ADVISE

Last updated

ADVISE (Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement) is a research and development program within the United States Department of Homeland Security (DHS) Threat and Vulnerability Testing and Assessment (TVTA) portfolio. [1] [2] It is reportedly developing a massive data mining system, which would collect and analyze data on everyone in the United States and perform a "threat analysis" on them. [3] The data can be anything from financial records, phone records, emails, blog entries, website searches, to any other electronic information that can be put into a computer system. [4] This information is then analyzed, and used to monitor social threats such as community-forming, terrorism, political organizing, or crime.

Contents

ADVISE will possess the ability to store one quadrillion data entities. [5]

The exact scope and degree of completion of the program is unclear. ADVISE is in the 2004-2006 Federal DHS Budget as a component of the $47 million TVTA program.[ citation needed ]

The program was officially scrapped in September 2007 after the agency's internal Inspector General found that pilot testing of the system had been performed using data on real people without required privacy safeguards in place. [6]

See also

Related Research Articles

Lawrence Livermore National Laboratory (LLNL) is a federally funded research and development center in Livermore, California, United States. Originally established in 1952, the laboratory now is sponsored by the United States Department of Energy and administrated by Lawrence Livermore National Security, LLC.

<span class="mw-page-title-main">Data mining</span> Process of extracting and discovering patterns in large data sets

Data mining is the process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems. Data mining is an interdisciplinary subfield of computer science and statistics with an overall goal of extracting information from a data set and transforming the information into a comprehensible structure for further use. Data mining is the analysis step of the "knowledge discovery in databases" process, or KDD. Aside from the raw analysis step, it also involves database and data management aspects, data pre-processing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating.

<span class="mw-page-title-main">United States Department of Homeland Security</span> United States federal department

The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of Cybersecurity and Communications' (CS&C) National Cybersecurity and Communications Integration Center (NCCIC).

<span class="mw-page-title-main">National Cyber Security Division</span>

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. Formed from the Critical Infrastructure Assurance Office, the National Infrastructure Protection Center, the Federal Computer Incident Response Center, and the National Communications System, NCSD opened on June 6, 2003. The NCSD mission is to collaborate with the private sector, government, military, and intelligence stakeholders to conduct risk assessments and mitigate vulnerabilities and threats to information technology assets and activities affecting the operation of the civilian government and private sector critical cyber infrastructures. NCSD also provides cyber threat and vulnerability analysis, early warning, and incident response assistance for public and private sector constituents. NCSD carries out the majority of DHS’ responsibilities under the Comprehensive National Cybersecurity Initiative. The FY 2011 budget request for NCSD is $378.744 million and includes 342 federal positions. The current director of the NCSD is John Streufert, former chief information security officer (CISO) for the United States Department of State, who assumed the position in January 2012.

<span class="mw-page-title-main">Environmental Measurements Laboratory</span>

The Environmental Measurements Laboratory (EML) is the former name of the current National Urban Security Technology Laboratory (NUSTL), a United States government-owned, government-operated laboratory. NUSTL is part of the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). Effective December 1, 2009, EML was re-designated as NUSTL to reflect the Lab’s evolved mission and functions. NUSTL is the third name in the laboratory's history, following the Health and Safety Laboratory and the Environmental Measurements Laboratory (1977–2009).

In the United States, fusion centers are designed to promote information sharing at the federal level between agencies such as the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the U.S. Department of Justice, and state, local, and tribal law enforcement. As of February 2018, the U.S. Department of Homeland Security recognized 79 fusion centers. Fusion centers may also be affiliated with an emergency operations center that responds in the event of a disaster.

The Automated Targeting System or ATS is a United States Department of Homeland Security computerized system that, for every person who crosses U.S. borders, scrutinizes a large volume of data related to that person, and then automatically assigns a rating for which the expectation is that it helps gauge whether this person may be placed within a risk group of terrorists or other criminals. Similarly ATS analyzes data related to container cargo.

The National Biodefense Analysis and Countermeasures Center (NBACC) is a government biodefense research laboratory created by the U.S. Department of Homeland Security (DHS) and located at the sprawling biodefense campus at Fort Detrick in Frederick, MD, USA. The NBACC is the principal U.S. biodefense research institution engaged in laboratory-based threat assessment and bioforensics. NBACC is an important part of the National Interagency Biodefense Campus (NIBC) also located at Fort Detrick for the US Army, National Institutes of Health and the US Department of Agriculture.

