Obama mining Facebook, Twitter to predict crimes. Controversial program may offer insight into Verizon scandal
Posted on June 7, 2013 at 12:57 AM EST
By Aaron Klein
Clues to the federal government‚Äôs reason for collecting the telephone records of millions of Verizon customers may be found in a recently unearthed 2010 project seeking to predict criminal activity using vast quantities of data on citizens mined from social network websites such as Facebook and Twitter.
In February,¬†the Sydney Morning Herald reported¬†the Massachusetts-based multinational corporation, Raytheon ‚Äď the world‚Äôs fifth largest defense contractor ‚Äď had developed a ‚ÄúGoogle for Spies‚ÄĚ operation.
Herald reporter Ryan Gallagher wrote that Raytheon had ‚Äúsecretly developed software capable of tracking people‚Äôs movements and predicting future behavior by mining data from social networking websites‚ÄĚ like Facebook, Twitter, and Foursquare.
The software is called RIOT, or Rapid Information Overlay Technology.
Raytheon told the Herald it has not sold RIOT to any clients but admitted that, in 2010, it had shared the program‚Äôs software technology with the U.S. government as part of a ‚Äújoint research and development effort ‚Ä¶ to help build a national security system capable of analyzing ‚Äėtrillions of entities‚Äô from cyberspace.‚ÄĚ
In April, RIOT was reportedly showcased at a U.S. government and industry national security conference for secretive, classified innovations, where it was listed under the category ‚Äúbig data ‚Äď analytics, algorithms.‚ÄĚ
Jay Stanley, senior policy analyst for the ACLU Speech, Privacy and Technology Project, argued that major ethical dilemmas ensue although RIOT apparently utilizes only publicly available information from companies like Facebook, Twitter and Foursquare.
‚ÄúThe government has no business rooting around people‚Äôs social network postings ‚Äď even those that are voluntarily publicly posted ‚Äď unless it has specific, individualized suspicion that person is involved in wrongdoing,‚ÄĚ¬†Stanley wrote on the ACLU blog.
Stanley wrote that among the many problems with government large-scale analytics of social network information ‚Äúis the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as RIOT, or to target them for further invasions of privacy based on incorrect inferences.‚ÄĚ
‚ÄúThe chilling effects of such activities,‚ÄĚ he concluded, ‚Äúwhile perhaps gradual, would be tremendous.‚ÄĚ
Ginger McCall, attorney and director of the Electronic Privacy Information Center‚Äôs Open Government program,¬†told NBC in February, ‚ÄúThis sort of software allows the government to surveil everyone.
‚ÄúIt scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this, other than that they can.‚ÄĚ
As for RIOT‚Äôs ability to help catch terrorists, McCall called it ‚Äúa lot of white noise.‚ÄĚ
The London Guardian further obtained a four-minute video that shows how the RIOT software uses photographs on social networks. The images, sometimes containing latitude and longitude details, are ‚Äúautomatically embedded by smartphones within so-called ‚Äėexif header data.‚Äô
RIOT pulls out this information, analyzing not only the photographs posted by individuals, but also the location where these images were taken,‚ÄĚ the Guardian reported.
Such sweeping data collection and analysis to predict future activity may further explain some of what the government is doing with the phone records of millions of Verizon customers.
In March 2006, the New York Times first reported the National Security Agency was utilizing phone records to search for patterns.
‚ÄúIn the increasingly popular language of network theory, individuals are ‚Äúnodes,‚ÄĚ and relationships and interactions form the ‚Äúlinks‚ÄĚ binding them together; by mapping those connections, network scientists try to expose patterns that might not otherwise be apparent,‚ÄĚ reported the Times.
In February 2006, more than a year after Obama was sworn as a U.S. senator, it was revealed the ‚Äúsupposedly defunct‚ÄĚ Total Information Awareness data-mining and profiling program had been acquired by the NSA.
The Total Information Awareness program was first announced in 2002 as an early effort to mine large volumes of data for hidden connections.
With additional research by Brenda J. Elliott