by dranek7 » Sat May 13, 2006 6:40 pm
William Arkin posted a list of 500 federal data mining programs on his <!--EZCODE LINK START--><a href="http://blog.washingtonpost.com/earlywarning/2006/05/nsas_multibillion_dollar_data.html">WaPo Blog</a><!--EZCODE LINK END-->:<!--EZCODE QUOTE START--><blockquote><strong><em>Quote:</em></strong><hr>The following list of some 500 software tools, databases, data mining and processing efforts have been contracted for or are under development or in use at the NSA and other intelligence agencies and military commands today. The list itself gives a sense of the scope and scale of the government's program of intelligence collection and tracking. Many of the acronyms and code names lead to standard commercial packages, others are inscrutable classified activities. My hope would be that other journalists and researchers will follow the leads.<hr></blockquote><!--EZCODE QUOTE END--><br><br><!--EZCODE QUOTE START--><blockquote><strong><em>Quote:</em></strong><hr><br># A2IPB<br># ABA<br># ABC Terrorism Prediction Model<br># ABIS (Automated Biometric Identification System)<br># AC2<br># ACCO (Army Central Control Office) counter-intelligence investigations database<br># ACOA<br># ACTOR (Analyzing Complex Threats for Operations and Readiness)<br># Adversary<br># AeroText<br># AFIS (Automated Fingerprint Identification Systems)<br># AIES (Automated Information Extraction System)<br># AIM<br># AIR (Arabic Information Retrieval):<br># Aira Data Mining Tool<br># AIPSA (Automated Intel Processing for Situational Awareness)<br># aiSee<br># AKA<br># ALADDIN (Automated Link Analysis for Data Mining of Distributed Information)<br># ALE (Aires Life Extension) <br># Alembic<br># ALICE d'ISoft<br># Alien Migration db<br># Alterian Nucleus<br># AME (analyst modeling environment)<br># Analyst Notebook/Analyst Notebook Link Chart Reader<br># Analyst Workbench<br># Anchory<br># AnswerTree<br># Answerer<br># AOCG (automated org-chart generation)<br># APOLLO<br># Aquarius<br># ARENA<br># ARM<br># ART (Author-Recipient-Topic)<br># ASAS (All Source Analysis System)/ASAS-L with MAST<br># ASID (Automated Systems Integration Management Intelligence Database)<br># ASIM (Automated Security Incident Measurement) <br># Association<br># AT Sigma Data Chopper<br># ATHENA<br># ATIX (Anti-Terrorism Information Exchange/Automated Trusted Information Exchange): <br># AUDITT<br># AutoMap<br># Autonomy<br># Automatic Identification System<br># Automated Warning Prototype<br># Auto-X tools<br># AutoTrackXP (ATXP)<br># AXIS (Analysis and eXploration of Information Sources)<br># AVS/Express Visualization Edition<br># Basketball<br># BioWar<br># Blackknight<br># Blue Data Miner<br># BNN (Broadcast News Navigator)<br># Breve<br># Broadbase EPM (Enter Perf Mgmt)<br># Brocade<br># BUILDINGCODE<br># BusinessMiner<br># C2PC<br># CADRE (Continuous Analysis and Discovery from Relational Evidence)<br># CamStudio<br># Camps<br># Capri<br># Carillon<br># CART<br># CASIAT (Computer Assisted Security Investigative Analysis Tool)<br># Categorizer/Tree Studio<br># CATEIS (Counterintelligence Automated Tactical Exploitation & Information Software)<br># CCDB (Consolidated