Anti-Terror Weapons We're Afraid to Use
The Old-Fashioned Approach to Catching Terrorists Isn't Enough

With the arrests last week of 24 alleged terrorists in Britain, the government's legal tools for fighting Al Qaeda are up for debate once again. Homeland Security Secretary Michael Chertoff suggests that Congress emulate Britain's law allowing extended pretrial detention of suspects. Others have observed that British law enforcement can more easily initiate investigations and obtain search warrants than their American counterparts.

Visiting Scholar John Yoo
Visiting Scholar John Yoo
But increasing detention time or making warrants easier to come by merely extends an old-fashioned approach to catching terrorists. These tools require individualized suspicion and "probable cause"; police must have evidence of criminal activity in hand. Such methods did not prevent 9/11, and stopping terrorists, who may have no criminal record, requires something more.

Instead of enlarging the scope of standard law enforcement methods, we should be doing what Americans do best--innovating and applying new technology to the problem. Despite what civil libertarians might have you think, that means data mining.

Data mining uses supercomputers to analyze vast amounts of information for suspicious patterns of behavior. It appears to have been an important tool in breaking up the plot in Britain. According to news reports, British authorities searched telephone, e-mail and banking records and uncovered connections between the bombers in Britain and their supporters in Pakistan.

American efforts to develop sophisticated data-mining abilities died early in 2003, when criticism killed the Defense Department's Total Information Awareness program. The idea was to develop mining techniques to compare information in government and commercial databases. Civil libertarians engaged in a scare campaign representing the TIA as an unchecked Big Brother. Congress cut off all funding for the program. It was a political defeat early in the war on terrorism, and the president retreated as fast as he could.

But that was a dangerous overreaction. Corporations already use data mining to detect consumer fraud and to market products such as credit cards and magazine subscriptions. Financial companies analyze patterns that might indicate a stolen credit card or bank account number. Why should the government be barred from using similar tools on similar databases to protect the country from attack? Data mining is nothing but an ordinary, ubiquitous feature of technology today.

In fact, the government also already uses modest forms of data mining. In response to drug cartels and organized crime, federal authorities are allowed to search banking records for signs of money laundering. Such analysis has already paid off in the war against terror by identifying groups that funnel funds to extremist organizations.

What about privacy concerns? The Supreme Court has found that the information in business records does not merit 4th Amendment protection because the consumer has already voluntarily turned over the information to a third party.

Still, civil libertarians object to data mining because most of the records and communications that would be searched are innocent, and there is no suspicion of criminal activity attached to any individual whose records may be mined. When the National Security Agency was discovered in May to be looking at telephone billing information on millions of calls within the United States, Sen. Patrick Leahy (D-Vt.) railed at a hearing: "Are you telling me tens of millions of Americans are involved with Al Qaeda?"

But it's important to remember that data mining is not the same thing as gathering the information in the first place. The NSA's program of looking at billing information, for example, doesn't raise the same constitutional issues as its other recently revealed program: warrantless wiretaps. There, the content of communications was captured. A federal trial judge in Detroit enjoined such surveillance Thursday, in a decision already on appeal.

Data mining could be controlled and developed so that it protects us from terror and maintains our privacy. Analysis could be limited to data already turned over to third parties. Searches could be performed initially by computer; only after a certain level of suspicious activity had been registered would an intelligence or law enforcement officer be allowed to see the results. A warrant could still be required to investigate the content of communications or the purpose of purchases.

Right now, we're fighting terror with one hand behind our back by refusing to exploit data-mining tools. London's success should serve notice that we must use our technological sophistication and reject the sky-is-falling claims of the extreme civil libertarians.

John Yoo is a visiting scholar at AEI.

Also Visit
AEIdeas Blog The American Magazine
About the Author

 

John
Yoo

What's new on AEI

AEI Election Watch 2014: What will happen and why it matters
image A nation divided by marriage
image Teaching reform
image Socialist party pushing $20 minimum wage defends $13-an-hour job listing
AEI on Facebook
Events Calendar
  • 27
    MON
  • 28
    TUE
  • 29
    WED
  • 30
    THU
  • 31
    FRI
Monday, October 27, 2014 | 10:00 a.m. – 11:30 a.m.
State income taxes and the Supreme Court: Maryland Comptroller v. Wynne

Please join AEI for a panel discussion exploring these and other questions about this crucial case.

Tuesday, October 28, 2014 | 9:30 a.m. – 12:15 p.m.
For richer, for poorer: How family structures economic success in America

Join Lerman, Wilcox, and a group of distinguished scholars and commentators for the release of Lerman and Wilcox’s report, which examines the relationships among and policy implications of marriage, family structure, and economic success in America.

Tuesday, October 28, 2014 | 5:30 p.m. – 7:00 p.m.
The 7 deadly virtues: 18 conservative writers on why the virtuous life is funny as hell

Please join AEI for a book forum moderated by Last and featuring five of these leading conservative voices. By the time the forum is over, attendees may be on their way to discovering an entirely different — and better — moral universe.

Thursday, October 30, 2014 | 2:00 p.m. – 3:00 p.m.
A nuclear deal with Iran? Weighing the possibilities

Join us, as experts discuss their predictions for whether the United States will strike a nuclear deal with Iran ahead of the November 24 deadline, and the repercussions of the possible outcomes.

Thursday, October 30, 2014 | 5:00 p.m. – 6:15 p.m.
The forgotten depression — 1921: The crash that cured itself

Please join Author James Grant and AEI senior economists for a discussion about Grant's book, "The Forgotten Depression: 1921: The Crash That Cured Itself" (Simon & Schuster, 2014).

No events scheduled this day.
No events scheduled this day.
No events scheduled this day.
No events scheduled today.
No events scheduled this day.