T9P St CRET SI cNOF9RN RESPONSE TO CONGRESS SECRETARY OF DEFENSE REPORT ON FEDERAL DATA MINING PROORAMS WITIIIN TilE DEPARTMENT OF DEFENSE Fiscal Year 2014 Prepantioa of tbil study report colt t e De rtmeot of Defeue o tobll of opprost otely $18 957 36 for Fiscal Year 2015 Ge nated H 21J5Marelllt RefiD VSIII1669-J4 UNCLASSIMEB WlmN-SEP RATEB-PROM AT'f'IICIIMIEN'FS T9P SEEURMlT ISII cN9FQRN TOP SECRET SJ NOFOR U The Office of the Secretary of Defense is pleased to provide Congress this report pursuant to Section 804 of the ImplementingRecomrnendations of the 9 ll Commission Act of 2007 entitled The Federal Agency Data Mining Reporting Act of 2007 the Act U Congressionally Directed Action Requirement This report responds to a congressional request for the Department of Defense to provide information on its data mining activities as dire cted by the Implementing Recommendations ofthe 9 11 Commission Act of 200 7 Section 804 of that legislation the Data Mining Reporting Act requires the head of each department or agency of the Federal Government that is engaged in any activity to use or develop data mining as defmed by the act to submit a report on all such activities to Congress U Background and Scope On August 3 2007 President Bush signed into law the Implementing Recommendations of the 9 11 Commission Act of2007 Section 804 of that legislation the Federal Agency Data Mining Reporting Act requires annual reports on government data mining programs beginning 180 days from the Data Mining Reporting Act's enactment This Fiscal Year 2014 report was prepared by the Office of the Under Secretary ofDefense for Intelligence and responds to the above requirement o U Each of the Department of Defense Components that engaged in data mining activities during fiscal year 20 14 was tasked to submit a report that contained the following information in accordance with Section 804 o U A thorough description of the data mining activity its goals and where appropriate the target dates for the deployment of the data mining activity o U A thorough description of the data mining technology that was or will be used to include the basis for detennination of whether a particular pattern or anomaly was indicative of terrorist or criminal activity o U A thorough description of the data sources that were used o U An assessment of the efficacy or likely efficacy of the data mining activity to provide accurate information consistent with and valuable to the stated goals and plans for the data mining activity o U An assessment of the impact or likely impact of the implementation of the data mining activity on the privacy and civil liberties of individuals including a thorough description of the actions taken or will be taken with regard to the property privacy or other rights or privileges of any individual or individuals as a result of the implementation of the data mining activity o U A list and analysis of the laws and regulations that govern the information collected reviewed gathered analyzed or used in conjunction with the data UNCLASSIFIED WIIEN SEPARATED FROM ATTM HMENT8 TOP SECMTNSI NOFORN TOP SECRET SI N0JPY0RN mining activity to the extent applicable in the context of the data mining activity o U A thorough discussion of the policies procedures and guidelines that are in place or that are to be developed and applied in the use of such data mining activity in order to o U Protect the privacy and due process rights of individuals such as redress procedures and o U Ensure that only accurate and complete information is collected reviewed gathered analyzed or used and guard against any hannful consequences of potential inaccuracies U Department of Defense Response The report was developed from inputs from all relevant DoD Components in coordination with the Defense Privacy and Civil Liberties Division The report is separated into UNCLASSIFIED and CLASSIFIED responses U For the FY 2014 reporting period o U Military Services The U S Army U S Air Force U S Navy and U S Marine Corps reported they did not engage in any data mining activities as defined by the Federal Data Mining Activity Reporting Act of2007 o U Combatant Commands The Joint Staff U S Central Command U S Pacific Command U S Northern Command U S Africa Command U S Transportation Command U S Strategic Command U S Special Operations Command U S Southern Command U S European Command and U S Forces Korea reported they did not engage in data mining activities as defined by the Federal Data Mining Activity Reporting Act of 2007 o U National Security Agency NSA NSA reported they engaged in data mining as defined under definition contained in the Federal Data Mining Activity Reporting Act of 2007 pursuant to their mission for foreign intelligence purposes to include the detection of terrorist activities Their classified report is contained in Annex A o U National Geospatial-InteUigence Agency NGA NGA reported they engaged in data mining activities as defined under the definition of the Federal Data Mining Activity Reporting Act of2007 in support of its mission to provide tiinely relevant and accurate geospatial intelligence in support of national security Their classified report is contained in Annex B o U Joint Improvised Explosive Device Defeat Organization JIEDDO JIEDDO reported they engaged in data mining activities as defined under the definition of the Federal Data Mining Activity Reporting Act of 2007 to perform searches on data -lJNCLASSIFIED WHEN SEPARATED FROM AITACIIMENTS TOP 8ECRETJ SI INOFORN TOP SECRET Slh'NOFOil compiled from a variety of databases used by U S and coalition military forces Their unclassified report is contained in Annex C and their classified report is contained in Annex D o U Defense lqtelligence Agency DIA and National Reconnaisnnce Office NRO Both DIA and the NRO reported they did not engage in data mining activities as defined by the Federal Data Mining Activity Reporting Act of2007 U Conclusion The Department of Defense has compiled this report for Congress in compliance with the Federal Data Mining Activity Reporting Act of2007 The Department continues to ensure the effectiveness of data mining programs while protecting all applicable privacy and due process rights of individuals UNCLASSIFIED liiiGBPN SEPARATED FROM ATTA CIDIENT 'FOP SECRE'FHSIHNOFOR 'l I I 46 remaining pages denied in full pursuant to 5 U S C 552 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu
OCR of the Document
View the Document >>