The most concrete manifestation of the new detect-and-deter approach was the Department of Defense’s Total Information Awareness program, a data-mining initiative headed by former National Security Adviser John Poindexter. As originally conceived by Poindexter, the program would have sorted through everything from grade-school report cards to medical records to video rentals in an effort to spot potential terrorists before they strike. Congress, however, put the kibosh on Poindexter’s grand vision, limiting the scope of the program strictly to noncitizens. Americans will not be subjected to the data-mining program, whose logo?a pyramid topped with a giant eyeball watching the world?went along well with its Orwellian name. The citizenry need not worry in any case. According to data-mining experts, technology isn’t even close to doing what Poindexter and the Defense Department want to do. Given today’s state-of-the-art technology, it is hard enough to mine two databases simultaneously, let alone the tens, hundreds or thousands that the program hopes to search. Then there is the issue of teaching the software what to look for?even data-mining programs based on artificial intelligence have to be told what patterns to search for. It took credit card companies decades to develop the algorithms they use to detect fraud. The government faces an even greater challenge trying to understand the behavior patterns of terrorists?particularly given the small sample size from which to learn. So far one of the only distinct transactional similarities among the 19 Sept. 11th hijackers is that they all bought a lot of pizza using credit cards. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe “Even under a nearly perfect system you get false positives,” says Larry Ponemon, head of the eponymous Ponemon Institute, a privacy and data protection think tank. “That’s where you infringe on people’s privacy and maybe their civil rights. You can’t have the convenience [of total awareness] without expanding the probability of a false positive.” And the possibility that hundreds, perhaps thousands, of people may be falsely accused of terrorism. Related content news CIO Announces the CIO 100 UK and shares Industry Recognition Awards in flagship evening celebrations By Romy Tuin Sep 28, 2023 4 mins CIO 100 IDG Events Events feature 12 ‘best practices’ IT should avoid at all costs From telling everyone they’re your customer to establishing SLAs, to stamping out ‘shadow IT,’ these ‘industry best practices’ are sure to sink your chances of IT success. By Bob Lewis Sep 28, 2023 9 mins CIO IT Strategy Careers interview Qualcomm’s Cisco Sanchez on structuring IT for business growth The SVP and CIO takes a business model first approach to establishing an IT strategy capable of fueling Qualcomm’s ambitious growth agenda. By Dan Roberts Sep 28, 2023 13 mins IT Strategy IT Leadership feature Gen AI success starts with an effective pilot strategy To harness the promise of generative AI, IT leaders must develop processes for identifying use cases, educate employees, and get the tech (safely) into their hands. By Bob Violino Sep 27, 2023 10 mins Generative AI Innovation Emerging Technology Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe