Facebook, het ultieme inlichtingenbedrijf7 juli 2014
Je kan Facebook vergelijken met de people’s secret service. Want hoe je het wendt of keert, uiteindelijk zijn het de internetgebruikers die vrijwillig hun persoonlijke leven prijsgeven aan het commerciële bedrijfsleven en de overheid.
In het voorafgaande artikel ‘Met de billen bloot op Facebook’, over Facebook profiling, gaat het vooral over netwerken waarin mensen zich bevinden. Profiling bestaat echter niet alleen uit netwerkanalyse, maar ook uit identificatie-analyse. Wie de profielen van Margriet, Barbara en Laurens bekijkt, krijgt niet alleen de beschikking over veel informatie met betrekking tot familie, vrienden, kennissen, heden en verleden, maar ook voorkeuren.
Facebook fungeert als een soort inlichtingendienst. Het verzamelt informatie die mensen zelf aanleveren. Het lijkt anders dan het persoonsdossier van de inlichtingendienst die bestaat uit krantenartikelen, mediaoptredens, twitterberichten, Facebook postings, vergadernotulen, observatieverslagen en telefoon-/internettaps.
Verzamelwoede
Wie echter inzoomt op de Facebook-data constateert dat het commerciële internetbedrijf dezelfde data beheert die inlichtingendiensten proberen te verzamelen. Informatie die betrekking heeft op persoonlijke voorkeuren, relaties, contacten en netwerken. Het verschil met inlichtingendiensten is dat Facebook niets hoeft te doen voor die dataverzameling. Zij stelt een gratis dienst ter beschikking. Gratis betekent in dit geval natuurlijk niet voor niets. Daarbij gaat het bij Facebook allang niet meer om de advertenties die je moet tolereren.
Het Facebook-beeld van de drie aan ons visualisatie-/analyseproject deelnemende activisten geeft een aantal zaken weer, waar inlichtingendiensten ook constant naar op zoeken zijn. Wie zijn je vrienden (op Facebook), bij welke actiegroepen en politieke partijen ben je aangesloten en voor welke demonstraties en acties heb je sympathie. Likes spelen daarbij natuurlijk een rol, maar het gaat ook om de interactie en de berichten die gekoppeld zijn aan die politieke voorkeuren.
Met de subscribe knop kan Facebook waarde koppelen aan verschillende persoonlijke relaties die je hebt. De relaties en voorkeuren leggen je sociale leven bloot. Naar welke muziek luister je graag, welke boeken lees je en hoe (e-book of papier), favoriete tv-series, de sport die je beoefent, de games die je speelt als je je even verveelt.
Dit is geen persoonlijke informatie die Facebook aan mensen ontfutselt. Het is geen inlichtingendienst die je bibliotheekgegevens opvraagt om te weten welk boek je hebt geleend. Mensen leveren Facebook al hun data aan, vrijwillig zonder dwang. Hooguit kun je spreken van groepsdruk, druk van het argument ‘iedereen gebruikt het’.
De kennis van het bedrijf over je sociale leven strekt zich uit van je voornaam, achternaam, geboortedatum en leeftijd tot aan je afkomst, je gezicht (scan), zeg maar je GBA (Gemeentelijke Basis Administratie) gegevens. Maar Facebook beschikt ook over gegevens betreffende je basisschool, middelbare school en hoger onderwijs (DUO Dienst Uitvoering Onderwijs gegevens), tot aan je seksuele oriëntatie (GGD gegevens in verband met inentingen en tests op HIV en andere seksueel overdraagbare ziekten), je huidige en voormalig werkgevers (UWV en DWI gegevens), partner en ex-partners (GBA gegevens), creditcard gegevens (banken/ en creditcard bedrijven), fysieke locatie (telefoonmaatschappijen en internetproviders). Gegevens die overheidsdiensten bij allerlei instanties moeten opvragen.
Duistere achterkant
Mensen delen veel en Facebook vraagt ook regelmatig om je profiel volledig in te vullen. Inlichtingendiensten kloppen bij al die instanties aan, of proberen direct en constant toegang tot deze data te verkrijgen. Aan de achterkant weet je eigenlijk niet wat Facebook met die data doet. Advertenties koppelen aan je profiel is de meest opvallende, maar die achterkant blijft duister.
Met de onthullingen van Edward Snowden over datastofzuiger de National Security Agency (NSA), is duidelijk geworden dat multinationals zoals Facebook, maar ook Google, Microsoft en Apple hun achterdeur voor de inlichtingendienst(en) open zetten. Het Amerikaanse blad Mother Jones kopte in december 2013: ‘Where Does Facebook Stop and the NSA Begin?’
Toch is deze weergave niet helemaal correct. Het lijkt eerder op de omgekeerde wereld. ‘Waar stoppen de inlichtingendiensten en gaat het bedrijf Facebook verder?’ Dit zit niet in de interacties tussen je vrienden op Facebook of met groepen; Facebook wil veel meer van je weten en of je nu ingelogd bent of niet, het bedrijf zorgt ervoor dat ze op de hoogte is van wat er in je leven gebeurt.
Eind oktober 2013 vertelde analist Ken Rudin van Facebook dat het bedrijf testen uitvoert om cursorbewegingen van individuele burgers op Facebook vast te leggen en te analyseren. Het gaat hierbij om het vastleggen van bewegingen met de muis naar locaties op het scherm om vervolgens daaruit af te kunnen leiden wat de interesse is van de afzonderlijke gebruikers.
De analist beweerde dat dit van doen heeft met het plaatsen van advertenties, maar uiteindelijk heeft het te maken met het profileren van de gebruikers. Zo kan Facebook namelijk ook zien of de persoon tijdens het gebruik van het sociale medium naar zijn telefoon of computerscherm kijkt, hoe lang, wanneer en wat. Allemaal nog wel gerelateerd aan de website van het bedrijf, maar met aanvullende functies als de sport applicatie pedometer kan Facebook vastleggen hoe lang, waar en wanneer je hebt hardgelopen of gewandeld.
Het duurt niet lang meer voordat het bedrijf je algehele conditie heeft doorgrond als aanvullende applicaties over bloeddruk en hartslag beschikbaar worden gesteld. Zo ontwikkelt Google een slimme contactlens voor diabetes patiënten en investeert zij in bedrijven die zicht bezig houden met diabetes. Allemaal gratis natuurlijk. Of is het niet gratis?
Rijkdom aan informatie
Facebook wil graag toegang tot de microfoon van je computer, headset of telefoon en dringt daarmee door tot in je huiskamer waar je, misschien zonder Facebook, naar muziek luistert die de private inlichtingendienst dan kan horen en toevoegen aan het profiel van jou. Hoe iemand zich voelt komt zo binnen bereik van het bedrijf. Want zelfs als je een andere naam, adres, geboortedatum en andere zaken opgeeft, volgt het bedrijf je. Het legt het apparaat vast waarmee je op Facebook bent ingelogd, met bijbehorend ip-adres, maar ook je locatie, tijdzone, datum en tijdstip.
Ook al vermijdt je te liken, het private bedrijf volgt je stappen langs de ‘events’ en ‘checkins’, de websites die je bezoekt zodra je geobserveerd wordt door Facebook. Zo kan het bedrijf kennis nemen van jouw favoriete café’s, restaurants, gerechten en recepten. Het inlichtingenbedrijf legt vast welke mensen je regelmatig bezoekt, op welke locaties je fotografeert en filmt, met wie je chat en welke groepen je in de gaten houdt.
Foto’s en films die worden toegevoegd aan Facebook bevatten een rijke verzameling aan extra gegevens, zoals met welk apparaat ze zijn gemaakt, sluitertijd en diafragma, locatie, auteur, tijd etc. En van de chats en berichten bewaart Facebook ook de uitgewiste stukken tekst. Je wilt een vriend schrijven dat hij een ‘eikel’ is, maar wist dat vervolgens uit omdat je je vriendschap ermee niet op het spel wilt zetten. Je stuurt deze vriend een berichtje dat je geen tijd hebt dit weekend. Facebook weet zo meer over jouw relatie met die vriend, dan die vriend zelf.
Bij dit alles moet worden aangetekend dat je ingelogd moet zijn op ‘jouw’ Facebook-pagina en dat je bepaalde applicaties hebt geïnstalleerd en aan hebt staan, zoals GPS voor je plaatsbepaling en de pedometer voor je hardloop tracking. Met de gezichtsherkenning kunnen mensen die onzichtbaar willen zijn door Facebook uit de duisternis worden getrokken. Niet door het bedrijf zelf, maar door haar medewerkers, de gebruikers van Facebook. Wie gaat er echter zo bewust mee om? En vooral: wie staat er bij stil dat jouw identiteit altijd gekoppeld is aan die van anderen?
In die zin is Facebook de ultieme inlichtingendienst. Het bedrijf is de people’s secret service, wat zoveel inhoudt dat de individuele gebruikers het werk als medewerkers van de geheime dienst vervullen voor henzelf en voor anderen. De Stasi zou haar vingers erbij aflikken, vandaar dat inlichtingendiensten als de NSA graag toegang hebben tot de achterkant van Facebook, het bedrijf zal de vergaarde informatie ook zonder blikken of blozen vrijgeven.
Steun overheid van belang
Het vrijgeven van vergaarde persoonlijke informatie aan inlichtingendiensten heeft met verschillende aspecten te maken. Ten eerste zijn grote internationaal opererende bedrijven afhankelijker van hun ‘nationale regering’ dan ze zelf zullen toegeven. Zo onderhoudt Shell innige relaties met zowel de Nederlandse als de Britse regering om haar operaties in het buitenland veilig te stellen. Als er ergens iets misgaat wordt zowel het diplomatieke als het militaire apparaat van het ’thuisland’ gemobiliseerd.
Amerikaanse bedrijven als Facebook en Google zullen dat ook doen. Als Gmail (Google) wordt gehackt zal het bedrijf de Amerikaanse overheid over haar schouder laten meekijken, maar diezelfde overheid zal langs diplomatieke, en zo nodig langs militaire (in dit geval waarschijnlijk cyber-militaire) weg, het bedrijf ondersteunen. Dat is natuurlijk niet vreemd, Google is een groot bedrijf en van belang voor de Amerikaanse economie en hegemonie.
Hetzelfde geldt voor Facebook waarvan diverse accounts begin 2013 werden gehackt. De Amerikaanse overheid zal vaak worden gevraagd om ‘officieel’ te reageren om in veel gevallen de Chinezen terecht te wijzen. Die steun van de Amerikaanse overheid is echter ook niet gratis. Zij zal druk op de bedrijven uitoefenen om de achterdeur voor inlichtingendiensten als de NSA, maar ook de FBI, open te houden. Je kunt bijna spreken van public private partnership waarbij multinationals vaak niet voor de overheidsdiensten hoeven te betalen.
Daarnaast proberen overheden een zo fijnmazig netwerk te creëren van diplomatieke posten en ambassades om hun land in het buitenland te promoten. Die posten hebben ook een andere functie. De onthullingen van Snowden hebben onderstreept dat de Amerikanen en bevriende naties als Canada, Australië, Groot-Brittannië en Nieuw Zeeland die diplomatieke posten gebruiken om in de gehele wereld de mogelijkheid te hebben om af te luisteren.
Werknemers van internationale bedrijven die wereldwijd opereren, zullen regelmatig gevraagd worden bij te dragen aan de inlichtingenoperatie van die overheid. Zij zitten vaak op andere plaatsen dan de diplomaten die vaak onder een vergrootglas in het buitenland opereren. Landen proberen dus hun zicht op het buitenland, de concurrenten en de vijanden zo scherp mogelijk te krijgen. Hoe meer diplomatieke posten en meewerkende bedrijven hoe scherper het beeld. Facebook probeert eigenlijk hetzelfde te doen met de data die zij van haar gebruikers verzamelt en analyseert. Hoe meer data, hoe scherper de analyses en hoe meer zicht op de verbanden en de interacties, hoe helderder het beeld.
In de loop der jaren heeft Facebook het aantal pixels (punten) van de foto van de profielen vergroot. Uiteindelijk werkt zij aan een haarscherp beeld van het profiel van haar gebruikers. Facebook realiseert dit zelf ook. Op 12 november 2013 diende het bedrijf een patent aanvraag in, de ‘178th patent application for a consumer profiling technique the company calls inferring household income for users of a social networking system’ (Facebook Future Plans for Data Collection Beyond All Imagination, 4 december 2013).
Deze aanvraag omschrijft de hoeveelheid en diversiteit van de data. Facebook heeft sinds oktober 2013 1,189,000,000 actieve gebruikers in de gehele wereld. Die data gebruikt het bedrijf nu al voor sociaal wetenschappelijk onderzoek door het Data Science Team van het bedrijf. Dit team doet niet alleen onderzoek naar de data, maar gebruikt de gebruikers ook als onderzoeksmateriaal, zoals het onderzoek van Eytan Bakshy die de toegang tot materiaal van 250 miljoen gebruikers manipuleerde. De gebruikers als proefpersonen in de ideale wereld van Facebook.
Gewoon een bedrijf
Uiteindelijk is Facebook natuurlijk geen gratis dienst. In eerste instantie zal het vooral proberen geld te verdienen door de verkoop van gebruikersprofielen ten bate van gerichte advertenties. De volgende stap heeft het bedrijf al gezet door de voorwaarden die ze stelt voor het aanmaken van een Facebook-pagina. Foto’s en films zijn in principe niet meer je eigendom. Het bedrijf kan die foto’s rechtenvrij gebruiken. Dit geldt natuurlijk ook voor Instagram. Andere bedrijven als Twitter (Twitpic’s) doen hetzelfde.
Wat geldt voor foto’s en films geldt natuurlijk ook voor teksten en andere content die je aan je pagina toevoegt. Voor deze zeer positieve voorwaarden is het bedrijf natuurlijk ook afhankelijk van de Amerikaanse overheid. Mocht wetgeving plotseling veranderen en gebruikers geld van Facebook eisen, zou dat voor het bedrijf een ramp zijn.
Afgaande op de totale omvang van de gebruikers, bijna evenveel als China inwoners heeft, en data die het bedrijf heeft verzameld en beheert, zou je bijna vergeten dat het gewoon een bedrijf is met 6.818 werknemers, een raad van bestuur en aandeelhouders die uiteindelijk graag hun inleg en winst terug willen zien.
De raad van bestuur geeft inzicht op welke plek Facebook in de markt staat. De verschillende leden zijn uit allerlei windstreken gerekruteerd. Natuurlijk Google Inc., Microsoft Corp. en haar dochter Skype, eBay Inc. en andere technologiebedrijven, maar ook entertainment bedrijven als Netflix en Walt Disney Co. Alsmede enkele banken, zoals Morgan Stanley & Co. LLC en Credit Suisse, maar ook The World Bank Group.
Contacten met de politiek zijn ook van belang, dat vindt plaats via oud-leden van de White House Chief of Staff of de US Department of The Treasury. En tot slot natuurlijk de ouderwetse consumentenmarkt zoals General Motors Corp. en Starbucks. Met een klein aantal leden van de raad van bestuur dekt Facebook haar contacten in verleden en heden af. Uiteindelijk is en blijft het gewoon een bedrijf, misschien wel een private inlichtingendienst, maar zonder winst zullen op een gegeven moment de aandeelhouders weglopen en valt het om.
Alternatieven?
Wat er met de vergaarde persoonlijke data gebeurt zodra het bedrijf failliet gaat, is onduidelijk. De overname van Whatsapp door Facebook liet zien dat gebruikers zich plots beducht waren voor hun persoonlijke informatie en op zoek gingen naar ‘alternatieven’.
Aan de bestaande alternatieven kleven eigenlijk dezelfde bezwaren als aan Facebook. Google Hangouts maakt onderdeel uit van een andere multinational, net als Imessenger. Bij Telegram werd geroepen dat het een Russische app is, maar waarom dat slechter is dan een Amerikaanse Whatsapp, los van de technische mankementen, blijft onduidelijk.
Uiteindelijk gaat het niet meer om een discussie over privacy, burgerrechten en/of bigdata. Facebook verzamelt namelijk niet zelf de data, zij verkrijgt het van haar gebruikers/agenten en die staan de persoonsgebonden informatie geheel vrijwillig af. Los van groepsdruk is er geen sprake van drang en dwang.
De Facebook inlichtingendienst stelt indirect solidariteit en de minderheid centraal. Hoe solidair zijn wij met mensen die misschien wel op de foto willen maar niet getagd wllen worden. Die wel iets schrijven maar niet geliked willen worden. Die wel op de foto willen maar zich niet op Facebook geplaatst willen zien. Het debat rond Facebook gaat ook over pluriformiteit versus uniformiteit. Over allemaal hetzelfde, Facebook, of iedereen iets anders.
Facebook registreert in meer of mindere mate het volgende van jou:
Je cursor bewegingen, geo-locatie, meta-data van foto’s en films (type, sluitertijd, geo-locatie indien gps aanstaat, auteur), biometrische gegevens (scan van het gezicht, matched zeer goed), chat gegevens en tekst die je zelfs niet verstuurd hebt, likes, vrienden, politieke kleur, seksuele oriëntatie, school, afkomst, ip-adressen van ingelogd zijn, wanneer je op je scherm van de smart device kijkt, welke smart devices waarmee je op Facebook bent, wanneer je achter de computer zit, hoelang je achter de computer zit, leeftijd, voormalige werkgevers en huidige, partner, familie, vrienden, ex-vriendinnen, muziek, boeken, films, series, games, sport, interacties tussen alle vrienden groepen, welke websites je bezoekt als je ingelogd bent, welke content je bekijkt op Facebook zelf, andere biometrische gegevens (zoals stappen, algehele conditie met sport applicaties).
Find this story at 30 June 2014
Facebook reveals news feed experiment to control emotions Protests over secret study involving 689,000 users in which friends’ postings were moved to influence moods7 juli 2014
Poll: Facebook’s secret mood experiment: have you lost trust in the social network?
It already knows whether you are single or dating, the first school you went to and whether you like or loathe Justin Bieber. But now Facebook, the world’s biggest social networking site, is facing a storm of protest after it revealed it had discovered how to make users feel happier or sadder with a few computer key strokes.
It has published details of a vast experiment in which it manipulated information posted on 689,000 users’ home pages and found it could make people feel more positive or negative through a process of “emotional contagion”.
In a study with academics from Cornell and the University of California, Facebook filtered users’ news feeds – the flow of comments, videos, pictures and web links posted by other people in their social network. One test reduced users’ exposure to their friends’ “positive emotional content”, resulting in fewer positive posts of their own. Another test reduced exposure to “negative emotional content” and the opposite happened.
The study concluded: “Emotions expressed by friends, via online social networks, influence our own moods, constituting, to our knowledge, the first experimental evidence for massive-scale emotional contagion via social networks.”
Lawyers, internet activists and politicians said this weekend that the mass experiment in emotional manipulation was “scandalous”, “spooky” and “disturbing”.
On Sunday evening, a senior British MP called for a parliamentary investigation into how Facebook and other social networks manipulated emotional and psychological responses of users by editing information supplied to them.
Jim Sheridan, a member of the Commons media select committee, said the experiment was intrusive. “This is extraordinarily powerful stuff and if there is not already legislation on this, then there should be to protect people,” he said. “They are manipulating material from people’s personal lives and I am worried about the ability of Facebook and others to manipulate people’s thoughts in politics or other areas. If people are being thought-controlled in this kind of way there needs to be protection and they at least need to know about it.”
A Facebook spokeswoman said the research, published this month in the journal of the Proceedings of the National Academy of Sciences in the US, was carried out “to improve our services and to make the content people see on Facebook as relevant and engaging as possible”.
She said: “A big part of this is understanding how people respond to different types of content, whether it’s positive or negative in tone, news from friends, or information from pages they follow.”
But other commentators voiced fears that the process could be used for political purposes in the runup to elections or to encourage people to stay on the site by feeding them happy thoughts and so boosting advertising revenues.
In a series of Twitter posts, Clay Johnson, the co-founder of Blue State Digital, the firm that built and managed Barack Obama’s online campaign for the presidency in 2008, said: “The Facebook ’transmission of anger’ experiment is terrifying.”
He asked: “Could the CIA incite revolution in Sudan by pressuring Facebook to promote discontent? Should that be legal? Could Mark Zuckerberg swing an election by promoting Upworthy [a website aggregating viral content] posts two weeks beforehand? Should that be legal?”
It was claimed that Facebook may have breached ethical and legal guidelines by not informing its users they were being manipulated in the experiment, which was carried out in 2012.
The study said altering the news feeds was “consistent with Facebook’s data use policy, to which all users agree prior to creating an account on Facebook, constituting informed consent for this research”.
But Susan Fiske, the Princeton academic who edited the study, said she was concerned. “People are supposed to be told they are going to be participants in research and then agree to it and have the option not to agree to it without penalty.”
James Grimmelmann, professor of law at Maryland University, said Facebook had failed to gain “informed consent” as defined by the US federal policy for the protection of human subjects, which demands explanation of the purposes of the research and the expected duration of the subject’s participation, a description of any reasonably foreseeable risks and a statement that participation is voluntary. “This study is a scandal because it brought Facebook’s troubling practices into a realm – academia – where we still have standards of treating people with dignity and serving the common good,” he said on his blog.
It is not new for internet firms to use algorithms to select content to show to users and Jacob Silverman, author of Terms of Service: Social Media, Surveillance, and the Price of Constant Connection, told Wire magazine on Sunday the internet was already “a vast collection of market research studies; we’re the subjects”.
“What’s disturbing about how Facebook went about this, though, is that they essentially manipulated the sentiments of hundreds of thousands of users without asking permission,” he said. “Facebook cares most about two things: engagement and advertising. If Facebook, say, decides that filtering out negative posts helps keep people happy and clicking, there’s little reason to think that they won’t do just that. As long as the platform remains such an important gatekeeper – and their algorithms utterly opaque – we should be wary about the amount of power and trust we delegate to it.”
Robert Blackie, director of digital at Ogilvy One marketing agency, said the way internet companies filtered information they showed users was fundamental to their business models, which made them reluctant to be open about it.
“To guarantee continued public acceptance they will have to discuss this more openly in the future,” he said. “There will have to be either independent reviewers of what they do or government regulation. If they don’t get the value exchange right then people will be reluctant to use their services, which is potentially a big business problem.”
Robert Booth
The Guardian, Monday 30 June 2014
Find this story at 30 June 2014
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Facebook’s Future Plans for Data Collection Beyond All Imagination7 juli 2014
Facebook’s dark plans for the future are given away in its patent applications.
“No one knows who will live in this cage in the future, or whether at the end of this tremendous development, entirely new prophets will arise, or there will be a great rebirth of old ideas and ideals, or, if neither, mechanized petrification, embellished with a sort of convulsive self-importance. For of the fast stage of this cultural development, it might well be truly said: ‘Specialists without spirit, sensualists without heart; this nullity imagines that it has attained a level of civilization never before achieved.’”
—Max Weber, 1905
On November 12 Facebook, Inc. filed its 178th patent application for a consumer profiling technique the company calls “inferring household income for users of a social networking system.”
“The amount of information gathered from users,” explain Facebook programmers Justin Voskuhl and Ramesh Vyaghrapuri in their patent application, “is staggering — information describing recent moves to a new city, graduations, births, engagements, marriages, and the like.” Facebook and other so-called tech companies have been warehousing all of this information since their respective inceptions. In Facebook’s case, its data vault includes information posted as early as 2004, when the site first went live. Now in a single month the amount of information forever recorded by Facebook —dinner plans, vacation destinations, emotional states, sexual activity, political views, etc.— far surpasses what was recorded during the company’s first several years of operation. And while no one outside of the company knows for certain, it is believed that Facebook has amassed one of the widest and deepest databases in history. Facebook has over 1,189,000,000 “monthly active users” around the world as of October 2013, providing considerable width of data. And Facebook has stored away trillions and trillions of missives and images, and logged other data about the lives of this billion plus statistical sample of humanity. Adjusting for bogus or duplicate accounts it all adds up to about 1/7th of humanity from which some kind of data has been recorded.
According to Facebook’s programmers like Voskuhl and Vyaghrapuri, of all the clever uses they have already applied this pile of data toward, Facebook has so far “lacked tools to synthesize this information about users for targeting advertisements based on their perceived income.” Now they have such a tool thanks to the retention and analysis of variable the company’s positivist specialists believe are correlated with income levels.
They’ll have many more tools within the next year to run similar predictions. Indeed, Facebook, Google, Yahoo, Twitter, and the hundreds of smaller tech lesser-known tech firms that now control the main portals of social, economic, and political life on the web (which is now to say everywhere as all economic and much social activity is made cyber) are only getting started. The Big Data analytics revolutions has barely begun, and these firms are just beginning to tinker with rational-instrumental methods of predicting and manipulating human behavior.
There are few, if any, government regulations restricting their imaginations at this point. Indeed, the U.S. President himself is a true believer in Big Data; the brain of Obama’s election team was a now famous “cave” filled with young Ivy League men (and a few women) sucking up electioneering information and crunching demographic and consumer data to target individual voters with appeals timed to maximize the probability of a vote for the new Big Blue, not IBM, but the Democratic Party’s candidate of “Hope” and “Change.” The halls of power are enraptured by the potential of rational-instrumental methods paired with unprecedented access to data that describes the social lives of hundreds of millions.
Facebook’s intellectual property portfolio reads like cliff notes summarizing the aspirations of all corporations in capitalist modernity; to optimize efficiency in order to maximize profits and reduce or externalize risk. Unlike most other corporations, and unlike previous phases in the development of rational bureaucracies, Facebook and its tech peers have accumulated never before seen quantities of information about individuals and groups. Recent breakthroughs in networked computing make analysis of these gigantic data sets fast and cheap. Facebook’s patent holdings are just a taste of what’s arriving here and now.
The way you type, the rate, common mistakes, intervals between certain characters, is all unique, like your fingerprint, and there are already cyber robots that can identify you as you peck away at keys. Facebook has even patented methods of individual identification with obviously cybernetic overtones, where the machine becomes an appendage of the person. U.S. Patents 8,306,256, 8,472,662, and 8,503,718, all filed within the last year, allow Facebook’s web robots to identify a user based on the unique pixelation and other characteristics of their smartphone’s camera. Identification of the subject is the first step toward building a useful data set to file among the billion or so other user logs. Then comes analysis, then prediction, then efforts to influence a parting of money.
Many Facebook patents pertain to advertising techniques that are designed and targeted, and continuously redesigned with ever-finer calibrations by robot programs, to be absorbed by the gazes of individuals as they scroll and swipe across their Facebook feeds, or on third party web sites.
Speaking of feeds, U.S. Patent 8,352,859, Facebook’s system for “Dynamically providing a feed of stories about a user of a social networking system” is used by the company to organize the constantly updated posts and activities inputted by a user’s “friends.” Of course embedded in this system are means of inserting advertisements. According to Facebook’s programmers, a user’s feeds are frequently injected with “a depiction of a product, a depiction of a logo, a display of a trademark, an inducement to buy a product, an inducement to buy a service, an inducement to invest, an offer for sale, a product description, trade promotion, a survey, a political message, an opinion, a public service announcement, news, a religious message, educational information, a coupon, entertainment, a file of data, an article, a book, a picture, travel information, and the like.” That’s a long list for sure, but what gets injected is more often than not whatever will boost revenues for Facebook.
The advantage here, according to Facebook, is that “rather than having to initiate calls or emails to learn news of another user, a user of a social networking website may passively receive alerts to new postings by other users.” The web robot knows best. Sit back and relax and let sociality wash over you, passively. This is merely one of Facebook’s many “systems for tailoring connections between various users” so that these connections ripple with ads uncannily resonant with desires and needs revealed in the quietly observed flow of e-mails, texts, images, and clicks captured forever in dark inaccessible servers of Facebook, Google and the like. These communications services are free in order to control the freedom of data that might otherwise crash about randomly, generating few opportunities for sales.
Where this fails Facebook ratchets up the probability of influencing the user to behave as a predictable consumer. “Targeted advertisements often fail to earn a user’s trust in the advertised product,” explain Facebook’s programmers in U.S. Patent 8,527,344, filed in September of this year. “For example, the user may be skeptical of the claims made by the advertisement. Thus, targeted advertisements may not be very effective in selling an advertised product.” Facebook’s computer programmers who now profess mastery over sociological forces add that even celebrity endorsements are viewed with skepticism by the savvy citizen of the modulated Internet. They’re probably right.
Facebook’s solution is to mobilize its users as trusted advertisers in their own right. “Unlike advertisements, most users seek and read content generated by their friends within the social networking system; thus,” concludes Facebook’s mathematicians of human inducement, “advertisements generated by a friend of the user are more likely to catch the attention of the user, increasing the effectiveness of the advertisement.” That Facebook’s current So-And-So-likes-BrandX ads are often so clumsy and ineffective does not negate the qualitative shift in this model of advertising and the possibilities of un-freedom it evokes.
Forget iPhones and applications, the tech industry’s core consumer product is now advertising. Their essential practice is mass surveillance conducted in real time through continuous and multiple sensors that pass, for most people, entirely unnoticed. The autonomy and unpredictability of the individual —in Facebook’s language the individual is the “user”— is their fundamental business problem. Reducing autonomy via surveillance and predictive algorithms that can placate existing desires, and even stimulate and mold new desires is the tech industry’s reason for being. Selling their capacious surveillance and consumer stimulus capabilities to the highest bidder is the ultimate end.
Sounds too dystopian? Perhaps, and this is by no means the world we live in, not yet. It is, however, a tendency rooted in the tech economy. The advent of mobile, hand-held, wirelessly networked computers, called “smartphones,” is still so new that the technology, and its services feel like a parallel universe, a new layer of existence added upon our existing social relationships, business activities, and political affiliations. In many ways it feels liberating and often playful. Our devices can map geographic routes, identify places and things, provide information about almost anything in real time, respond to our voices, and replace our wallets. Who hasn’t consulted “Dr. Google” to answer a pressing question? Everyone and everything is seemingly within reach and there is a kind of freedom to this utility.
Most of Facebook’s “users” have only been registered on the web site since 2010, and so the quintessential social network feels new and fun, and although perhaps fraught with some privacy concerns, it does not altogether fell like a threat to the autonomy of the individual. To say it is, is a cliche sci-fi nightmare narrative of tech-bureaucracy, and we all tell one another that the reality is more complex.
Privacy continues, however, too be too narrowly conceptualized as a liberal right against incursions of government, and while the tech companies have certainly been involved in a good deal of old-fashioned mass surveillance for the sake of our federal Big Brother, there’s another means of dissolving privacy that is more fundamental to the goals of the tech companies and more threatening to social creativity and political freedom.
Georgetown University law professor Julie Cohen notes that pervasive surveillance is inimical to the spaces of privacy that are required for liberal democracy, but she adds importantly, that the surveillance and advertising strategies of the tech industry goes further.
“A society that permits the unchecked ascendancy of surveillance infrastructures, which dampen and modulate behavioral variability, cannot hope to maintain a vibrant tradition of cultural and technical innovation,” writes Cohen in a forthcoming Harvard Law Review article.
“Modulation” is Cohen’s term for the tech industry’s practice of using algorithms and other logical machine operations to mine an individual’s data so as to continuously personalize information streams. Facebook’s patents are largely techniques of modulation, as are Google’s and the rest of the industry leaders. Facebook conducts meticulous surveillance on users, collects their data, tracks their movements on the web, and feeds the individual specific content that is determined to best resonate with their desires, behaviors, and predicted future movements. The point is to perfect the form and function of the rational-instrumental bureaucracy as defined by Max Weber: to constantly ratchet up efficiency, calculability, predictability, and control. If they succeed in their own terms, the tech companies stand to create a feedback loop made perfectly to fit each an every one of us, an increasingly closed systems of personal development in which the great algorithms in the cloud endlessly tailor the psychological and social inputs of humans who lose the gift of randomness and irrationality.
“It is modulation, not privacy, that poses the greater threat to innovative practice,” explains Cohen. “Regimes of pervasively distributed surveillance and modulation seek to mold individual preferences and behavior in ways that reduce the serendipity and the freedom to tinker on which innovation thrives.” Cohen has pointed out the obvious irony here, not that it’s easy to miss; the tech industry is uncritically labeled America’s hothouse of innovation, but it may in fact be killing innovation by disenchanting the world and locking inspiration in an cage.
If there were limits to the reach of the tech industry’s surveillance and stimuli strategies it would indeed be less worrisome. Only parts of our lives would be subject to this modulation, and it could therefore benefit us. But the industry aspires to totalitarian visions in which universal data sets are constantly mobilized to transform an individual’s interface with society, family, the economy, and other institutions. The tech industry’s luminaries are clear in their desire to observe and log everything, and use every “data point” to establish optimum efficiency in life as the pursuit of consumer happiness. Consumer happiness is, in turn, a step toward the rational pursuit of maximum corporate profit. We are told that the “Internet of things” is arriving, that soon every object will have embedded within it a computer that is networked to the sublime cloud, and that the physical environment will be made “smart” through the same strategy of modulation so that we might be made free not just in cyberspace, but also in the meatspace.
Whereas the Internet of the late 1990s matured as an archipelago of innumerable disjointed and disconnected web sites and databases, today’s Internet is gripped by a handful of giant companies that observe much of the traffic and communications, and which deliver much of the information from an Android phone or laptop computer, to distant servers, and back. The future Internet being built by the tech giants —putting aside the Internet of things for the moment— is already well into its beta testing phase. It’s a seamlessly integrated quilt of web sites and apps that all absorb “user” data, everything from clicks and keywords to biometric voice identification and geolocation.
United States Patent 8,572,174, another of Facebook’s recent inventions, allows the company to personalize a web page outside of Facebook’s own system with content from Facebook’s databases. Facebook is selling what the company calls its “rich set of social information” to third party web sites in order to “provide personalized content for their users based on social information about those users that is maintained by, or otherwise accessible to, the social networking system.” Facebook’s users generated this rich social information, worth many billions of dollars as recent quarterly earnings of the company attest.
In this way the entire Internet becomes Facebook. The totalitarian ambition here is obvious, and it can be read in the securities filings, patent applications, and other non-sanitized business documents crafted by the tech industry for the financial analysts who supply the capital for further so-called innovation. Everywhere you go on the web, with your phone or tablet, you’re a “user,” and your social network data will be mined every second by every application, site, and service to “enhance your experience,” as Facebook and others say. The tech industry’s leaders aim to expand this into the physical world, creating modulated advertising and environmental experiences as cameras and sensors track our movements.
Facebook and the rest of the tech industry fear autonomy and unpredictability. The ultimate expression of these irrational variables that cannot be mined with algorithmic methods is absence from the networks of surveillance in which data is collected.
One of Facebook’s preventative measures is United States Patent 8,560,962, “promoting participation of low-activity users in social networking system.” This novel invention devised by programmers in Facebook’s Palo Alto and San Francisco offices involves a “process of inducing interactions,” that are meant to maximize the amount of “user-generated content” on Facebook by getting lapsed users to return, and stimulating all users to produce more and more data. User generated content is, after all, worth billions. Think twice before you hit “like” next time, or tap that conspicuously placed “share” button; a machine likely put that content and interaction before your eyes after a logical operation determined it to have the highest probability of tempting you to add to the data stream, thereby increasing corporate revenues.
Facebook’s patents on techniques of modulating “user” behavior are few compared to the real giants of the tech industry’s surveillance and influence agenda. Amazon, Microsoft, and of course Google hold some of the most fundamental patents using personal data to attempt to shape an individual’s behavior into predictable consumptive patterns. Smaller specialized firms like Choicestream and Gist Communications have filed dozens more applications for modulation techniques. The rate of this so-called innovation is rapidly telescoping.
Perhaps we do know who will live in the iron cage. It might very well be a cage made of our own user generated content, paradoxically ushering in a new era of possibilities in shopping convenience and the delivery of satisfactory experiences even while it eradicates many degrees of chance, and pain, and struggle (the motive forces of human progress) in a robot-powered quest to have us construct identities and relationships that yield to prediction and computer-generated suggestion. Defense of individual privacy and autonomy today is rightly motivated by the reach of an Orwellian security state (the NSA, FBI, CIA). This surveillance changes our behavior by chilling us, by telling us we are always being watched by authority. Authority thereby represses in us whatever might happen to be defined as “crime,” or any anti-social behavior at the moment. But what about the surveillance that does not seek to repress us, the watching computer eyes and ears that instead hope to stimulate a particular set of monetized behaviors in us with the intimate knowledge gained from our every online utterance, even our facial expressions and finger movements?
Darwin Bond-Graham, a contributing editor to CounterPunch, is a sociologist and author who lives and works in Oakland, CA. His essay on economic inequality in the “new” California economy appears in theJuly issue of CounterPunch magazine. He is a contributor to Hopeless: Barack Obama and the Politics of Illusion
Darwin Bond-Graham, a contributing editor to CounterPunch, is a sociologist and author who lives and works in Oakland, CA. His essay on economic inequality in the “new” California economy appears in theJuly issue of CounterPunch magazine. He is a contributor to Hopeless: Barack Obama and the Politics of Illusion
By Darwin Bond-Graham
December 4, 2013
Find this story at 4 December 2013
copyright http://www.alternet.org/
Who Owns Photos and Videos Posted on Facebook, Instagram or Twitter?7 juli 2014
Well, it depends on what you mean as “own.” Under copyright law, unless there is an agreement to the contrary or the photograph or video is shot as part of your job, a copyright to a photograph generally belongs to the creator. As the copyright owner, you own the exclusive rights to display, copy, use, produce, distribute and perform your creation as you see fit and approve. As the subject of the photograph, you have a right to publicity, which allows you to get paid for the commercial use of your name, likeness or voice.
But what happens when you decide to post that picture on the Internet — perhaps on Facebook or Twitter (using Twitpic), or some other social network or photo-sharing site?
You may be shocked to find out that once you post on these sites, that although you still “own” the photograph, you grant the social media sites a license to use your photograph anyway they see fit for free AND you grant them the right to let others use you picture as well! This means that not only can Twitter, Twitpic and Facebook make money from the photograph or video (otherwise, a copyright violation), but these sites are making commercial gain by licensing these images, which contains the likeness of the person in the photo or video (otherwise, a violation of their “rights of publicity”).
Facebook
Under Facebook’s current terms (which can change at anytime), by posting your pictures and videos, you grant Facebook “a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any [IP] content that you post on or in connection with Facebook (“IP License”). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it. Beware of the words “transferable, sub-licensable, royalty-free, worldwide license.” This means that Facebook can license your content to others for free without obtaining any other approval from you! You should be aware that once your photos or videos are shared on Facebook, it could be impossible to delete them from Facebook, even if you delete the content or cancel your account (the content still remains on Facebook servers and they can keep backups)! So, although you may be able to withdraw your consent to the use of photos on Facebook, you should also keep in mind that if you share your photos and videos with Facebook applications, those applications may have their own terms and conditions of how they use your creation! You should read the fine print to make sure you are not agreeing to something that you don’t want to have happen.
Twitter
Twitter’s photo sharing service, Twitpic, just updated their terms of Service on May 10, 2011 (which, of course, can and will be updated at any time, from time to time). By uploading content using Twitpic, you are giving “Twitpic permission to use or distribute your content on Twitpic.com or affiliated sites.” You are also granting “Twitpic a worldwide, non-exclusive, royalty-free, sublicenseable and transferable license to use, reproduce, distribute, prepare derivative works of, display, and perform the Content in connection with the Service and Twitpic’s (and its successors’ and affiliates’) business, including without limitation for promoting and redistributing part or all of the Service (and derivative works thereof) in any media formats and through any media channels.”
The terms go on to state that you also grant “each user of the Service a non-exclusive license to access your Content through the Service, and to use, reproduce, distribute, display and perform such Content as permitted through the functionality of the Service and under these Terms of Service. The above licenses granted by you in media Content you submit to the Service terminate within a commercially reasonable time after you remove or delete your media from the Service provided that any sub-license by Twitpic to use, reproduce or distribute the Content prior to such termination may be perpetual and irrevocable.”
Twitpic/Twitter is probably more problematic than Facebook — They can sell your images and videos if they want!
First, there is no definition of “Service” on their site (they need to find a more detailed oriented internet attorney to draft their terms (Twitpic, call me)), so your photo could be used throughout the Internet. More troubling is that your photos and videos may be reprinted and used in anything without your getting paid a dime – books, magazines, movies, TV shows, billboards — you get the picture!
Second, Twitter can create derivative works from your creations. A derivative work is anything that is built upon your work (like adding your video to a TV show, putting your photo in a montage, etc.).
Third, even after you delete your photos from Twitpic, Twitter and Twitpic can still use your creations for a “reasonable” amount of time afterwards. So what would be a reasonable amount of time to continue using your photo after you terminate the “license” if your photo or video is incorporated by Twitter or Twitpic in a larger work — perhaps forever if it would cost them money to remove!
Lastly, since Twitter/Twitpic can grant others to use your photos (and make money from it without paying you (remember the nasty word “œroyalty-free”)), even if you terminate your Twitter/Twitpic account, the rights they grant to others can never be terminated! Twitter has a deal with World Entertainment News Network permitting them to sell Twitpic content with no money to you!
Celebrities and celebrities-to-be, beware! Your right to publicity (e.g. your right to get paid when others use your name, likeness, voice for commercial gain like product or sports endorsements) is stripped away each and every time you post on Twitter! You or your intellectual property attorney should read the fine print before you post your photos or videos on Twitter or Facebook!
December 19, 2012 UPDATE
Instagram
Well Facebook was at it again (changing their terms of service for their latest acquisition, Instagram). The proposed changes are to take place on January 16, 2013. Basically, Instagram had a brilliant idea to generate money off the backs of their members. The proposed terms of service explicitly state “To help us deliver interesting paid or sponsored content or promotions, you agree that a business or other entity may pay us to display your username, likeness, photos (along with any associated metadata), and/or actions you take, in connection with paid or sponsored content or promotions, without any compensation to you. If you are under the age of eighteen (18), or under any other applicable age of majority, you represent that at least one of your parents or legal guardians has also agreed to this provision (and the use of your name, likeness, username, and/or photos (along with any associated metadata)) on your behalf.”
This means that Instagram can make money from advertisers that want to use your face or pictures of your loved ones on any advertising (TV, web, magazines, newspapers, etc.) and never pay you a penny! Even worse, if you are under 18 (which means you don’t have the legal capacity to enter into a contract) you are making a contractual agreement that you have asked your parents permission to agree to the Instagram terms. This not only is an egregious position (see discussion above about rights of publicity), but defies logic — Instagram acknowledges that minors can’t enter into a contract, but nevertheless for the under-18, force them to agree by (unenforceable) contract that they have permission anyway. Go figure! [Finally there is a reason to go back to the old 2-hour Kodak Carousel slide shows of aunt Sally’s vacation.]
[December 21, 2012 UPDATE]
Instagram announced today that it was backing off of its proposed T&C’s to be able to sell content without paying the members. But a closer look of their replacement terms of use are just as bad. “Instagram does not claim ownership of any Content that you post on or through the Service. Instead, you hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the Content that you post on or through the Service, subject to the Service’s Privacy Policy. . .” This means that Instagram can still sublicense your photos to any company for a fee (without paying the member)! And it gets worse. For instance, let’s say a posted photo is of a celebrity. Instagram then licenses that picture to an advertiser. But then the advertiser gets sued by the celebrity for violation of their right of privacy (who in turn sues Instagram). You the poster would have to indemnify Instagram because in section 4(iii) of the terms, “(iii) you agree to pay for all royalties, fees, and any other monies owed by reason of Content you post on or through the Service.” Bottom line – Instagram stil gets to sell your pictures without paying you and you can be liable in the event they have to return that money to the advertiser!
Find this story at december 2012
© 2012 Law Offices of Craig Delsack, LLC
Your Facebook Data File: Everything You Never Wanted Anyone to Know7 juli 2014
A group of Austrian students called Europe v. Facebook recently got their hands on their complete Facebook user data files – note, this is not the same file Facebook sends if you request your personal history through the webform in Account Settings.
See, Facebook wants you to feel safe and warm and fuzzy about controlling your own privacy. As we move into the era of the Open Graph and apps that autopost your activities, users are raising serious questions about data collection and privacy.
To help quell these fears, Facebook lets users download their their own data, as they said in an official statement to the Wall Street Journal blog Digits:
“We believe that every Facebook user owns his or her own data and should have simple and easy access to it. That is why we’ve built an easy way for people to download everything they have ever posted on Facebook, including all of their messages, posts, photos, status updates and profile information. People who want a copy of the information they have put on Facebook can click a link located in ‘Account Settings’ and easily get a copy of all of it in a single download. To protect the information, this feature is only available after the person confirms his or her password and answers appropriate security questions.”
Phew, that’s good. But wait… how come the students over at Europe v. Facebook got a different, more complete file when requested through Section 4 DPA + Art. 12 Directive 95/46/EG, a European privacy law? The carefully crafted statement above says they will give you access to everything you’ve put on Facebook – but what about the data Facebook collects without your knowledge?
What You May Not Get in Your Copy of Your Facebook File
facebook-message-report
On their website, Europe v. Facebook lists their primary objective as transparency, saying, “It is almost impossible for the user to really know what happens to his or her personal data when using facebook. For example ‘removed’ content is not really deleted by Facebook and it is often unclear what Facebook exactly does with our data.”
Indeed, the complete user file they received when requested through Section 4 DPA + Art. 12 Directive 95/46/EG is the same one available to attorneys and law enforcement via court order. It contains more information than the one Facebook sends users through their webform, according to Europe v. Facebook founder and law student Max Schrems, including:
Every friend request you’ve ever received and how you responded.
Every poke you’ve exchanged.
Every event you’ve been invited to through Facebook and how you responded.
The IP address used each and every time you’ve logged in to Facebook.
Dates of user name changes and historical privacy settings changes.
Camera metadata including time stamps and latitude/longitude of picture location, as well as tags from photos – even if you’ve untagged yourself.
Credit card information, if you’ve ever purchased credits or advertising on Facebook.
Your last known physical location, with latitude, longitude, time/date, altitude, and more. The report notes that they are unsure how Facebook collects this data.
One of Europe v. Facebook’s chief objections is that Facebook offers “no sufficient way of deleting old junk data.” Many of the complaints they’ve filed with the Irish Data Protection Commissioner* involve Facebook’s continued storage of data users believe they have deleted. Copies of the redacted files received through their requests are published on the Europe v. Facebook website.
Better Hope You’ve Behaved Yourself…
Ever flirted with someone other than your spouse in a Facebook chat? You had better hope your message records don’t end up in the hands of a divorce lawyer, because they can access even the ones you’ve deleted.
That day you called your employer in Chicago and begged off work, as you were sick? You logged in to Facebook from an IP address in Miami. Oops.
A few weeks ago, Australian hacker exposed Facebook’s practice of tracking logged out users and they quickly “fixed” the problem (after trying to defend it, initially). But the extent to which they collect and keep information users may not even realize they are giving Facebook in the first place – or believe they’ve deleted – is worrisome for privacy watchdogs.
The truly questionable thing is, the average user has no idea what their file contains and in North America, at least, have no right to access it. ITWorld’s Dan Tynan requested his, citing the U.S. Constitution, but received only an autoresponse telling him the form is only applicable in certain jurisdictions. In other words, if they’re not required to release your data to you by law, don’t hold your breath.
But then, maybe you’ll be one of the “lucky” ones who will have your activities brought up in court or a police investigation. There will be little left to the imagination, then.
What You Can Do About It
We contacted Max Schrems and asked whether Europe v. Facebook is able to help users, even those in other jurisdictions, to access their personal files. Though they receive emails from around the world, he said, their focus is on the 22 active complaints they currently have registered with the Irish Data Protection Commission. Residents of the European Union can fill out the online form on Facebook’s website (this is not the Account Settings form, but a request for the full file).
Schrems did offer tips for all users who want to curb the amount of information they’re handing over to Facebook from this point forward. “I would frequently check my privacy settings, turn everything to ‘Friends only’ and turn off ‘Platform.’ Users have to realize that you don’t just share with your Friends, but you always share with your Friends AND Facebook.”
Judging by the sheer difference in file sizes, comparing the personally requested vs. legally requested files Schrems and Europe v. Facebook received, there’s a lot of data left on the table. For the same user, the file sizes varied enormously. Schrems described the file obtained through a legal request as a 500MB PDF including data the user thought they had deleted. The one sent through a regular Facebook request was a 150MB HTML file and included video (the PDF did not) but did not have the deleted data.
We reached out to Facebook for comment but had not received a response by the time of publication.
*Europe v. Facebook files their complaints in Ireland, as Facebook’s User Terms list their Ireland office as headquarters for all Facebook affairs outside of Canada and the U.S.
Miranda Miller, October 3, 2011
Find this story at 3 October 2011
© 2014 Incisive Interactive Marketing LLC.
What Facebook Knows7 juli 2014
The company’s social scientists are hunting for insights about human behavior. What they find could give Facebook new ways to cash in on our data—and remake our view of society.
Cameron Marlow calls himself Facebook’s “in-house sociologist.” He and his team can analyze essentially all the information the site gathers.
If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world.
It would far outstrip any regime past or present in how intimately it records the lives of its citizens. Private conversations, family photos, and records of road trips, births, marriages, and deaths all stream into the company’s servers and lodge there. Facebook has collected the most extensive data set ever assembled on human social behavior. Some of your personal information is probably part of it.
And yet, even as Facebook has embedded itself into modern life, it hasn’t actually done that much with what it knows about us. Now that the company has gone public, the pressure to develop new sources of profit (see “The Facebook Fallacy”) is likely to force it to do more with its hoard of information. That stash of data looms like an oversize shadow over what today is a modest online advertising business, worrying privacy-conscious Web users (see “Few Privacy Regulations Inhibit Facebook”) and rivals such as Google. Everyone has a feeling that this unprecedented resource will yield something big, but nobody knows quite what.
FEW PRIVACY REGULATIONS INHIBIT FACEBOOK
Laws haven’t kept up with the company’s ability to mine its users’ data.
Even as Facebook has embedded itself into modern life, it hasn’t done that much with what it knows about us. Its stash of data looms like an oversize shadow. Everyone has a feeling that this resource will yield something big, but nobody knows quite what.
Heading Facebook’s effort to figure out what can be learned from all our data is Cameron Marlow, a tall 35-year-old who until recently sat a few feet away from Zuckerberg. The group Marlow runs has escaped the public attention that dogs Facebook’s founders and the more headline-grabbing features of its business. Known internally as the Data Science Team, it is a kind of Bell Labs for the social-networking age. The group has 12 researchers—but is expected to double in size this year. They apply math, programming skills, and social science to mine our data for insights that they hope will advance Facebook’s business and social science at large. Whereas other analysts at the company focus on information related to specific online activities, Marlow’s team can swim in practically the entire ocean of personal data that Facebook maintains. Of all the people at Facebook, perhaps even including the company’s leaders, these researchers have the best chance of discovering what can really be learned when so much personal information is compiled in one place.
Facebook has all this information because it has found ingenious ways to collect data as people socialize. Users fill out profiles with their age, gender, and e-mail address; some people also give additional details, such as their relationship status and mobile-phone number. A redesign last fall introduced profile pages in the form of time lines that invite people to add historical information such as places they have lived and worked. Messages and photos shared on the site are often tagged with a precise location, and in the last two years Facebook has begun to track activity elsewhere on the Internet, using an addictive invention called the “Like” button. It appears on apps and websites outside Facebook and allows people to indicate with a click that they are interested in a brand, product, or piece of digital content. Since last fall, Facebook has also been able to collect data on users’ online lives beyond its borders automatically: in certain apps or websites, when users listen to a song or read a news article, the information is passed along to Facebook, even if no one clicks “Like.” Within the feature’s first five months, Facebook catalogued more than five billion instances of people listening to songs online. Combine that kind of information with a map of the social connections Facebook’s users make on the site, and you have an incredibly rich record of their lives and interactions.
“This is the first time the world has seen this scale and quality of data about human communication,” Marlow says with a characteristically serious gaze before breaking into a smile at the thought of what he can do with the data. For one thing, Marlow is confident that exploring this resource will revolutionize the scientific understanding of why people behave as they do. His team can also help Facebook influence our social behavior for its own benefit and that of its advertisers. This work may even help Facebook invent entirely new ways to make money.
Contagious Information
Marlow eschews the collegiate programmer style of Zuckerberg and many others at Facebook, wearing a dress shirt with his jeans rather than a hoodie or T-shirt. Meeting me shortly before the company’s initial public offering in May, in a conference room adorned with a six-foot caricature of his boss’s dog spray-painted on its glass wall, he comes across more like a young professor than a student. He might have become one had he not realized early in his career that Web companies would yield the juiciest data about human interactions.
In 2001, undertaking a PhD at MIT’s Media Lab, Marlow created a site called Blogdex that automatically listed the most “contagious” information spreading on weblogs. Although it was just a research project, it soon became so popular that Marlow’s servers crashed. Launched just as blogs were exploding into the popular consciousness and becoming so numerous that Web users felt overwhelmed with information, it prefigured later aggregator sites such as Digg and Reddit. But Marlow didn’t build it just to help Web users track what was popular online. Blogdex was intended as a scientific instrument to uncover the social networks forming on the Web and study how they spread ideas. Marlow went on to Yahoo’s research labs to study online socializing for two years. In 2007 he joined Facebook, which he considers the world’s most powerful instrument for studying human society. “For the first time,” Marlow says, “we have a microscope that not only lets us examine social behavior at a very fine level that we’ve never been able to see before but allows us to run experiments that millions of users are exposed to.”
Marlow’s team works with managers across Facebook to find patterns that they might make use of. For instance, they study how a new feature spreads among the social network’s users. They have helped Facebook identify users you may know but haven’t “friended,” and recognize those you may want to designate mere “acquaintances” in order to make their updates less prominent. Yet the group is an odd fit inside a company where software engineers are rock stars who live by the mantra “Move fast and break things.” Lunch with the data team has the feel of a grad-student gathering at a top school; the typical member of the group joined fresh from a PhD or junior academic position and prefers to talk about advancing social science than about Facebook as a product or company. Several members of the team have training in sociology or social psychology, while others began in computer science and started using it to study human behavior. They are free to use some of their time, and Facebook’s data, to probe the basic patterns and motivations of human behavior and to publish the results in academic journals—much as Bell Labs researchers advanced both AT&T’s technologies and the study of fundamental physics.
It may seem strange that an eight-year-old company without a proven business model bothers to support a team with such an academic bent, but Marlow says it makes sense. “The biggest challenges Facebook has to solve are the same challenges that social science has,” he says. Those challenges include understanding why some ideas or fashions spread from a few individuals to become universal and others don’t, or to what extent a person’s future actions are a product of past communication with friends. Publishing results and collaborating with university researchers will lead to findings that help Facebook improve its products, he adds.
Eytan Bakshy experimented with the way Facebook users shared links so that his group could study whether the site functions like an echo chamber.
For one example of how Facebook can serve as a proxy for examining society at large, consider a recent study of the notion that any person on the globe is just six degrees of separation from any other. The best-known real-world study, in 1967, involved a few hundred people trying to send postcards to a particular Boston stockholder. Facebook’s version, conducted in collaboration with researchers from the University of Milan, involved the entire social network as of May 2011, which amounted to more than 10 percent of the world’s population. Analyzing the 69 billion friend connections among those 721 million people showed that the world is smaller than we thought: four intermediary friends are usually enough to introduce anyone to a random stranger. “When considering another person in the world, a friend of your friend knows a friend of their friend, on average,” the technical paper pithily concluded. That result may not extend to everyone on the planet, but there’s good reason to believe that it and other findings from the Data Science Team are true to life outside Facebook. Last year the Pew Research Center’s Internet & American Life Project found that 93 percent of Facebook friends had met in person. One of Marlow’s researchers has developed a way to calculate a country’s “gross national happiness” from its Facebook activity by logging the occurrence of words and phrases that signal positive or negative emotion. Gross national happiness fluctuates in a way that suggests the measure is accurate: it jumps during holidays and dips when popular public figures die. After a major earthquake in Chile in February 2010, the country’s score plummeted and took many months to return to normal. That event seemed to make the country as a whole more sympathetic when Japan suffered its own big earthquake and subsequent tsunami in March 2011; while Chile’s gross national happiness dipped, the figure didn’t waver in any other countries tracked (Japan wasn’t among them). Adam Kramer, who created the index, says he intended it to show that Facebook’s data could provide cheap and accurate ways to track social trends—methods that could be useful to economists and other researchers.
Other work published by the group has more obvious utility for Facebook’s basic strategy, which involves encouraging us to make the site central to our lives and then using what it learns to sell ads. An early study looked at what types of updates from friends encourage newcomers to the network to add their own contributions. Right before Valentine’s Day this year a blog post from the Data Science Team listed the songs most popular with people who had recently signaled on Facebook that they had entered or left a relationship. It was a hint of the type of correlation that could help Facebook make useful predictions about users’ behavior—knowledge that could help it make better guesses about which ads you might be more or less open to at any given time. Perhaps people who have just left a relationship might be interested in an album of ballads, or perhaps no company should associate its brand with the flood of emotion attending the death of a friend. The most valuable online ads today are those displayed alongside certain Web searches, because the searchers are expressing precisely what they want. This is one reason why Google’s revenue is 10 times Facebook’s. But Facebook might eventually be able to guess what people want or don’t want even before they realize it.
Recently the Data Science Team has begun to use its unique position to experiment with the way Facebook works, tweaking the site—the way scientists might prod an ant’s nest—to see how users react. Eytan Bakshy, who joined Facebook last year after collaborating with Marlow as a PhD student at the University of Michigan, wanted to learn whether our actions on Facebook are mainly influenced by those of our close friends, who are likely to have similar tastes. That would shed light on the theory that our Facebook friends create an “echo chamber” that amplifies news and opinions we have already heard about. So he messed with how Facebook operated for a quarter of a billion users. Over a seven-week period, the 76 million links that those users shared with each other were logged. Then, on 219 million randomly chosen occasions, Facebook prevented someone from seeing a link shared by a friend. Hiding links this way created a control group so that Bakshy could assess how often people end up promoting the same links because they have similar information sources and interests.
He found that our close friends strongly sway which information we share, but overall their impact is dwarfed by the collective influence of numerous more distant contacts—what sociologists call “weak ties.” It is our diverse collection of weak ties that most powerfully determines what information we’re exposed to.
That study provides strong evidence against the idea that social networking creates harmful “filter bubbles,” to use activist Eli Pariser’s term for the effects of tuning the information we receive to match our expectations. But the study also reveals the power Facebook has. “If [Facebook’s] News Feed is the thing that everyone sees and it controls how information is disseminated, it’s controlling how information is revealed to society, and it’s something we need to pay very close attention to,” Marlow says. He points out that his team helps Facebook understand what it is doing to society and publishes its findings to fulfill a public duty to transparency. Another recent study, which investigated which types of Facebook activity cause people to feel a greater sense of support from their friends, falls into the same category.
Facebook is not above using its platform to tweak users’ behavior, as it did by nudging them to register as organ donors. Unlike academic social scientists, Facebook’s employees have a short path from an idea to an experiment on hundreds of millions of people.
But Marlow speaks as an employee of a company that will prosper largely by catering to advertisers who want to control the flow of information between its users. And indeed, Bakshy is working with managers outside the Data Science Team to extract advertising-related findings from the results of experiments on social influence. “Advertisers and brands are a part of this network as well, so giving them some insight into how people are sharing the content they are producing is a very core part of the business model,” says Marlow.
Facebook told prospective investors before its IPO that people are 50 percent more likely to remember ads on the site if they’re visibly endorsed by a friend. Figuring out how influence works could make ads even more memorable or help Facebook find ways to induce more people to share or click on its ads.
Social Engineering
Marlow says his team wants to divine the rules of online social life to understand what’s going on inside Facebook, not to develop ways to manipulate it. “Our goal is not to change the pattern of communication in society,” he says. “Our goal is to understand it so we can adapt our platform to give people the experience that they want.” But some of his team’s work and the attitudes of Facebook’s leaders show that the company is not above using its platform to tweak users’ behavior. Unlike academic social scientists, Facebook’s employees have a short path from an idea to an experiment on hundreds of millions of people.
In April, influenced in part by conversations over dinner with his med-student girlfriend (now his wife), Zuckerberg decided that he should use social influence within Facebook to increase organ donor registrations. Users were given an opportunity to click a box on their Timeline pages to signal that they were registered donors, which triggered a notification to their friends. The new feature started a cascade of social pressure, and organ donor enrollment increased by a factor of 23 across 44 states.
Marlow’s team is in the process of publishing results from the last U.S. midterm election that show another striking example of Facebook’s potential to direct its users’ influence on one another. Since 2008, the company has offered a way for users to signal that they have voted; Facebook promotes that to their friends with a note to say that they should be sure to vote, too. Marlow says that in the 2010 election his group matched voter registration logs with the data to see which of the Facebook users who got nudges actually went to the polls. (He stresses that the researchers worked with cryptographically “anonymized” data and could not match specific users with their voting records.)
Sameet Agarwal figures out ways for Facebook to manage its enormous trove of datagiving the company a unique and valuable level of expertise.
This is just the beginning. By learning more about how small changes on Facebook can alter users’ behavior outside the site, the company eventually “could allow others to make use of Facebook in the same way,” says Marlow. If the American Heart Association wanted to encourage healthy eating, for example, it might be able to refer to a playbook of Facebook social engineering. “We want to be a platform that others can use to initiate change,” he says.
Advertisers, too, would be eager to know in greater detail what could make a campaign on Facebook affect people’s actions in the outside world, even though they realize there are limits to how firmly human beings can be steered. “It’s not clear to me that social science will ever be an engineering science in a way that building bridges is,” says Duncan Watts, who works on computational social science at Microsoft’s recently opened New York research lab and previously worked alongside Marlow at Yahoo’s labs. “Nevertheless, if you have enough data, you can make predictions that are better than simply random guessing, and that’s really lucrative.”
Doubling Data
Like other social-Web companies, such as Twitter, Facebook has never attained the reputation for technical innovation enjoyed by such Internet pioneers as Google. If Silicon Valley were a high school, the search company would be the quiet math genius who didn’t excel socially but invented something indispensable. Facebook would be the annoying kid who started a club with such social momentum that people had to join whether they wanted to or not. In reality, Facebook employs hordes of talented software engineers (many poached from Google and other math-genius companies) to build and maintain its irresistible club. The technology built to support the Data Science Team’s efforts is particularly innovative. The scale at which Facebook operates has led it to invent hardware and software that are the envy of other companies trying to adapt to the world of “big data.”
In a kind of passing of the technological baton, Facebook built its data storage system by expanding the power of open-source software called Hadoop, which was inspired by work at Google and built at Yahoo. Hadoop can tame seemingly impossible computational tasks—like working on all the data Facebook’s users have entrusted to it—by spreading them across many machines inside a data center. But Hadoop wasn’t built with data science in mind, and using it for that purpose requires specialized, unwieldy programming. Facebook’s engineers solved that problem with the invention of Hive, open-source software that’s now independent of Facebook and used by many other companies. Hive acts as a translation service, making it possible to query vast Hadoop data stores using relatively simple code. To cut down on computational demands, it can request random samples of an entire data set, a feature that’s invaluable for companies swamped by data. Much of Facebook’s data resides in one Hadoop store more than 100 petabytes (a million gigabytes) in size, says Sameet Agarwal, a director of engineering at Facebook who works on data infrastructure, and the quantity is growing exponentially. “Over the last few years we have more than doubled in size every year,” he says. That means his team must constantly build more efficient systems.
One potential use of Facebook’s data storehouse would be to sell insights mined from it. Such information could be the basis for any kind of business. Assuming Facebook can do this without upsetting users and regulators, it could be lucrative.
All this has given Facebook a unique level of expertise, says Jeff Hammerbacher, Marlow’s predecessor at Facebook, who initiated the company’s effort to develop its own data storage and analysis technology. (He left Facebook in 2008 to found Cloudera, which develops Hadoop-based systems to manage large collections of data.) Most large businesses have paid established software companies such as Oracle a lot of money for data analysis and storage. But now, big companies are trying to understand how Facebook handles its enormous information trove on open-source systems, says Hammerbacher. “I recently spent the day at Fidelity helping them understand how the ‘data scientist’ role at Facebook was conceived … and I’ve had the same discussion at countless other firms,” he says.
As executives in every industry try to exploit the opportunities in “big data,” the intense interest in Facebook’s data technology suggests that its ad business may be just an offshoot of something much more valuable. The tools and techniques the company has developed to handle large volumes of information could become a product in their own right.
Mining for Gold
Facebook needs new sources of income to meet investors’ expectations. Even after its disappointing IPO, it has a staggeringly high price-to-earnings ratio that can’t be justified by the barrage of cheap ads the site now displays. Facebook’s new campus in Menlo Park, California, previously inhabited by Sun Microsystems, makes that pressure tangible. The company’s 3,500 employees rattle around in enough space for 6,600. I walked past expanses of empty desks in one building; another, next door, was completely uninhabited. A vacant lot waited nearby, presumably until someone invents a use of our data that will justify the expense of developing the space.
One potential use would be simply to sell insights mined from the information. DJ Patil, data scientist in residence with the venture capital firm Greylock Partners and previously leader of LinkedIn’s data science team, believes Facebook could take inspiration from Gil Elbaz, the inventor of Google’s AdSense ad business, which provides over a quarter of Google’s revenue. He has moved on from advertising and now runs a fast-growing startup, Factual, that charges businesses to access large, carefully curated collections of data ranging from restaurant locations to celebrity body-mass indexes, which the company collects from free public sources and by buying private data sets. Factual cleans up data and makes the result available over the Internet as an on-demand knowledge store to be tapped by software, not humans. Customers use it to fill in the gaps in their own data and make smarter apps or services; for example, Facebook itself uses Factual for information about business locations. Patil points out that Facebook could become a data source in its own right, selling access to information compiled from the actions of its users. Such information, he says, could be the basis for almost any kind of business, such as online dating or charts of popular music. Assuming Facebook can take this step without upsetting users and regulators, it could be lucrative. An online store wishing to target its promotions, for example, could pay to use Facebook as a source of knowledge about which brands are most popular in which places, or how the popularity of certain products changes through the year.
Hammerbacher agrees that Facebook could sell its data science and points to its currently free Insights service for advertisers and website owners, which shows how their content is being shared on Facebook. That could become much more useful to businesses if Facebook added data obtained when its “Like” button tracks activity all over the Web, or demographic data or information about what people read on the site. There’s precedent for offering such analytics for a fee: at the end of 2011 Google started charging $150,000 annually for a premium version of a service that analyzes a business’s Web traffic.