Counterdrug Data Base)<br># CCIP (Counterterrorism Collaboration Interoperability Project)<br># CCM<br># Centrifuge<br># CETA<br># Chassis<br># CHATS (CI/HUMINT Automation Tool Set)<br># Checkpoint<br># CHIMS (CI/HUMINT Information Management System)<br># CHINET (Chinese Name Extraction and Translation)<br># CIA TD/TDX<br># CiceroLite:<br># CIDAR (Critical Infrastructure Detection, Analysis and Reporting)<br># CIM (Critical Intent Model)<br># CIM/SEAS Nested Argumentation<br># CIPA (Counter Insurgency Pattern Assessment)<br># CIRC<br># CIS (Case Information System)<br># CITF (Criminal Investigative Task Force) Web-enabled Database<br># CJMTK<br># Clear Case<br># Clear Quest<br># ClearForest<br># ClearResearch<br># Clementine<br># CMS (Case Management System)<br># Cobra Focus<br># CODIS (Combined DNA Index System)<br># CoGen<br># COGNET<br># Cognos (COTS Tool for Report Generation)<br># Coliseum<br># Conceptual Model of Counter-Terrorism Operations<br># Constant Web<br># Construct<br># Content Analyst<br># Context<br># Convera<br># Cornerstone<br># Coverterm<br># CPOF<br># CPXP<br># CrimeLink<br># CrissCross<br># CrossGraphs<br># CTAC (Counter-Terrorism Analysis Capability)<br># CTDB (Combating Terrorism Database)<br># CT-AVRS/CT-AVARS (Combined Theater - Analyst Vetted Relational System/Combined Theater Analyst-Vetted, Relational, Structured Database)<br># Cubist<br># Cultweave/Cultweave II<br># CyberLINXX<br># CyberTrans<br># CYC<br># Darwin<br># Data Clarity<br># Data Detective<br># Data Logic/RDS<br># DataMiner 3D<br># Data mining suite<br># DataMite<br># DataScope<br># Data Serfer<br># DataSurferPlus<br># Data Surveyor<br># DB2<br># dbProbe<br># DCIIS<br># DECIDE<br># DecisionWORKS<br># DeltaMiner<br># Diamond<br># DIAZ<br># DIMS (Detainee Information Management System)<br># DNA (Dynamic Network Analysis)<br># Dollar-Dinar db ($$) <br># DOORS<br># Dream Media<br># DTES<br># DyNet<br># Eagle Eye<br># EARS<br># EASYBORDER<br># EICK<br># EKM<br># Elite Network Modeling<br># Emergejust (EJ)<br># Enterprise Miner<br># ENVIE (Extensible News Video Exploitation for Intelligence Analysis)<br># Envision<br># EP<br># FaceIt<br># FactBrowser<br># Fair Isaac<br># Fascia<br># FAST DIAMOND US<br># FAST ISSM<br># FAST toolbox for OOTW<br># FastTalk<br># Fastus/TextPro<br># FatCat<br># FeedDemon<br># Festival<br># FINTEL<br># FOMA<br># FORECITE Monitor<br># Foreign terrorism communication profile database<br># Foundationstone<br># Fraud Investigator<br># Freedom<br># Fulcrum Knowledge Server<br># GATE (General Architecture for Text Engineering)<br># GBAE (Glass Box Analytical Environment)<br># GCS<br># GDA<br># GDM-FC<br># Geo-Browser<br># Genysis<br># GeoTagger<br># GIDI<br># GIP (Generic Intelligence Processor)<br># Glide<br># Graphlet<br># GRAPHVIZ/graphvis<br># Grindstone<br># Groove Workspace:<br># Groundbreaker<br># Group Discovery Algorithm<br># Guardian<br># Harvester<br># HD Map<br># HIDTA DIG (High Intensity Drug Trafficking Areas Digital Information Gateway)<br># Highpoint<br># HIS (HUMINT Imagery Server)<br># Homebase/Homebase II<br># HMSng (HUMINT Management System next generation)<br># HPS (HUMINT Processing System)<br># Hydrant<br># i2 Visual