{"id":46547,"date":"2014-08-25T12:00:07","date_gmt":"2014-08-25T11:00:07","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=46547"},"modified":"2015-05-05T21:30:42","modified_gmt":"2015-05-05T20:30:42","slug":"pentagon-funds-new-data-mining-tools-to-track-and-kill-activists-part-iii","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/08\/pentagon-funds-new-data-mining-tools-to-track-and-kill-activists-part-iii\/","title":{"rendered":"Pentagon Funds New Data-Mining Tools to Track and Kill Activists (Part III)"},"content":{"rendered":"<p><em>20 Aug 2014 &#8211; This is the third of a four-part investigative series about U.S. Defense-funded programs to spy on activists and Muslims worldwide. <\/em><\/p>\n<p>Read <strong>Part I <a target=\"_blank\" href=\"http:\/\/www.occupy.com\/article\/exposed-pentagon-funds-new-data-mining-tools-track-and-kill-activists-part-i\" >HERE<\/a><\/strong>\u00a0and <strong>Part II\u00a0<a target=\"_blank\" href=\"http:\/\/www.occupy.com\/article\/exposed-pentagon-funds-new-data-mining-tools-track-and-kill-activists-part-ii\" >HERE<\/a><\/strong><\/p>\n<p>The U.S. Department of Defense&#8217;s multimillion dollar university\u00a0<a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/environment\/earth-insight\/2014\/jun\/12\/pentagon-mass-civil-breakdown\" >research program<\/a>, the Minerva Research Initiative, is developing new data mining and analysis tools for the U.S. military intelligence community to capture and analyze social media posts. The new tools provide unprecedented techniques to identify individuals engaged in political radicalism around the world, while mapping their behavioral patterns and social or organizational connections and affiliations.<\/p>\n<p>The range of research projects undertaken by Arizona State University (ASU), a National Security Agency (NSA)-designated university, includes the development of algorithms which leading intelligence experts agree could directly input into the notorious &#8220;kill lists&#8221; \u2013 enhancing the intelligence community\u2019s ability to identify groups suspected of terrorist activity for potential targeting via the CIA\u2019s extrajudicial &#8220;signature&#8221; drone strikes.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46548\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa.jpg\" alt=\"gchq-spying pentagon facebook nafez mosadeq nsa\" width=\"696\" height=\"391\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa.jpg 996w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa-300x168.jpg 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p><strong>Through the Social Media Looking Glass<\/strong><\/p>\n<p>One Pentagon-sponsored ASU project whose\u00a0<a target=\"_blank\" href=\"http:\/\/www.public.asu.edu\/%7Ehdavulcu\/SNAM12.pdf\" >findings were published<\/a>\u00a0by the Social Network Analysis and Mining journal in 2012 involved downloading and cataloging 37,000 articles from 2005 to 2011 from the websites of 23 Indonesian religious organizations to \u201cprofile their ideology and activity patterns along a hypothesized radical\/counter-radical scale.\u201d<\/p>\n<p>This study also found that the automated threat-classification model successfully ranked the organizations with \u201cexpert-level accuracy.\u201d Related research has focused on developing data-mining and analytical tools to track political trends and social movements via social media.<\/p>\n<p>According to Minerva chief Erin Fitzgerald, such research is about minimizing conflict. \u201cInsights generated from Minerva research are intended to inform more effective strategic and operational policy decisions by defense leadership,&#8221; said Fitzgerald. &#8220;The end goal is always to prevent future conflict and \u2013 if the U.S. must play a role in conflict elsewhere \u2013 to help DoD understand how to most effectively engage with partners to mitigate that conflict.\u201d<\/p>\n<p>Long before Edward Snowden\u2019s revelations about NSA surveillance programs, it has been known that the\u00a0<a target=\"_blank\" href=\"http:\/\/www.wired.com\/2009\/10\/exclusive-us-spies-buy-stake-in-twitter-blog-monitoring-firm\/\" >CIA and other U.S. intelligence agencies<\/a>\u00a0have actively sought to analyze social media, from blogposts to tweets and from Amazon reviews to YouTube clips and Flickr photos. The NSA\u2019s\u00a0<a target=\"_blank\" href=\"http:\/\/www.projectcensored.org\/nsa-uses-online-data-mining-predict-global-political-unrest\/\" >Open Source Indicators Program<\/a>, for instance, involves \u201cacademics who work at a research branch of the NSA\u201d developing automated analytical tools that mine open source information on Facebook, Twitter, Google and elsewhere to predict future events such as protests, pandemics, resource shortages, mass migrations, and economic crises.