Back at Facebook, Marlow isn’t the one who makes decisions about what the company charges for, even if his work will shape them. Whatever happens, he says, the primary goal of his team is to support the well-being of the people who provide Facebook with their data, using it to make the service smarter. Along the way, he says, he and his colleagues will advance humanity’s understanding of itself. That echoes Zuckerberg’s often doubted but seemingly genuine belief that Facebook’s job is to improve how the world communicates. Just don’t ask yet exactly what that will entail. “It’s hard to predict where we’ll go, because we’re at the very early stages of this science,” says Marlow. “The number of potential things that we could ask of Facebook’s data is enormous.”
Tom Simonite is Technology Review’s senior IT editor.
By Tom Simonite on June 13, 2012 20 COMMENTS
Find this story at 13 June 2012
copyright http://www.technologyreview.com/
How Facebook Uses Your Data to Target Ads, Even Offline7 juli 2014
If you feel like Facebook has more ads than usual, you aren’t imagining it: Facebook’s been inundating us with more and more ads lately, and using your information—both online and offline—to do it. Here’s how it works, and how you can opt out.
For most people, Facebook’s advertising system is insider-baseball that doesn’t really affect how we use the service. But as the targeted ads—the advertisements that take the data you provide to offer ads specific to you—get more accurate and start pulling in information from other sources (including the stuff you do offline), it’s more important than ever to understand their system. To figure out how this all works, I spoke with Elisabeth Diana, manager of corporate communication at Facebook. Let’s kick it off with the basics of how the targeted ads work online before moving on to some of the changes we’ll see with the recent inclusion of offline shopping data.
How Facebook Uses Your Profile to Target Ads
How Facebook Uses Your Data to Target Ads, Even Offline
We’ve talked before about how Facebook uses you to annoy your friends by turning your likes into subtle ads. This method of sponsored posts is deceptively simple.
The most obvious example of a targeted ad uses something you like—say Target—and then shows an ad on the right side or in the newsfeed that simply says, “[Name] likes Target.” What you and your friends like helps determine what everyone on your friends list sees for ads. Any ad you click on then increases the likelihood of another similar ad.
It’s not just what you and your friends are doing that generates ads though; it’s also basic demographic information. Diana notes that this also includes “major life events like getting engaged or married.” So, if you’re recently engaged and note that on Facebook, you’ll see ads about things like wedding planning.
When an advertiser creates an ad on Facebook, they can select all sorts of parameters so they reach the right people. A simple example of a parameter would be: “Someone engaged to be married, who lives in New York, between the ages of 20-30.” That’s simple, but advertisers can actually narrow that down to insane specifics, like “Someone engaged to be married, who lives in New York, between the ages of 20-30, who likes swimming, and who drives a BMW.” If your profile fits those parameters, you’ll likely see the ad. If you want to see how it works, you can even try your hand at creating an ad.
It boils down to this: the more information you put about yourself on Facebook—where you live, your age, where (and if) you graduated college, the companies, brands, and activities you like, and even where you work—determines what kind of ads you’ll see. In theory, it makes it so targeted ads are more relevant to you.
What Happens When You Don’t Like or Share Anything
How Facebook Uses Your Data to Target Ads, Even Offline
The way Facebook targets ads is based a lot around the information you provide. Using your likes, location, or age, Facebook puts you in a demographic and advertises to you. But what happens when you don’t include any of that information on your profile? It turns out that your friends are used to fill in the gaps.
Chances are, even a barebones profile has a few bits of information about you. You probably at least have where you live and your age. That combined with the information your friends provide creates a reasonable demographic that advertisers can still reach you at. The ads won’t be as spookily accurate to you as if you provide a lot of data, but they’ll at least be about as accurate as a television ad on your favorite show.
How to Keep Facebook from Targeting Ads Online
We know Facebook has an idea of what you’re doing online. That can be unsettling if you’re concerned about your privacy and you don’t want your online habits contributing to advertisements, or if you don’t like the idea of Facebook collecting data about you that you’re not willfully providing. You’ll “miss out” on targeted ads, but here here are a few tools to keep that from happening online:
Facebook Disconnect for Chrome and Firefox: Facebook gets notified when you visit a page that uses Facebook Connect (the little “Like” button you find on most web sites, including ours), and that data can be used to target ads. Facebook Disconnect stops that flow of data.
Facebook Privacy List for Adblock Plus: This subscription for Adblock Plus blocks Facebook plugins and scripts from running all over the web so your browsing data doesn’t get tied to your Facebook account.
DoNotTrackMe: DoNotTrackMe is another extension that blocks trackers and anyone who wants to collect your browsing data to create targeted ads.
Finally, you want to opt out of the Facebook Ads that use your actions (liking a page, sharing pages, etc) to promote ads to your friends:
Click the lock icon when you’re logged into Facebook and select “see more settings”.
Click the “Ads” tab on the sidebar.
Click “Edit” under “Third Party Sites” and change the setting to “No one.”
Click “Edit” under “Ads & Friends” and select “No One.” This disables Social Ads.
So, that takes care of the online advertising. Be sure to check out our guide to Facebook privacy for more information about all that. You can also hide your likes from your profile so they’re not as prominant. If you don’t actually mind the advertising, but want to improve the ads shown to you, you can always click the “X” next to any ad to get rid of it.
The Always Up-to-Date Guide to Managing Your Facebook Privacy
Keeping your Facebook info private is getting harder and harder all the time—mostly because…
Read more
How Facebook Uses Your Real World Shopping to Target Ads
How Facebook Uses Your Data to Target Ads, Even Offline
EXPAND
Of course, you probably knew about a lot of that already. Using information in Facebook profile to target ads is old news, but with a few recent partnerships, Facebook is also going to use what you buy in real life stores to influence and track the ads you see. It sounds spooky, but it’s also older than you may realize.
To do this, Facebook is combining the information they have with information from data collection companies like Datalogix, Acxiom, Epsilon, and BlueKai. These companies already collect information about you through things like store loyalty cards, mailing lists, public records information (including home or car ownership), browser cookies, and more. For example, if you buy a bunch of detergent at Safeway, and use your Safeway card to get a discount, that information is cataloged and saved by a company like Datalogix.
How much do these data collecting companies know? According to The New York Times: way more than you’d think, including race, gender, economic status, buying habits, and more. Typically, they then sell this data to advertisers or corporations, but when it’s combined with your information from Facebook, they get an even better idea of what you like, where you shop, and what you buy. As Diana describes it, Facebook is “trying to give advertisers a chance to reach people both on and off Facebook,” and make advertisements more relevant to you. Photo by Joe Loong.
How Real-Life Ad Targetting Works
How Facebook Uses Your Data to Target Ads, Even Offline
The most shocking thing you’re going to find on Facebook is when something you do in the real world—say, buy a car, go shopping with a loyalty card at a grocery store, or sign up for an email list—actually impacts the ads you see. This is no different than any other direct marketing campaign like junk mail, but seeing it on Facebook might be a little unsettling at first. There are a couple reasons this might happen: custom audiences, and the recent partnerships with data collection companies we talked about earlier.
Custom audiences are very simple and it basically allows an advertiser to upload an email list and compare that data (privately) with who’s on Facebook. Diana offered the simple example of buying a car. Let’s say you purchase a car from a dealership, and when you do so, you give them your email address. That dealership wants to advertise on Facebook, so they upload a list of all the email addresses they have. That data is then made private, and Facebook pairs the email address with the one you registered on Facebook. If they match, you might see an ad from that dealership on Facebook for a discounted tune-up or something similar. Additionally, Lookalike audiences might be used to advertise to people similar to you because you purchased a car there. That might mean your friends (assuming you’re all similar) will see the same ad from the dealership.
The custom audiences can be used by any company advertising on Facebook. So, if you’re on your dentist’s email list, or that small bakery around the corner snagged your email for a free slice of pie, they can potentially reach you through this system.
The partnership with other data collection agencies like Acxiom and Datalogix is going to look a little different. This means that when you use something like a customer loyalty card at a grocery store, you might see a targeted ad that reflects that. The New York Times offers this example:
At the very least, said Ms. Williamson, an analyst with the research firm eMarketer, consumers will be “forced to become more aware of the data trail they leave behind them and how companies are putting all that data together in new ways to reach them.” She knows, for instance, that if she uses her supermarket loyalty card to buy cornflakes, she can expect to see a cornflakes advertisement when she logs in to Facebook.
A new targeting feature, Partner categories, takes the data collected by these third-party data brokers and puts you into a group. So, if you’re in a group of people who buys a lot of frozen pizza at Safeway, you’ll see ads for frozen pizza, and maybe other frozen foods.
It sounds a little weird at a glance, but it’s important to remember that this is all information that you’re already providing. Facebook is using data collected by outside companies to create a more accurate portrayal of you so marketers can advertise to you directly.
How Your Data Is Kept Private
How Facebook Uses Your Data to Target Ads, Even Offline
All of this information being exchanged should make the hairs on the back of your neck stand up a little. If anything goes wrong, it could leak a bunch of your private information all over the place. Or, at the very least, marketers would get a lot more information about you then you want like your username, email, and location data. To keep your information private, Facebook uses a system called hashing.
First, your personal information like email and name is encrypted. So, your name, login info, and anything else that would identify you as a person goes away. Then, Facebook turns the rest of the information into a series of numbers and letters using hashing. For example, Age: 31, Likes: Lifehacker, Swimming, BMW’s, Location: New York, turns into something like, “342asafk43255adjk.” Finally, this information is combined with what the data collection companies have on you to create a better picture of your shopping habits so they can target ads. Slate describes the system like so:
What they came up with was a Rube Goldbergian system that strips out personally identifiable information from the databases at Facebook, Datalogix, and the major retailers while still matching people and their purchases. The system works by creating three separate data sets. First, Datalogix “hashes” its database—that is, it turns the names, addresses and other personally identifiable data for each person in its logs into long strings of numbers. Facebook and retailers do the same thing to their data. Then, Datalogix compares its hashed data with Facebook’s to find matches. Each match indicates a potential test subject-someone on Facebook who is also part of Datalogix’s database. Datalogix runs a similar process with retailers’ transaction data. At the end of it all, Datalogix can compare the Facebook data and the retail data, but, importantly, none of the databases will include any personally identifiable data—so Facebook will never find out whether and when you, personally, purchased Tide, and Procter & Gamble and Kroger will never find out your Facebook profile.
From the actual advertisers point of view, the flow of information doesn’t reveal personal details. It just tells them how many potential customers might see an ad. “An advertiser would learn something like, ‘about 50% of your customers are on Facebook,'” says Diana, “But they don’t know who you are.” Image by Jorge Stolfi.
How to Opt Out of Offline Targetting
How Facebook Uses Your Data to Target Ads, Even Offline
EXPAND
Unlike the internal advertising system that uses the information you already provide to Facebook to give you ads, these new partnerships with real world data collection agencies go way beyond that. Now, they’re able to see what you’re buying at stores offline, and that’s disconcerting for a lot of people. The goal, of course, is more relevant ads, but that comes at the price of privacy and security. With all this data out there, it would be easy to get a very clear image of who you are, where you live, what you like, and even if you’re pregnant. Thankfully, opting out of the data collection companies also gets you out of the integration with Facebook (and everywhere else).
This process is a lot more complicated than it should be, but the Electronic Frontier Foundation has a step-by-step guide for each of the data brokers. Basically, you’ll need to opt out in three different places: Acxiom, Datalogix, and Epsilon in order to ensure your shopping data in the real world isn’t used on Facebook (and beyond). BlueKai, unfortunately, has no direct way to opt out so you’ll need to use the browser extensions listed in the first section.
If you really want to keep those loyalty cards from tracking you, just use Jenny’s number (867-5309) at the checkout lane instead of setting up an account.
Use “Jenny’s Number” to Get Club Discounts at Stores Without Providing Personal Information
When you go to the grocery store you’re always asked to sign up for a rewards card, which…
Read more
Those are the basics of how Facebook’s various targeted advertising systems work. Of course, a lot of complex math and algorithms are in place to actually generate this data, but it really boils down to how much information you’re making public—whether you’re aware of it or not—that makes the system tick. If you like the targeted ads, they should improve even more as the years go on. If you don’t, opting out is always an option.
Thorin Klosowski
4/11/13 8:00am
Find this story at 4 November 2013
copyright http://lifehacker.com/
Facebook Tests Software to Track Your Cursor on Screen7 juli 2014
Facebook Inc.FB -0.24% is testing technology that would greatly expand the scope of data that it collects about its users, the head of the company’s analytics group said Tuesday.
The social network may start collecting data on minute user interactions with its content, such as how long a user’s cursor hovers over a certain part of its website, or whether a user’s newsfeed is visible at a given moment on the screen of his or her mobile phone, Facebook analytics chief Ken Rudin said Tuesday during an interview.
Facebook’s Ken Rudin
Mr. Rudin said the captured information could be added to a data analytics warehouse that is available for use throughout the company for an endless range of purposes–from product development to more precise targeting of advertising.
Facebook collects two kinds of data, demographic and behavioral. The demographic data—such as where a user lives or went to school—documents a user’s life beyond the network. The behavioral data—such as one’s circle of Facebook friends, or “likes”—is captured in real time on the network itself. The ongoing tests would greatly expand the behavioral data that is collected, according to Mr. Rudin. The tests are ongoing and part of a broader technology testing program, but Facebook should know within months whether it makes sense to incorporate the new data collection into the business, he said
New types of data Facebook may collect include “did your cursor hover over that ad … and was the newsfeed in a viewable area,” Mr. Rudin said. “It is a never-ending phase. I can’t promise that it will roll out. We probably will know in a couple of months,” said Mr. Rudin, a Silicon Valley veteran who arrived at Facebook in April 2012 from Zynga Inc.ZNGA -0.31%, where he was vice president of analytics and platform technologies.
As the head of analytics, Mr. Rudin is preparing the company’s infrastructure for a massive increase in the volume of its data.
Facebook isn’t the first company to contemplate recording such activity. Shutterstock Inc.SSTK +0.11%, a marketplace for digital images, records literally everything that its users do on the site. Shutterstock uses the open-source Hadoop distributed file system to analyze data such as where visitors to the site place their cursors and how long they hover over an image before they make a purchase. “Today, we are looking at every move a user makes, in order to optimize the Shutterstock experience….All these new technologies can process that,” Shutterstock founder and CEO Jon Oringer told the Wall Street Journal in March.
Facebook also is a major user of Hadoop, an open-source framework that is used to store large amounts of data on clusters of inexpensive machines. Facebook designs its own hardware to store its massive data analytics warehouse, which has grown 4,000 times during the last four years to a current level of 300 petabytes. The company uses a modified version of Hadoop to manage its data, according to Mr. Rudin. There are additional software layers on top of Hadoop, which rank the value of data and make sure it is accessible.
The data in the analytics warehouse—which is separate from the company’s user data, the volume of which has not been disclosed—is used in the targeting of advertising. As the company captures more data, it can help marketers target their advertising more effectively—assuming, of course, that the data is accessible.
“Instead of a warehouse of data, you can end up with a junkyard of data,” said Mr. Rudin, who spoke to CIO Journal during a break at the Strata and Hadoop World Conference in New York. He said that he has led a project to index that data, essentially creating an internal search engine for the analytics warehouse.
October 30, 2013, 7:15 AM ET
By STEVE ROSENBUSH
Find this story at 30 October 2013
Copyright ©2014 Dow Jones & Company, Inc
Report: Facebook Is Collecting Data on Your Cursor Movements7 juli 2014
Facebook may be adding to the list of things it knows about you.
The social network is reportedly experimenting with new technology that tracks and collects data about a user’s activity on the site, including cursor movements, according to the Wall Street Journal. The technology is being tested now with a small group of users.
SEE ALSO: How to Change Your Facebook Relationship Status Without Alerting Friends
The data could be used in a number of different ways, from product development to advertising, Facebook analytics chief Ken Rudin told the Journal.
The technology can supposedly determine where a user is hovering his or her cursor on the screen, meaning it could be used to determine the most appropriate places for advertisements. The technology also tracks whether Facebook’s mobile users can see their News Feed at any particular time from their smartphone.
Facebook did not immediately respond to Mashable’s request for comment.
Facebook will reportedly decide “within months” whether or not to continue this data collection and analysis. It could be relevant for targeted advertising where Facebook has already seen quarter-over-quarter growth in 2013.
Facebook is set to reports the company’s quarterly earnings Wednesday afternoon.
UPDATE, Oct. 30, 8:55 p.m. ET: Facebook responded to our request for comment with the following statement:
“Like most websites, we run numerous tests at any given time to ensure that we’re creating the best experience possible for people on Facebook. These experiments look at aggregate trends of how people interact with the site to inform future product decisions. We do not share this information with anyone outside of Facebook and we are not using this information to target ads.”
BY KURT WAGNEROCT 30, 2013
Find this story at 30 October 2013
copyright http://mashable.com/
What Facebook Collects and Shares7 juli 2014
What Facebook could know about you, and why you should care.
Facebook is a resource for opinions and hobbies, celebrities and love interests, friends and family, and all the activities that whirl them together in our daily lives. Much like other social networking sites, Facebook is free except for one thing that all users give up: a certain amount of personal information.
Facebook privacy policy provides extensive information about the use of personal data of registered users. It clearly specifies what personal information is collected, how it is used, parties to whom this information may be disclosed, and the security measures taken to protect the information.
By reading and understanding the privacy policy, a user is able to weigh the risks involved in trusting this popular Web site, before one enters any personal information into its pages or installs its applications.
Information Collected by Facebook
Facebook collects two types of information: personal details provided by a user and usage data collected automatically as the user spends time on the Web site clicking around.
Regarding personal information, the user willfully discloses it, such as name, email address, telephone number, address, gender and schools attended, for example. Facebook may request permission to use the user’s email address to send occasional notifications about the new services offered.
Facebook records Web site usage data, in terms of how users access the site, such as type of web browser they use, the user’s IP address, how long they spend logged into the site, and other statistics. Facebook compiles this data to understand trends for improving the site or making marketing decisions.
Facebook now has fine-grained privacy settings for its users. Users can decide which part of their information should be visible and to whom. Facebook categorizes members of the user’s network as “Friends” and “Friends of Friends,” or a broader group, such as a university or locality, and “Everyone,” which includes all users of the site. The categorization increases the granularity of the privacy settings in a user’s profile.
Children: No one under 13 is permitted to register. Children between 13 and 18 require parental permission before sending personal information over Internet. A policy alone, however, does not stop children from using the site, and parents must be watchful of their children’s online activities in order to enforce these policies.
Facebook stores users’ personal information on secure servers behind a firewall.
Sharing of Information with Third Parties
Facebook does not provide personal information to third parties without the user’s consent. Facebook also limits the information available to Internet search engines. Before accepting third-party services, Facebook makes the third party sign an agreement that holds it responsible for any misuse of personal information. However, advertising by third parties on Facebook can lead to their gaining access to user information, such as IP address or cookie-based web usage information that allows personalization of advertisements.
Precautions for Users
Facebook provides thousands of third-party applications for its users to download. Facebook further personalizes the advertisements of these applications on the user’s profiles. It does this by mining through other sources on the Internet to information about the likings and interests of these users. Sources for such mined data are newspapers, blogs and instant messaging to provide services customized according to the user’s personality. However, because these sources are not affiliated with Facebook, it raises a concern of data mining by these sources.
Facebook does not actually provide a mechanism for users to close their accounts, and thus raises the concern that private user data will remain indefinitely on Facebook’s servers.
Over time, the CEO and Board of Directors of a company change, or the company may even be sold. Under such circumstances, a concern arises about the private information held by the company. Deactivation without deletion of a user’s account implies that the data continue to be present on the servers. If a company is then sold, the data of those users who are currently deactivated may be subject to compromise.
Conclusion
Facebook has an explicitly stated privacy policy. It aims to enhance the social networking experience of users by reducing their concerns about the privacy of their data on the Web site. However, the more the Web site tries to incorporate open innovation by allowing third-party access and other such facilities, the more it puts personal information at risk, thereby increasing the probability of losing the trust of its users.
Find this story at 2014
Copyright © 2003–2012 Carnegie Mellon CyLab
Where Does Facebook Stop and the NSA Begin?7 juli 2014
Sometimes it’s hard to tell the difference.
“That social norm is just something that has evolved over time” is how Mark Zuckerberg justified hijacking your privacy in 2010, after Facebook imperiously reset everyone’s default settings to “public.” “People have really gotten comfortable sharing more information and different kinds.” Riiight. Little did we know that by that time, Facebook (along with Google, Microsoft, etc.) was already collaborating with the National Security Agency’s PRISM program that swept up personal data on vast numbers of internet users.
In light of what we know now, Zuckerberg’s high-hat act has a bit of a creepy feel, like that guy who told you he was a documentary photographer, but turned out to be a Peeping Tom. But perhaps we shouldn’t be surprised: At the core of Facebook’s business model is the notion that our personal information is not, well, ours. And much like the NSA, no matter how often it’s told to stop using data in ways we didn’t authorize, it just won’t quit. Not long after Zuckerberg’s “evolving norm” dodge, Facebook had to promise the feds it would stop doing things like putting your picture in ads targeted at your “friends”; that promise lasted only until this past summer, when it suddenly “clarified” its right to do with your (and your kids’) photos whatever it sees fit. And just this week, Facebook analytics chief Ken Rudin told the Wall Street Journal that the company is experimenting with new ways to suck up your data, such as “how long a user’s cursor hovers over a certain part of its website, or whether a user’s newsfeed is visible at a given moment on the screen of his or her mobile phone.”
There will be a lot of talk in coming months about the government surveillance golem assembled in the shadows of the internet. Good. But what about the pervasive claim the private sector has staked to our digital lives, from where we (and our phones) spend the night to how often we text our spouse or swipe our Visa at the liquor store? It’s not a stretch to say that there’s a corporate spy operation equal to the NSA—indeed, sometimes it’s hard to tell the difference.
In light of what we know now, Zuckerberg’s high-hat act has a bit of a creepy feel, like that guy who told you he was a documentary photographer, but turned out to be a Peeping Tom.
Yes, Silicon Valley libertarians, we know there is a difference: When we hand over information to Facebook, Google, Amazon, and PayPal, we click “I Agree.” We don’t clear our cookies. We recycle the opt-out notice. And let’s face it, that’s exactly what internet companies are trying to get us to do: hand over data without thinking of the transaction as a commercial one. It’s all so casual, cheery, intimate—like, like?
But beyond all the Friends and Hangouts and Favorites, there’s cold, hard cash, and, as they say on Sand Hill Road, when the product is free, you are the product. It’s your data that makes Facebook worth $100 billion and Google $300 billion. It’s your data that info-mining companies like Acxiom and Datalogix package, repackage, sift, and sell. And it’s your data that, as we’ve now learned, tech giants also pass along to the government. Let’s review: Companies have given the NSA access to the records of every phone call made in the United States. Companies have inserted NSA-designed “back doors” in security software, giving the government (and, potentially, hackers—or other governments) access to everything from bank records to medical data. And oh, yeah, companies also flat-out sell your data to the NSA and other agencies.
To be sure, no one should expect a bunch of engineers and their lawyers to turn into privacy warriors. What we could have done without was the industry’s pearl-clutching when the eavesdropping was finally revealed: the insistence (with eerily similar wording) that “we have never heard of PRISM”; the Captain Renault-like shock—shock!—to discover that data mining was going on here. Only after it became undeniably clear that they had known and had cooperated did they duly hurl indignation at the NSA and the FISA court that approved the data demands. Heartfelt? Maybe. But it also served a branding purpose: Wait! Don’t unfriend us! Kittens!
O hai, check out Mark Zuckerberg at this year’s TechCrunch conference: The NSA really “blew it,” he said, by insisting that its spying was mostly directed at foreigners. “Like, oh, wonderful, that’s really going to inspire confidence in American internet companies. I thought that was really bad.” Shorter: What matters is how quickly Facebook can achieve total world domination.
Maybe the biggest upside to l’affaire Snowden is that Americans are starting to wise up. “Advertisers” rank barely behind “hackers or criminals” on the list of entities that internet users say they don’t want to be tracked by (followed by “people from your past”). A solid majority say it’s very important to control access to their email, downloads, and location data. Perhaps that’s why, outside the more sycophantic crevices of the tech press, the new iPhone’s biometric capability was not greeted with the unadulterated exultation of the pre-PRISM era.
The truth is, for too long we’ve been content to play with our gadgets and let the geekpreneurs figure out the rest. But that’s not their job; change-the-world blather notwithstanding, their job is to make money. That leaves the hard stuff—like how much privacy we’ll trade for either convenience or security—in someone else’s hands: ours. It’s our responsibility to take charge of our online behavior (posting Carlos Dangerrific selfies? So long as you want your boss, and your high school nemesis, to see ‘em), and, more urgently, it’s our job to prod our elected representatives to take on the intelligence agencies and their private-sector pals.
The NSA was able to do what it did because, post-9/11, “with us or against us” absolutism cowed any critics of its expanding dragnet. Facebook does what it does because, unlike Europe—where both privacy and the ability to know what companies have on you are codified as fundamental rights—we haven’t been conditioned to see Orwellian overreach in every algorithm. That is now changing, and both the NSA and Mark Zuckerberg will have to accept it. The social norm is evolving.
—By Monika Bauerlein and Clara Jeffery | November/December 2013 Issue
Find this story at November/December 2013
Copyright ©2014 Mother Jones and the Foundation for National Progress.
The Bahamas Wants to Know Why the NSA is Recording Its Phone Calls7 juli 2014
Government officials in the Bahamas want their U.S. counterparts to explain why the National Security Agency has been intercepting and recording every cell phone call taking place on the island nation.
Responding to a report published by The Intercept on Monday, which revealed that the NSA has been targeting the Bahamas’ entire mobile network and storing the audio of every phone call traversing the network for up to 30 days, Bahamian officials told the Nassau Guardian that they had contacted the U.S. and vowed to release a statement regarding the revelations.
In a front-page story published Tuesday, Bahamian Minister of Foreign Affairs Fred Mitchell told the Guardian that his government had reached out to the U.S. for an explanation. Mitchell said the cabinet was set to meet to discuss the matter and planned to issue a statement on the surveillance. The Bahamian minister of national security told the paper he intended to launch an inquiry into the NSA’s surveillance but did not provide a comment.
A source familiar with the situation told The Intercept that the cabinet meeting had indeed taken place, but an official in Mitchell’s office said there would be no comment Tuesday. “You’ll have to call back,” said the official, who did not identify herself.
Calls to the office of the prime minister went unanswered, as did a call to Bahamas Telecommunications Company, the Bahamas’ largest communications provider.
U.S. officials at the embassy in the Bahamian capital of Nassau, meanwhile, told the Guardian it would not comment on “every specific alleged intelligence activity.”
“The United States values its relationship with the Bahamas,” Neda Brown, a U.S. embassy spokesperson, told the paper. Contacted by The Intercept, Brown directed inquires to the State Department’s Bureau of Western Hemispheres. The bureau did not return a request for comment made late Tuesday.
In addition to the Bahamas, The Intercept‘s report also revealed NSA’s targeting of mobile networks in Mexico, Kenya and the Philippines. Calls and emails to the embassies of each country were not returned Tuesday.
By Ryan Devereaux20 May 2014, 5:58 PM EDT 151
Find this story at 20 May 2014
© 2014 First Look Productions, Inc.
WikiLeaks ignores ‘deaths’ warning, threatens to name NSA-targeted country7 juli 2014
Internet, Mass media, Security, USA, WikiLeaks
Despite warnings that doing so “could lead to increased violence” and potentially deaths, anti-secrecy group WikiLeaks says it plans to publish the name of a country targeted by a massive United States surveillance operation.
On Monday this week, journalists at The Intercept published a report based off of leaked US National Security Agency documents supplied by former contractor Edward Snowden which suggested that the NSA has been collecting in bulk the contents of all phone conversations made or received in two countries abroad.
Only one of those nations, however — the Bahamas — was named by The Intercept. The other, journalists Ryan Devereaux, Glenn Greenwald and Laura Poitras wrote this week, was withheld as a result of “credible concerns that doing so could lead to increased violence.”
WikiLeaks has since accused The Intercept and its parent company First Look Media of censorship and says they will publish the identity of the country if the name remains redacted in the original article. The Intercept’s Greenwald fired back over Twitter, though, and said his outlet chose to publish more details than the Washington Post, where journalists previously reported on a related call collection program but chose to redact more thoroughly.
“We condemn Firstlook for following the Washington Post into censoring the mass interception of an entire nation,” WikiLeaks tweeted on Monday.
“It is not the place of Firstlook or the Washington Post to deny the rights of an entire people to know they are being mass recorded,” WikiLeaks added. “It is not the place of Firstlook or WaPo to decide how a people will [choose] to act against mass breaches of their rights by the United States.”
When Greenwald defended his decision to publish the names of four countries where telephony metadata is collected by the NSA but withhold a fifth where content is recorded as well, WikiLeaks said it could be interpreted as meaning that the unknown country doesn’t deserve to know they’re being surveilled, but Greenwald said The Intercept was “very convinced” it could lead to deaths. Later, WikiLeaks equated this as an act of racism.
But as the conversation escalated, the WikiLeaks Twitter announced it would disclose the nation’s identify if The Intercept did not, despite requests from the US government to leave that information redact over fears of what the response could be.
“When has true published information harmed innocents?” WikiLeaks asked. “To repeat this false Pentagon talking point is to hurt all publishers.”
“We will reveal the name of the censored country whose population is being mass recorded in 72 hours,” WikiLeaks wrote at 6:35 p.m. EST Tuesday evening. If the organization intends to uphold that promise, that the identity of the country could be revealed before the weekend.
As RT reported earlier this week, The Intercept story made claims that the NSA has used a program codenamed MYSTIC to collect basic phone records in at least five countries, similar to the metadata that has been controversially collected in bulk domestically as revealed in one of the first documents released by Snowden last year. In the Bahamas and one more locale, though, The Intercept reported that NSA documents reveal another program, codenamed SOMALGET, is deployed in order to process “over 100 million call events per day.”
SOMALGET, the document reads, is a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.” According to The Intercept, the decision to wiretap all calls in and out of the Bahamas was made unilaterally and without the knowledge of the island’s government or its quarter-of-a-million people.
Published time: May 20, 2014 18:38
Edited time: May 22, 2014 11:17 Get short URL
Find this story at 20 May 2014
© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2014
Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas7 juli 2014
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.
According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.
SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.
The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
“The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”
By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
In addition, the program is a serious – and perhaps illegal – abuse of the access to international phone networks that other countries willingly grant the United States for legitimate law-enforcement surveillance. If the NSA is using the Drug Enforcement Administration’s relationship to the Bahamas as a cover for secretly recording the entire country’s mobile phone calls, it could imperil the longstanding tradition of international law enforcement cooperation that the United States enjoys with its allies.
“It’s surprising, the short-sightedness of the government,” says Michael German, a fellow at New York University’s Brennan Center for Justice who spent 16 years as an FBI agent conducting undercover investigations. “That they couldn’t see how exploiting a lawful mechanism to such a degree that you might lose that justifiable access – that’s where the intelligence community is acting in a way that harms its long-term interests, and clearly the long-term national security interests of the United States.”
The NSA refused to comment on the program, but said in a statement that “the implication that NSA’s foreign intelligence collection is arbitrary and unconstrained is false.” The agency also insisted that it follows procedures to “protect the privacy of U.S. persons” whose communications are “incidentally collected.”
Informed about the NSA’s spying, neither the Bahamian prime minister’s office nor the country’s national security minister had any comment. The embassies of Mexico, Kenya, and the Philippines did not respond to phone messages and emails.
In March, The Washington Post revealed that the NSA had developed the capability to record and store an entire nation’s phone traffic for 30 days. The Post reported that the capacity was a feature of MYSTIC, which it described as a “voice interception program” that is fully operational in one country and proposed for activation in six others. (The Post also referred to NSA documents suggesting that MYSTIC was pulling metadata in some of those countries.) Citing government requests, the paper declined to name any of those countries.
The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.
MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
1
A top-secret description of the MYSTIC program written by the NSA’s Special Source Operations division
If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
SOMALGET’s capabilities are further detailed in a May 2012 memo written by an official in the NSA’s International Crime and Narcotics division. The memo hails the “great success” the NSA’s drugs and crime unit has enjoyed through its use of the program, and boasts about how “beneficial” the collection and recording of every phone call in a given nation can be to intelligence analysts.
Rather than simply making “tentative analytic conclusions derived from metadata,” the memo notes, analysts can follow up on hunches by going back in time and listening to phone calls recorded during the previous month. Such “retrospective retrieval” means that analysts can figure out what targets were saying even when the calls occurred before the targets were identified. “[W]e buffer certain calls that MAY be of foreign intelligence value for a sufficient period to permit a well-informed decision on whether to retrieve and return specific audio content,” the NSA official reported.
“There is little reason,” the official added, that SOMALGET could not be expanded to more countries, as long as the agency provided adequate engineering, coordination and hardware. There is no indication in the documents that the NSA followed up on the official’s enthusiasm.
2
A 2012 memo written by the NSA’s International Crime & Narcotics division
The documents don’t spell out how the NSA has been able to tap the phone calls of an entire country. But one memo indicates that SOMALGET data is covertly acquired under the auspices of “lawful intercepts” made through Drug Enforcement Administration “accesses”– legal wiretaps of foreign phone networks that the DEA requests as part of international law enforcement cooperation.
When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.”
“Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe.
But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.”