Notebook:<br># IAA (Intelligence Analyst Associate)<br># IAFIS (Integrated Automated Fingerprint Identification System)<br># iBase<br># IBM Intelligence Miner for Data<br># IBM MT:<br># IC ROSE<br># IdentiFinder<br># IDP (Intelligence discovery portal)<br># IDW (Investigative Data Warehouse)<br># IE CounterDrug<br># IES (IIR Evaluation System)<br># IFS (Intelligence Fusion System)<br># ILS<br># iMapData<br># IMPACT (Intelligent Mining Platform for the Analysis of Counter Terrorism)<br># InCLUEsion<br># Indri<br># InFact<br># InfoMASQ<br># Informix Red Brick Formation<br># InfoWorkspace<br># InfoXtract<br># INQUEST<br># IN-SPIRE<br># Insta-Know<br># Intelligent Miner for Text<br># Intelligenxia<br># InterSCOPE 3-D Geospatial Visualization<br># INTREPID (Intelligence and Terrorist Photograph Identification Database)<br># IR Discover<br># ISM (InfoSphere Management System)<br># ITN (Identification Tasking and Network)<br># IWS<br># Jabber<br># Jaguar<br># JDS<br># JMIE<br># Juggernaut<br># JWARN (Joint Warning System)<br># KATE-DataMining<br># KDD Explorer/SRA KDD Explorer<br># Keycard<br># KeyPlayer<br># KnowledgeSEEKER<br># KnowledgeSTUDIO<br># LADS (Linkage Analysis Database System)<br># LAS<br># LAW (Link Analysis Workbench)<br># LDS (Lotus Discovery Server)<br># LEADMiner (NIPS)<br># LEMUR<br># LexiQuest Mine<br># LingPipe<br># LingSoft<br># LinkView<br># LSI (Latent Semantic Indexer)<br># Mage<br># Mailorder<br># Mainway<br># Malolo<br># Malta<br># MAPLE<br># MARS<br># MatView<br># MAUI NITE<br># MayaVis<br># Media Manager<br># METIS<br># METS (Metadata Extraction and Tagging Service)<br># MindManager<br># MINDS (Multilingual Interactive Document Summarization)<br># MINER<br># Minerva<br># MineSet<br># MiTAP (MITRE Text and Audio Processing)<br># MODEL 1<br># Modus Operandi Database<br># Mohomine<br># MPES<br># Name Variant<br># NameStats<br># NDA (name data archive)<br># NDCore<br># NDEx (National Data Exchange)<br># NDPIX (National Drug Pointer Index)<br># NER (named entity extraction)<br># Nested Vision 3D<br># NetDraw<br># Netica<br># NetMap Analytics<br># NetMiner<br># NetOwl/Net Owl<br># NETVIZ<br># NexMiner<br># NLP++<br># Noöscape<br># NORMALLAW<br># NORA (Non-Obvious Relationship Analysis)<br># NorthernLight<br># NRM (NSA Reference Model)<br># Nuggets<br># Oasis<br># ObjectFX<br># OCULIS<br># OMNIDEX<br># OnTap<br># OnTopic<br># Open Visualization Data Explorer<br># Optionspace Visualization<br># ORA<br># Orion<br># ORIONMagic<br># OSALAT (Open Source Automated Link Analysis Tool)<br># Outline/Magic<br># Overwatch<br># PAC (Portal Automated Collection)<br># Pajek<br># Paladin<br># Pantheon<br># PASSGEAR<br># PathFinder<br># PEAC-WMDv5 Decision Support tool<br># Pen-Link<br># Pensa<br># Pinpoint<br># PINWALE<br># Pipeline<br># PIRANHA<br># Plus<br># Polaris<br># PolyAnalyst<br># PowerDrill<br># Powerplant<br># PPS<br># Procon<br># Project Foundry<br># Proximity<br># PrudSys Discoverer<br># PTEK<br># QACTIS (Question-Answering for Cross-Lingual Text, Image, and Speech)<br># QANDA<br># Query Tree NG/Querytree<br># QUIET (QUery Improvement Elevation Technique)<br># QKS Classifier<br># Radiant Garnet<br># Rampart<br># Rational Rose<br># Raven<br># Razor<br># REES<br># Remedy<br># Renoir/Renoir+<br># REPAST<br># Rigel<br># RMS<br># ROSID (Rapid Open Source Intelligence Deployment System)<br># ROVER<br># RPS<br># S-PLUS<br># SAFE<br># SaffronNet<br># Saffron Web<br># SAIL Labs Media Mining (MM) and Communications Mining (CM) Tool<br># SameTime<br># Sandbox<br># Sander<br># SANDKEY.