<\/p>\n<p>Such open source information is also already being used as \u201cenrichment\u201d data\u00a0<a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/09\/29\/us\/nsa-examines-social-networks-of-us-citizens.html?pagewanted=all&amp;_r=1&amp;\" >to be integrated<\/a>\u00a0with phone and email metadata to create sophisticated graphs identifying the social connections, associates, locations, traveling companions and other patterns of behavior of individuals seen as potential \u201cradicals\u201d or terrorists \u2013 whether American or foreign.<\/p>\n<p>This analytical capability is directly mobilized to identify not just potential extremists and their associations, but also to pursue and sanction &#8220;high-value targets.&#8221; In one case in 2012, according to the\u00a0<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program\/2013\/10\/16\/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html\" >Washington Post<\/a>, \u201ca user account on a social media Web site provided an instant portal to an al-Qaeda operative\u2019s hard drive.\u201d A leaked NSA document confirmed: \u201cWithin minutes, we successfully exploited the target.\u201d<\/p>\n<p>The National Counterterrorism Center (NCTC), which generates the CIA\u2019s kill lists, draws its information from databases across the U.S. intelligence community, including the FBI, CIA, NSA and Department of Homeland Security (DHS), among others, encompassing and integrating both metadata from private electronic communications and associated data across an individual\u2019s online social media networks.<\/p>\n<p>DHS fusion centers, working closely with private sector corporations,\u00a0<a target=\"_blank\" href=\"http:\/\/www.prwatch.org\/news\/2013\/05\/12122\/homeland-security-apparatus-fusion-centers-data-mining-and-private-sector-partner\" >routinely data-mine social media posts of American citizens<\/a>\u00a0including, for instance, Occupy activists in efforts to detect threat trends that could constitute a \u201chazard\u201d to the public.<\/p>\n<p>According to a classified criteria, names of potential \u201cradicals\u201d outside the U.S. linked to terrorist groups or activity are\u00a0<a target=\"_blank\" href=\"http:\/\/www.nbcnews.com\/id\/52192630\/ns\/technology_and_science-tech_and_gadgets\/t\/how-obamas-disposition-matrix-kill-list-could-be-used-us-soil\/\" >canvassed by the NCTC<\/a>\u00a0for potential extrajudicial assassination, and assessed by a White House interagency commission, which narrows them down before a presidential decision as to whether each individual lives or dies.<\/p>\n<p>The problem, according to ASU researchers writing in a separate 2013 paper, is that current technology \u201ccannot find the proverbial \u2018needles in a haystack\u2019 corresponding to those individuals with radical or extremist ideas, connect the dots to identify their relationships, and their socio-cultural, political, economic drivers.\u201d<\/p>\n<p>This has led the Pentagon to fund the ASU to create a technology dubbed\u00a0<a target=\"_blank\" href=\"http:\/\/www.public.asu.edu\/%7Ehdavulcu\/fosint13.pdf\" >&#8220;LookingGlass,&#8221;<\/a>\u00a0\u201ca visual intelligence platform for tracking the diffusion of online social movements.\u201d Algorithms are applied to \u201clarge amounts of text collected from a wide variety of organizations\u2019 media outlets to discover their hotly debated topics, and their discriminative perspectives voiced by opposing camps organized into multiple scales.\u201d<\/p>\n<p>These are then used to \u201cclassify and map individual Tweeter\u2019s message content to social movements based on the perspectives expressed in their weekly tweets.\u201d The LookingGlass platform is able \u201cto track the geographical footprint, shifting positions and flows of individuals, topics and perspectives between groups.\u201d<\/p>\n<p>Unlike previous systems, the Pentagon\u2019s appropriation of LookingGlass can provide \u201creal-time contextual analysis of complex socio-political situations that are rife with volatility and uncertainty. It is able to rapidly recognize radical hot-spots of networks, narratives and activities, and their socio-cultural economic, political drivers,\u201d and is able to identify and track specific \u201cradical\u201d and \u201cnon-radical\u201d individuals, along with shifts in their beliefs and affiliations to \u201cradical\u201d and \u201cnon-radical\u201d movements and organizations.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa1.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46549\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa1.png\" alt=\"gchq-spying pentagon facebook nafez mosadeq nsa1\" width=\"692\" height=\"475\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa1.png 1202w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa1-300x205.