What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
Selander’s first-hand experience is echoed in the 2004 memo by the manager of the NSA’s drug-war efforts, which was titled “DEA: The Other Warfighter.” The DEA and the NSA “enjoy a vibrant two-way information-sharing relationship,” the memo observes, and cooperate so closely on counternarcotics and counterterrorism that there is a risk of “blurring the lines between the two missions.”
Still, the ability to record and replay the phone calls of an entire country appears to be a relatively new weapon in the NSA’s arsenal. None of the half-dozen former U.S. law enforcement officials interviewed by The Intercept said they had ever heard of a surveillance operation quite like the NSA’s Bahamas collection.
“I’m completely unfamiliar with the program,” says Joel Margolis, a former DEA official who is now executive vice president of government affairs for Subsentio, a Colorado-based company that installs lawful intercepts for telecommunications providers. “I used to work in DEA’s office of chief counsel, and I was their lead specialist on lawful surveillance matters. I wasn’t aware of anything like this.”
3
A 2012 memo written by the NSA’s International Crime & Narcotics division
For nearly two decades, telecom providers in the United States have been legally obligated under the 1994 Communications Assistance for Law Enforcement Act to build their networks with wiretapping capabilities, providing law enforcement agencies with access to more efficient, centrally managed surveillance.
Since CALEA’s passage, many countries have adopted similar measures, making it easier to gather telecommunications intelligence for international investigations. A 2001 working group for the United Nations Office on Drugs and Crime went so far as to urge countries to consider permitting foreign law enforcement agencies to initiate international wiretaps directly from within their own territories.
The process for setting up lawful intercepts in foreign countries is largely the same as in the United States. “Law enforcement issues a warrant or other authorization, a carrier or a carrier’s agent responds to the warrant by provisioning the intercept, and the information is sent in sort of a one-way path to the law enforcement agency,” says Marcus Thomas, a former FBI assistant director who now serves as chief technology officer for Subsentio.
When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.”
The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.”
Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
“Most telecom hardware vendors will have some solutions for legal interception,” says a former mobile telecommunications engineer who asked not to be named because he is currently working for the British government. “That’s pretty much because legal interception is a requirement if you’re going to operate a mobile phone network.”
The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA.
One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
The classified 2013 intelligence budget also describes MYSTIC as using “partner-enabled” access to both cellular and landline phone networks. The goal of the access, the budget says, is to “provide comprehensive metadata access and content against targeted communications” in the Caribbean, Mexico, Kenya, the Philippines, and the unnamed country. The budget adds that in the Bahamas, Mexico, and the Philippines, MYSTIC requires “contracted services” for its “operational sustainment.”
SSO_Dictionary_Excerpt
Definitions of terms related to the MYSTIC program, drawn from an NSA glossary
The NSA documents don’t specify who is providing access in the Bahamas. But they do describe SOMALGET as an “umbrella term” for systems provided by a private firm, which is described elsewhere in the documents as a “MYSTIC access provider.” (The documents don’t name the firm, but rather refer to a cover name that The Intercept has agreed not to publish in response to a specific, credible concern that doing so could lead to violence.) Communications experts consulted by The Intercept say the descriptions in the documents suggest a company able to install lawful intercept equipment on phone networks.
Though it is not the “access provider,” the behemoth NSA contractor General Dynamics is directly involved in both MYSTIC and SOMALGET. According to documents, the firm has an eight-year, $51 million contract to process “all MYSTIC data and data for other NSA accesses” at a facility in Annapolis Junction, Maryland, down the road from NSA’s headquarters. NSA logs of SOMALGET collection activity – communications between analysts about issues such as outages and performance problems – contain references to a technician at a “SOMALGET processing facility” who bears the same name as a LinkedIn user listing General Dynamics as his employer. Reached for comment, a General Dynamics spokesperson referred questions to the NSA.
According to the NSA documents, MYSTIC targets calls and other data transmitted on Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries.
In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
Punching into this portion of a county’s mobile network would give the NSA access to a virtually non-stop stream of communications. It would also require powerful technology.
“I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world.
The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets.
But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
marijauna
A slide from a 2013 NSA Special Source Operations presentation
The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general.
So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States?
The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.
“From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
Beyond the Bahamas, the other countries being targeted by MYSTIC are more in line with the NSA’s more commonly touted priorities. In Kenya, the U.S. works closely with local security forces in combating the militant fundamentalist group Al-Shabab, based in neighboring Somalia. In the Philippines, the U.S. continues to support a bloody shadow war against Islamist extremists launched by the Bush administration in 2002. Last month, President Barack Obama visited Manila to sign a military pact guaranteeing that U.S. operations in Southeast Asia will continue and expand for at least another decade.
Mexico, another country targeted by MYSTIC, has received billions of dollars in police, military, and intelligence aid from the U.S. government over the past seven years to fight the war on drugs, a conflict that has left more than 70,000 Mexicans dead by some estimates. Attorney General Eric Holder has described Mexican drug cartels as a U.S. “national security threat,” and in 2009, then-CIA director Michael Hayden said the violence and chaos in Mexico would soon be the second greatest security threat facing the U.S. behind Al Qaeda.
Photo credit: Marcelo A. Salinas/MCT/Zumapress.com
Photo credit: Marcelo A. Salinas/MCT/Zumapress.com
The legality of the NSA’s sweeping surveillance in the Bahamas is unclear, given the permissive laws under which the U.S intelligence community operates. Earlier this year, President Obama issued a policy directive imposing “new limits” on the U.S. intelligence community’s use of “signals intelligence collected in bulk.” In addition to threats against military or allied personnel, the directive lists five broad conditions under which the agency would be permitted to trawl for data in unrestricted dragnets: threats posed by foreign powers, terrorism, weapons of mass destruction, cybersecurity, and “transnational criminal threats, including illicit finance and sanctions evasion.”
SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless.
“I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.”
“An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.”
It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
Documents published with this article:
SOMALGET memo
SIDToday: DEA – The “Other” Warfighter
SSO Dictionary Excerpt
MYSTIC
SSO March 14, 2013
SSO April 18, 2013 – What’s New
SSO May 2, 2013
SSO May 3, 2013 – MYSTIC
SSO May 3, 2012
Black Budget
By Ryan Devereaux, Glenn Greenwald and Laura Poitras19 May 2014, 12:37 PM EDT 395
Find this story at 19 May 2014
© 2014 First Look Productions, Inc
Greenwald: Washington Post ‘suppressed’ foreign countries under NSA eavesdropping program7 juli 2014
It’s been a couple of months since the Washington Post published a scoop on the extraordinary overseas eavesdropping capabilities of the U.S. government. Under the bylines of Barton Gellman and Ashkan Soltani, the paper revealed that the National Security Agency (NSA) had amassed a system — known as “MYSTIC” — enabling it to “rewind and review” all of the telephone conversations of a foreign country.
From the story: “A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.” Details on the program came from documents supplied by NSA whistleblower Edward Snowden as well as from sources familiar with the program.
A really juicy scoop, with one desiccating caveat: The Post withheld a detail critical to understanding the scope and capabilities of the program:
At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Ah, a legacy media outlet acceding to a request from the U.S. government. Or, in other words, the raison d’etre of Glenn Greenwald, the former Guardian columnist and current First Look Media talent who has long criticized American media outlets for wimping out on disclosure of sensitive information. In a recent interview with Amy Goodman of Democracy Now, Greenwald riffed, “[t]he editors at The Washington Post are very much old-style, old-media, pro-government journalists, the kind who have essentially made journalism in the U.S. neutered and impotent and obsolete.”
Following the Post’s story on MYSTIC, the Erik Wemple Blog waited a couple of weeks and then asked Greenwald, essentially, where’s your story on this thing? He responded, “I can’t comment on that yet, except to say that, obviously, if we were to publish something that the WashPost has announced it thinks shouldn’t be published, it would take work (and thus time) with editors, lawyers and the like.”
Time, indeed. Yesterday, The Intercept, First Look Media’s magazine on national security matters, published its version of the Post’s MYSTIC story. In the very headline of the piece, it drew a distinction between its piece and that of the Washington Post: “Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas.”
The Bahamas? The what?
Under the bylines of Ryan Devereaux, Greenwald and Laura Poitras, The Intercept reports that the NSA worked with the Drug Enforcement Agency (DEA) to secure a “backdoor” to the cell phone network of the island nation, “without the knowledge or consent of the Bahamian government.” Noting that the agency commonly cites such life-and-death imperatives as anti-terrorism to justify its eavesdropping program, in this case it’s going after drug traffickers and smugglers, “a far cry from derailing terror plots or intercepting weapons of mass destruction,” notes the story.
If the Bahamas sounds like an odd place on which to focus such a spy initiative, that’s perhaps by design, notes the story: It could well be a “sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.”
As for the “elsewhere,” Greenwald and The Intercept go there, to a point. Here’s the big reveal of the story: “Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.”
John Cook, The Intercept’s editor-in-chief, declined an interview request about the decisions behind the story, instead leaving the matter to Twitter. Which provides a rich back-and-forth for this case.
Following publication of the story, Wikileaks ripped The Intercept for failing to embrace a more radical form of transparency:
The principals then went off to the races:
And then some input from The Intercept’s priest of adversarial press-government relations:
Compare that sentiment with what Greenwald tweeted the day the Washington Post published its MYSTIC story:
As part of the back-and-forth Wikileaks made a bid for renewed relevance with this boast:
The exchange proves that in the world of radical media-government adversarialists, purity is a prerequisite. Here, Greenwald apparently thought his publication was sticking to its governing principles in publishing the names of four countries, only to get shouted down by Wikileaks for not going far enough (Greenwald couldn’t be reached for comment). In a previous post, Greenwald has criticized the NSA for allegedly spilling details of top-secret programs when it suits its propaganda mission, only to turn around and insist to media outlets that lives will be endangered if they publish sensitive information.
The Intercept’s partial defiance of the NSA in publishing the names of four countries surely adds contour to the story of MYSTIC — the example of the Bahamas alone fleshes out various legal and diplomatic considerations involved in foreign surveillance. The more careful Washington Post version of the story was interesting yet unsatisfying: Absent a specific country, it was more difficult to reach hard conclusions on the program’s legitimacy, legality and efficacy. Those are the dangers of scaling back detail in consideration of security concerns. When asked if naming just the Bahamas as a way of explaining NSA capabilities would have been a tolerably cautious approach, Washington Post Executive Editor Martin Baron replied, “You make some assumptions here, but I’m not going to address them.”
There are also perils to The Intercept’s approach. It may have touched off a macho-transparentist scramble to out that one country whose secretness The Intercept genuinely wants to protect.
Whatever the outcome, each outlet apparently got the same pitch from the government: “We shared with both news outlets the very same concerns about risks to human life and national security,” says NSA spokeswoman Vanee’ Vines in a statement to this blog. She also sent along this statement:
Every day, NSA provides valuable intelligence on issues of concern to all Americans – such as international terrorism, cyber crime, international narcotics trafficking, and the proliferation of weapons of mass destruction. The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all.
NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets. Moreover, all of NSA’s efforts are strictly conducted under the rule of law and provide appropriate protection for privacy rights.
The Agency collects data to meet specific security and intelligence requirements such as counterintelligence, counterterrorism, counterproliferation, cyber security, force protection for U.S. troops and allies, and combating transnational crime.
Erik Wemple writes the Erik Wemple blog, where he reports and opines on media organizations of all sorts.
BY ERIK WEMPLE May 20
Find this story at 20 May 2014
© 1996-2014 The Washington Post
Glenn Greenwald: how the NSA tampers with US-made internet routers7 juli 2014
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
For years, the US government loudly warned the world that Chinese routers and other internet devices pose a “threat” because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA’s documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
Tell us what you think: Star-rate and review this book
The drumbeat of American accusations against Chinese internet device manufacturers was unrelenting. In 2012, for example, a report from the House Intelligence Committee, headed by Mike Rogers, claimed that Huawei and ZTE, the top two Chinese telecommunications equipment companies, “may be violating United States laws” and have “not followed United States legal obligations or international standards of business behaviour”. The committee recommended that “the United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies”.
The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products: “Private-sector entities in the United States are strongly encouraged to consider the long-term security risks associated with doing business with either ZTE or Huawei for equipment or services. US network providers and systems developers are strongly encouraged to seek other vendors for their projects. Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security threat to the United States and to our systems.”
The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: “‘If Huawei gets in the middle of US-China relations,’ and causes problems, ‘it’s not worth it’.”
But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA’s Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.
The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some “SIGINT tradecraft … is very hands-on (literally!)”.
Eventually, the implanted device connects back to the NSA. The report continues: “In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network.”
It is quite possible that Chinese firms are implanting surveillance mechanisms in their network devices. But the US is certainly doing the same.
Warning the world about Chinese surveillance could have been one of the motives behind the US government’s claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA’s own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
The Guardian, Monday 12 May 2014 22.39 BST
Find this story at 12 May 2014
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
EXCLUSIVE: EMAILS REVEAL CLOSE GOOGLE RELATIONSHIP WITH NSA (2014)19 mei 2014
National Security Agency head and Internet giant’s executives have coordinated through high-level policy discussions
Email exchanges between National Security Agency Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt suggest a far cozier working relationship between some tech firms and the U.S. government than was implied by Silicon Valley brass after last year’s revelations about NSA spying.
Disclosures by former NSA contractor Edward Snowden about the agency’s vast capability for spying on Americans’ electronic communications prompted a number of tech executives whose firms cooperated with the government to insist they had done so only when compelled by a court of law.
But Al Jazeera has obtained two sets of email communications dating from a year before Snowden became a household name that suggest not all cooperation was under pressure.
On the morning of June 28, 2012, an email from Alexander invited Schmidt to attend a four-hour-long “classified threat briefing” on Aug. 8 at a “secure facility in proximity to the San Jose, CA airport.”
“The meeting discussion will be topic-specific, and decision-oriented, with a focus on Mobility Threats and Security,” Alexander wrote in the email, obtained under a Freedom of Information Act (FOIA) request, the first of dozens of communications between the NSA chief and Silicon Valley executives that the agency plans to turn over.
Alexander, Schmidt and other industry executives met earlier in the month, according to the email. But Alexander wanted another meeting with Schmidt and “a small group of CEOs” later that summer because the government needed Silicon Valley’s help.
“About six months ago, we began focusing on the security of mobility devices,” Alexander wrote. “A group (primarily Google, Apple and Microsoft) recently came to agreement on a set of core security principles. When we reach this point in our projects we schedule a classified briefing for the CEOs of key companies to provide them a brief on the specific threats we believe can be mitigated and to seek their commitment for their organization to move ahead … Google’s participation in refinement, engineering and deployment of the solutions will be essential.”
Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society, said she believes information sharing between industry and the government is “absolutely essential” but “at the same time, there is some risk to user privacy and to user security from the way the vulnerability disclosure is done.”
The challenge facing government and industry was to enhance security without compromising privacy, Granick said. The emails between Alexander and Google executives, she said, show “how informal information sharing has been happening within this vacuum where there hasn’t been a known, transparent, concrete, established methodology for getting security information into the right hands.”
The classified briefing cited by Alexander was part of a secretive government initiative known as the Enduring Security Framework (ESF), and his email provides some rare information about what the ESF entails, the identities of some participant tech firms and the threats they discussed.
The classified briefing cited by Alexander was part of a secretive government initiative known as the Enduring Security Framework (ESF), and his email provides some rare information about what the ESF entails, the identity of some participant tech firms and the threats they discussed.
Alexander explained that the deputy secretaries of the Department of Defense, Homeland Security and “18 US CEOs” launched the ESF in 2009 to “coordinate government/industry actions on important (generally classified) security issues that couldn’t be solved by individual actors alone.”
“For example, over the last 18 months, we (primarily Intel, AMD [Advanced Micro Devices], HP [Hewlett-Packard], Dell and Microsoft on the industry side) completed an effort to secure the BIOS of enterprise platforms to address a threat in that area.”
“BIOS” is an acronym for “basic input/output system,” the system software that initializes the hardware in a personal computer before the operating system starts up. NSA cyberdefense chief Debora Plunkett in December disclosed that the agency had thwarted a “BIOS plot” by a “nation-state,” identified as China, to brick U.S. computers. That plot, she said, could have destroyed the U.S. economy. “60 Minutes,” which broke the story, reported that the NSA worked with unnamed “computer manufacturers” to address the BIOS software vulnerability.
But some cybersecurity experts questioned the scenario outlined by Plunkett.
“There is probably some real event behind this, but it’s hard to tell, because we don’t have any details,” wrote Robert Graham, CEO of the penetration-testing firm Errata Security in Atlanta, on his blog in December. “It”s completely false in the message it is trying to convey. What comes out is gibberish, as any technical person can confirm.”
And by enlisting the NSA to shore up their defenses, those companies may have made themselves more vulnerable to the agency’s efforts to breach them for surveillance purposes.
“I think the public should be concerned about whether the NSA was really making its best efforts, as the emails claim, to help secure enterprise BIOS and mobile devices and not holding the best vulnerabilities close to their chest,” said Nate Cardozo, a staff attorney with the Electronic Frontier Foundation’s digital civil liberties team.
He doesn’t doubt that the NSA was trying to secure enterprise BIOS, but he suggested that the agency, for its own purposes, was “looking for weaknesses in the exact same products they’re trying to secure.”
The NSA “has no business helping Google secure its facilities from the Chinese and at the same time hacking in through the back doors and tapping the fiber connections between Google base centers,” Cardozo said. “The fact that it’s the same agency doing both of those things is in obvious contradiction and ridiculous.” He recommended dividing offensive and defensive functions between two agencies.
Google, NSA
The government has asked for Silicon Valley’s help. Adam Berry / Getty Images
Two weeks after the “60 Minutes” broadcast, the German magazine Der Spiegel, citing documents obtained by Snowden, reported that the NSA inserted back doors into BIOS, doing exactly what Plunkett accused a nation-state of doing during her interview.
Google’s Schmidt was unable to attend to the mobility security meeting in San Jose in August 2012.
“General Keith.. so great to see you.. !” Schmidt wrote. “I’m unlikely to be in California that week so I’m sorry I can’t attend (will be on the east coast). Would love to see you another time. Thank you !” Since the Snowden disclosures, Schmidt has been critical of the NSA and said its surveillance programs may be illegal.
Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, did attend that briefing. Foreign Policy reported a month later that Dempsey and other government officials — no mention of Alexander — were in Silicon Valley “picking the brains of leaders throughout the valley and discussing the need to quickly share information on cyber threats.” Foreign Policy noted that the Silicon Valley executives in attendance belonged to the ESF. The story did not say mobility threats and security was the top agenda item along with a classified threat briefing.
A week after the gathering, Dempsey said during a Pentagon press briefing, “I was in Silicon Valley recently, for about a week, to discuss vulnerabilities and opportunities in cyber with industry leaders … They agreed — we all agreed on the need to share threat information at network speed.”
Google co-founder Sergey Brin attended previous meetings of the ESF group but because of a scheduling conflict, according to Alexander’s email, he also could not attend the Aug. 8 briefing in San Jose, and it’s unknown if someone else from Google was sent.
A few months earlier, Alexander had emailed Brin to thank him for Google’s participation in the ESF.
“I see ESF’s work as critical to the nation’s progress against the threat in cyberspace and really appreciate Vint Cerf [Google’s vice president and chief Internet evangelist], Eric Grosse [vice president of security engineering] and Adrian Ludwig’s [lead engineer for Android security] contributions to these efforts during the past year,” Alexander wrote in a Jan. 13, 2012, email.
“You recently received an invitation to the ESF Executive Steering Group meeting, which will be held on January 19, 2012. The meeting is an opportunity to recognize our 2012 accomplishments and set direction for the year to come. We will be discussing ESF’s goals and specific targets for 2012. We will also discuss some of the threats we see and what we are doing to mitigate those threats … Your insights, as a key member of the Defense Industrial Base, are valuable to ensure ESF’s efforts have measurable impact.”
A Google representative declined to answer specific questions about Brin’s and Schmidt’s relationship with Alexander or about Google’s work with the government.
“We work really hard to protect our users from cyberattacks, and we always talk to experts — including in the U.S. government — so we stay ahead of the game,” the representative said in a statement to Al Jazeera. “It’s why Sergey attended this NSA conference.”
Brin responded to Alexander the following day even though the head of the NSA didn’t use the appropriate email address when contacting the co-chairman.
“Hi Keith, looking forward to seeing you next week. FYI, my best email address to use is [redacted],” Brin wrote. “The one your email went to — sergey.brin@google.com — I don’t really check.”
May 6, 2014 5:00AM ET
by Jason Leopold @JasonLeopold
Find this story at 6 May 2014
© 2014 Al Jazeera America, LLC.
US tech giants knew of NSA data collection, agency’s top lawyer insists (2014)19 mei 2014
NSA general counsel Rajesh De says big tech companies like Yahoo and Google provided ‘full assistance’ in legally mandated collection of data
The senior lawyer for the National Security Agency stated on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data.
Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet.
Asked during a Wednesday hearing of the US government’s institutional privacy watchdog if collection under the law, known as Section 702 or the Fisa Amendments Act, occurred with the “full knowledge and assistance of any company from which information is obtained,” De replied: “Yes.”
When the Guardian and the Washington Post broke the Prism story in June, thanks to documents leaked by whistleblower Edward Snowden, nearly all the companies listed as participating in the program – Yahoo, Apple, Google, Microsoft, Facebook and AOL – claimed they did not know about a surveillance practice described as giving NSA vast access to their customers’ data. Some, like Apple, said they had “never heard” the term Prism.
De explained: “Prism was an internal government term that as the result of leaks became the public term,” De said. “Collection under this program was a compulsory legal process, that any recipient company would receive.”
After the hearing, De added that service providers also know and receive legal compulsions surrounding NSA’s harvesting of communications data not from companies but directly in transit across the internet under 702 authority.
The disclosure of Prism resulted in a cataclysm in technology circles, with tech giants launching extensive PR campaigns to reassure their customers of data security and successfully pressing the Obama administration to allow them greater leeway to disclose the volume and type of data requests served to them by the government.
Last week, Facebook founder Mark Zuckerberg said he had called US president Barack Obama to voice concern about “the damage the government is creating for all our future.” There was no immediate response from the tech companies to De’s comments on Wednesday.
It is unclear what sort of legal process the government serves on a company to compel communications content and metadata access under Prism or through upstream collection. Documents leaked from Snowden indicate that the NSA possesses unmediated access to the company data.
The secret Fisa court overseeing US surveillance for the purposes of producing foreign intelligence issues annual authorisations blessing NSA’s targeting and associated procedures under Section 702.After winning a transparency battle with the administration in the Fisa court earlier this year, the companies are now permitted to disclose the range of Fisa orders they receive, in bands of 1,000, which presumably include orders under 702.
Passed in 2008, Section 702 retroactively gave cover of law to a post-9/11 effort permitting the NSA to collect phone, email, internet and other communications content when one party to the communication is reasonably believed to be a non-American outside the United States. The NSA stores Prism data for five years and communications taken directly from the internet for two years.
While Section 702 forbids the intentional targeting of Americans or people inside the United States – a practice known as “reverse targeting” – significant amounts of Americans’ phone calls and emails are swept up in the process of collection.
In 2011, according to a now-declassified Fisa court ruling, the NSA was found to have collected tens of thousands of emails between Americans, which a judge on the court considered a violation of the US constitution and which the NSA says it is technologically incapable of fixing.
Renewed in December 2012 over the objections of senate intelligence committee members Ron Wyden and Mark Udall, Section 702 also permits NSA analysts to search through the collected communications for identifying information about Americans, an amendment to so-called “minimisation” rules revealed by the Guardian in August and termed the “backdoor search loophole” by Wyden.
De and his administration colleagues, testifying before the Privacy and Civil Liberties Oversight Board, strongly rejected suggestions by the panel that a court authorise searches for Americans’ information inside the 702 databases. “If you have to go back to court every time you look at the information in your custody, you can imagine that would be quite burdensome,” deputy assistant attorney general Brad Wiegmann told the board.
De argued that once the Fisa court permits the collection annually, analysts ought to be free to comb through it, and stated that there were sufficient privacy safeguards for Americans after collection and querying had occurred. “That information is at the government’s disposal to review in the first instance,” De said.
De also stated that the NSA is not permitted to search for Americans’ data from communications taken directly off the internet, citing greater risks to privacy.
Section 702 is not the only legal authority the US government possesses to harvest data transiting the internet.
Neither De nor any other US official discussed data taken from the internet under different legal authorities. Different documents Snowden disclosed, published by the Washington Post, indicated that NSA takes data as it transits between Yahoo and Google data centers, an activity reportedly conducted not under Section 702 but under a seminal executive order known as 12333.
De and his administration colleagues were quick to answer the board that companies were aware of the government’s collection of data under 702, which Robert Litt, general counsel for the director of national intelligence, told the board was “one of the most valuable collection tools that we have.”
“All 702 collection is pursuant to court directives, so they have to know,” De reiterated to the Guardian.
• This article was amended on 20 March 2014 to remove statements in the original that the testimony by Rajesh De contradicted denials by technology companies about their knowledge of NSA data collection. It was also updated to clarify that the companies challenged the secrecy surrounding Section 702 orders. Other minor clarifications were also made.
Spencer Ackerman in Washington
theguardian.com, Wednesday 19 March 2014 18.40 GMT
Find this story at 19 March 2014
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Apple, Google and AT&T meet Obama to discuss NSA surveillance concerns (2013)19 mei 2014
Silicon Valley companies concerned at effect on business as revelations over US government spying spread more widely
Barack Obama hosted a summit on government surveillance and digital privacy attended by Apple chief executive Tim Cook, Google vice-president Vint Cerf and the boss of US telecoms network AT&T on Thursday.
The US president attended in person, sources told the Politico blog, as did other technology company executives. Additional attendees included representatives of the Center for Democracy and Technology and Gigi Sohn, leader of internet campaign group Public Knowledge.
The meeting was apparently prompted by growing concerns among US technology companies that revelations from the Guardian and others about the extent and depth of surveillance by the National Security Agency, and the companies’ obligation to allow access to data under secret court rules, could be damaging their reputation and commercial interests abroad.
The gathering followed a closed-doors meeting earlier this week with Obama’s chief of staff Denis McDonough and general counsel Kathy Ruemmler at the White House.
On the agenda at Tuesday’s meeting were the surveillance activities of the NSA, commercial privacy issues and the online tracking of consumers.
“This is one of a number of discussions the administration is having with experts and stakeholders in response to the president’s directive to have a national dialogue about how to best protect privacy in a digital era, including how to respect privacy while defending our national security,” one official told Politico.
McDonough and Ruemmler met members of the Information Technology Industry Council, TechNet and Tech America, which represent a range of companies from defence contractors to digital giants Facebook, Google and Microsoft.
Campaigners including the American Civil Liberties Union and the Electronic Privacy information Center were also present, Politico’s Tony Romm reported.
The Guardian’s revelations about the breadth of the NSA’s access to data, particularly relating to foreign individuals, has created PR problems for US companies. Apple has set its sights on China as a huge potential growth market, but if people there fear eavesdropping by the US government it could harm sales. And Google stands to lose business in cloud computing to European rivals if customers fear similar eavesdropping. Cloud computing companies have estimated they could lose billions of dollars of business as a result.
The White House is also battling to respond to growing unrest over surveillance of citizens by the state and the vast caches of data many digital giants are now storing about individual consumers.
Obama has promised more public debate about the country’s counterterrorism activities and privacy safeguards in general amid signs of widespread support for NSA whistleblower Edward Snowden, but officials have so far declined to provide details about this week’s technology summits.
The meetings came as a wave of Americans posted messages of support to the former security contractor, whose leaks exposed the extent of government sponsored surveillance in the US and Europe.
A website launched by the digital rights group Fight for the Future on Wednesday has attracted more than 10,000 posts expressing support for Snowden’s actions. Billed as an exercise to put faces to statistics, the website features a combination of photographs of individuals holding up signs and written words of support.
In June, Reuters/Ipsos found 31% of respondents believed Snowden was a patriot, while 23% thought he was a traitor. Another 46% said they did not know. Gallup found in June that 53% of respondents disapproved of government snooping programmes, while just 37% approved and 10% had no opinion.
In a statement, Fight for the Future cofounder Tiffiniy Cheng said: “We’ve seen an unbelievable response already – the messages keep streaming in. The government reads the same polls that we do. They know that Snowden has the public’s support. But now we’re adding faces to those statistics. As someone who volunteered and worked for Obama’s election, I feel totally burned by the president’s civil liberties and human rights records. If he truly cares about representing the American people, he should turn his attention to shutting down the NSA’s illegal surveillance programs, and leave Mr Snowden alone.”
The website was launched shortly before Obama pulled out of a presidential meeting with Russia’s leader Vladimir Putin in Moscow next month. This followed Russia’s decision to grant Snowden asylum.
Juliette Garside
theguardian.com, Friday 9 August 2013 17.37 BST
Find this story at 9 August 2013
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
BT and Vodafone among telecoms companies passing details to GCHQ (2013)19 mei 2014
Fears of customer backlash over breach of privacy as firms give GCHQ unlimited access to their undersea cables
Some of the world’s leading telecoms firms, including BT and Vodafone, are secretly collaborating with Britain’s spy agency GCHQ, and are passing on details of their customers’ phone calls, email messages and Facebook entries, documents leaked by the whistleblower Edward Snowden show.
BT, Vodafone Cable, and the American firm Verizon Business – together with four other smaller providers – have given GCHQ secret unlimited access to their network of undersea cables. The cables carry much of the world’s phone calls and internet traffic.
In June the Guardian revealed details of GCHQ’s ambitious data-hoovering programmes, Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. It emerged GCHQ was able to tap into fibre-optic cables and store huge volumes of data for up to 30 days. That operation, codenamed Tempora, has been running for 20 months.
On Friday Germany’s Süddeutsche newspaper published the most highly sensitive aspect of this operation – the names of the commercial companies working secretly with GCHQ, and giving the agency access to their customers’ private communications. The paper said it had seen a copy of an internal GCHQ powerpoint presentation from 2009 discussing Tempora.
The document identified for the first time which telecoms companies are working with GCHQ’s “special source” team. It gives top secret codenames for each firm, with BT (“Remedy”), Verizon Business (“Dacron”), and Vodafone Cable (“Gerontic”). The other firms include Global Crossing (“Pinnage”), Level 3 (“Little”), Viatel (“Vitreous”) and Interoute (“Streetcar”). The companies refused to comment on any specifics relating to Tempora, but several noted they were obliged to comply with UK and EU law.
The revelations are likely to dismay GCHQ and Downing Street, who are fearful that BT and the other firms will suffer a backlash from customers furious that their private data and intimate emails have been secretly passed to a government spy agency. In June a source with knowledge of intelligence said the companies had no choice but to co-operate in this operation. They are forbidden from revealing the existence of warrants compelling them to allow GCHQ access to the cables.
Together, these seven companies operate a huge share of the high-capacity undersea fibre-optic cables that make up the backbone of the internet’s architecture. GCHQ’s mass tapping operation has been built up over the past five years by attaching intercept probes to the transatlantic cables where they land on British shores. GCHQ’s station in Bude, north Cornwall, plays a role. The cables carry data to western Europe from telephone exchanges and internet servers in north America. This allows GCHQ and NSA analysts to search vast amounts of data on the activity of millions of internet users. Metadata – the sites users visit, whom they email, and similar information – is stored for up to 30 days, while the content of communications is typically stored for three days.
GCHQ has the ability to tap cables carrying both internet data and phone calls. By last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.
Each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.
This operation is carried out under clandestine agreements with the seven companies, described in one document as “intercept partners”. The companies are paid for logistical and technical assistance.
The identity of the companies allowing GCHQ to tap their cables was regarded as extremely sensitive within the agency. Though the Tempora programme itself was classified as top secret, the identities of the cable companies was even more secret, referred to as “exceptionally controlled information”, with the company names replaced with the codewords, such as “GERONTIC”, “REMEDY” and “PINNAGE”.
However, some documents made it clear which codenames referred to which companies. GCHQ also assigned the firms “sensitive relationship teams”. One document warns that if the names emerged it could cause “high-level political fallout”.
Germans have been enraged by the revelations of spying by the National Security Agency and GCHQ after it emerged that both agencies were hoovering up German data as well. On Friday the Süddeutsche said it was now clear that private telecoms firms were far more deeply complicit in US-UK spying activities than had been previously thought.
The source familiar with intelligence maintained in June that GCHQ was “not looking at every piece of straw” but was sifting a “vast haystack of data” for what he called “needles”.
He added: “If you had the impression we are reading millions of emails, we are not. There is no intention in this whole programme to use it for looking at UK domestic traffic – British people talking to each other.” The source said analysts used four criteria for determining what was examined: security, terror, organised crime and Britain’s economic wellbeing.”The vast majority of the data is discarded without being looked at … we simply don’t have the resources.”
Nonetheless, the agency repeatedly referred to plans to expand this collection ability still further in the future.
Once it is collected, analysts are able to search the information for emails, online chats and browsing histories using an interface called XKeyscore, uncovered in the Guardian on Wednesday. By May 2012, 300 analysts from GCHQ and 250 NSA analysts had direct access to search and sift through the data collected under the Tempora program.
Documents seen by the Guardian suggest some telecoms companies allowed GCHQ to access cables which they did not themselves own or operate, but only operated a landing station for. Such practices could raise alarm among other cable providers who do not co-operate with GCHQ programmes that their facilities are being used by the intelligence agency.
Telecoms providers can be compelled to co-operate with requests from the government, relayed through ministers, under the 1984 Telecommunications Act, but privacy advocates have raised concerns that the firms are not doing enough to challenge orders enabling large-scale surveillance, or are co-operating to a degree beyond that required by law.
