Raytheon Video Claims Riot Software Can Track Users Via Social Networks
IN FOCUS, ANGLO AMERICA, MILITARISM, MEDIA, WHISTLEBLOWING - SURVEILLANCE, 18 Feb 2013
Raytheon, a U.S. military manufacturer, is selling a new software surveillance package named “Riot” that claims to predict where individuals are expected to go next using technology that mines data from social networks like Facebook, Foursquare and Twitter.
Based just outside of Boston, Massachusetts, Raytheon sells $25 billion worth of equipment a year to military clients like the Pentagon. Some of its most famous products include Sidewinder air-to-air missiles, Maverick air-to-ground missiles, Patriot surface-to-air missiles and Tomahawk submarine-launched cruise missiles.
Raytheon’s Rapid Information Overlay Technology (Riot) software extracts location data from photos and comments posted online by individuals, and then analyzes this information to create a variety of spider diagrams to show where the individuals like to go, what they like to do and whom they communicate with.
A video demonstration of the software was recently published online by the Guardian newspaper. In it, Brian Urch of Raytheon shows how Riot can be used to track “Nick” – a company employee – to predict that the best time and place to steal his computer or put spy software on it.
“Six a.m. appears to be the most frequently visited time at the gym,” says Urch in the video which is dated November 2010. “So if you ever did want to try to get a hold of Nick – or maybe get a hold of his laptop – you might want to visit the gym at 6:00 a.m. on Monday.”
“Riot is a big data analytics system design we are working on with industry, national labs and commercial partners to help turn massive amounts of data into useable information to help meet our nation’s rapidly changing security needs,” Jared Adams, a spokesman for Raytheon’s intelligence and information systems department, told the Guardian.
Adams says that nobody has bought the software – which is still under development – yet. However, company filings indicate that Riot is classified as an “Export Administration Regulations 99” item which allows it to be sold or exported to any client.
But it is certainly true that a number of U.S. government agencies have been eagerly pursuing surveillance software to exploit the vast quantities of data that individuals are posting online about themselves. In January 2012 the Federal Bureau of Investigation posted a request for an application that would allow it to “provide an automated search and scrape capability of social networks including Facebook and Twitter … and (i)mmediately translate foreign language tweets into English.”
Last month the U.S. Transportation Security Administration asked contractors to propose applications “to generate an assessment of the risk to the aviation transportation system that may be posed by a specific individual” using “specific sources of current, accurate, and complete non-governmental data.” The initial plan is to use it to screen volunteer flyers who will be offered the benefits of “expedited screening lanes … leave on their shoes, light outerwear and belts, as well as leave laptops and … compliant liquids in carry-on bags.”
Privacy activists say that the Riot package is troubling. “This sort of software allows the government to surveil everyone,” Ginger McCall, the director of the Electronic Privacy Information Center’s Open Government program, told NBC News. “It scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this.”
“(T)he government has no business rooting around people’s social network postings—even those that are voluntarily publicly posted—unless it has specific, individualized suspicion that a person is involved in wrongdoing,” writes Jay Stanley, a senior policy analyst at the Speech, Privacy and Technology Project of the American Civil Liberties Union. “Among the many problems with government “large-scale analytics” of social network information is the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as Riot, or to target them for further invasions of privacy based on incorrect inferences.”
Indeed, it would also be possible for a tech-savvy malcontent to lead security officials on a wild goose chase, or even deliberately frame anyone they wanted.
Go to Original – corpwatch.org
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Read more
Click here to go to the current weekly digest or pick another article:
IN FOCUS:
- Che Guevara, Nelson Mandela, Yahya Sinwar: Freedom Fighters
- Israel’s War on the World
- War on Gaza and How the US and Israel Dehumanize Human Culture
ANGLO AMERICA:
- A No-Win Dilemma for US Peace Voters
- “Don’t Destroy What You Want to Inherit”: Peacebuilding Holds the Key to Building a Strong USA
- Kamala Harris Comes Out of the Closet on Israel
MILITARISM:
- On Democracy NOW!--A Tale of Two Ongoing Genocides in Israel and Myanmar
- Thomas Merton on US Militarism
- Microsoft's CEO for Israel to Appear at Event Celebrating Israeli Military AI
MEDIA:
- Israel’s War on Journalism
- How a Secluded 1984 Conference Forged Israel’s Unprecedented Influence Over US Media
- Revealed: The Israeli Spies Writing US News
WHISTLEBLOWING - SURVEILLANCE: