Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Database

    Do You Know Your Terror Threat Score?

    Written by

    John Pallatto
    Published December 8, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The United States government is assigning a terror “risk assessment” score to every person, citizen or foreign national who crosses the border.

      The Department of Homeland Security plans to retain that score and information about your comings and goings for up to 40 years. But you have no way of learning what the score is.

      This latest example of the government blithely eroding its citizens human rights in the name of national security was disclosed in the Nov. 2, 2006, edition of the Federal Register.

      It gave notice in typically turgid bureaucratic prose that the government is operating the “Automated Targeting System” that is aimed at assessing the potential terror threats posed by people and cargo that enter and exit the country.

      The system uses massive databases and data mining technology to compile information “obtained from the public” that is processed “to permit targeting of conveyances, goods, cargo or persons.” The system is supposed to flag suspicious people and cargo to make it easier for the Department of Homeland Security to stop criminals, terror suspects or dangerous materials at the border.

      Stopping terrorists before they get into the country is certainly a laudable goal. But it is questionable that the government can only do this by collecting information and maintaining a terror risk score on all who cross the border.

      Worst of all, the system doesnt give citizens or their legal representatives the ability to check or challenge the accuracy of that information.

      /zimages/5/28571.gifClick here to read CIO Insights feature on “The Death of Privacy.”

      But the government has the right to share this information with U.S. and international security authorities, and in some cases with private contractors.

      The government is asking citizens to take it on faith that the information is accurate and wont be misused by the other organizations it shares it with.

      This sets up a Kafka-esque security system wherein citizens traveling abroad or trying to return home might be detained, interrogated, held without charge—locked away in some secret government prison without knowing why they are being held.

      Obviously the vast majority of us without criminal records or apparent connections to foreign insurgencies or international terrorist organizations will come and go across U.S. borders without attracting the attention of Homeland Security or its computer systems.

      But we have already seen examples of the havoc wreaked by the governments security systems as innocent people try to go about their lives or travel overseas.

      There are still examples of law-abiding people who are prevented from boarding planes because their names happen to match those of people on a terror watch list. The government has yet to provide an effective way for citizens to check these lists or to get the government to modify them so they dont encounter the same unwanted scrutiny.

      /zimages/5/28571.gifClick here to read why a Central Intelligence Agency venture investment in a health records management software company is raising privacy fears.

      The case of Khalid El-Masri, a Kuwait-born German citizen, illustrates the suffering that simple misspellings on a terror watch list can cause.

      El-Masri was traveling on vacation in December 2003 when he was detained in Macedonia and flown to Afghanistan, where he claims he was interrogated, tortured and held without charge for months as part of the U.S. Central Intelligence Agencys “extraordinary rendition” program.

      He says he was seized because his name is similar to another man with a similar name who is wanted as an al-Qaida operative. El-Masri is now trying to sue the U.S. government for his alleged pain and suffering during his detention.

      Then there is the case of Canadian citizen Maher Arar, who was detained in 2002 at New Yorks John F. Kennedy Airport on his way back to Canada. U.S. authorities had acted on information from Canadian police that Arar, a Syrian native, may have had ties to Islamic extremists.

      Next Page: Whats in a Name?

      Cost of Mistakes

      As a result, U.S immigration authorities deported Arar to Syria, which threw him in jail and held him for nearly a year. After his release, Arar claimed that he had been tortured and repeatedly whipped with electrical cables.

      Canadian police later acknowledged that the information that it had passed on to the United States about Arars alleged ties to extremists was erroneous. The scandal that resulted from Arars detention ultimately compelled the head of Canadas national police force to resign.

      The Automated Targeting System is supposed to speed up and improve the effectiveness and presumably the accuracy of our national terror screening effort. But are we just creating an automated system for compiling and compounding identity errors? A system of this scope also has the potential for causing suffering and injustice on a grand scale.

      What we have really done is given our government carte blanche to build an automated police state, where our comings and goings are watched, recorded, reviewed and scored for their potential threat to society. Our governments security apparatus has become virtually a state within a state that is seemingly beyond the review and regulation of the democratic society that created it ostensibly for its protection.

      The most distressing factor in this controversy is that through either apathy or ignorance we are all colluding in the erosion of our privacy rights. The government will keep building its screening databases if we are content to remain silent.

      One of the cherished rights of living in a democratic society is that as long as you obey the law and live peaceably with your neighbors, you have a reasonable expectation that your government will pay little or no attention to your existence except when income taxes are due or when its time once every decade to conduct the national census.

      We have to defend our privacy rights just as tenaciously as we guard our borders.

      The incoming Democratic majority in Congress, led by the new Senate Judiciary Committee Chairman, Patrick Leahy of Vermont, has pledged to review the various anti-terrorist database systems like the Automated Targeting System, with an eye toward ensuring they arent casually violating citizens human rights.

      /zimages/5/28571.gifTo read more about government efforts to access Web search records, click here.

      Such oversight is long overdue. The national trauma of the Sept. 11, 2001, terrorist attacks has given the government the sense that citizens will pay any price and sacrifice long-defended privacy rights in the name of national security. We must reassert those rights and set boundaries for how and when the government gathers information about our personal travels and associations.

      While data mining systems can be of great potential value in identifying potential threats, citizens have a right to know and to question the information that the government is gathering about them.

      Its time we moved beyond the shock and paranoia engendered by the 9/11 attacks and balance our desire to defend ourselves from international terrorism with the equally essential need to protect our rights at home.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.

      John Pallatto
      John Pallatto
      John Pallatto has been editor in chief of QuinStreet Inc.'s eWEEK.com since October 2012. He has more than 40 years of experience as a professional journalist working at a daily newspaper and computer technology trade journals. He was an eWEEK managing editor from 2009 to 2012. From 2003 to 2007 he covered Enterprise Application Software for eWEEK. From June 2007 to 2008 he was eWEEK’s West Coast news editor. Pallatto was a member of the staff that launched PC Week in March 1984. From 1992 to 1996 he was PC Week’s West Coast Bureau chief. From 1996 to 1998 he was a senior editor with Ziff-Davis Internet Computing Magazine. From 2000 to 2002 Pallatto was West Coast bureau chief with Internet World Magazine. His professional journalism career started at the Hartford Courant daily newspaper where he worked from 1974 to 1983.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.