“We urgently need clarity on how close the relationship is between companies assisting with intelligence gathering and government,” said Eric King, head of research for Privacy International. “Were the companies strong-armed, or are they voluntary intercept partners?”
Vodafone said it complied with the laws of all the countries in which its cables operate. “Media reports on these matters have demonstrated a misunderstanding of the basic facts of European, German and UK legislation and of the legal obligations set out within every telecommunications operator’s licence … Vodafone complies with the law in all of our countries of operation,” said a spokesman.
“Vodafone does not disclose any customer data in any jurisdiction unless legally required to do so. Questions related to national security are a matter for governments not telecommunications operators.”
A spokeswoman for Interoute said: “As with all communication providers in Europe we are required to comply with European and local laws including those on data protection and retention. From time to time we are presented with requests from authorities. When we receive such requests, they are processed by our legal and security teams and if valid, acted upon.”
A spokeswoman for Verizon said: “Verizon continually takes steps to safeguard our customers’ privacy. Verizon also complies with the law in every country in which we operate.”
BT declined to comment.
James Ball, Luke Harding and Juliette Garside
The Guardian, Friday 2 August 2013 18.36 BST
Find this story at 2 August 2013
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Newly declassified documents on phone records program released (2013)19 mei 2014
Obama administration officials faced deepening political skepticism Wednesday about a far-reaching counterterrorism program that collects millions of Americans’ phone records, even as they released newly declassified documents in an attempt to spotlight privacy safeguards.
The previously secret material — a court order and reports to Congress — was released by Director of National Intelligence James R. Clapper as a Senate Judiciary Committee hearing opened Wednesday morning in which lawmakers sharply questioned the efficacy of the collection of bulk phone records. A senior National Security Agency official conceded that the surveillance effort was the primary tool in thwarting only one plot — not the dozens that officials had previously suggested.
Read the documents
NSA
Secret FISA court order to Verizon
The Obama administration declassified government documents related to NSA collection of telephone metadata records on Wednesday.
Graphic
How the secret FISA court works Click Here to View Full Graphic Story
How the secret FISA court works
Click here to subscribe.
In recent weeks, political support for such broad collection has sagged, and the House last week narrowly defeated a bipartisan bid to end the program, at least in its current form. On Wednesday, senior Democratic senators voiced equally strong doubts.
“This bulk-collection program has massive privacy implications,” said Senate Judiciary Committee Chairman Patrick J. Leahy (Vt.). “The phone records of all of us in this room — all of us in this room — reside in an NSA database. I’ve said repeatedly, just because we have the ability to collect huge amounts of data does not mean that we should be doing so. . . . If this program is not effective, it has to end. So far, I’m not convinced by what I’ve seen.”
Administration officials defended the collection effort and a separate program targeting foreigners’ communication as essential and operating under stringent guidelines.
“With these programs and other intelligence activities, we are constantly seeking to achieve the right balance between the protection of national security and the protection of privacy and civil liberties,” Deputy Attorney General James Cole said. “We believe these two programs have achieved the right balance.”
Cole nonetheless said the administration is open to amending the program to achieve greater public trust. Legislation is pending in the Senate that would narrow its scope.
The NSA program collecting phone records began after the September 2001 terrorist attacks and was brought under the supervision of the Foreign Intelligence Surveillance Court in 2006. But its existence remained hidden until June, when the Guardian newspaper in Britain published a classified FISC order to a U.S. phone company to turn over to the NSA all call records. Former NSA contractor Edward Snowden leaked the order to the newspaper.
On Wednesday, the Guardian published new documents provided by Snowden that outlined previously unknown features of an NSA data-retrieval system called XKeyscore. The newspaper reported that the search tool allowed analysts to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.”
NSA slides describing the system published with the Guardian article indicated that analysts used it to sift through government databases, including Pinwale, the NSA’s primary storage system for e-mail and other text, and Marina, the primary storage and analysis tool for “metadata.” Another slide described analysts using XKeyscore to access a database containing phone numbers, e-mail addresses, log-ins and Internet user activity generated from other NSA programs.
The newspaper said the disclosures shed light on Snowden’s claim that the NSA’s surveillance programs allowed him while sitting at his desk to “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal e-mail.” U.S. officials have denied that he had such capability.
In a statement responding to the Guardian report, the NSA said “the implication that NSA’s collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against — and only against — legitimate foreign intelligence targets.” The agency further said: “Access to XKEYSCORE, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks. . . . Not every analyst can perform every function, and no analyst can operate freely. Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.”
On Wednesday, Clapper disclosed the FISA court’s “primary” order that spells out the program’s collection rules and two reports to Congress that discussed the program, which is authorized under Section 215 of the “business records” provision of the Foreign Intelligence Surveillance Act. Administration officials released the documents to reassure critics that the program is strictly supervised and minimally invasive.
For instance, the primary order states that only “appropriately trained and authorized personnel” may have access to the records, which consist of phone numbers of calls made and received, their time and duration, but not names and content. Officials call this metadata. The order also states that to query the data, there must be “reasonable, articulable suspicion,” presumably that the number is linked to a foreign terrorist group.
But the documents fueled more concern about the program’s scope among civil liberties advocates who are pressing the administration to release the legal rationale that might explain what makes such large numbers of records relevant to an authorized investigation. Perhaps most alarming to some critics was the disclosure, in the order, that queries of the metadata return results that are placed into a “corporate store” that may then be searched for foreign intelligence purposes with fewer restrictions.
That disclosure takes on significance in light of Deputy NSA Director John C. Inglis’s testimony last month that analysts could extend their searches by “three hops.” That means that starting from a target’s phone number, analysts can search on the phone numbers of people in contact with the target, then the numbers of people in contact with that group, and then the numbers of people in contact with that larger pool. That is potentially millions of people, said Jameel Jaffer, deputy legal director of the American Civil Liberties Union, who also testified Wednesday.
The Office of the DNI earlier released a statement that fewer than 300 numbers were queried in 2012. That could still mean potentially hundreds of millions of records, Sen. Richard J. Durbin (D-Ill.) said at the hearing.
Also, according to the order, the NSA does not need to audit the results of searches of the corporate store.
The order asserts that phone metadata could be obtained with a grand jury subpoena. That may be true for one person or even a group of people, but not for all Americans’ phone records, critics said.
Privacy advocates criticized redactions in the reports to Congress of information about the NSA’s failure to comply with its own internal rules. That is “among the most important information that the American public needs to critically assess whether these programs are proper,” said Mark Rumold, a staff lawyer at the Electronic Frontier Foundation.
At the hearing, Leahy voiced upset with the administration for suggesting that the program was as effective in thwarting terrorist plots as another NSA program, authorized under Section 702 of FISA and targeting foreigners’ communications. “I don’t think that’s a coincidence when we have people in government make that comparison, but it needs to stop,” he said of attempts to conflate the two programs’ utility.
He noted that senior officials had testified that the phone logging effort was critical to thwarting 54 plots, but after reviewing NSA material, he said that assertion cannot be made — “not by any stretch.” Pressed by Leahy on the point, Inglis admitted that the program “made a contribution” in 12 plots with a domestic nexus, but only one case came close to a “but-for” or critical contribution.
Carol D. Leonnig and William Branigin contributed to this report.
By Ellen Nakashima, Published: July 31, 2013
Find this story at 31 July 2013
© 1996-2014 The Washington Post
Telekom-Riesen helfen den Geheimdiensten (2013)19 mei 2014
Der britische Geheimdienst wurde bei Abhöraktionen umfangreicher von Telekommunikationsfirmen unterstützt als bislang bekannt. Das berichten “Süddeutsche Zeitung” und NDR. Sogar Programmierarbeit soll an die Firmen ausgelagert worden sein.
Berlin – Laut übereinstimmenden Berichten des NDR und der “Süddeutschen Zeitung” (SZ) sind einige private Telekommunikationsunternehmen stärker in die Abhöraktionen ausländischer Geheimdienste verwickelt als bisher angenommen. Der britische Geheimdienst GCHQ etwa, ein enger Partner des US-Diensts NSA, arbeite beim Abhören des Internetverkehrs mit sieben großen Firmen zusammen.
NDR und “Süddeutsche Zeitung” beziehen sich in ihren Berichten auf Dokumente des ehemaligen NSA-Vertragsmitarbeiters Edward Snowden, die sie einsehen konnten. Die interne Präsentation von 2009 nennt neben den internationalen Unternehmen British Telecom, Verizon und Vodafone auch die Netzwerkbetreiber Level 3, Interoute, Viatel und Global Crossing als Schlüsselpartner des GCHQ. Global Crossing wurde inzwischen von Level 3 gekauft.
Gemeinsam spannen die Unternehmen laut NDR und “SZ” ein engmaschiges Datennetz über Europa und weite Teile der Welt. Einige Firmen wie Level 3 betreiben in Deutschland demnach große Datenzentren. Demnach betreibt Level 3 Rechenzentren in mehreren deutschen Städten, ein Transatlantikkabel von Global Crossing ist in Westerland auf Sylt mit deutschen Netzen verbunden. Das Unternehmen Interoute, das den Unterlagen zufolge auch mit dem GCHQ kooperiert, betreibt 15 Netzknoten in Deutschland.
Teilweise sei die Kooperation mit dem Geheimdienst über den einfachen Zugang zu den Datennetzen hinausgegangen, berichten “SZ” und NDR. Einige Firmen sollen laut den Dokumenten sogar Computerprogramme entwickelt haben, um dem britischen Geheimdienst das Abfangen von Daten aus ihren Netzen zu erleichtern. Faktisch habe der GCHQ einen Teil seiner Ausspäharbeit an Privatunternehmen delegiert.
Viatel bestreitet Zusammenarbeit
Die meisten der Unternehmen verwiesen laut NDR und “SZ” auf Gesetze, die Regierungen erlaubten, Firmen unter bestimmten Umständen zur Herausgabe von Informationen zu verpflichten. Viatel widersprach den Angaben und erklärte, nicht mit dem GCHQ zu kooperieren und dem Geheimdienst auch keinen Zugang zur eigenen Infrastruktur oder zu Kundendaten zu gewähren.
02. August 2013, 09:20 Uhr
Find this story at 2 August 2013
© SPIEGEL ONLINE 2013
Agreements with private companies protect U.S. access to cables’ data for surveillance (2013)19 mei 2014
The U.S. government had a problem: Spying in the digital age required access to the fiber-optic cables traversing the world’s oceans, carrying torrents of data at the speed of light. And one of the biggest operators of those cables was being sold to an Asian firm, potentially complicating American surveillance efforts.
Enter “Team Telecom.”
In months of private talks, the team of lawyers from the FBI and the departments of Defense, Justice and Homeland Security demanded that the company maintain what amounted to an internal corporate cell of American citizens with government clearances. Among their jobs, documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.
This “Network Security Agreement,” signed in September 2003 by Global Crossing, became a model for other deals over the past decade as foreign investors increasingly acquired pieces of the world’s telecommunications infrastructure.
The publicly available agreements offer a window into efforts by U.S. officials to safeguard their ability to conduct surveillance through the fiber-optic networks that carry a huge majority of the world’s voice and Internet traffic.
The agreements, whose main purpose is to secure the U.S. telecommunications networks against foreign spying and other actions that could harm national security, do not authorize surveillance. But they ensure that when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely, say people familiar with the deals.
Negotiating leverage has come from a seemingly mundane government power: the authority of the Federal Communications Commission to approve cable licenses. In deals involving a foreign company, say people familiar with the process, the FCC has held up approval for many months while the squadron of lawyers dubbed Team Telecom developed security agreements that went beyond what’s required by the laws governing electronic eavesdropping.
The security agreement for Global Crossing, whose fiber-optic network connected 27 nations and four continents, required the company to have a “Network Operations Center” on U.S. soil that could be visited by government officials with 30 minutes of warning. Surveillance requests, meanwhile, had to be handled by U.S. citizens screened by the government and sworn to secrecy — in many cases prohibiting information from being shared even with the company’s executives and directors.
“Our telecommunications companies have no real independence in standing up to the requests of government or in revealing data,” said Susan Crawford, a Yeshiva University law professor and former Obama White House official. “This is yet another example where that’s the case.”
The full extent of the National Security Agency’s access to fiber-optic cables remains classified. The Office of the Director of National Intelligence issued a statement saying that legally authorized data collection “has been one of our most important tools for the protection of the nation’s — and our allies’ — security. Our use of these authorities has been properly classified to maximize the potential for effective collection against foreign terrorists and other adversaries.”
It added, “As always, the Intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens.”
Collecting information
Documents obtained by The Washington Post and Britain’s Guardian newspaper in recent weeks make clear how the revolution in information technology sparked a revolution in surveillance, allowing the U.S. government and its allies to monitor potential threats with a reach impossible only a few years earlier.
Yet any access to fiber-optic cables allows for possible privacy intrusions into Americans’ personal communications, civil libertarians say.
As people worldwide chat, browse and post images through online services, much of the information flows within the technological reach of U.S. surveillance. Though laws, procedural rules and internal policies limit how that information can be collected and used, the data from billions of devices worldwide flow through Internet choke points that the United States and its allies are capable of monitoring.
This broad-based surveillance of fiber-optic networks runs parallel to the NSA’s PRISM program, which allows analysts to access data from nine major Internet companies, including Google, Facebook, Microsoft, Yahoo, AOL and Apple, according to classified NSA PowerPoint slides. (The companies have said the collection is legal and limited.)
One NSA slide titled, “Two Types of Collection,” shows both PRISM and a separate effort labeled “Upstream” and lists four code names: Fairview, Stormbrew, Blarney and Oakstar. A diagram superimposed on a crude map of undersea cable networks describes the Upstream program as collecting “communications on fiber cables and infrastructure as data flows past.”
The slide has yellow arrows pointing to both Upstream and PRISM and says, “You Should Use Both.” It also has a header saying “FAA 702 Operations,” a reference to a section of the amended Foreign Intelligence Surveillance Act that governs surveillance of foreign targets related to suspected terrorism and other foreign intelligence.
Under that provision, the government may serve a court order on a company compelling it to reach into its networks for data on multiple targets who are foreigners reasonably believed to be overseas. At an Internet gateway, the government may specify a number of e-mail addresses of foreigners to be targeted without the court signing off on each one.
When the NSA is collecting the communications of a foreign, overseas target who is speaking or e-mailing with an American, that American’s e-mail or phone call is considered to be “incidentally” collected. It is considered “inadvertently” collected if the target actually turns out to be an American, according to program rules and people familiar with them. The extent of incidental and inadvertent collection has not been disclosed, leading some lawmakers to demand disclosure of estimates of how many Americans’ communications have been gathered. No senior intelligence officials have answered that question publicly.
Using software that scans traffic and “sniffs out” the targeted e-mail address, the company can pull out e-mail traffic automatically to turn over to the government, according to several former government officials and industry experts.
It is unclear how effective that approach is compared with collecting from a “downstream” tech company such as Google or Facebook, but the existence of separate programs collecting data from both technology companies and telecommunications systems underscores the reach of government intelligence agencies.
“People need to realize that there are many ways for the government to get vast amounts of e-mail,” said Chris Soghoian, a technology expert with the American Civil Liberties Union.
Controlling the data flow
The drive for new intelligence sources after the Sept. 11, 2001, attacks relied on a key insight: American companies controlled most of the Internet’s essential pipes, giving ample opportunities to tap the torrents of data flowing by. Even terrorists bent on destruction of the United States, it turned out, talked to each other on Web-based programs such as Microsoft’s Hotmail.
Yet even data not handled by U.S.-based companies generally flowed across parts of the American telecommunications infrastructure. Most important were the fiber-optic cables that largely have replaced the copper telephone wires and the satellite and microwave transmissions that, in an earlier era, were the most important targets for government surveillance.
Fiber-optic cables, many of which lie along the ocean floor, provide higher-quality transmission and greater capacity than earlier technology, with the latest able to carry thousands of gigabits per second.
The world’s hundreds of undersea cables now carry 99 percent of all intercontinental data, a category that includes most international phone calls, as well, says TeleGeography, a global research firm.
The fiber-optic networks have become a rich source of data for intelligence agencies. The Guardian newspaper reported last month that the Government Communications Headquarters, the British equivalent of the NSA, taps and stores data flowing through the fiber-optic cables touching that nation, a major transit point for data between Europe and the Americas. That program, code-named Tempora, shares data with the NSA, the newspaper said.
Tapping undersea transmission cables had been a key U.S. surveillance tactic for decades, dating back to the era when copper lines carrying sensitive telephone communications could be accessed by listening devices divers could place on the outside of a cable’s housing, said naval historian Norman Polmar, author of “Spy Book: The Encyclopedia of Espionage.”
“The U.S. has had four submarines that have been outfitted for these special missions,” he said.
But the fiber-optic lines — each no thicker than a quarter — were far more difficult to tap successfully than earlier generations of undersea technology, and interception operations ran the risk of alerting cable operators that their network had been breached.
It’s much easier to collect information from any of dozens of cable landing stations around the world — where data transmissions are sorted into separate streams — or in some cases from network operations centers that oversee the entire system, say those familiar with the technology who spoke on the condition of anonymity to discuss sensitive intelligence matters.
Expanding powers
In the aftermath of the Sept. 11 attacks, the NSA said its collection of communications inside the United States was constrained by statute, according to a draft report by the agency’s inspector general in 2009, which was obtained by The Post and the Guardian. The NSA had legal authority to conduct electronic surveillance on foreigners overseas, but the agency was barred from collecting such information on cables as it flowed into and through the United States without individual warrants for each target.
“By 2001, Internet communications were used worldwide, underseas cables carried huge volumes of communications, and a large amount of the world’s communications passed through the United States,” the report said. “Because of language used in the [Foreign Intelligence Surveillance] Act in 1978, NSA was required to obtain court orders to target e-mail accounts used by non-U.S. persons outside the United States if it intended to intercept the communications at a webmail service within the United States. Large numbers of terrorists were using such accounts in 2001.”
As a result, after White House and CIA officials consulted with the NSA director, President George W. Bush, through a presidential order, expanded the NSA’s legal authority to collect communications inside the United States. The President’s Surveillance Program, the report said, “significantly increased [NSA’s] access to transiting foreign communications.”
Gen. Michael Hayden, then the NSA director, described that information as “the real gold of the program” that led to the identification of threats within the United States, according to the inspector general’s report.
Elements of the President’s Surveillance Program became public in 2005, when the New York Times reported the government’s ability to intercept e-mail and phone call content inside the United States without court warrants, sparking controversy. The FISA court began oversight of those program elements in 2007.
As these debates were playing out within the government, Team Telecom was making certain that surveillance capacity was not undermined by rising foreign ownership of the fiber-optic cables that the NSA was using.
The Global Crossing deal created particular concerns. The company had laid an extensive network of undersea cables in the world, but it went bankrupt in 2002 after struggling to handle more than $12 billion in debt.
Two companies, one from Singapore and a second from Hong Kong, struck a deal to buy a majority stake in Global Crossing, but U.S. government lawyers immediately objected as part of routine review of foreign investment into critical U.S. infrastructure.
President Gerald Ford in 1975 had created an interagency group — the Committee on Foreign Investment in the United States, or CFIUS — to review deals that might harm U.S. national security. Team Telecom grew out of that review process. Those executive branch powers were expanded several times over the decades and became even more urgent after the Sept. 11 attacks, when the Defense Department became an important player in discussions with telecommunications companies.
The Hong Kong company soon withdrew from the Global Crossing deal, under pressure from Team Telecom, which was worried that the Chinese government might gain access to U.S. surveillance requests and infrastructure, according to people familiar with the negotiations.
Singapore Technologies Telemedia eventually agreed to a slate of concessions, including allowing half of the board of directors of a new subsidiary managing the undersea cable network to consist of American citizens with security clearances. They would oversee a head of network operations, a head of global security, a general counsel and a human resources officer — all of whom also would be U.S. citizens with security clearances. The FBI and the departments of Defense, Justice and Homeland Security had the power to object to any appointments to those jobs or to the directors who had to be U.S. citizens.
U.S. law already required that telecommunications companies doing business in the United States comply with surveillance requests, both domestic and international. But the security agreement established the systems to ensure that compliance and to make sure foreign governments would not gain visibility into the working of American telecommunications systems — or surveillance systems, said Andrew D. Lipman, a telecommunications lawyer who has represented Global Crossing and other firms in negotiating such deals.
“These Network Security Agreements flesh out the details,” he said.
Lipman, a partner with Bingham McCutchen, based in Washington, said the talks with Team Telecom typically involve little give and take. “It’s like negotiating with the Motor Vehicle Department,” he said.
Singapore Technologies Telemedia sold Global Crossing in 2011 to Level 3 Communications, a company based in Colorado. But the Singaporean company maintained a minority ownership stake, helping trigger a new round of review by Team Telecom and a new Network Security Agreement that added several new conditions.
A spokesman for Level 3 Communications declined to comment for this article.
By Craig Timberg and Ellen Nakashima, Published: July 7, 2013
Find this story at 7 July 2013
© 1996-2014 The Washington Post
Microsoft handed the NSA access to encrypted messages (2013)19 mei 2014
• Secret files show scale of Silicon Valley co-operation on Prism
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply
Microsoft has collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption, according to top-secret documents obtained by the Guardian.
The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.
The documents show that:
• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;
• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;
• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;
• Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;
• In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;
• Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a “team sport”.
The latest NSA revelations further expose the tensions between Silicon Valley and the Obama administration. All the major tech firms are lobbying the government to allow them to disclose more fully the extent and nature of their co-operation with the NSA to meet their customers’ privacy concerns. Privately, tech executives are at pains to distance themselves from claims of collaboration and teamwork given by the NSA documents, and insist the process is driven by legal compulsion.
In a statement, Microsoft said: “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” The company reiterated its argument that it provides customer data “only in response to government demands and we only ever comply with orders for requests about specific accounts or identifiers”.
In June, the Guardian revealed that the NSA claimed to have “direct access” through the Prism program to the systems of many major internet companies, including Microsoft, Skype, Apple, Google, Facebook and Yahoo.
Blanket orders from the secret surveillance court allow these communications to be collected without an individual warrant if the NSA operative has a 51% belief that the target is not a US citizen and is not on US soil at the time. Targeting US citizens does require an individual warrant, but the NSA is able to collect Americans’ communications without a warrant if the target is a foreign national located overseas.
Since Prism’s existence became public, Microsoft and the other companies listed on the NSA documents as providers have denied all knowledge of the program and insisted that the intelligence agencies do not have back doors into their systems.
Microsoft’s latest marketing campaign, launched in April, emphasizes its commitment to privacy with the slogan: “Your privacy is our priority.”
Similarly, Skype’s privacy policy states: “Skype is committed to respecting your privacy and the confidentiality of your personal data, traffic data and communications content.”
But internal NSA newsletters, marked top secret, suggest the co-operation between the intelligence community and the companies is deep and ongoing.
The latest documents come from the NSA’s Special Source Operations (SSO) division, described by Snowden as the “crown jewel” of the agency. It is responsible for all programs aimed at US communications systems through corporate partnerships such as Prism.
The files show that the NSA became concerned about the interception of encrypted chats on Microsoft’s Outlook.com portal from the moment the company began testing the service in July last year.
Within five months, the documents explain, Microsoft and the FBI had come up with a solution that allowed the NSA to circumvent encryption on Outlook.com chats
A newsletter entry dated 26 December 2012 states: “MS [Microsoft], working with the FBI, developed a surveillance capability to deal” with the issue. “These solutions were successfully tested and went live 12 Dec 2012.”
Two months later, in February this year, Microsoft officially launched the Outlook.com portal.
Another newsletter entry stated that NSA already had pre-encryption access to Outlook email. “For Prism collection against Hotmail, Live, and Outlook.com emails will be unaffected because Prism collects this data prior to encryption.”
Microsoft’s co-operation was not limited to Outlook.com. An entry dated 8 April 2013 describes how the company worked “for many months” with the FBI – which acts as the liaison between the intelligence agencies and Silicon Valley on Prism – to allow Prism access without separate authorization to its cloud storage service SkyDrive.
The document describes how this access “means that analysts will no longer have to make a special request to SSO for this – a process step that many analysts may not have known about”.
The NSA explained that “this new capability will result in a much more complete and timely collection response”. It continued: “This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established.”
A separate entry identified another area for collaboration. “The FBI Data Intercept Technology Unit (DITU) team is working with Microsoft to understand an additional feature in Outlook.com which allows users to create email aliases, which may affect our tasking processes.”
The NSA has devoted substantial efforts in the last two years to work with Microsoft to ensure increased access to Skype, which has an estimated 663 million global users.
One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.
Eight months before being bought by Microsoft, Skype joined the Prism program in February 2011.
According to the NSA documents, work had begun on smoothly integrating Skype into Prism in November 2010, but it was not until 4 February 2011 that the company was served with a directive to comply signed by the attorney general.
The NSA was able to start tasking Skype communications the following day, and collection began on 6 February. “Feedback indicated that a collected Skype call was very clear and the metadata looked complete,” the document stated, praising the co-operation between NSA teams and the FBI. “Collaborative teamwork was the key to the successful addition of another provider to the Prism system.”
ACLU technology expert Chris Soghoian said the revelations would surprise many Skype users. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.”
The information the NSA collects from Prism is routinely shared with both the FBI and CIA. A 3 August 2012 newsletter describes how the NSA has recently expanded sharing with the other two agencies.
The NSA, the entry reveals, has even automated the sharing of aspects of Prism, using software that “enables our partners to see which selectors [search terms] the National Security Agency has tasked to Prism”.
The document continues: “The FBI and CIA then can request a copy of Prism collection of any selector…” As a result, the author notes: “these two activities underscore the point that Prism is a team sport!”
In its statement to the Guardian, Microsoft said:
We have clear principles which guide the response across our entire company to government demands for customer information for both law enforcement and national security issues. First, we take our commitments to our customers and to compliance with applicable law very seriously, so we provide customer data only in response to legal processes.
Second, our compliance team examines all demands very closely, and we reject them if we believe they aren’t valid. Third, we only ever comply with orders about specific accounts or identifiers, and we would not respond to the kind of blanket orders discussed in the press over the past few weeks, as the volumes documented in our most recent disclosure clearly illustrate.
Finally when we upgrade or update products legal obligations may in some circumstances require that we maintain the ability to provide information in response to a law enforcement or national security request. There are aspects of this debate that we wish we were able to discuss more freely. That’s why we’ve argued for additional transparency that would help everyone understand and debate these important issues.
In a joint statement, Shawn Turner, spokesman for the director of National Intelligence, and Judith Emmel, spokeswoman for the NSA, said:
The articles describe court-ordered surveillance – and a US company’s efforts to comply with these legally mandated requirements. The US operates its programs under a strict oversight regime, with careful monitoring by the courts, Congress and the Director of National Intelligence. Not all countries have equivalent oversight requirements to protect civil liberties and privacy.
They added: “In practice, US companies put energy, focus and commitment into consistently protecting the privacy of their customers around the world, while meeting their obligations under the laws of the US and other countries in which they operate.”
• This article was amended on 11 July 2013 to reflect information from Microsoft that it did not make any changes to Skype to allow Prism collection on or around July 2012.
Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe
The Guardian, Friday 12 July 2013
Find this story at 12 July 2013
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Microsoft soll seit Jahren mit US-Ermittlern kooperieren (2013)19 mei 2014
Microsoft arbeitet angeblich intensiv mit US-Geheimdiensten zusammen. Nach Informationen, die Edward Snowden dem “Guardian” zugespielt hat, soll der Konzern den Ermittlern Zugang zu E-Mails und Skype-Gesprächen gewährt und sogar die firmeneigene Verschlüsselung ausgehebelt haben.
Hamburg/London – Edward Snowden hat mit seinen Enthüllungen über die globale Datenschnüffelei der US-Geheimdienste nicht nur die amerikanische Politik in helle Aufregung versetzt, sondern auch die dortige IT-Branche. Giganten wie Facebook, Apple, Google und Microsoft haben bisher versucht, den Eindruck zu erwecken, ihre Zusammenarbeit mit den US-Behörden beschränke sich auf das Nötigste.
Jetzt aber berichtet der britische “Guardian”, wie Microsoft mit den Ermittlern kooperiert. Demnach zeigen Informationen von Snowden, dass das Unternehmen seit drei Jahren intensiv mit US-Geheimdiensten zusammenarbeitet.
Die National Security Agency (NSA) habe etwa die Sorge geäußert, Web-Chats auf dem neuen Outlook.com-Portal nicht mitlesen zu können. Microsoft habe daraufhin der NSA geholfen, die konzerneigene Verschlüsselungstechnik zu umgehen. Dieses Vorgehen soll sich dem Bericht zufolge nicht auf die Web-Chats beschränkt haben: Die NSA soll auch Zugang zu E-Mails auf Outlook.com und Hotmail trotz der Verschlüsselung gehabt haben.
Auch der Internettelefoniedienst Skype, den Microsoft im Oktober 2011 gekauft hat, geriet ins Visier der NSA: Laut “Guardian” hat die Firma Geheimdiensten ermöglicht, im Rahmen des “Prism”-Überwachungsprogramms sowohl Video- als auch Audio-Unterhaltungen mitzuschneiden.
Microsoft begründete sein Vorgehen mit rechtlichen Zwängen: “Wenn wir Produkte verbessern, müssen wir uns weiterhin Anfragen beugen, die mit dem Gesetz in Einklang sind.” Das Unternehmen betonte, dass es Kundendaten nur auf Anfrage der Regierung herausgebe – und auch das nur, wenn es um spezifische Konten oder Nutzer gehe.
Spannungen zwischen Silicon Valley und Obama-Regierung
Aus den Unterlagen geht laut “Guardian” hervor, dass das durch “Prism” gesammelte Material routinemäßig an das FBI und den US-Auslandsgeheimdienst CIA geht. In einem NSA-Dokument sei von einem “Mannschaftssport” die Rede.
Die neuen Informationen zeigen nach Angaben des “Guardian” auch, dass es Spannungen zwischen dem Silicon Valley, Standort zahlreicher Computerunternehmen, und der Regierung von US-Präsident Barack Obama gibt. Alle großen Technologiefirmen drängten die US-Regierung, ihnen zu erlauben, das Ausmaß der Zusammenarbeit mit den Behörden öffentlich zu machen, um den Datenschutzbedenken ihrer Kunden gerecht zu werden.
11. Juli 2013, 23:34 Uhr
Find this story at 11 July 2013
© SPIEGEL ONLINE 2013
Top-secret MI5 files released online to mark first world war centenary19 mei 2014
Spies such as Mata Hari, heroic nurse Edith Cavell, suffragette Sylvia Pankhurst and the Boy Scouts feature in documents
Exotic spies, heroes, and known and suspected communists feature in top-secret MI5 files available online for the first time on Thursday to mark the 100th anniversary of the first world war.
Mata Hari, Edith Cavell, Sir Roger Casement, Arthur Ransome, Sidney Reilly, a leading suffragette and the Boy Scouts were among those MI5 kept under surveillance in its early years as Britain’s Security Service.
Mata Hari, one of history’s most celebrated honey-trap spies, first came to MI5’s attention in December 1915 when she arrived at Folkestone on the Dieppe boat train. She admitted her destination was The Hague to be near her lover Baron Van der Capellen, a colonel in the Dutch Hussars.
The following year, MI5’s informant in The Hague, codenamed “T”, reported: “Mata Hari is a demi-mondaine who is in relation with highly placed people and during her sojourn in France she made the acquaintance of many French and Belgian officers. She is suspected of having been to France on an important mission for the Germans.”
In November 1916, questioned by MI5, Mata Hari claimed that a French consul in Spain had subsequently asked her to go to Austria to spy on that country’s forces.
A renowned dancer, Mata Hari was a Dutch divorcee born Marguerite Gertrude Zelle in the Dutch East Indies. A French intelligence report dated 22 May 1917, shown to a MI5 officer in Paris, noted: “Mata Hari today confessed that she has been engaged by Consul Cremer of Amsterdam for the German Secret Service. She was paid 20,000 francs in advance.”
She was shot by a French firing squad in 1917.
Edith Cavell, a British nurse at a Red Cross hospital in Belgium, was executed by a German firing squad in October 1915 for helping 200 allied soldiers to escape. The files in the National Archives show that British diplomats clung to the hope that Germany would not execute a woman who was regarded as a heroine.
An MI5 agent in Liège said he had been told by a reliable source that “the two spies who denounced Nurse Cavell have both been killed, one by a bullet in the head, the other by a dagger thrust in the chest”.
Sir Roger Casement, a British consul in Africa and South America knighted for his work in exposing the exploitation and slaughter of Africans and South American Indians, and Sidney Reilly, a naturalised Russian Jew dubbed the Ace of Spies, are other victims of espionage who feature among the 150 MI5 files.
Casement was arrested on a beach in Co Kerry, three days before the 1916 Easter rising, after landing in a boat that had picked him up from a German submarine. A trawler accompanying the submarine and carrying 20,000 guns was scuttled after being intercepted.
The MI5 documents show Casement knew the Easter rising was doomed to failure after Germany reneged on its promises to send troops to help the rebels. The UK government used his “black diaries” to smear him and sabotage a campaign to save his life.
“I have done nothing dishonourable, as you will one day learn,” he told Frank Hall, a senior MI5 officer. Casement was hanged in Pentonville prison on 3 August 1916.
