR.pdf| title = Genoa II DARPAtech 2002 Presentation Script| last = Armour| first = Tom| date = 2002| website = w2.eff.org| publisher = Electronic Frontier Foundation| access-date = 20 June 2016| archive-url = https://web.archive.org/web/20161008004230/https://w2.eff.org/Privacy/TIA/darpatech2002/speeches/ARMOUR.pdf| archive-date = 2016-10-08| dead-url = yes| df = }} 40. ^{{cite web| url = http://infowar.net/tia/www.darpa.mil/iao/Genoa.htm| title = Genoa| website = www.darpa.mil/iao| publisher = Information Awareness Office| deadurl = yes| archiveurl = https://web.archive.org/web/20090216081001/http://infowar.net/tia/www.darpa.mil/iao/Genoa.htm| archivedate = 2009-02-16| df = }} 41. ^{{cite web|title=TECHNOLOGY; Many Tools Of Big Brother Are Now Up And Running|url=https://www.nytimes.com/2002/12/23/business/technology-many-tools-of-big-brother-are-now-up-and-running.html?pagewanted=2&src=pm|publisher=The New York Times|accessdate=7 December 2013|date=December 23, 2002}} 42. ^{{cite web|last=ADAM CLYMER|title=Senate Rejects Privacy Project|url=https://www.nytimes.com/2003/01/24/politics/24PRIV.html|publisher=The New York Times|accessdate=7 December 2013|date=January 24, 2003}} 43. ^{{cite web| url = https://www.gpo.gov/fdsys/pkg/PLAW-108publ7/html/PLAW-108publ7.htm| title = Joint Resolution| date = February 2003| website = www.gpo.gov| publisher = United States Government Publishing Office| access-date = 7 June 2016}} 44. ^{{cite web| url = http://nsarchive.gwu.edu/NSAEBB/NSAEBB436/| title = The Snowden Affair| last = Richelson| first = Jeffrey T.| date = 4 September 2013| website = nsarchive.gwu.edu| publisher = National Security Archive| access-date = 9 June 2016}} 45. ^1 2 {{cite book| last = Bamford| first = James| title = The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America| publisher = Knopf Doubleday Publishing Group | date = 14 October 2008| pages =| url = https://books.google.com/books?id=YfiTZBYnZd4C&dq=&source=gbs_navlinks_s| isbn = 9780385528399}} 46. ^{{cite book| last = Solove| first = Daniel J.| title = Nothing to Hide: The False Tradeoff Between Privacy and Security| publisher = Yale University Press| date = 2011| url = https://books.google.com/books?id=UUdQi4FxRxAC&dq=&source=gbs_navlinks_s| isbn = 9780300177251}} 47. ^{{cite book| last = Donohue| first = Laura K.| title = The Cost of Counterterrorism: Power, Politics, and Liberty| publisher = Cambridge University Press| date = 14 April 2008| pages = 258| url = https://books.google.com/books?id=QpVVPtzu1LUC&dq=&source=gbs_navlinks_s| isbn = 9781139469579}} 48. ^{{cite news| last= Eric| first= Schmitt| date= 1 August 2003| title= Poindexter Will Be Quitting Over Terrorism Betting Plan| url = https://www.nytimes.com/2003/08/01/politics/01POIN.html| newspaper = New York Times| location = Washington D.C.| access-date = 10 June 2016}} 49. ^Mark Williams Pontin. The Total Information Awareness Project Lives On, MIT Technology Review, 26 April 2006, retrieved 16 June 2016 50. ^1 2 3 4 TIA Lives On, National Journal, 23 February 2006, retrieved 14 June 2016 51. ^1 2 3 {{cite news|last=WILLIAM SAFIRE|title=You Are a Suspect|url=https://www.nytimes.com/2002/11/14/opinion/you-are-a-suspect.html|publisher=The New York Times|accessdate=September 20, 2013|date=November 14, 2002}} 52. ^1 {{cite web|last=Weinberger|first=Sharon|title=Defence research: Still in the lead?|url=http://www.nature.com/news/2008/080123/full/451390a.html|work=Nature|publisher=Nature Publishing Group|accessdate=7 December 2013|pages=390–393|doi=10.1038/451390a|date=24 January 2008|quote=Poindexter and his office proved to be more polarizing than expected; its Total Information Awareness programme (later changed to Terrorism Information Awareness), which aimed to sift through huge amounts of data to track terrorists, was attacked on privacy grounds, and Congress eventually cancelled it. "That was a dishonest misuse of DARPA," says Hans Mark, a former director of defense research and engineering now at the University of Texas at Austin.}} 53. ^{{cite web|title=Q&A on the Pentagon's "Total Information Awareness" Program|url=https://www.aclu.org/technology-and-liberty/qa-pentagons-total-information-awareness-program|publisher=American Civil Liberties Union|accessdate=19 December 2013|date=April 20, 2003}} 54. ^{{cite web|author=ROB MORSE|title=Fighting terror by terrifying U.S. citizens|url=http://www.sfgate.com/news/article/Fighting-terror-by-terrifying-U-S-citizens-2752084.php|publisher=San Francisco Chronicle|accessdate=21 December 2013|date=November 20, 2002}} 8 : Mass surveillance|Surveillance|DARPA|George W. Bush administration controversies|Counter-terrorism in the United States|Privacy in the United States|Privacy of telecommunications|Surveillance scandals |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。