BioWatch is a United States federal government program to detect the release of pathogens into the air as part of a terrorist attack on major American cities. Reportedly operating in Philadelphia, New York City, Washington, DC, San Diego, Boston, Chicago, San Francisco, Atlanta, St. Louis, Houston, Los Angeles and 21 other cities, the BioWatch program was created in 2001 in response to the increased threat of bioterrorism sparked by the 2001 anthrax attacks, and was announced in President George W. Bush's State of the Union Address of 2003.

According to the DHS S&T website, the Command, Control, and Interoperability Division was a unit of the DHS Science and Technology Directorate which "develops interoperable communication standards and protocols for emergency responders, cyber security tools for protecting the integrity of the Internet, and automated capabilities to recognize and analyze potential threats."

EINSTEIN was originally an intrusion detection system that monitors the network gateways of government departments and agencies in the United States for unauthorized traffic. The software was developed by the United States Computer Emergency Readiness Team (US-CERT), which is the operational arm of the National Cyber Security Division (NCSD) of the United States Department of Homeland Security (DHS). The program was originally developed to provide "situational awareness" for the civilian agencies. While the first version examined network traffic and subsequent versions examined content, the current version of EINSTEIN is significantly more advanced.

<span class="mw-page-title-main">Future Attribute Screening Technology</span> Surveillance program

Future Attribute Screening Technology (FAST) is a program created by the Department of Homeland Security. It was originally titled Project Hostile Intent. The purpose is to detect "Mal Intent" by screening people for "psychological and physiological indicators" in a "Mobile Screening Laboratory".

<span class="mw-page-title-main">Command, Control and Interoperability Division</span>

The Command, Control and Interoperability Division is a bureau of the United States Department of Homeland Security's Science and Technology Directorate, run by Dr. David Boyd. This division is responsible for creating informative resources(including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S.

National Urban Security Technology Laboratory is a United States government-owned, government-operated laboratory, part of the Department of Homeland Security (DHS) Science & Technology Directorate. It is located in the Federal Office Building at 201 Varick Street in the Hudson Square neighborhood, Manhattan, New York.

<span class="mw-page-title-main">Parney Albright</span>

Penrose "Parney" C. Albright is a physicist and weapons scientist known for his work with the U.S. Government, think tanks and National Laboratories, and government contractors. Since November 1, 2014, he has been the president and CEO of HRL Laboratories, a research firm jointly owned by Boeing and General Motors. Until December 2013 he served as the director of Lawrence Livermore National Laboratory, and, in 2014, he served as a senior advisor in the Office of the Director of National Intelligence.

<span class="mw-page-title-main">FedRAMP</span> US government cybersecurity program

The Federal Risk and Authorization Management Program (FedRAMP) is a United States federal government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

<span class="mw-page-title-main">Hancock (programming language)</span> Programming language intended for data mining

Hancock is a C-based programming language, first developed by researchers at AT&T Labs in 1998, to analyze data streams. The language was intended by its creators to improve the efficiency and scale of data mining. Hancock works by creating profiles of individuals, utilizing data to provide behavioral and social network information.

References

  1. Pang, Les (2009). Data Mining Lessons Learned in the Federal Government. Encyclopedia of Data Warehousing and Mining. pp. 492–496.
  2. Jifa, Gu; Zhang, Lingling. "Data, DIKW, Big data and Data science". Procedia Computer Science.
  3. "Homeland Security revives supersnoop". Washington Times. 8 March 2007. Retrieved 10 January 2010.
  4. Clayton, Mark (February 9, 2006). "US plans massive data sweep". Christian Science Monitor. Archived from the original on 5 January 2010. Retrieved 10 January 2010.
  5. UK, ZDNet. "DHS program tries to connect far-flung information, but at what privacy cost?". ZDNet. Retrieved 2020-08-10.
  6. "US suspends vast ADVISE data-sifting system". Christian Science Monitor. 2007-08-28. ISSN   0882-7729 . Retrieved 2020-08-10.