Reilly was recruited to work for the British secret intelligence service, MI6. When he died in 1925 the Russians claimed a guard had shot him as he crossed the border with Finland. MI5 documents suggest he was executed by Bolsheviks in 1925.
Reilly had many wives, according to MI5. A Special Branch informer reported that his second wife, actress Pepita Bobadilla, went to the Russian embassy in Paris following his death. As she applied for a visa, she told the Russians her husband had been “spying for the British government”.
Arthur Ransome, author of Swallows and Amazons, caught MI5’s attention as correspondent for the Manchester Guardian in Moscow who married Trotsky’s secretary, Evgenia Petrovna Shelepina.
British officials told MI5 that Ransome was “exceedingly clever and interesting fellow – but an out and out Bolshevist”. The British consul and MI6 officer in Moscow, Robert Bruce Lockhart, soon corrected them. Ransome, who was given the codename S76, was a valuable intelligence asset during the chaos of the Russian revolution, he said.
The files include one on the suffragette Sylvia Pankhurst, one of MI5’s later targets. MI5 noted that in 1940 she wrote to Viscount Swinton, chairman of a committee investigating Fifth Columnists, sending him a list of active Fascists still at large and of anti-Fascists who had been interned. A copy of the letter includes a note by Swinton, saying: “I should think a most doubtful source of information.”
The files also show how MI5 was concerned that the Boy Scouts were being infiltrated by Communists after the first world war.
The files can be accessed at the National Archives link – First World War 100.
Richard Norton-Taylor
The Guardian, Wednesday 9 April 2014 22.43 BST
Find this story at 9 April 2014
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Condemned spy Mata Hari glib during final interrogation: MI5 files (2014)19 mei 2014
World War I spy Mata Hari refused to fully confess to espionage before facing French firing squad in 1917.
Mata Hari was a wildly-popular Dutch exotic dancer, who was executed as a German spy in 1917.
The spy known as “Mata Hari” was glib in her final prison interrogation before her life ended in front of a French firing squad in the First World War, according to formerly top secret files from the British intelligence agency MI5.
Mata Hari, once a wildly popular Dutch exotic dancer, didn’t appear fazed when an interrogator confronted her with a long list of her lovers, an MI5 report released earlier this month states.
“When faced with her acquaintances with officers of all ranks and all nations, she replied that she loved all officers, and would rather have as her lover a poor officer than a rich banker,” the MI5 files note.
Walking the Western Front:
• Where John McCrae wrote ‘In Flanders Fields’
• The ‘Trench of Death’
Her lovers included a wide range of ages and nationalities, including Germans, French, Russians, Swiss and Spaniards, the files state.
At the time of her execution on Oct. 15, 1917, in a muddy field outside Paris, she was accused of feeding Germany information that cost some 50,000 Allied troops their lives.
But two academics who have studied her case say they don’t believe she provided Germany with any useful information for its war effort.
“She really did not pass on anything that you couldn’t find in the local newspapers in Spain,” said Julie Wheelwright of City University in London, the author of The Fatal Lover: Mata Hari and the Myth of Women in Espionage.
Mata Hari was the stage name for Gertruda Margaretha Zelle, who was born July 8, 1876, in the Dutch East Indies to a Dutch father and a Javanese mother. Wheelwright said she became an exotic dancer after fleeing an abusive marriage.
Wheelwright described her as “an independent woman, a divorcee, a citizen of a neutral country, a courtesan and a dancer, which made her a perfect scapegoat for the French, who were then losing the war.”
“She was kind of held up as an example of what might happen if your morals were too loose,” Wheelwright said.
Wesley Wark, a security, intelligence and terrorism expert at the University of Ottawa, said Mata Hari provided France with a scapegoat when the country wrestled with emerging power for women and fears of losing the war.
“They needed a scapegoat and she was a notable target for scapegoating,” Wark said.
In the MI5 files, an intelligence officer sounds impressed with her attitude during her final days.
“She never made a full confession nor can I find … that she ever gave away anyone as her (accomplice),” the report states.
“She was a ‘femme forte’ and she worked alone,” the report concludes.
The newly released files show Mata Hari was trailed by Allied surveillance officers across France, Spain and England.
The officers noted that on Aug. 4, 1916, she wrote to a Don Diego de Leon and then met a Capt. Vladimir de Masloff, of the Russian army, stationed in France.
“He was very intimate with her from this date and constant letters pass between, he was her favourite lover,” the MI5 files state.
“Same day she met PROFESSOR MARIANI Captain Italian Army.”
While in custody in the ancient Prison de Saint-Lazare outside Paris, she admitted to having spied for the Germans, the MI5 files state.
A file dated May 22, 1917 states: “Matahari today confessed that she has been engaged in Consul CREMER of Amsterdam for the German Secret Service. She was paid 20,000 (francs) in advance and her number was H.21.”
That file also notes her German spymasters gave her vials of invisible ink.
Much of her prison interrogation statement concerns mundane thoughts, not troop movements.
Her MI5 file includes the note: “She had discussed the life led by people in Paris, as regards supply of food etc., had said that the English officers in Paris treated their French Allies badly, although the French went out of their way to treat them ‘like Kings’; that the French nation might live to regret that they had ever allowed the English into the country … .”
Even if she wanted to divulge information, there wasn’t much she could say, Wark said. “Politics wasn’t really part of her world.”
Accounts of her execution say she waved off the offer of a blindfold or the last sacrament. She was reportedly blowing a kiss — at her lawyer, a nun or the firing squad, depending on who’s telling the story — the instant her life ended.
Wheelwright thinks this was likely bravado on the dancer’s part.
“This was going to be her last performance and she was going to go out in style,” she said. “She was playing to the crowd, which is what she always did.”
By: Peter Edwards Star Reporter, Published on Thu Apr 24 2014
Find this story at 24 April 2014
© Copyright Toronto Star Newspapers Ltd. 1996-2014
MI5 watched Mata Hari (1999)19 mei 2014
Mata Hari: beautiful exotic dancer turned espionage agent
Mata Hari, the glamorous World War I spy shot by the French in 1917, was watched by MI5 for two years, according to the newly released secret government papers.
The former wife of a Dutch army colonel, she was recruited by German intelligence while performing as a stripper in Berlin.
Special Report: Wartime Spies The sultry spy, who was notorious in prewar Paris for her exotic dancing and libidinous lifestyle, was interrogated twice by the British secret service but they could not force her to reveal her activities.
She later confessed all to French authorities and was executed. Her MI5 files note however that there was never any evidence that she passed on anything of military importance.
‘Unfavourable impression’
Mata Hari was born Margaretha Geertruida Zelle in Leeuwarden, The Netherlands.
She first attracted the suspicion of British officials in December 1915 and was arrested at the southern English port of Folkestone attempting to board a boat for France.
Under interrogation, she admitted she was heading for The Hague to live near her lover, a Dutch colonel. But MI5 could not pin anything further on her.
Her interrogator, Captain S S Dillon, noted at the time: “Although she had good answers to every question, she impressed me very unfavourably, but after having her very carefully searched and finding nothing, I considered I hadn’t enough grounds to refuse her embarkation.”
The report also noted that she was “handsome, bold … well and fashionably dressed” in a costume with “raccoon fur trimming and hat to match”.
Suspect
Mata Hari
MI5 decided to keep tabs
MI5 continued to monitored her after she settled in The Hague, and soon an informant revealed she was being paid by the German Embassy.
A February 1916 intelligence report noted that she was “in relation with highly placed people and during her sojourn in France she made the acquaintance of many French and Belgian officers”.
“She is suspected of having been to France on important mission for the Germans,” the report said. The report concluded that the matter was being followed up.
Wrongly suspected
In November 1916, British authorities removed Mata Hari from a steamer at the port of Falmouth en route from Spain to Holland, believing she was another German spy, Clara Benedix.
She was taken, along with her 10 travelling trunks, to be interviewed by MI5 and the police. She told them she had been recruited by a Belgian officer, to work for his country’s intelligence service.
She also alleged that the French consul in Vigo, Spain, had asked her to spy on Russian forces in Austria.
Death by firing squad
Once again there was insufficient evidence to detain her and she was sent back to Spain.
The following year she was arrested by the French authorities, court martialled and sentenced to death by firing squad.
A French intelligence report shown to MI5 noted: “Mata Hari today confessed that she has been engaged by Consul Cremer of Amsterdam for the German Secret Service.”
She admitted sending “general information of every kind procurable,” but mentioned no military secrets, it said.
Tuesday, 26 January, 1999, 23:22 GMT
Find this story at 26 January 1999
© BBC
Former FBI Agent: NYPD’s Muslim-Spying Demographics Unit Was Almost Completely Useless (2014)14 mei 2014
from the holds-several-‘most-rights-violated’-trophies,-however dept
Certain demographics are desirable. 18-34? Taste-makers and early adopters. 35-49? Money. Muslim and New York City resident? Being a member of this group meant (until recently) having First Amendment-protected activities being closely scrutinized by the NYPD’s now-defunct “Demographics Unit.”
This special unit was recently disbanded, roughly a decade after it should have been, thanks to a new mayor and a new police commissioner. The unit was put together by a former CIA officer who used the post-9/11 attack climate to push for expansive surveillance of the city’s Muslim population, including designating entire mosques as terrorist-related entities. Despite all the extra attention being paid to Muslims, not a single useful investigation resulted from this unit’s work.
The surveillance being done by this unit so pervasively subverted civil liberties protections that not even the CIA could access the NYPD’s files without breaking its internal rules. The same goes for the FBI, which has long partnered with the NYPD in its counter-terrorism efforts. Don Borelli, a former FBI agent, has written a piece for the New York Daily News, detailing why police commissioner Bill Bratton was right to disband the Demographics Unit.
Together, we were able to stop many threats — and save many lives — including a serious plot against the subways from Najibullah Zazi, an ethnic Afghan who grew up in Queens and went on to become an Al Qaeda operative.
Interestingly enough, the NYPD demographics unit had detailed files on Zazi’s neighborhood in Flushing during the period in which he was becoming radicalized. It kept files on businesses and visited coffee shops believed to be hangouts for potential terrorists. The unit even visited the travel agency where Zazi bought his ticket to travel to Afghanistan for terrorism training.
So why wasn’t Zazi identified until he was driving to New York from Denver to blow up the subway? Because the program was ineffective. The mission of the demographics unit was to spot the terrorists in the haystack, but again and again it failed to do so.
All haystack, no needle, like so many other surveillance programs. The unit overwhelmed itself in useless data, keeping it from finding what it needed when it mattered most. These data swamps built by investigative agencies have proven to be more dangerous than old-fashioned police work.
During my time with the Joint Terrorism Task Force, I read many reports derived from investigations conducted by the NYPD Intelligence Division, which may well have relied on the demographics unit’s work. I was presented with many interesting facts about where people were attending Friday prayers and who belonged to various Muslim student associations.
But rarely did I learn anything I didn’t already know through traditional investigations, much less anything that would have led me to open a terrorism investigation.
Adding to the mess here is the NYPD’s twisted relationship with the FBI. While it clearly enjoys access to G-men and their tools, former police chief Ray Kelly often made it clear that his officers did superior work and that the FBI’s production of information was too slow to be useful. Of course, FBI agents have said the same thing about the NYPD, particularly in the information department, where the sharing was usually a one-way street that flowed out of the FBI and into the NYPD’s hands.
Beyond the antagonistic relationship is the Demographic Unit itself — its own worst enemy. The former CIA officer who had a local judge rewrite guidelines to give the NYPD unprecedented permission for pervasive surveillance also managed to ensure that most info flowing back upstream to the FBI ended up being routed directly into the trash can.
Moreover, I wound up shredding some of these reports because they had no investigative value and, in my opinion, did not belong in any FBI file because they solely reported on what was First Amendment-protected activity.
Much like other failures to stop terrorist activity, the problems here were communication (too little) and information (too much). As Borelli notes, in his experience, it’s been more useful to build trust than to endlessly spy, something the NYPD really hasn’t made much effort to foster over the years. But its failure to do so means it has buried itself in data and alienated those who could bring an inside perspective. A decade’s worth of spying resulted in nothing but violated rights.
by Tim Cushing
Mon, Apr 28th 2014 4:05pm
Find this story at 28 April 2014
FBI informants may be revealed after agency loses court battle (2014)14 mei 2014
• Photographer arrested after 2008 protest wins ruling
• FBI sought to protect ‘confidential sources’
The FBI has lost a legal battle to prevent the disclosure of documents that could reveal the identity of two of its covert informants.
In highly unusual case Laura Sennett, a freelance photojournalist, has won a ruling from a district court that compels the FBI to provide her with documents that shed light on informants use by agents used in their investigation into a protest which resulted in damage to a hotel lobby in Washington.
The FBI launched its joint terrorism task force investigation days after anarchists protested a World Bank and International Monetary Fund meeting in the capital in April 2008.
Protesters stormed into the lobby of the Four Seasons Hotel around 2.30am, chanting slogans and throwing paint-filled balloons. Most of the criminal damage, including a broken window, was minor, although the hotel said a statue worth more than $200,000 was damaged.
Sennett had been tipped off about the protest and attended to take photographs. She believed the protesters planned to wake up the IMF delegates by making a commotion, and maintains she had no prior knowledge of their criminal intent. She did not enter the hotel lobby – choosing to photograph events from outside.
Both of the “confidential sources” cited in the court case were asked by the FBI to review surveillance footage of the protest, in order to help identify who was there. They identified a handful of activists as well as Sennett, who specialises in reporting grass-roots activism.
The FBI placed the photojournalist under surveillance before raiding her home with two-dozen armed law enforcement officials, who seized memory cards, hard drives and computer and camera equipment.
In an effort to find out more about why she was targeted, Sennett, 51, has been running a legal campaign to obtain information the bureau holds about her, using Freedom of Information Act (FOIA) requests.
She had so far been given more than 1,000 pages of FBI documents, which the Guardian has seen, but the bureau withheld key portions, claiming they fell under an exemption intended to protect the identity of “confidential sources”. That decision has been challenged in court by Sennett’s lawyers.
On Wednesday, district judge James E Boasberg sided with Sennett, ordering the FBI to release the contested documents, which all parties accept “could reasonably be expected to disclose the identity of a confidential source”.
The judge said that despite three attempts, the FBI had failed to convince him the sources would have inferred confidentiality from their interactions with agents.
Dan Metcalfe, who directed the Justice Department’s Office of Information and Privacy for more than 25 years before retiring in 2007, and has represented the FBI in dozens of similar cases, said it was “extremely rare” for the bureau to be forced to reveal the identity of a source.
“I can think of just a handful of cases at most in which the FBI has had to disclose potentially identifying information about a confidential source over the past 40 years,” he said.
The case, he said, was a significant blow for the FBI, which is very strongly opposed to revealing the identity of its sources, not least because doing so could discourage future informants from co-operating.
Metcalfe, now a law professor at the American University, said the solicitor general was highly unlikely to launch an appeal.
“I’ve read thousands and thousands of FOIA opinions,” he said. “I would put this in the top percentile for being analytically sound and written exceptionally well. Based upon the facts that one gleans from reading the opinion, this is an entirely correct outcome. I see little or no prospect for reversal on appeal.”
Mike German, a former FBI agent now with the Brennan Center for Justice at New York University, said he believed the two informants in the case, one of whom is said to have attended anti-capitalist meetings, could be private investigators.
“That is something that, having seen the documents, the judge may be less keen on keeping secret,” he said.
German said the fact an act of vandalism against the Four Seasons was even investigated by the FBI’s counter-terrorism teams followed a pattern of investigations into protest movements that are “more about suppressing dissent than investigating serious or violent crime”.
Detective Vincent Antignano, the federal marshall deputised to run the FBI’s investigation into the protest, said in a deposition conducted by Sennett’s legal team he believed Sennett was “like-minded like anarchists”, because she was among the 16 people captured on the hotel’s surveillance video.
“Everyone on that video is a suspect, so that’s the way I look at it,” he said, adding that he assumed she had similar views to the protesters captured in the video “who despise their government”.
Asked to elaborate, Antignano said that while he did not know Sennett’s dietary preference, “she could also be a vegan like … [people] who are against animal protests [sic] or animal research or won’t eat meat and stuff like that.”
Antignano had a broad notion of what behaviour constituted “terrorism”, saying that even an assault could fall within the definition.
“If you get assaulted and you believe you’ve been terrorised, then maybe that is terrorism,” he told Sennett’s lawyer.
The deposition was part of a separate case, in which Sennett’s lawyers sued the FBI for damages they said Sennett suffered as part of the raid on her home, which was led by Antignano.
Sennett said the raid was traumatising. Around two-dozen agents “yanked my 19-year-old son out of bed at gunpoint”, she said, before quizzing her about political books on her shelf and asking what “kind of an American” she was.
Sennet said she replied: “I’m a photographer.”
A freelancer whose images have appeared on CNN, MSNBC and the History Channel and in the Toronto Free Press, Sennett is adamant the FBI must have known she was present at the protest in a journalistic capacity. The FBI denied its agents knew of her occupation.
Sennett was never arrested or charged. She believes undercover police or moles within the protest group may have been responsible for giving the FBI details, including a cellphone number, which allowed agents to track her down.
Her lawyer, DC-based Jeffrey Light, argued that her status as a photojournalist should have barred agents from seizing her material, under a clause of the Privacy Protection Act.
However in that case a district court ruled against Sennett – a decision upheld in 2012 by the court of appeal, which found that while Sennett’s occupation provided “an innocent explanation” for her presence at the protest, the FBI, when it launched its inquiry, still had “probable cause” to believe she was part of a conspiracy to commit vandalism.
Wednesday’s court ruling by judge Boasberg, a Barack Obama appointee, was far more sympathetic to Sennett’s case.
Boasberg said the FBI had failed to provide sufficient proof that its informants “inferred that their communications with the bureau would remain confidential”. While acknowledging the FBI’s argument regarding preserving the confidentiality of informants – “one of source protection and empowerment of law-enforcement agencies” – Boasberg added: “That solicitude, however, can only carry the court so far.”
Light said he hoped Wednesday’s victory, which the government has 90 days to appeal, would take the capital’s protest community a step closer to discovering the identity of potential moles in their midst.
“People want to know who is spying on them,” he said.
Sennett said she hoped that by identification of the FBI’s informants in her case would discourage the bureau from conducting similar quasi-terrorist investigation in the future.
“I pursued this case because I don’t think anyone – activists, freelancers, bloggers – should have to go through what I went through.”
The US attorney’s office said it was reviewing the case but declined to offer further comment.
The FBI also declined a request for comment.
Paul Lewis in Washington
theguardian.com, Friday 2 May 2014 18.01 BST
Find this story at 2 May 2014
© 2014 Guardian News and Media Limited or its affiliated companies.
Better This World (2011)14 mei 2014
The timely new documentary Better This World tells a provocative and cautionary story about the shifting fault lines of civil liberties, protest and government vigilance. Two boyhood friends from the heart of Texas, Bradley Crowder and David McKay, find themselves increasingly out of step with their neighbors as they react against the wars in Iraq and Afghanistan. After moving to Austin, they go to a presentation at a local bookstore about protesting the 2008 Republican National Convention (RNC) in Minneapolis-St. Paul. There they are approached by a charismatic older activist, who suggests that they work together to prepare for the demonstrations.
Six months later, on the eve of the convention, the two young friends make eight Molotov cocktails but then decide not to use them. The matter might have ended there — but not everything was as it seemed. The FBI and other law enforcement agencies had been engaged in a two-year, multimillion-dollar counterterrorism effort leading up to the convention. The young men’s mentor, it turns out, was a government informant and had been long before meeting them; Crowder and McKay were arrested and charged with domestic terrorism.
McKay calls home from jail
David McKay calls home for the first time from jail
Credit: Mike Nicholson
Growing up in Midland, Texas, Crowder and McKay had little political education beyond their parents’ encouragement to “stand up for the oppressed” and to “stand up for what you believe in.” Somewhere along the way, partly in late-night walks through the town’s deserted streets, the friends began to form their own interpretation of their parents’ words. It was Crowder who made the first public statement of his political beliefs in 2003 when the United States declared war on Iraq. He drew an upside-down American flag with the words “No War” on a T-shirt and wore it to his high school the next day — a move that, he recounts, “became a pretty dramatic event.”
Seeking “something else,” Crowder and McKay moved to more progressive Austin, where they met Brandon Darby, who had gained prominence as the co-founder of Common Ground, a grassroots relief organization that fed and housed thousands of victims of Hurricane Katrina. Crowder and McKay were flattered when the larger-than-life activist approached them at a bookstore in Austin about organizing together.
Two years prior to the 2008 RNC, Minneapolis-St. Paul was designated a “homeland security site” and the FBI began “preventative” intelligence operations nationwide, including sending informants into many activist circles. As FBI Special Agent Christopher Langert says, “We . . . knew that there were . . . some people [coming] to St. Paul to do more than just demonstrate. . . . They were going to try to block delegates, cause destruction.” So the FBI tasked Darby with infiltrating Austin-based activist groups.
Police pepperspray protesters at the 2008 RNC
Police unleash pepper spray at protesters during the 2008 Republican National Convention.
Credit: Courtesy of Better This World
As several people in the film who knew Darby, Crowder and McKay recount, Darby urged the young men to become more radical — to take more extreme actions. According to Larra Elliott, one of the activists who accompanied the three to the RNC, “Brandon . . . said something that caught my attention, like, ‘Don’t you feel that firebombs and armed militias . . . that kind of . . . action is necessary sometimes?’ And Brad was like, ‘No, I don’t feel that way.’ Brandon would not leave it alone.”
Darby echoes some of this sentiment in letters to his FBI handler about meetings with McKay and Crowder. “I told them that direct action is intense, and we could all expect to have violence used against us. I told them I was ready to deal with that, and if they weren’t, then they shouldn’t work with me.”
On Aug. 28, 2008, Crowder and McKay joined Darby and several other activists Darby had brought together for the long van ride up to the RNC, where they would join thousands of other protestors. Within days Crowder and McKay were under arrest. The “Texas Two” faced multiple domestic terrorism charges, agonizing legal decisions and decades in prison. Darby, until then their mentor, would be the government’s star witness against them.
Better This World reconstructs the story of the relationship between these three men and the subsequent twists and turns of their legal cases through interviews with Crowder, McKay and their family members; FBI agents and attorneys; and a wealth of intriguing surveillance and archival footage — presenting an extraordinarily well-documented account and untangling a web of questions: Why did Darby, a committed activist, become a government informant? What led these young men to build eight homemade bombs? Did Darby and law enforcement save innocent victims from domestic terrorists bent on violence and destruction? Or were Crowder and McKay impressionable disciples set up by overzealous agents and a dangerous provocateur? Or does the answer lie somewhere in between?
Better This World probes these questions and more as it paints a gripping portrait of the strange and intriguing odyssey of these men — poignantly describing not only the problems of power and authority, but also the ultimate power of friendship, forgiveness and love.
Premiere Date: September 6, 2011
Find this story at 6 September 2011
Copyright © 1995–2014 American Documentary, Inc.
How a Radical Leftist Became the FBI’s BFF; To many on the left, Brandon Darby was a hero. To federal agents consumed with busting anarchist terror cells, he was the perfect snitch (2011)14 mei 2014
FOR A FEW DAYS IN SEPTEMBER 2008, as the Republican Party kicked off its national convention in St. Paul, Minnesota, the Twin Cities were a microcosm of a deeply divided nation. The atmosphere around town was tense, with local and federal police facing off against activists who had descended upon the city. Convinced that anarchists were plotting violent acts, they sought to bust the protesters’ hangouts, sometimes bursting into apartments and houses brandishing assault rifles. Inside the cavernous Xcel Energy convention center, meanwhile, an out-of-nowhere vice presidential nominee named Sarah Palin assured tens of thousands of ecstatic Republicans that her running mate, John McCain, was “a leader who’s not looking for a fight, but sure isn’t afraid of one either.”
The same thing might have been said of David McKay and Bradley Crowder, a pair of greenhorn activists from George W. Bush’s Texas hometown who had driven up for the protests. Wide-eyed guys in their early 20s, they’d come of age hanging out in sleepy downtown Midland, commiserating about the Iraq War and the administration’s assault on civil liberties.
FBI Special report
Our Yearlong Investigation Into the Program to Spy on America’s Muslim Communities
How the Bureau Enlists Foreign Regimes to Detain and Interrogate US Citizens
When Did Lefty Darling Brandon Darby Turn Government Informant?
Charts from Our Terror Trial Database
Watch an FBI Surveillance Video
St. Paul was their first large-scale protest, and when they arrived they were taken aback: Rubber bullets, flash-bang grenades, tumbling tear-gas canisters—to McKay and Crowder, it seemed like an all-out war on democracy. They wanted to fight back, even going so far as to mix up a batch of Molotov cocktails. Just before dawn on the day of Palin’s big coming out, a SWAT team working with federal agents raided their crash pad, seized the Molotovs, and arrested McKay, alleging that he intended to torch a parking lot full of police cars.
Advertise on MotherJones.com
Since only a few people knew about the firebombs, fellow activists speculated that someone close to McKay and Crowder must have tipped off the feds. Back in Texas, flyers soon began appearing at coffeehouses urging leftists to beware of Brandon Darby, an “FBI informant rat loose in Austin.”
The allegation came as a shocker; Darby was a known and trusted member of the left-wing protest crowd. “If Brandon was conning me, and many others, it would be the biggest lie of my life since I found out the truth about Santa Claus,” wrote Scott Crow, one of many activists who rushed to defend him at first. Two months later, Darby came clean. “The simple truth,” he wrote on Indymedia.org, “is that I have chosen to work with the Federal Bureau of Investigation.”
Darby’s entanglement with the feds is part of a quiet resurgence of FBI interest in left-wingers. From the Red Scare days of the 1950s into the ’70s, the FBI’s Counter Intelligence Program, a.k.a. COINTELPRO, monitored and sabotaged communist and civil rights organizations. Nowadays, in what critics have dubbed the Green Scare, the bureau is targeting the global-justice movement and radical environmentalists. In 2005, John Lewis, then the FBI official in charge of domestic terrorism, ranked groups like the Earth Liberation Front ahead of jihadists as America’s top domestic terror threat.
FBI stings involving informants have been key to convicting 14 ELF members since 2006 for a string of high-profile arsons, and to sentencing a man to 20 years in prison for conspiring to destroy several targets, including cell phone towers. During the St. Paul protests, at least two additional informants infiltrated and helped indict a group of activists known as the RNC Eight for conspiring to riot and damage property.
Brandon Darby.: Couresy Loteria Films
Brandon Darby. Courtesy Loteria Films
But it’s Darby’s snitching that has provided the most intriguing tale. It’s the focus of a radio magazine piece, two documentary films, and a book in the making. By far the most damning portrayal is Better This World, an award-winning doc that garnered rave reviews on the festival circuit and is slated to air on PBS on September 6. The product of two years of work by San Francisco Bay Area filmmakers Katie Galloway and Kelly Duane de la Vega, it dredges up a wealth of FBI documents and court transcripts related to Darby’s interactions with his fellow activists to suggest that Darby acted as an agitator as much as an informant. (Watch the trailer and read our interview with the filmmakers here.)
The film makes a compelling case that Darby, with the FBI’s blessing, used his charisma and street credibility to goad Crowder and McKay into pursuing the sort of actions that would later land them in prison. Darby flatly denies it, and he recently sued the New York Times over a story with similar implications. (The Times corrected the disputed detail.) “I feel very morally justified to do the things that I’ve done,” he told me. “I don’t know if I could have handled it much differently.”
Darby “gets in people’s minds and can pull you in,” one activist warned me. “He’s a master. And you are going to feel all kinds of sympathy for him.”
BRANDON MICHAEL DARBY is a muscular, golden-skinned 34-year-old with Hollywood looks and puppy-dog eyes. Once notorious for sleeping around the activist scene, he now often sleeps with a gun by his bed in response to death threats. His former associates call him unhinged, a megalomaniac, a manipulator. “He gets in people’s minds and can pull you in,” Lisa Fithian, a veteran labor, environmental, and anti-war organizer, warned me before I set out to interview him. “He’s a master. And you are going to feel all kinds of sympathy for him.”
The son of a refinery welder, Darby grew up in Pasadena, a dingy Texas oil town. His parents divorced when he was 12, and soon after he ran away to Houston, where he lived in and out of group homes. By 2002, Darby had found his way to Austin’s slacker scene, where one day he helped his friend, medical-marijuana activist Tracey Hayes, scale Zilker Park’s 165-foot moonlight tower (of Dazed and Confused fame) and unfurl a giant banner painted with pot leaves that read “Medicine.” They later “hooked up,” Hayes says, and eventually moved in together. She introduced him to her activist friends, and he started reading Howard Zinn and histories of the Black Panthers.
Some local activists wouldn’t work with Darby (he liked to taunt the cops during protests, getting them all riled up). But that changed after Hurricane Katrina, when he learned that Robert King Wilkerson, one of the Angola Three—former Black Panthers who endured decades of solitary confinement at Louisiana’s Angola Prison—was trapped in New Orleans. Darby and Crow drove 10 hours from Austin towing a jon boat. When they couldn’t get it into the city, Darby somehow harangued some Coast Guard personnel into rescuing Wilkerson. The story became part of the foundation myth for an in-your-face New Orleans relief organization called the Common Ground Collective.
It would eventually grow into a national group with a million-dollar budget. But at first Common Ground was just a bunch of pissed-off anarchists working out of the house of Malik Rahim, another former Panther. Rahim asked Darby to set up an outpost in the devastated Ninth Ward, where not even the Red Cross was allowed at first. Darby brought in a group of volunteers who fed people and cleared debris from houses while being harassed by police, right along with the locals who had refused to evacuate. “If I’d had an appropriate weapon, I would have attacked my government for what they were doing to people,” he declared in a clip featured in Better This World. He said he’d since bought an AK-47 and was willing to use it: “There are residents here who have said that you will not take my home from me over my dead body, and we have made a commitment to be in solidarity with those residents.”
But Common Ground’s approach soon began to grate on Darby. He bristled at its consensus-based decision making, its interminable debates over things like whether serving meat to locals was serving oppression. He idolized rugged, iconoclastic populists like Che Guevara—so, in early 2006, he jumped at a chance to go to Venezuela to solicit money for Katrina victims.
Darby was deeply impressed with what he saw, until a state oil exec asked him to go to Colombia and meet with FARC, the communist guerrilla group. “They said they wanted to help me start a guerrilla movement in the swamps of Louisiana,” he told “This American Life” reporter Michael May. “And I was like, ‘I don’t think so.'” It turned out armed revolution wasn’t really his thing.David Mckay: Couresy Loteria Films
David McKay. Courtesy Loteria Films
Darby’s former friends dispute the Venezuela story as they dispute much that he says. They accuse him of grandstanding, being combative, and even spying on his rivals. In his short-lived tenure as Common Ground’s interim director, Darby drove out 30 volunteer coordinators and replaced them with a small band of loyalists. “He could only see what’s in it for him,” Crow told me. For example, Darby preempted a planned police-harassment hot line by making flyers asking victims to call his personal phone number.
The flyers led to a meeting between Darby and Major John Bryson, the New Orleans cop in charge of the Ninth Ward. In time, Bryson became a supporter of Common Ground, and Darby believed that they shared a common dream of rebuilding the city. But he was less and less sure about his peers. “I’m like, ‘Oh my God, I’ve replicated every system that I fought against,'” he recalls. “It was fucking bizarre.”
By mid-2007, Darby had left the group and become preoccupied with the conflict in Lebanon. Before long, Darby says, he was approached in Austin by a Lebanese-born schoolteacher, Riad Hamad, for help with a vague plan to launder money into the Palestinian territories. Hamad also spoke about smuggling bombs into Israel, he claims.
Darby says he discouraged Hamad at first, and then tipped off Bryson, who put him in touch with the FBI. “I talked,” he told me. “And it was the fucking weirdest thing.” He knew his friends would hate him for what he’d done. (The FBI raided Hamad’s home, and discovered nothing incriminating; he was found dead in Austin’s Lady Bird Lake two months later—an apparent suicide.)
MCKAY AND CROWDER FIRST encountered Darby in March 2008 at Austin’s Monkey Wrench Books during a recruitment drive for the St. Paul protests. Later, in a scene re-created in Better This World, they met at a café to talk strategy. “I stated that I wasn’t interested in being a part of a group if we were going to sit and talk too much,” Darby emailed his FBI handlers. “I stated that I was gonna shut that fucker down.”
“My biggest impression from that meeting was that Brandon really dominated it,” fellow activist James Clark told the filmmakers. Darby’s FBI email continued: “I stated that they all looked like they ate too much tofu and that they should eat beef so that they could put on muscle mass. I stated that they weren’t going to be able to fight anybody until they did so.” At one point Darby took everyone out to a parking lot and threw Clark to the ground. Clark interpreted it as Darby sending the message: “Look at me, I’m badass. You can be just like me.” (Darby insists that this never happened.)
“The reality is, when we woke up the next day, neither one of us wanted to use” the Molotovs, Crowder told me.
When the Austin activists arrived in St. Paul, police, acting on a Darby tip, broke open the group’s trailer and confiscated the sawed-off traffic barrels they’d planned to use as shields against riot police. They soon learned of similar raids all over town. “It started to feel like Darby hadn’t amped these things up, and it really was as crazy and intense as he had told us it was going to be,” Crowder says. Feeling that Darby’s tough talk should be “in some ways, a guide of behavior,” they went to Walmart to buy Molotov supplies.
