11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CPU 119In recent years the U.S. Department <strong>of</strong> Homel<strong>and</strong> Securityhas apparently been developing more sophisticateddata-mining <strong>and</strong> pattern-recognition programs (see biometrics<strong>and</strong> data mining). One is called ADVISE, or Analysis,Dissemination, Visualization, Insight, <strong>and</strong> SemanticEnhancement. This at least suggests an attempt not to simplyfind matches between e-mail, online postings, or othertextual data, but to construct pr<strong>of</strong>iles <strong>of</strong> a person’s activity<strong>and</strong>/or intentions, which could presumably then be comparedwith terrorist or criminal pr<strong>of</strong>iles.Surveillance or wiretapping <strong>of</strong> specific individuals alsoraises legal issues, particularly with recent revelations <strong>of</strong>so-called warrantless wiretaps. Officials have claimed thatthere are relatively few such cases (perhaps fewer than 100per year), but the Bush administration’s claim that it didnot need to follow Foreign Intelligence Surveillance Act(FISA) procedures raised considerable controversy, <strong>and</strong> acourt decision forced the administration to seek affirmation<strong>of</strong> its powers by Congress.Intelligence <strong>of</strong>ficials argue that existing FISA proceduresare too cumbersome to deal with the Internet. Oldstylewiretapping involved specific telephone instruments<strong>and</strong> lines, but on the Internet the routing <strong>of</strong> information isconstantly changing, <strong>and</strong> a person may use several differentdevices <strong>and</strong> types <strong>of</strong> communication. Thus it is argued thatthe warrant must be broad enough to apply to the person,not a particular means <strong>of</strong> communication. It is also arguedthat the global nature <strong>of</strong> the network also means that distinctionsabout whether persons are inside or outside <strong>of</strong> theUnited States may no longer be as relevant.Privacy <strong>and</strong> civil liberties advocates tend to agree thatsome updating <strong>of</strong> warrant procedures to deal with moderntechnology is necessary, but they point to secretiveness<strong>and</strong> lack <strong>of</strong> effective legal oversight resulting in a lack<strong>of</strong> accountability for government surveillance programs.This concern has also been fueled by a succession <strong>of</strong> revelationsthat surveillance programs are more extensivethan previously thought. (This includes the involvement<strong>of</strong> telecommunications <strong>and</strong> Internet service providers<strong>and</strong> the use <strong>of</strong> FBI “national security letters”—essentiallysecret subpoenas.)Coordinating EffortsBesides the gathering <strong>and</strong> analysis <strong>of</strong> intelligence, computerapplications are used in the intelligence <strong>and</strong> counterterrorismcommunity for many <strong>of</strong> the same functions foundin any large enterprise. These applications include e-mail,personal information management, collaborative creationor review <strong>of</strong> documents, scheduling <strong>and</strong> project management,<strong>and</strong> so on.Intelligence agencies are even adopting some popularemerging Web technologies. First came Intellipedia, a classifiedversion <strong>of</strong> Wikipedia serving as a knowledge basefor intelligence pr<strong>of</strong>essionals (see wikis <strong>and</strong> Wikipedia).In late 2007 the director <strong>of</strong> national intelligence (DNI)launched A-Space, which includes Intellipedia, while addingother extensive databases, online <strong>of</strong>fice facilities (similarto Google Apps), <strong>and</strong> even blogs <strong>and</strong> a MySpace-likecomponent (see social networking).Further ReadingDerosa, Mary. Data Mining <strong>and</strong> Data Analysis for Counterterrorism.Washington, D.C.: Center for Strategic & International Studies,2004.Hoover, J. Nicholas. “U.S. Spy Agencies Go Web 2.0 in Effortto Better Share Information.” InformationWeek, August 23,2007. Available online. URL: http://www.informationweek.com/story/showArticle.jhtml?articleID=201801990. AccessedSeptember 10, 2007.Lichtblau, Eric. “F.B.I. Data Mining Reached beyond Initial Targets.”New York Times, September 9, 2007. Available online.URL: http://www.nytimes.com/2007/09/09/washington/09fbi.html. Accessed September 10, 2007.Miller, Greg. “Spy Chief Reveals Details <strong>of</strong> Operations.” Los AngelesTimes. Available online. URL: http://www.latimes.com/news/nationworld/nation/la-na-intel23aug23,0,6229712.story?coll=la-home-center. Accessed September 10, 2007.Mohammed, Arshad, <strong>and</strong> Sara Kehaulani Goo. “GovernmentIncreasingly Turning to Data Mining.” Washington Post,June 15, 2006, p. D03. Available online. URL: http://www.whisperingwires.info/. Accessed September 10, 2007.National Research Council. Information <strong>Technology</strong> for Counterterrorism:Immediate Actions <strong>and</strong> Future Possibilities. Washington,D.C.: National Academies Press, 2003.Taipale, K. A. “Whispering Wires <strong>and</strong> Warrantless Wiretaps: DataMining <strong>and</strong> Foreign Intelligence Surveillance.” Bulletin onLaw & Security, spring 2006. Available online. URL: http://www.whisperingwires.info/. Accessed September 10, 2007.CPUThe CPU, or central processing unit, is the heart <strong>of</strong> a computer,the place where data is brought in from input devices,processed, <strong>and</strong> sent to output devices. (This article describesthe CPU from the point <strong>of</strong> view <strong>of</strong> desktop micromputers,where it is a single large silicon chip <strong>and</strong> supporting chips;see mainframe for a discussion <strong>of</strong> that earlier architecture,microprocessor for desktop <strong>and</strong> portable CPUs, <strong>and</strong> chip<strong>and</strong> chipset for physical design <strong>of</strong> components.)The CPU consists <strong>of</strong> two major parts. The arithmeticlogicunit performs arithmetic or logical operations on pairs<strong>of</strong> numbers brought in from memory <strong>and</strong> stored in speciallocations called registers (see arithmetic logic unit). Forexample, the CPU can add a value from main memory toa value stored in a register <strong>and</strong> store the result back intomemory. In addition to addition, subtraction, multiplication,<strong>and</strong> division, the CPU can logically compare the individualbits in two values, performing such operations asAND, where the result is 1 only if both bits are ones, or OR,where the result is 1 if either bit is one. The power <strong>of</strong> a CPUis measured either in the number <strong>of</strong> clock cycles that driveit each second (see clock speed) or the number <strong>of</strong> st<strong>and</strong>ardinstructions it can execute in a second. For modern PCs,clock speeds range into the billions <strong>of</strong> cycles per second(gigahertz) <strong>and</strong> millions <strong>of</strong> instructions per second (mostinstructions take more than one cycle to be completed).The other key part <strong>of</strong> the CPU is the control unit, whichdetermines when (<strong>and</strong> which) instructions will be executed.Operations to be performed are specified by instruction valuesthat are the lowest level representation <strong>of</strong> program code,sometimes called machine code. An index register is usedto keep track <strong>of</strong> the current instruction. As instructions areprocessed, control signals can indicate special conditions,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!