. "Appendix I: Illustrative Government Data Mining Programs and Activity." Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. Washington, DC: The National Academies Press, 2008.
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
sources include complaint reports from the CMS and DHHS Inspector General’s office and FBI databases.
Other DOJ activities:
Organized Crime and Drug Enforcement Task Force (OCDETF) FusionCenter. OCDETF maintains a data warehouse named Compass that contains relevant drug and related financial intelligence information from numerous law-enforcement organizations. As stated in the report, “the goal of the data warehouse is to use cross-case analysis tools to transform multi-agency information into actionable intelligence in order to support major investigations across the globe.”83
Investigative Data Warehouse (IDW). Managed by FBI, this warehouse enables investigators to perform efficient distributed searches of data sources across FBI. IDW provides analysts with the capability to examine relationships between people, places, communication devices, organizations, financial transactions, and case-related information.
Internet Crime Complaint Center (IC3). A partnership between FBI and the National White Collar Crime Center (NW3C), IC3 is focused on cybercrime. It provides a reporting mechanism for suspected violations. Reports are entered into the IC3 database, which can then be queried to discover common characteristics of complaints.
Computer Analysis and Response Team (CART) Family of Systems. This is a set of tools used to support computer forensics work. CART maintains a database of information collected from criminal investigations. Data can be searched for similarities among confiscated computer hard drives.
Before publication of the report, many of the programs were either unknown publicly or had unclear scopes and purposes. Commenting on the DOJ report shortly after its delivery to the Senate Committee on the Judiciary, Senator Patrick Leahy commented that “this report raises more questions than it answers and demonstrates just how dramatically the Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans’ most sensitive personal information,” and said that the report provided “an important and all too rare ray of sunshine on the Department’s data mining activities and provides Congress with an opportunity to conduct meaningful oversight of this powerful technological tool.”84