“The reality is, when we woke up the next day, neither one of us wanted to use them,” Crowder told me. They stored the firebombs in a basement and left for the convention center, where Crowder was swept up in a mass arrest. Darby and McKay later talked about possibly lobbing the Molotovs on a police parking lot early the next morning, though by 2:30 a.m. McKay was having serious doubts. “I’m just not feeling the vibe on the street,” he texted Darby.
“You butt head,” Darby shot back. “Text me when you can.” He texted his friend repeatedly over the next hour, until well after McKay had turned in. At 5 a.m., police broke into McKay’s room and found him in bed. He was scheduled to fly home to Austin two hours later.
Bradley Crowder: Courtesy Loteria Films
Bradley Crowder. Courtesy Loteria Films
The feds ultimately convicted the pair for making the Molotov cocktails, but they didn’t have enough evidence of intent to use them. Crowder, who pleaded guilty rather than risk trial, and a heavier sentence, got two years. McKay, who was offered seven years if he pleaded guilty, opted for a trial, arguing on the stand that Darby told him to make the Molotovs, a claim he recanted after learning that Crowder had given a conflicting account. McKay is now serving out the last of his four years in federal prison.
AT SOUTH AUSTIN’S STRANGE BREW coffeehouse, Darby shows up to meet me on a chromed-out Yamaha with flames on the side. We sit out back, where he can chain-smoke his American Spirits. Darby is through being a leftist radical. Indeed, he’s now an enthusiastic small-government conservative. He loves Sarah Palin. He opposes welfare and national health care. “The majority of things could be handled by people and by communities,” he explains. Climate change is “a bandwagon” and the EPA should be “strongly limited.” Abortion shouldn’t be a federal issue.
He sounds a bit like his new friend, Andrew Breitbart, who made his name producing sting videos targeting NPR, ACORN, Planned Parenthood, and others. About a year after McKay and Crowder went to jail, Breitbart called Darby wanting to know why he wasn’t defending himself against the left’s misrepresentations. “They don’t print what I say,” Darby said. Breitbart offered him a regular forum on his website, BigGovernment.com. Darby now socializes with Breitbart at his Los Angeles home and is among his staunchest defenders. (Breitbart’s takedown of ACORN, he says, was “completely fucking fair.”)
“No matter what I say, most people on the left are going to believe what reinforces their own narrative,” Darby says. “And I’ve quit giving a shit.”
Entrapment? Darby scoffs at the suggestion. He pulls up his shirt, showing me his chest hair and tattoos, as though his macho physique had somehow seduced Crowder and McKay into mixing their firebombs. “No matter what I say, most people on the left are going to believe what reinforces their own narrative,” he says. “And I’ve quit giving a shit.”
The fact is, Darby says, McKay and Crowder considered him a has-been. His tofu comment, he adds, was a jocular response after one of them had ribbed him for being fat. “I constantly felt the need to show that I was still worthy of being in their presence,” he tells me. “They are complete fucking liars.” As for those late-night texts to McKay, Darby insists he was just trying to dissuade him from using the Molotovs.
He still meets with FBI agents, he says, to eat barbecue and discuss his ideas for new investigations. But then, it’s hard to know how much of what Darby says is true. For one, the FBI file of his former friend Scott Crow, which Crow obtained under a Freedom of Information Act request last year, suggests that Darby was talking with the FBI more than a year before he claims Bryson first put him in touch. Meanwhile, Crow and another activist, Karly Dixon, separately told me that Darby asked them, in the fall of 2006, to help him burn down an Austin bookstore affiliated with right-wing radio host Alex Jones. (Hayes, Darby’s ex, says he told her of the idea too.) “The guy was trying to put me in prison,” Crow says.
Such allegations, Darby claims, are simply part of a conspiracy to besmirch him and the FBI: “They get together, and they just figure out ways to attack.” Believe whomever you want to believe, he says. “Either way, they walk away with scars—and so do I.”
—By Josh Harkinson | September/October 2011 Issue
Find this story in September/October 2011
Copyright ©2014 Mother Jones and the Foundation for National Progress.
381: Turncoat (2009)14 mei 2014
A well-known activist—an anarchic, revolutionary activist—is accused of spying on other activists for the FBI. The strangest thing about the rumor is, it’s true. How Brandon Darby transformed from cop-hater to federal witness. Plus, a story by Etgar Keret, about a boy who betrays his people with a pair of shoes.
Brandon Darby was a radical activist and one of the founders of the incredibly effective relief organization Common Ground. Michael May reports on how Darby changed from a revolutionary who wanted the overthrow of the U.S. government into an informant working with the FBI against his former radical allies.
MAY 22, 2009
Find this story at 22 May 2009
© 1995 – 2014 Chicago Public Media & Ira Glass
The Informant Revolutionary to rat: The uneasy journey of Brandon Darby (2009)14 mei 2014
Last year on Aug. 28, eight Austin activists traveled north in a rented white van to join thousands of protesters in St. Paul, Minn., for the Republican National Convention. In the trailer behind them were shields homemade from traffic barrels – cut in half, painted black, and fitted with Plexiglas windows. The shields mimic police riot gear and are often used in “black blocs,” a method of street protesting with origins in Germany that became prominent stateside at the 1999 Seattle World Trade Organization protests, during which a black bloc caused property damage to various businesses. The black bloc is sort of like the punk rock version of protest, and its alluring combination of direct action and danger similarly attracts mostly young, white men.
On Aug. 31, a couple of days after the group’s arrival in Minnesota, St. Paul police searched the trailer without a warrant and seized the shields. The next day, two of the van’s passengers, David McKay, 22, and Bradley Crowder, 23, were arrested for disorderly conduct. McKay was released later that day, but Crowder remained in jail. According to a subsequent police affidavit, McKay met the next day with fellow activist Brandon Michael Darby, 32, who had also traveled to St. Paul with the Austin group. Angry that his friend was still being held, McKay told Darby that he and Crowder had made some Molotov cocktails (i.e., bottled gasoline bombs) and that he was planning on throwing them at cop cars parked in a parking lot.
According to the partial transcript in the affidavit, Darby asked McKay, “What if there’s a cop sleeping in the car?” “He’ll wake up,” replied McKay. “What if he doesn’t?” Darby asked. McKay was silent. Darby pressed on, asking McKay if he would “leave the scene with a cop burning or dying.” McKay answered, “Yes.” And then, again, according to a partial transcript of the recorded conversation, McKay told Darby that it was “worth it if a cop gets burned or maimed.” These words, along with eight Molotov cocktails found in the basement of the house in which McKay was crashing, have him facing up to 30 years in federal prison for charges related to possession and assembly of “unregistered firearms,” as the weapons are defined by federal law.
McKay did not know that his words to Darby, spoken in a moment of foolish hotheadedness that his friends say he is known for, were being transmitted to agents of the Federal Bureau of Investigation via electronic surveillance gear that Darby had hidden out of sight. Nor did he know that Darby had supplied the FBI with the information that led to the seizure of the homemade riot gear. Moreover, Darby had already told the feds that, in retaliation for the cops’ apparently illegal bust, the group had gone to Wal-Mart with a shopping list that might have supplied a touring Roller Derby team – elbow pads, gas cans, bike helmets, motor oil, tampons – but included also the potential fixings for some Molotov cocktails. The youths’ recklessness, as well as their implicit trust in Darby, had led them into a police trap.
Who Is Brandon Darby?
At first glance, Brandon Michael Darby seems a typical Austin lefty activist. He entered Austin’s radical progressive scene nearly a decade ago; through a former activist girlfriend, he became involved in a variety of small groups engaged in progressive projects: getting dirty drug needles off the streets, innocent prisoners out of jail, and recent immigrants into stable homes. He’s a boyishly handsome guy, in good shape from martial arts training, and he currently lives on several acres of farmland beyond the city limits, where he keeps chickens and a pig. He says he’s planning on getting a goat and has a “massive compost operation” going. He talks excitedly about making his home more sustainable and about the impending installation of a solar water heater. He collects rainwater for the garden and is restoring an old house.
Darby’s now employed as a legal and investigative assistant for an attorney, work that he feels good about because, he says, his employer doesn’t buy in to the whole “how much justice can you afford” system and does a lot of pro bono work. He recently became a father, to 9-month-old Olivia, and though he and Olivia’s mother don’t live together, he says that they are “co-parenting.” All in all, a contemporary portrait in progressive rationality and sustainable ambitions.
Prior to his latest incarnation, Darby had also acquired a considerable national reputation as a valiant and committed community activist, especially in New Orleans. There, initially in the wake of Hurricane Katrina, he had helped rescue stranded residents and rebuild housing and had been centrally involved in the work of the Common Ground Relief – a community effort focused on restoring neighborhoods, defending residents’ rights, and trying to rebuild the community from the ground up. Darby was featured in national interviews about post-hurricane New Orleans and more particularly had a reputation for defying authority and especially cops – not necessarily the profile of a potential police informant.
But ask around Austin activist circles, and a more contradictory portrait emerges. Several local activists describe Darby as a troubled, paranoid man with a volatile history with women, a penchant for violent rhetoric, and a strong authoritarian streak. At best, Darby might be just an ordinary and confused young person, fired with generalized idealism and stumbling through this world on his own tangled, misguided mission to save it. But at worst, he might have been – might have become over the last several years – a manipulator with a hero complex, bent on inflating his own self-importance in the comfortable guise of moral superiority.
Finding Common Ground
For much of 2006, Darby was heavily involved with Common Ground Relief, the post-Katrina recovery effort that has gained national attention for its endeavors. Darby himself came to national attention when he and one of Common Ground Relief’s founding members, Scott Crow, the prominent anarchist community organizer behind a host of Austin organizations including Radical Encuentro Camp, Ecology Action, and Treasure City Thrift, traveled to New Orleans right after the levees broke in search of their friend Robert “King” Wilkerson, who had stayed in his home to weather out the storm.
Crow’s detailed account of the apocalyptic journey, “It Takes a Spark to Start a Prairie Fire: Desperation, Racism and the Beginnings of Common Ground Relief,” can be read in full at Infoshop News (news.infoshop.org). (Crow’s book, Black Flags and Windmills: Anarchy, Hope and Common Ground, which also recounts the episode, comes out this year.) Their first effort failed, but the two friends decided to try again when they got a call from Malik Rahim, a former Black Panther, community organizer, and childhood friend of King’s, who reported that his neighborhood, Algiers, was being patrolled by white militias harassing unarmed black residents. The men set out once again, this time determined to bring supplies and aid to Rahim and to bring King back to Austin.
It was on this second trip that Rahim and Crow planted the seeds for Common Ground Relief using, Crow writes, “a strategy mixed from the Black Panther survival programs, the current work in Chiapas, Mexico of the Zapatistas and good old community organizing.” It was also when Darby made national headlines by taking a dip into the dreaded “toxic sludge,” a gnarly mix of industrial waste, waterlogged carcasses, and other nastiness, to find King. Crow writes: “Brandon called me one last time before he dropped into the dark water, and Malik and I told him we would come looking for him if he didn’t return. He started swimming with his phone held in the air, and he made good progress alternating between wading and swimming, trying to keep the water out of his mouth.” Federal Emergency Management Agency agents spotted Darby and ordered him out of the water, but he would not do so until they dispatched a boat to find and retrieve King; a hero’s welcome awaited Darby when he and King returned to Rahim’s home. After celebrating the reunion, everyone went to work, doing what they could to put the world right again.
At the time of Common Ground’s inception, the mood in New Orleans was tense. The U.S. government had completely failed the community, all the proof that most people needed that the system wasn’t working. Revolution was in the air, and Common Ground was at the forefront of envisioning a potential new world. In that heady atmosphere, Venezuelan President Hugo Chávez offered the group monetary relief in the form of Citgo gas cards, and Common Ground sent a delegation, including Darby, to Caracas. On pirate radio, Crow described Common Ground as “a paramilitary organization” – a statement for which he was criticized within the group. But given the atmosphere of chaos and devastation and uncertainty, people behaved in ways they normally would not.
As for Darby, those who were involved in Common Ground describe him as a simultaneously dynamic and divisive character, with an authoritarian streak that the mostly anarcho-hippie crowd didn’t care for. One volunteer coordinator who worked with Common Ground from January to July 2006 recounted a disturbing episode: A couple of volunteers called back to headquarters concerned they were about to get jumped, and Darby leaped into his truck to save the day – reportedly by firing his gun into the air in the middle of the street. “It just seemed like an unnecessarily violent escalation,” she recalled. “Everything I heard about Brandon Darby during my time at Common Ground was that he was crazy, and what I witnessed was that he was very prominent and very divisive. He’d come into town and everybody would be whispering, like: ‘Oh, shit. Brandon Darby’s back.’ ”
Darby explains the perception of him as authoritarian this way: “For some, Common Ground might have been about creating a little anarchist utopia. For me, it was about helping people have their rights heard and have their homes [restored], and it was about getting things done.” Darby also denies that he has ever discharged a firearm anywhere in the state of Louisiana.
“I know that Brandon has been trained in firearm safety, and I just don’t see him doing that,” says Andy Gallagher, a New Orleans resident who’s known Darby since he was 18 and who has lived with him in the past. “In all honesty, there have been situations that I have witnessed where Brandon has had a gun on hand and used it [in] a way that actually de-escalated the situation and protected the lives [of those] who were with him.” Though Gallagher wasn’t involved with Common Ground, he was in town at the time doing his own aid work – locating displaced foster children – and would often visit Darby.
Another prominent organizer of the Common Ground effort was Lisa Fithian, who says she has never gotten along with Darby. “He was a leader of the organization, though, and because of that, he was able to set some patterns in motion that I believe led to systemic issues of sexual abuse, sexual harassment, and violence,” she says. “He kicked the door down of a women’s center at 2am to throw a guy out; he kicked in the door of a trailer where there were volunteers with guns on them. He did a lot of Wild West shit – Mister Macho Action Hero.”
Darby responds that this portrait is both inaccurate and unfair. “We were in an aggressive situation that was frightening; we felt like it was the end of the world,” he explains. “So if there is a man living in a women’s center illegally, against the wishes of the women in the center, and all of the women exit that center, leaving that one guy who barricades himself in and is pissing and pooping on the floor, I think it’s totally fine to kick down the door. But really, if I was so bad, why was I the spokesperson for Common Ground Relief for so long?” Darby asks. “Why, after 2006, did they have me come back and ask me to direct the organization and be the spokesperson again?”
In retrospect, Darby’s friend Crow adds his own doubts. “He inserted himself as ‘co-founder’; he wanted that status, even as people were getting written out of the Common Ground history, people who did a lot of work organizing. He also made sure that the media followed him extensively and didn’t interview other people when he was director and also when he was just another person around,” insists Crow. “If you look at the way Brandon tells it, he did the whole Lower 9th Ward with one hand tied behind his back, when really there were a lot of people who did the work, and the organizing too, who you’ll never hear about because of Brandon’s monopoly on the media. So, did he do that just because he’s crazy, or did he do that to get more credibility for himself so that he could gather more information?”
Bad Intentions
Malik Rahim now fervently believes that Darby was an informant for at least part of the time he worked for Common Ground, a conclusion he describes as heartbreaking. “Look, Brandon and Scott brought weapons to my house to help me defend my home,” he says. “So my first feeling for both of them was love.” But that love, Rahim laments, soon turned to blind defense of someone with whom many in the organization, including his own family members, had problems. “It came to the degree that my son just knew that there was something too wrong with Brandon, and he searched Brandon’s possessions, because he said, ‘This guy is an agent, or he is an informant,'” Rahim recalls. “And, let me tell you, it caused a rift between my son and I, so much so that eventually, he left. Because I believed Brandon. I defended him.”
Rahim believes that something happened to Darby while he was in Venezuela and that it was then that he became an informant, because that is when Rahim now sees that Darby began to impede the group’s progress. “I think that Brandon had a nervous breakdown in Venezuela and that when he came back he was messed up in the head,” Rahim explains. “At the very beginning, he was helpful, but after Venezuela, he became harmful. … He did everything he could to destroy St. Mary’s, which was where we were housing the majority of our volunteers, by letting a bunch of crackheads move in there. And he also drove a wedge between me and Lisa Fithian and eventually caused her to leave, too. He was doing everything you’re supposed to do as a government agent in that situation. Divide and conquer.”
What Rahim considers sabotage and what Fithian calls patriarchal power plays Darby just sees as trying to do something good in a bad situation. Though he disagrees that his adamant refusal to turn people away from St. Mary’s was harmful, he agrees that something bad really did happen to him in Venezuela and that he came back a changed man. “I probably should have left New Orleans at that point and come back to Austin and gone to therapy. But I didn’t. I stayed,” he says. “I didn’t want to be there, but I thought I should have been there. Maybe that was my biggest mistake.” While in Venezuela, Darby says, he was informed by “someone in the Venezuelan government” that what he was doing – essentially seeking funds from the Chávez administration to undermine the Bush administration – was illegal. Darby freaked out and says that at times he was frightened for his life. He thought he might be arrested when he returned to the States, and he was angry that he had been put in that position by Common Ground, particularly Crow and Fithian. But he swears, again and again, that he was never working for the federal government while in New Orleans. Not ever.
These activists believe Brandon Darby reported on their activities to the FBI. Those interviewed for this story include Scott Crow (back, center). Next to Crow is Ann Harkness. Simon Evans is back row, far right, and Lisa Fithian stands in front of Evans.
These activists believe Brandon Darby reported on their activities to the FBI. Those interviewed for this story include Scott Crow (back, center). Next to Crow is Ann Harkness. Simon Evans is back row, far right, and Lisa Fithian stands in front of Evans.
PHOTO BY JANA BIRCHUM
Though he refuses to give a start date, Darby says he’s been working with the FBI for less than two years. FBI documents have him making phone calls to the bureau beginning in November 2007. Though he still describes himself as a lefty and says he’s “the furthest thing from a Republican,” it was protecting the rights of Republicans, he says, that finally persuaded him to work with the feds. “One morning, I woke up and realized that I disagree with the group I was associating with as much as I disagree with the Republican Party,” he recalls. “I began to feel that a small select group of people had bad intentions, and I felt the need to do something about it.”
The relationship began with a call to a cop that Darby knows in another city, because, he says, there was a situation that needed to be reported. He told that person what his concerns were, and that cop gave him the name of a federal agent. Darby says he met with some federal agents, told them what he had to say, and left. The agent later contacted him again, they had what Darby says was a “good conversation,” and over the course of a few months, Darby agreed to go undercover. Though he won’t say what it was exactly that made him make that initial call, he will say this about the eventual decision to go undercover: “My deal was with a small group of people whom I personally wouldn’t call terrorists but whose views and ideologies, in addition to their actions, are a little bit frightening and not in the best interest of the world. … So, with that said, I did what I can to make sure that that’s not an issue. Because I felt like I owed that to life, and I felt like I owed it to this little collective we call a nation who are trying to get through the world together.”
This sudden bout of patriotism sounds odd coming from a guy who witnessed complete governmental breakdown in New Orleans and went to Venezuela with revolution on his mind, but Darby says that it was those very experiences that added to his shift. “I think I began to see things very differently as a result of my experiences around Hurricane Katrina and the aftermath and my experiences as a person of leadership in a large organization. I saw the absolute importance and the absolute negative effect that happens to individuals or groups whenever there’s no stability in a system,” he explains. “I began to feel that we as a radical, radical left, because of the way we pseudo-governed, I started to feel like we were a little silly, critiquing the U.S. government, when we had so many faults of our own.”
Soul on Fire
Some people who worked with him are frankly suspicious that Darby’s acknowledged collaboration with the FBI hints of something much larger and more sinister. Some Austin activists have formed the Austin Informant Working Group; currently focused on the McKay and Crowder cases, they are also considering the wider implications. The term “Green Scare” (by analogy to earlier anti-communist “Red Scares”) refers to the federal government’s growing interest in prosecuting environmental activist groups, particularly the Earth Liberation Front and Animal Liberation Front. Austin Informant Working Group member Simon Evans points to a report by former University of Texas law student Elizabeth Waggoner, who said that FBI agent Charles Rasner announced to her class that Food Not Bombs and Austin Indymedia were on the bureau’s terror watch list. “It doesn’t seem unreasonable to question,” says Evans, “whether or not something larger is at play here.”
“They’re going after me and Scott and other organizers, but they nabbed the low-hanging fruit,” said Fithian, who was also involved in the RNC protests in Minnesota. Fithian was not surprised at the news that Darby was an informant. “I always said at Common Ground: If he was not a cop or an agent of the state, he was doing their job for them, creating division and disrupting our work.”
Crow initially came to Darby’s defense, posting a strenuous denial, when a story in the St. Paul Pioneer Press first fingered him as an informant, based on FBI documents. “It was more about defending the truth than it was about defending Brandon as a person,” says Crow. “When I asked him, he told me it wasn’t him, and I believed him. I’ve had to apologize to people like Lisa, because I gave him credibility with my initial statements. I just wanted to make sure he wasn’t being maligned. Now, I didn’t defend his misogyny or his antagonism; I defended him based on what he told me. It’s still heartbreaking, you know.” Darby eventually wrote an open letter coming out as an informant, but Crow first learned the truth by reading FBI documents furnished to him by McKay’s defense team. Crow was hurt by the news, as this wasn’t the first time he had found himself defending Darby.
“A lot of women had been hurt by this man, and a lot of men had defended him over the years, and it’s not OK,” says Fithian. “That’s a whole part of the healing process that we are going to have to deal with as a community.” This sentiment was echoed by other sources who spoke of a particular romantic relationship in Darby’s past that they describe as emotionally abusive and Darby as paranoid, jealous, and possessive. “I was a total asshole in my early 20s,” Darby admits freely. “My entire adult life has been a process of trying to be less of an asshole. What on earth my penis has to do with this case, I have no idea.”
Regarding Darby’s obsessive and paranoid nature, Crow says that sometimes Darby would call him 30 times a day. “I’m not a psychologist, but I would definitely say that guy’s paranoid. I mean, he sleeps with guns under his pillow. This is not something I have been told; this is something I have seen. The guy has a cache of weapons.” This depiction from Crow, who legally owns an AK-47, pisses Darby off. “I have legal firearms that I have a right to own,” he says, “and I live out in the country, and I think it’s OK. And I did have a gun in New Orleans, and as a citizen I have a right to do that.”
Sometimes, when Darby speaks of his old friend Crow, there’s a catch in his voice – as when he says that they were close, once, but that Crow hasn’t accepted his recent invitation to his home nor met his daughter. “I will always have a bond with him because of what we went through together, and no evil or anything that he would perceive as bad would come from my hand toward that person,” he says, sounding sincere. Yet the documents reflect that during 2007, Darby secretly informed on Crow’s whereabouts and actions. His defense is that he reported what he saw. “Wouldn’t it be more frightening,” he asks, “if the person in my position picked and chose what truth they told rather than say the facts?”
“Even though I was a shield for him in a lot of ways,” Crow now argues, “he really was marginalized in our community. A lot of people wouldn’t work with him on stuff, and even I didn’t have anything to do with him for a year before Common Ground, because he would start getting paranoid and do divisive things, like tell everyone that Lisa was out to get him, for example. For one period in New Orleans, he started to get King to think that Lisa and I were colluding against him – and I took Brandon’s calls more than anybody would. I counseled that guy many times and actually considered it more of a mentorship than a friendship. That guy asked me a lot of questions. And now of course, it all makes sense.”
So when he had his personal epiphany, why didn’t Darby reach out to other activists and tell them about his change in world-view – rather than begin spying on them? “If I felt like the best thing I could have done to right my wrongs was to come out and say how I felt, I would have done so. I just didn’t feel like it was. I felt like I would be completely marginalized and nobody would want to hear my opinions.” Darby uses the controversial civil rights leader and Black Panther turned Republican born-again Christian Eldridge Cleaver as an example. “He wrote a book called Soul on Ice, and it sold a million copies and is touted at all the anarchist bookstores. Most people in radical communities have heard of it. Then, if you say to an auditorium, ‘Have you ever heard of a book called Soul on Fire?’ No. That’s when Eldridge Cleaver became a born-again Christian and changed his views and recanted much of what he had earlier believed. They don’t promote it. Just like the school board: They promote a version of history that isn’t historically accurate.” Like a petulant teenager whose parents just don’t get him, Darby adds: “Nobody lets you voice your opinions. Nobody cares. Nobody wants to hear it.”
Pissed Off and Pissed On
Fithian says she was wary of Darby’s presence in Minnesota last September. “Nothing about Brandon going to the RNC made any sense to me, and I spoke out about it, and I warned people. When he came to meetings, I actually asked, ‘What the fuck is he doing here?'” She says she pulled him aside and asked him to leave communication meetings where strategic details of actions are worked out. “He said he was there to do medical, but instead he was at all the meetings, all the comms. When he stood up at a spokes meeting [i.e., organized like ‘spokes’ on a wheel], I told him he needed to leave.”
Gabby Hicks, a 21-year-old activist who traveled in the van with Darby, McKay, Crowder, and others, said that the Darby in the open letter – who sounds like a thoughtful guy opposed to violence – is very different from the argumentative and nonsensical Darby she met. Once, on the drive up, Darby became agitated because he needed to go to the bathroom. “He at one point threatened a driver of the van, because the person didn’t pull over fast enough, and Brandon was literally yelling, ‘I’m a 31-year-old revolutionary, and you can’t tell me when I can or can’t pee!'” Hicks laughed. “Once we pulled over, they were still fighting, and someone asked if they needed mediation. Brandon was like, ‘I can put it behind us if we can all act like adults.’ He turned the whole thing around and acted like we were the ones who had freaked out. That was his tactic. It was just weird.”
At the heart of the Darby story remain those two young men from Midland, Texas, Bradley Crowder and David McKay, who are currently facing years in federal prison based in no small part on information that Darby gave to the FBI. Though there are no legal restrictions preventing Darby from commenting on the case, he says he declines to do so out of “respect for the bureau.” Darby is a decade older than either defendant and, as far as direct action is concerned, much more experienced. So why didn’t he simply try to talk these guys out of doing something stupid or criminal instead of turning them over to the feds?
“Why didn’t I try to discourage them? You don’t know that I did or didn’t,” Darby insists. “For all you know, I could have gotten in trouble for violating the rules and trying to discourage somebody from doing something. I’m just saying you don’t know what the facts are yet.”
Indeed we don’t, says Evans of the Austin Informant Working Group. “There is still the issue of entrapment: I want to be clear that we may never know Brandon Darby’s full role or motivations in this incident, as these details are omitted from the FBI documents and informant reports provided to the defense. But something I keep coming back to is: What would I have done in the same position? I consider myself a moral and ethical person; I believe in nonviolence; I’m an ‘anarchist.’ What I would have done is talk to anyone thinking of illegal action, weigh in with my experience, point out the potential consequence, and dissuade that person. If that didn’t work, I would have prevented them from purchasing the materials or going on the action. I feel that a strong community can educate and police itself.”
Darby rejects the depiction of McKay and Crowder as kids easily influenced by an older activist. “If these two ‘kids’ had been stopped in the midst of a plot to bomb an abortion clinic, all these same people would be like: ‘Why wasn’t the government watching these people? Why weren’t they involved?'” he says, exasperated. “The guys who dragged James Byrd to death were the same age as these two, and they weren’t kids; they were monsters.” (Actually, two of the perpetrators in Byrd’s 1998 murder in Texas were 24; the third was 32.) In any case, Darby is sticking to his story. “In regards to this case, there’s no evidence that shows that I assumed a leadership role, and I didn’t,” he says. “I didn’t encourage anybody to do anything, and if you think that I should have done everything I could have to talk these guys out it, you’re not going to be let down [as the trial proceeds] a month from now.”
Good Career Move
Whatever his current motivations, Darby acknowledges his past mistakes. “When I was younger, I identified as a revolutionary, and I believed that many people around the world had a right to take up arms against oppression,” he says. “But I mistakenly felt that our system was one where that would be appropriate.” Then why does he feel that he deserved the benefit of maturity and hindsight, when McKay and Crowder deserve multiple years in the pen? How does he justify robbing them of their chance to go through their own maturing process and personal evolution of political ideology? “Because I didn’t actually do any of it,” he says. “Because I always had enough sense to know that I didn’t have the wisdom to make decisions that endanger people’s lives.”
Darby does say that McKay and Crowder were not the focal point of the investigation. In the course of an ideological shift that took him from armed revolutionary to FBI mole, Darby says he began to see major problems with certain actions that were being planned for the Republican National Convention – particularly by the black bloc and a group of organizers calling themselves the Welcoming Committee. “Anytime that a group of people get together and say that they are going to use ‘any means necessary’ and have images of firebombs and all kinds of other things on their website and they organize around the country, not to protest but to specifically prevent another group of American citizens to exercise their right to assemble, the U.S. government is going to get involved,” he says. “And they should get involved, and I support it wholeheartedly.”
Crowder and McKay, he suggests, were just in the wrong place at the wrong time, adding, “Then, if at the very end of an investigation like that, as a complete shock to everybody, a group of people decide to do something that’s insane, they’re going to get in trouble for it.”
None of this fully explains why Darby chose to go undercover as an FBI informant and surreptitiously spy on his friends when he could have instead simply left the movement and tried to get involved in public policy in some other productive way. “I’ve watched countless activists begin to work in the Legislature and begin to do things that participate in the system; we have a system that is wide open for our involvement,” he said. “You can get involved and have a say so; if you disagree with the way our city is run, you can get involved. If you have an ideological bent that’s on social justice, you can become a law enforcement officer, you can get involved with the FBI, or a lawyer.”
Darby says he was indeed compensated at times for his work with the feds, although he’s vague on the details except to say he turned down witness protection and a lump sum offered to people who testify in federal cases. He does say he is able to be independent because he has some money from his family. Darby sees his current role with the FBI as something akin to a “volunteer firefighter” and believes it to be a natural extension of his desire to do what’s right, no matter how uncomfortable. Yet with his decision to go undercover instead of any other of the myriad choices he had to change the direction of his life, Darby has effectively reinforced the notions that many in the activist community already had: that the Man is always out to get you, and you just can’t trust anyone.
Activist, adventurer, hero, revolutionary, informant. For his next transformation, Darby sees a future for himself in law enforcement. His first gig was surely a foot in the door.
BY DIANA WELCH, FRI., JAN. 23, 2009
Find this story at 23 January 2009
COPYRIGHT © 1981-2014 Austin Chronicle Corp.
OSZE in der Ukraine-Krise Friedensstifter im Kreuzfeuer14 mei 2014
Die Geiselnahme der OSZE-Militärbeobachter ist vorbei, die Debatte geht erst richtig los: CSU-Vize Gauweiler übt heftige Kritik, Verteidigungsministerin von der Leyen will den Einsatz überprüfen lassen. Und dann ist da noch der Vorwurf der Spionage, der die OSZE zu beschädigen droht.
Bundeskanzlerin Angela Merkel hat am Sonntag den Telefonhörer in die Hand genommen. Am anderen Ende der Leitung: Wladimir Putin, der russische Präsident. Es war das erste Gespräch der beiden nach der Freilassung der OSZE-Militärbeobachter, die nach acht Tagen in der Gefangenschaft prorussischer Separatisten am Samstag freigekommen und nach Berlin ausgeflogen worden waren.
Darüber habe sich Merkel am Telefon “erleichtert” gezeigt, teilte die Bundesregierung mit. Der Schwerpunkt des Gesprächs sei aber ein anderer gewesen: Die Kanzlerin habe mit Putin vor allem über den Besuch von Didier Burkhalter beim russischen Präsidenten am Mittwoch geredet.
Welche Rolle spielt die OSZE?
Burkhalter ist Bundespräsident der Schweiz und amtierender Vorsitzender der OSZE, der Organisation für Sicherheit und Zusammenarbeit in Europa. Ihre Hauptaufgabe: Frieden sichern. Die Ukraine, Russland und 55 weitere Staaten sind Mitglieder dieser Konferenz, die 1975 mit der Schlussakte von Helsinki unter dem Namen KSZE gegründet wurde und sich immer als blockübergreifend betrachtet hat. Damit ist sie – eigentlich – gut geeignet, um in der Ukraine-Krise zu vermitteln, in der es auch um die russische Furcht vor einer Ausbreitung der Nato nach Osten geht.
ANZEIGE
Doch die Vermittlung hat sich seit Beginn der Krise als schwierig erwiesen. Burkhalters Idee einer internationalen Kontaktgruppe wurde nie umgesetzt. Von Burkhalters “persönlichem Gesandten” für die Ukraine, Tim Guldimann, ist wenig zu hören. Ein Mitte April zwischen der Ukraine, Russland, USA und EU vereinbartes Genfer Abkommen wird von Moskau als gescheitert betrachtet. In ihm war die Entwaffnung illegaler Kräfte und ein Gewaltverzicht vereinbart worden. Beides lässt auf sich warten, weshalb Bundesaußenminister Frank-Walter Steinmeier nun ein zweites Treffen in Genf fordert. Burkhalter hingegen will “runde Tische” etablieren, um die Präsidentschaftswahl in der Ukraine am 25. Mai vorzubereiten.
Nato-Spione unter dem Deckmantel der OSZE?
Vor allem in Deutschland wird die Arbeit der OSZE überlagert von der Debatte um die Geiselnahme in Slawjansk. Dort, im Osten der Ukraine, waren am 25. April die Militärbeobachter – darunter vier Deutsche – von prorussischen Separatisten entführt worden. Der Anführer der Separatisten, Wjatscheslaw Ponomarjow, rechtfertigte die Entführung mit dem Vorwurf, die Beobachter seien Spione der Nato.