<br># SAS/SAS Enterprise Miner<br># SAVANT (Systematic Architecture for Virtual Analytic Net-centric Threat Information):<br># Scenario<br># SeaLink/SeaWatch<br># SEAS (Structured Evidence Argumentation System)<br># See 5/C5.0<br># Semantic Forests<br># Semantic Navigator<br># Semantic Web<br># SEMESTER<br># Semio Taxonomy<br># SERIF (Statistical Entity & Relation Information Finding)<br># SIAAD (Secure Information Access Analysis & Dissemination)<br># SIAM (Situational Influence Assessment Module)<br># Siena<br># SIFT<br># SIGINT on Demand<br># SKYWRITER<br># Slate<br># SmartDiscovery<br># SmartDiscovery Analysis Server<br># SmartDiscovery Awareness Server<br># SNAKE (Social Network Analysis for Knowledge Exploitation)<br># SOCIDS<br># SoNIA<br># Soundex<br># Sparkler<br># sphinxVision<br># SPIRE/Themeview<br># Springtide<br># Spotfire Pro<br># SPSS/Clementine<br># SpyGLAS<br># SS7<br># SSNAStandpoint<br># Starlight<br># StarTree<br># STK (Surge Toolkit)<br># Strategic Player<br># STRONG ANGEL<br># Subdue<br># SUMMAC (Summarization Analysis Conference)<br># Suspect Finder<br># Swarm <br># Sybase<br># Syllogic Data Mining<br># Symphony<br># SyNERA<br># Synergist<br># System Dynamic Modeling<br># SYSTRAN<br># TACS<br># TAG Manager (Thematic Argument Group Manager)<br># TAIC (Text Analysis International Corporation)<br># TAPAS (Threat Anticipation Program Agent-Based Simulation of Terrorist Motivations, Objectives and Strategies)<br># TEES (Trainable Evidence Extraction System)<br># Tel-Scope<br># TER (The Easy Reasoner)<br># TERQAS (Time and Event Recognition for Question Answering Systems)<br># Teradata<br># TextWise<br># Themelink<br># ThingFinder<br># THREADS (Threat HUMINT Reporting, Evaluation, Analysis, and Display System) <br># Threat Tracker<br># TILADS (Terrorist Identification Linkage Analysis Database)<br># Timewall<br># TIMEX<br># Tina Tool<br># Tinman<br># TIRT<br># TKT (Tacit Knowledge Toolkit)<br># TMODS (Terrorist Modus Operandi Detection System)<br># TOLLS<br># Tom Sawyer<br># TouchGraph<br># Trailblazer<br># TravelNet<br># TRIDENT<br># TRIST (“The Rapid Information Scanning Tool”)<br># Trusted Wisdom<br># TruTalk<br># TTKB<br># Ucinet<br># UWIL<br># Vantage Point<br># Verity Indexer<br># Verity K2E (Verity K2 Enterprise)<br># Verity Locales<br># Verity Profiler<br># Verona<br># VIA Repository<br># Viceroy<br># Virtual Situation Book<br># Viscovery SOMine<br># Visual Insights ADVIZOR<br># Visual Links<br># VisualMine<br># ViTAP<br># VizServer<br># VKB (Virtual Knowledge Base) FINTEL ISM<br># Voltaire<br># WAEWarlord<br># Watchtower<br># Watson Pro<br># Webster<br># Webtas (Web-based Time Line Analysis System)<br># WilmaScope<br># Windgrinder/WnGrinder<br># Wired<br># Wrangler<br># XMB (XML Metadata Browser)<br># XpertRule Miner<br># Yellowstone<br><hr></blockquote><!--EZCODE QUOTE END--> <p></p><i></i>