Seitdem tobt in der Politik, aber auch in Medien und Leserkommentarspalten, ein zum Teil erbitterter Streit über mehrere Punkte: Welche Rolle spielte die OSZE? Warum fuhren die Beobachter nach Slawjansk? Und, neuerdings: Warum war der deutsche Leiter der Gruppe, Axel Schneider, seinem Geiselnehmer gegenüber so höflich? Aber der Reihe nach.
Direkt nach der Geiselnahme hatte Claus Neukirch, Sprecher der Organisation, im österreichischen Fernsehen erklärt: “Ich muss sagen, dass es sich im Grunde genommen nicht um Mitarbeiter der OSZE handelt.” Diese Passage wird seitdem immer wieder als Beweis dafür angeführt, dass es sich bei den Geiseln tatsächlich um Spione handle. Dabei sagte Neukirch auch: “Es sind Militärbeobachter, die dort bilateral unter einem OSZE-Dokument tätig sind.”
Dieses “Wiener Dokument 2011” (hier als PDF) erlaubt es jedem der 57 OSZE-Mitgliedsländer, andere Länder um die Entsendung von Militärbeobachtern zu bitten, um “ungewöhnliche militärische Vorgänge” zu untersuchen. Genau das ist passiert. Die Ukraine berief sich darauf.
Nach den gescheiterten Einsätzen auf der Krim gemäß Kapitel III des Dokuments (Verminderung der Risiken) bat Kiew um weitere Missionen gemäß der Kapitel IX (Einhaltung und Verifikation) und insbesondere Kapitel X (Regionale Maßnahmen), in dem es heißt: “Die Teilnehmerstaaten werden ermutigt, unter anderem auf der Grundlage von Sondervereinbarungen in bilateralem, multilateralem oder regionalem Zusammenhang Maßnahmen zur Steigerung der Transparenz und des Vertrauens zu ergreifen.” Diese Maßnahmen könnten angepasst und im regionalen Zusammenhang angewendet werden.
Auf dieser Basis wurden in der Ukraine bislang nacheinander fünf multinationale Teams von jeweils etwa acht Militärbeobachtern aktiv. Die erste Mission begann Ende März unter dänischer Leitung, dann übernahm Polen als “Lead Nation”, gefolgt von den Niederlanden und schließlich Deutschland. Inzwischen ist eine neunköpfige Gruppe aktiv, die von Kanada geführt wird. Weitere Team-Mitglieder kommen aus Frankreich, Moldawien, den USA und der Ukraine selbst.
Die OSZE listet die Mission auf ihrer Website unter dem Titel “Verschiedene Formen des OSZE-Engagements mit der Ukraine” auf. Ein OSZE-Twitterkanal sprach am Sonntag von einer “OSZE-Militärverifikationsmission”.
Der Vorwurf, das Team habe nichts mit der OSZE zu tun gehabt, ist also haltlos. Was die Spionage betrifft: Während der Dolmetscher vom Bundessprachenamt in Hürth kommt, gehören die drei Soldaten dem Zentrum für Verifikationsaufgaben der Bundeswehr (ZVBw) im nordrhein-westfälischen Geilenkirchen an. Dort gibt es nach SZ-Informationen zwar auch eine geheime Außenstelle des Bundesnachrichtendienstes (BND). Doch keiner der Männer war für den Geheimdienst – oder sein militärisches Pendant, den Militärischen Abschirmdienst – tätig. Der BND berät deutsche OSZE-Beobachter allerdings vor ihren Einsätzen. Auch wenn die OSZE-Beobachter also selbst keine Spione sind, zu tun haben sie mit ihnen allemal.
Warum gerade Slawjansk? Von der Leyen verspricht Prüfung
Wie das deutsche Verteidigungsministerium erklärte, besuchen OSZE-Militärbeobachter, die über Diplomatenstatus verfügen, Orte auf Empfehlung des Gastgebers. Wohin sie fahren, entscheidet letztlich der jeweilige Leiter der Mission. Warum Oberst Axel Schneider das Risiko einging, sich in unmittelbare Nähe der Separatisten zu begeben, ist unklar – und ein Streitpunkt in Berlin, über die politischen Lager hinweg.
Der SPD-Verteidigungsexperte Lars Klingbeil fordert in der Bild-Zeitung Aufklärung darüber, ob die Militärbeobachter wirklich die Aufgabe hatten, nach Slawjansk zu fahren. Die Bundesregierung habe das bislang “nicht plausibel erklären können”, kritisiert etwa die Vorsitzende der Linkspartei, Katja Kipping, im Gespräch mit der Zeitung Die Welt.
Außenminister Steinmeier verteidigte hingegen die Mission: Sie habe wertvolle Hinweise geliefert. Verteidigungsministerin Ursula von der Leyen kündigte an, den Einsatz überprüfen zu wollen. Sie sagte aber auch: “Wir lassen uns nicht einschüchtern.”
Der Verteidigungsexperte der Grünen im Bundestag, Omid Nouripour, sagte SZ.de, er sei für die Überprüfung des Einsatzes. “Aber wir dürfen jetzt nicht eine Diskussion anzetteln, die am Ende dazu führt, dass sich Deutschland nicht mehr beteiligt an einem jahrzehntelang bewährtem Instrumentarium.” Die OSZE-Mission sei “in vollem Wissen Russlands” absolviert worden. “Das Instrument ist ein Gutes.”
Warum so höflich dem Geiselnehmer gegenüber? Alle gegen Gauweiler
Als der selbsternannte Bürgermeister von Slawjansk, Ponomarjow, am 27. April seine Geiseln der Weltpresse vorführte, bedankte sich Oberst Schneider bei ihm und gab ihm die Hand. Der CSU-Bundestagsabgeordnete Peter Gauweiler hat das im Spiegel kritisiert: “Der ganze Vorgang macht auch für die Bundeswehr einen unguten Eindruck.” Deutschland habe sich “in dieser plumpen Weise noch tiefer in den Konflikt hineinziehen” lassen.
Nun hagelt es wiederum Kritik an Gauweiler. Der CDU-Europaabgeordnete Elmar Brok nannte dessen Äußerungen “komplett unverständlich”. Der Parlamentarische Geschäftsführer der CSU-Landesgruppe, Max Straubinger, sprach von einer “ziemlichen Frechheit, vom gemütlichen Schreibtisch in München aus das Verhalten deutscher Soldaten in Geiselhaft zu maßregeln”.
Und auch der Grüne Nouripour reagiert mit Unverständnis auf Gauweiler: Was er von Oberst Schneider auf der Pressekonferenz gesehen habe, sei konfliktentschärfend gewesen und damit “vorbildlich.”
OSZE-Militärbeobachter werden vor ihrem Einsatz in Konfliktbewältigung geschult. Vermutlich hat Schneider also nur umgesetzt, was er gelernt hat.
5. Mai 2014 13:46
Von Michael König und Markus C. Schulte von Drach
Find this story at 5 May 2014
Copyright © Süddeutsche Zeitung Digitale Medien GmbH
Ist der BND in der Ukraine unterwegs?1 mei 2014
Sie ist schmutzig, sie ist wichtig: Warum gerade westliche Demokratien nicht auf Spionage verzichten können. Denn Politik basiert auf Täuschung. Auch im 21. Jahrhundert.
Die Spionage ist – neben der Prostitution – das älteste Gewerbe der Welt. Schon in “Die Kunst des Krieges”, einem chinesischen Buch, das einem General namens Sun Tzu zugeschrieben wird und aus dem sechsten vorchristlichen Jahrhundert stammt, heißt es: “Spionageoperationen sind im Kriege von wesentlicher Bedeutung – Armeen verlassen sich auf sie, um sich in Bewegung zu setzen.”
Der alte Chinese war keineswegs zimperlich, wenn es darum ging, die Aufgabe von Spionen zu definieren: Es gehe darum, pinselte er in zierlichen Schriftzeichen auf Bambuspapier, “Armeen zu schlagen, Städte anzugreifen und tödliche Attentate zu verüben”.
Zu diesem Behufe müssen Spione “die Namen von Garnisonskommandanten, Flügeladjutanten, Pförtnern, Torhütern und Leibwächtern” herausfinden. Ganz unbezahlbar ist es, wenn man Spione in den eigenen Reihen entdeckt. Diese werden natürlich nicht hingerichtet, sondern umgedreht: Sie arbeiten hinfort als Doppelagenten und versorgen den Feind mit Erstunkenem und Erlogenem.
Denn als Grundprinzip militärischer Operationen hatte Sun Tzu schon auf der ersten Seite seines klassischen Buchs erläutert: “Alle Kriegsführung basiert auf Täuschung.” In der Schlacht gewinnt am Ende nicht jener General, der den längeren Säbel hat, sondern jener, dem es am besten gelingt, den Feind hinters Licht zu führen: ihn zur Raserei zu bringen, ihm Stärke vorzutäuschen, wo man schwach ist und so weiter.
WON_OVEdfhfgjm-still
Snowden fragt Putin
“Etwas wie in den USA kann es bei uns nicht geben”
Man begibt sich auf das Niveau der Feinde der Freiheit
Nun sind diese Ratschläge mehrere Jahrtausende alt. Gelten sie heute noch? Und gelten sie insbesondere auch für liberale, aufgeklärte, westliche Länder? Begibt man sich nicht auf das Niveau der Feinde der Freiheit herab, wenn man Spionage betreibt; wenn man fremde Elektropost liest, Telefongespräche abhört und Agenten ausschickt, damit sie (nur zum Beispiel) iranische Atomphysiker niederschießen, bestechen oder mit schmutzigen kleinen Privatgeheimnissen erpressen?
Während ich dies schreibe, schaue ich auf ein gerahmtes Foto an der Wand meines Büros, das ein mysteriöses Gerät zeigt: einen dunklen Holzkasten auf Rädern, in dessen Gehäuse seltsame kleine weiße Scheiben eingelassen sind. Es handelt sich um die “Turing-Bombe”, sozusagen: den prähistorischen Ur-Computer, den das britische Mathematikgenie Alan Turing erfunden hat.
Dank der “Turing-Bombe” gelang es den Geheimdienstleuten in Bletchley Park bei London – den Vorläufern aller heutigen Abhördienste –, den deutschen “Enigma”-Code zu brechen. So wurde es möglich, deutsche Unterseeboote zu orten und zu versenken: Endlich waren die alliierten Geleitzüge sicher, die quer über den Atlantik schipperten, um Hitlers und Mussolinis Gegner mit Kriegsgerät zu versorgen.
Heute gilt den Historikern als gesichert, dass die “Turing-Bombe” den großen Krieg um circa zwei Jahre verkürzt hat. Sie half also, ungezählte Menschenleben (auch deutsche) zu retten.
Gibt es heute etwa keine Gefahren mehr?
Waren das besondere Umstände, weil es schließlich um die Nazis ging? Gibt es heute keine Gefahren mehr? Gehört es nicht immer noch zu den Aufgaben jeder demokratisch gewählten Regierung, das fundamentalste Menschenrecht ihrer Bürger zu schützen – das Recht, am Leben zu bleiben?
Zu den Enthüllungen des amerikanischen Überläufers Edward Snowden, der immer noch in Wladimir Putins Moskau lebt, gehört unter anderem diese: Der australische Geheimdienst ist tief in die Daten- und Kommunikationsnetzwerke Indonesiens eingedrungen und hat jedes Mal mitgehört, wenn indonesische Politiker miteinander sprachen. Was soll daran schockierend sein?
Im September 2004 explodierte eine Autobombe vor der indonesischen Botschaft in Jakarta (neun Tote, 150 Verletzte). 2009 wurden in einer Serie von Bombenanschlägen in indonesischen Hotels drei Australier getötet.
Indonesien ist seit dem Sturz des Diktators Suharto zwar eine Demokratie – aber es ist auch ein armes und korruptes Land, das auf seinem Territorium militante islamische Gruppierungen beherbergt.
Zu Recht horcht Australien Indonesien ab
Seit es die holländische Kolonialherrschaft abschüttelte, hat Indonesien zwei Revolutionen durchlebt. Hätten die Australier sich in diesem zutiefst instabilen Land auf die Behörden verlassen, hätten sie nett um Informationen bitten sollen?
Warum soll es zudem verwerflich sein, wenn amerikanische Behörden sogenannte Metadaten sammeln – wenn sie also überprüfen, wer in den Vereinigten Staaten mit wem kommuniziert. Angenommen, mein Nachbar würde regelmäßig E-Mails mit Scheich Nasrallah, dem Chef der Hisbollah, austauschen: Wäre das dann seine Privatsache?
Gewiss: Sollten amerikanische Behörden diese E-Mails mitgelesen haben, ohne dass sie sich vorher einen richterlichen Beschluss besorgt hätten, wäre dies ein Skandal und ein Rechtsbruch. Sie hätten dann den vierten Zusatzartikel zur amerikanischen Verfassung missachtet.
Außerhalb der amerikanischen Landesgrenzen aber gilt der vierte Zusatzartikel nicht: Auslandsspionage ist grundsätzlich und grenzenlos erlaubt. Und warum sollte das anders sein? Der vierte Zusatzartikel zur amerikanischen Verfassung ist ja nicht gratis. Er schützt mich, weil ich amerikanischer Staatsbürger bin, aber dieser Schutz kostet: Ich bin hier steuerpflichtig, muss mich an die Gesetze halten (auch die idiotischen) und im Notfall bereit sein, meine Heimat mit der Waffe zu verteidigen.
Ist der BND in der Ukraine unterwegs?
Letzteres musste ich bei meiner Einbürgerung mit erhobener Hand schwören! Warum sollte das “Fourth Amendment” für Leute gelten, denen keine dieser Pflichten auferlegt ist?
Wie steht es nun mit der Spionage unter Verbündeten? Sie ist seit eh und je üblich, weil die Welt aus Sicht der Geheimdienste in zwei scharf geschiedene Teile zerfällt: in “uns” und “die da”. Denn Bündnisse sind nicht ewig, sie können schon morgen wieder zerfallen sein. Allerdings – es gibt ein exklusives Abkommen zwischen den Vereinigten Staaten, Kanada, Australien, Neuseeland und Großbritannien, dass man einander nicht ausforscht.
Möchte die Bundesrepublik Deutschland als Mitglied in diesen Klub aufgenommen werden? Dann muss sie etwas mitbringen: wichtige geheimdienstliche Erkenntnisse. Hat sie solche? Sind Mitarbeiter des Bundesnachrichtendienstes in der Ukraine unterwegs, um die Lage vor Ort zu erkunden?
Hören deutsche Beamte die Handys der russischen Regierung ab? Und sollte die Antwort “Nein” lauten – wozu zahlen Sie, geneigte Leserin, dann eigentlich Steuern?
21.04.14
Von Hannes Stein
Find this story at 21 April 2014
© Axel Springer SE 2014.
The mentality of J Edgar Hoover’s FBI undergirds today’s surveillance state (2014)1 mei 2014
People forget that the FBI is the NSA’s primary partner in domestic spying, which allows them to work in secret
FBI director nominee James Comey oversees a growing part of the US surveillance state. Photograph: Gary Cameron/Reuters
The new documentary 1971, about the formerly anonymous FBI burglars who exposed the crimes of former FBI director J. Edgar Hoover, debuted to a rapt audience at the Tribeca film festival last night. As the filmmakers noted in an interview with the AP, the parallels between Nixon-era FBI whistleblowers and Edward Snowden’s NSA revelations are almost eerie in their similarity.
But while the NSA connection seems obvious, the movie will actually shed light on the domestic intelligence agency with far more power over ordinary Americans: the modern FBI.
Everyone seems to forget that the FBI is the NSA’s primary partner in the latter’s domestic spying operations and that, in fact, the NSA’s job would be impossible without them. Whenever you see a company deny giving any data to the NSA remember: It’s because it’s not the NSA asking (or demanding) the information of them, it’s the FBI. They use the same Patriot Act authorities that the NSA does, and yet we have almost no idea what they do with it.
In fact, the FBI has gone to extreme lengths to just keep their surveillance methods a secret from the public, just like the NSA. And the more we learn, the scarier it gets.
On Monday, the EFF revealed through its Freedom of Information Act lawsuit that the FBI’s “next generation” facial recognition program will have as many as 52m photographs in it next year – including millions that were taken for “non-criminal purposes.” It’s massive biometric database already “may hold records on as much as one third of the U.S. population,” EFF found.
Lavabit, the email provider once allegedly used by Edward Snowden, also lost an appeal this week, leaving its founder Ladar Levinson in contempt of court for failing to hand over Lavabit’s encryption keys to the FBI that would have exposed all 400,000 users of Lavabit. The court failed to rule on the larger issue – leaving the door open for the FBI to try it again.
And we know they want to. Foreign Policy’s Shane Harris reported last year, the FBI “carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies – an operation that the NSA once conducted, was reprimanded for, and says it abandoned.” The FBI’s activities include trying to convince “telecom carriers and Internet service providers to install [port readers] on their networks so that the government can collect large volumes of data about emails and Internet traffic.”
We also know they routinely get cell phone location information without a warrant. (If you want to see how your cell phone location information reveals almost every detail of your life, watch this amazing ACLU video.) We also know they’re using Stingray devices, which are fake cell phone towers that vacuum up all cell phone activity in a particular area.
We know that the FBI is still issuing thousands of oversight-free National Security Letters a year, despite multiple government reports detailing systematic abuse, and a federal court ruling that they are unconstitutional last year. (The ruling was put on hold pending appeal.)
The FBI has pushed Congress and the White House – and reportedly quietly lobbied the tech companies – to support a dangerous overhaul to wiretapping laws that would require Internet companies like Google and Facebook to create a backdoor into their services, giving the FBI direct access if they get the requisite legal authorities. And, at the same time, the FBI also wants to be able to expand their ability to hack suspects’ computers.
(At least some judges have been pushing back, noting that the trove of information that the FBI can get from hacking suspects is often far beyond what the agency’s investigation requires.)
Worse, Wired discovered FBI training materials in 2012 that told agents they had the “ability to bend or suspend the law and impinge on freedoms of others,” in national security cases. The materials were quickly withdrawn when they became public.
All of this leads to why a comprehensive report released by ACLU late in 2013 called the FBI a “secret domestic intelligence agency” that “regularly overstepped the law, infringing on Americans’ constitutional rights while overzealously pursuing its domestic security mission.”
After watching 1971, or reading Betty Medsger’s corresponding book The Burglary, it should be a scandal to everyone that the FBI building is still named after J. Edgar Hoover. Unfortunately, his ghost also still seems to permeate in much of what they do.
Trevor Timm
theguardian.com, Saturday 19 April 2014 15.00 BST
Find this story at 19 April 2014
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
“The Convert” Update (2012)1 mei 2014
This week’s episode, “The Convert,” was about FBI informant Craig Monteilh, who went undercover in southern California’s Muslim community to try to find people who were recruiting and training terrorists. Craig’s operation, which took place in 2006 and 2007, was called Operation Flex.
On Tuesday, a federal judge dismissed a lawsuit that was filed against the FBI as a result of Operation Flex. Several people Craig spied on — including Yasser AbdelRahim, who was featured in our episode — sued the Bureau, claiming it had violated their first amendment rights during Operation Flex by targeting them because of their religious beliefs, and that they’d been subjected to searches and monitoring without a warrant.
In response, the government asserted the state secrets privilege, arguing that the suit shouldn’t be allowed to move forward because it would force the FBI to reveal classified information and would put national security at risk.
U.S. District Judge Cormac Carney sided with the government. After reviewing confidential statements from top FBI officials, Carney wrote in his decision that allowing the suit to proceed could “significantly compromise national security.”
It was a difficult decision, according to Carney. He compared himself to an ancient Greek hero:
In struggling with this conflict, the Court is reminded of the classic dilemma of Odysseus, who faced the challenge of navigating his ship through a dangerous passage, flanked by a voracious six-headed monster, on the one side, and a deadly whirlpool, on the other. Odysseus opted to pass by the monster and risk a few of his individual sailors, rather than hazard the loss of his entire ship to the sucking whirlpool. Similarly, the proper application of the state secrets privilege may unfortunately mean the sacrifice of individual liberties for the sake of national security.
We reached out to the American Civil Liberties Union, the ACLU, and the Council on American Islamic Relations, CAIR, who are representing the people Craig spied on. Peter Bibring, an attorney at the ACLU, sent us this statement:
As troubling as we find the implications that it might be okay to feed the Muslim community to a monster, it’s a mistake to think that closing courts to claims of religious discrimination in the name of national security affects only the few who bring those cases. The government that refuses to let courts determine whether it has violated our most basic Constitutional values because the whole matter is supposedly secret steers our nation into much more dangerous waters. It’s wrongheaded, in the name of defending freedom, to give up its hallmarks, including the basic balance of powers our founders so carefully set.
The judge’s dismissal means that the case against the FBI cannot move forward. But the plaintiffs are also suing individual FBI agents who were involved in Operation Flex, and Carney did allow certain charges against them to stand. Bibring said the ACLU and CAIR plan to appeal the judge’s decision.
AUG 16, 2012
Find this story at 16 August 2012
Find the radio show at 10 August 2012
© 1995 – 2014
Chicago Public Media & Ira Glass
The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’1 mei 2014
Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices
Craig Monteilh says he did not balk when his FBI handlers gave him the OK to have sex with the Muslim women his undercover operation was targeting. Nor, at the time, did he shy away from recording their pillow talk.
“They said, if it would enhance the intelligence, go ahead and have sex. So I did,” Monteilh told the Guardian as he described his year as a confidential FBI informant sent on a secret mission to infiltrate southern Californian mosques.
It is an astonishing admission that goes to the heart of the intelligence surveillance of Muslim communities in America in the years after 9/11. While police and FBI leaders have insisted they are acting to defend America from a terrorist attack, civil liberties groups have insisted they have repeatedly gone too far and treated an entire religious group as suspicious.
Monteilh was involved in one of the most controversial tactics: the use of “confidential informants” in so-called entrapment cases. This is when suspects carry out or plot fake terrorist “attacks” at the request or under the close supervision of an FBI undercover operation using secret informants. Often those informants have serious criminal records or are supplied with a financial motivation to net suspects.
In the case of the Newburgh Four – where four men were convicted for a fake terror attack on Jewish targets in the Bronx – a confidential informant offered $250,000, a free holiday and a car to one suspect for help with the attack.
In the case of the Fort Dix Five, which involved a fake plan to attack a New Jersey military base, one informant’s criminal past included attempted murder, while another admitted in court at least two of the suspects later jailed for life had not known of any plot.
Such actions have led Muslim civil rights groups to wonder if their communities are being unfairly targeted in a spying game that is rigged against them. Monteilh says that is exactly what happens. “The way the FBI conducts their operations, It is all about entrapment … I know the game, I know the dynamics of it. It’s such a joke, a real joke. There is no real hunt. It’s fixed,” he said.
But Monteilh has regrets now about his involvement in a scheme called Operation Flex. Sitting in the kitchen of his modest home in Irvine, near Los Angeles, Monteilh said the FBI should publicly apologise for his fruitless quest to root out Islamic radicals in Orange County, though he does not hold out much hope that will happen. “They don’t have the humility to admit a mistake,” he said.
Monteilh’s story sounds like something out of a pulp thriller. Under the supervision of two FBI agents the muscle-bound fitness instructor created a fictitious French-Syrian alter ego, called Farouk Aziz. In this disguise in 2006 Monteilh started hanging around mosques in Orange County – the long stretch of suburbia south of LA – and pretended to convert to Islam.
He was tasked with befriending Muslims and blanket recording their conversations. All this information was then fed back to the FBI who told Monteilh to act like a radical himself to lure out Islamist sympathizers.
Yet, far from succeeding, Monteilh eventually so unnerved Orange County’s Muslim community that that they got a restraining order against him. In an ironic twist, they also reported Monteilh to the FBI: unaware he was in fact working undercover for the agency.
Monteilh does not look like a spy. He is massively well built, but soft-spoken and friendly. He is 49 but looks younger. He lives in a small rented home in Irvine that blends into the suburban sprawl of southern California. Yet Monteilh knows the spying game intimately well.
By his own account Monteilh got into undercover work after meeting a group of off-duty cops working out in a gym. Monteilh told them he had spent time in prison in Chino, serving time for passing fraudulent checks.
It is a criminal past he explains by saying he was traumatised by a nasty divorce. “It was a bad time in my life,” he said. He and the cops got to talking about the criminals Monteilh had met while in Chino. The information was so useful that Monteilh says he began to work on undercover drug and organised crime cases.
Eventually he asked to work on counter-terrorism and was passed on to two FBI handlers, called Kevin Armstrong and Paul Allen. These two agents had a mission and an alias ready-made for him.
Posing as Farouk Aziz he would infiltrate local mosques and Islamic groups around Orange County. “Paul Allen said: ‘Craig, you are going to be our computer worm. Our guy that gives us the real pulse of the Muslim community in America’,” Monteilh said.
The operation began simply enough. Monteilh started hanging out at mosques, posing as Aziz, and explaining he wanted to learn more about religion. In July, 2006, at the Islamic Center of Irvine, he converted to Islam.
Monteilh also began attending other mosques, including the Orange County Islamic Foundation. Monteilh began circulating endlessly from mosque to mosque, spending long days in prayer or reading books or just hanging out in order to get as many people as possible to talk to him.
“Slowly I began to wear the robes, the hat, the scarf and they saw me slowly transform and growing a beard. At that point, about three or four months later, [my FBI handlers] said: ‘OK, now start to ask questions’.”
Those questions were aimed at rooting out radicals. Monteilh would talk of his curiosity over the concepts of jihad and what Muslims should do about injustices in the world, especially where it pertained to American foreign policy.
He talked of access to weapons, a possible desire to be a martyr and inquired after like-minded souls. It was all aimed at trapping people in condemning statements. “The skill is that I am going to get you to say something. I am cornering you to say “jihad”,” he said.
Of course, the chats were recorded.
In scenes out of a James Bond movie, Monteilh said he sometimes wore a secret video recorder sewn into his shirt. At other times he activated an audio recorder on his key rings.
Monteilh left his keys in offices and rooms in the mosques that he attended in the hope of recording conversations that took place when he was not there. He did it so often that he earned a reputation with other worshippers for being careless with his keys. The recordings were passed back to his FBI handlers at least once a week.
He also met with them every two months at a hotel room in nearby Anaheim for a more intense debriefing. Monteilh says he was grilled on specific individuals and asked to view charts showing networks of relationships among Orange County’s Muslim population.
He said the FBI had two basic aims. Firstly, they aimed to uncover potential militants. Secondly, they could also use any information Monteilh discovered – like an affair or someone being gay – to turn targeted people into becoming FBI informants themselves.
None of it seemed to unnerve his FBI bosses, not even when he carried out a suggestion to begin seducing Muslim women and recording them.
At one hotel meeting, agent Kevin Armstrong explained the FBI attitude towards the immense breadth of Operation Flex – and any concerns over civil rights – by saying simply: “Kevin is God.”
Monteilh’s own attitude evolved into something very similar. “I was untouchable. I am a felon, I am on probation and the police cannot arrest me. How empowering is that? It is very empowering. You began to have a certain arrogance about it. It is almost taunting. They told me: ‘You are an untouchable’,” he said.
But it was not always easy. “I started at 4am. I ended at 9.30pm. Really, it was a lot of work … Farouk took over. Craig did not exist,” he said. But it was also well paid: at the peak of Operation Flex, Monteilh was earning more than $11,000 a month.
But he was wrong about being untouchable.
Far from uncovering radical terror networks, Monteilh ended up traumatising the community he was sent into. Instead of embracing calls for jihad or his questions about suicide bombers or his claims to have access to weapons, Monteilh was instead reported to the FBI as a potentially dangerous extremist.
A restraining order was also taken out against him in June 2007, asking him to stay away from the Islamic Center of Irvine. Operation Flex was a bust and Monteilh had to kill off his life as Farouk Aziz.
But the story did not end there. In circumstances that remain murky Monteilh then sued the FBI over his treatment, claiming that they abandoned him once the operation was over.
He also ended up in jail after Irvine police prosecuted him for defrauding two women, including a former girlfriend, as part of an illegal trade in human growth hormone at fitness clubs. (Monteilh claims those actions were carried out as part of another secret string operation for which he was forced to carry the can.)
What is not in doubt is that Monteilh’s identity later became public. In 2009 the FBI brought a case against Ahmad Niazi, an Afghan immigrant in Orange County.
The evidence included secret recordings and even calling Osama bin Laden “an angel”. That was Monteilh’s work and he outed himself to the press to the shock of the very Muslims he had been spying on who now realised that Farouk Aziz – the radical they had reported to the FBI two years earlier – had in fact been an undercover FBI operative.
Now Monteilh says he set Niazi up and the FBI was trying to blackmail the Afghani into being an informant. “I built the whole relationship with Niazi. Through my coercion we talked about jihad a lot,” he said. The FBI’s charges against Niazi were indeed later dropped.
Now Monteilh has joined an American Civil Liberties Union lawsuit against the FBI. Amazingly, after first befriending Muslim leaders in Orange County as Farouk Aziz, then betraying them as Craig Monteilh, he has now joined forces with them again to campaign for their civil liberties.
That has now put Monteilh’s testimony about his year undercover is at the heart of a fresh legal effort to prove that the FBI operation in Orange County unfairly targeted a vulnerable Muslim community, trampling on civil rights in the name of national security.
The FBI did not respond to a request from the Guardian for comment.
It is not the first time Monteilh has shifted his stance. In the ACLU case Monteilh is now posing as the sorrowful informant who saw the error of his ways.
But in previous court papers filed against the Irvine Police and the FBI, Monteilh’s lawyers portrayed him as the loyal intelligence asset who did sterling work tackling the forces of Islamic radicalism and was let down by his superiors.
In those papers Monteilh complained that FBI agents did not act speedily enough on a tip he gave them about a possible sighting of bomb-making materials. Now Monteilh says that tip was not credible.
Either way it does add up to a story that shifts with the telling. But that fact alone goes to the heart of the FBI’s use of such confidential informants in investigating Muslim communities.
FBI operatives with profiles similar to Monteilh’s – of a lengthy criminal record, desire for cash and a flexibility with the truth – have led to high profile cases of alleged entrapment that have shocked civil rights groups across America.
In most cases the informants have won their prosecutions and simply disappeared. Monteilh is the only one speaking out. But whatever the reality of his year undercover, Monteilh is almost certainly right about one impact of Operation Flex and the exposure of his undercover activities: “Because of this the Muslim community will never trust the FBI again.”
Paul Harris contributor jan 2013
Paul Harris in Irvine, California
theguardian.com, Tuesday 20 March 2012 16.50 GMT
Find this story at 20 March 2012
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
FBI informant scares Muslim suspects so much with his talk of violent jihad that they report HIM to authorities (2010)1 mei 2014
An FBI informer sent to infiltrate a California mosque was made the subject of a restraining order after scaring Muslim worshippers with demands for holy war.
Craig Monteilh was known to members of the Irvine Islamic Center as Farouk al-Aziz, an apparently devout and at times over-zealous Muslim.
But when he began speaking of jihad and plans to blow up buildings, senior figures at the mosque reported him the FBI – the very people who sent him.
Informant: FBI operative Craig Monteilh was sent to spy on Muslims but was thrown out and reported to his handlers for extremist beahviour
Informant: FBI operative Craig Monteilh was sent to spy on Muslims but was thrown out and reported to his handlers for extremist beahviour
Now the FBI is facing criticism for its use of such stooges which have backfired in a number of cases.
The law enforcement agency’s problems have been confounded after Monteilh, a petty criminal with forgery convictions, went public with claims he received $177,000 tax free in 15 months for his work.
Shakeel Syed, of the Islamic Shura Council of Southern California which represents more than 75 mosques told the Washington Post: ‘The community feels betrayed.
‘They got a guy, a bona fide criminal, and obviously trained him and sent him to infiltrate mosques.
‘And when things went sour, they ditched him and he got mad. It’s like a soap opera, for God’s sake.’
The emergence of details of the FBI’s attempted infiltration comes after an Oregan man was arrested for planning to bomb a Christmas tree lighting ceremony.
An explosive device he was discovered in possession of had been supplied to him by an undercover FBI agent and was made by FBI technicians in a case of apparent entrapment.
Sacred: The informant was send to the mosque to secretly record conversations (file picture)
Sacred: The informant was send to the mosque to secretly record conversations (file picture)
The FBI defended its tactics, claiming such operations had prevented further terrorist atrocities in the wake of 9/11.
Steven Martinez, assistant director in charge of the FBI’s Los Angeles field office, said that in certain circumstances, if there is evidence of a crime, FBI agents may ‘conduct an activity that might somehow involve surveillance in and about a mosque.’
He added: ‘I know there’s a lot of suspicion that that’s the focus, that we’re looking at the mosques, monitoring who is coming and going. That’s just not the case.’
Monteilh claims he was already working for the FBI when he was approached about infiltrating mosques and was told ‘Islam is a threat to our national security’.
He agreed and became Farouk al-Aziz, code name Oracle, a French Syrian in search of his Islamic roots.
He was trained by the FBI and claims he was told to infiltrate mosques in Orange County and two other counties.
Worshippers said that in Monteilh’s 10 months at the mosque, he became almost manic in his devotion, attending prayers five times a day but he was secretly recording conversations.
However, when he began to tell Muslims he had access to weapons they became convinced he was a terrorist and ironically reported the informant to the FBI.
UPDATED: 22:42 GMT, 6 December 2010
Find this story at 6 December 2010
© Associated Newspapers Ltd
<< oudere artikelen nieuwere artikelen >>