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa1-1024x702.png 1024w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p><strong>The Entire Physical and Virtual World is a Militarized Battlefield<\/strong><\/p>\n<p>U.S. intelligence experts assessing the Minerva initiative strongly disagreed with Fitzgerald\u2019s claims that these Pentagon-funded research projects would contribute to minimizing conflict.<\/p>\n<p>In my earlier\u00a0<a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/environment\/earth-insight\/2014\/jun\/12\/pentagon-mass-civil-breakdown\" >report on Minerva<\/a>, I disclosed an internal Minerva staff email related directly to the ASU\u2019s radicalization discourse project, which confirmed that the program is geared toward producing \u201ccapabilities that are deliverable quickly\u201d for application to field operations. Senior Pentagon officials had told ASU staff to develop \u201cmodels and tools that can be integrated with operations.\u201d<\/p>\n<p>The analytical tools developed for the Pentagon by ASU researchers are directly applicable to the\u00a0<a target=\"_blank\" href=\"http:\/\/www.popularmechanics.com\/technology\/military\/news\/nsa-data-mining-how-it-works-15910146\" >extensive data-mining programs of the National Security Agency<\/a>\u00a0revealed by whistleblowers Edward Snowden, Russell Tice, William Binney and Thomas Drake, among others. Billions of pieces of data in the form of phone calls, emails, photos and videos from major communication giants like Google, Facebook, Twitter and Microsoft, among others, are collected and then analyzed to identify national security threats.<\/p>\n<p>Technologies like LookingGlass could dramatically advance the NSA\u2019s capacity to track and analyse metadata in the context of the &#8220;open source&#8221; online data it mines so comprehensively. Former senior NSA executive and whistleblower Thomas Drake told me regarding the Minerva-funded data-mining projects, \u201cWe must remember that the entire world, physical and virtual, is considered by the Pentagon as fair game and a militarized battlefield.\u201d<\/p>\n<p>LookingGlass, along with the other data-mining tools being developed by universities with Pentagon funding, fits neatly into the parameters of earlier intelligence structures such as the Pentagon\u2019s &#8220;Total Information Awareness&#8221; (TIA) program launched by the Bush administration, described by the\u00a0<a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2002\/12\/15\/magazine\/15TOTA.html\" >New York Times<\/a>\u00a0as \u201cthe most sweeping effort to monitor the activity of Americans since the 1960\u2019s.\u201d TIA\u2019s function was to use data-mining \u201cto create risk profiles for millions of visitors and American citizens in its quest for suspicious patterns of behavior.\u201d<\/p>\n<p>Under Obama, this has evolved into the global \u201cdisposition matrix,\u201d a \u201cnext-generation targeting list\u201d which \u201ccontains the names of terrorism suspects arrayed against an accounting of the resources being marshaled\u201d to kill them, including the ability to map \u201cplans for the \u2018disposition\u2019 of suspects beyond the reach of American drones.\u201d The kill lists, reported the\u00a0<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/plan-for-hunting-terrorists-signals-us-intends-to-keep-adding-names-to-kill-lists\/2012\/10\/23\/4789b2ae-18b3-11e2-a55c-39408fbe6a4b_story.html\" >Washington Post<\/a>, are part of \u201ca single, continually evolving database in which biographies, locations, known associates and affiliated organizations are all catalogued. So are strategies for taking targets down, including extradition requests, capture operations and drone patrols.\u201d<\/p>\n<p>It is therefore no coincidence that Lisa Troy \u2013 the Pentagon\u2019s Minerva supervisor for the University of Washington\u2019s project, aiming to \u201cfingerprint\u201d the configuration of \u201cmass political movements\u201d to gauge the determinants of \u201csocial change\u201d \u2013 is an employee of Bowman Systems Management which is a leading U.S. defense contractor working on drone warfare technology.<\/p>\n<p>Yet as Harvard security technologist Prof. Bruce Schneier has\u00a0<a target=\"_blank\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2006\/03\/data_mining_for.html\" >pointed out<\/a>, the inherently murky and fluid categories used to profile terrorists and potential terrorists mean that the risk of seeing terrorists where there are none is higher the more data is inputted into the data-mining system.<\/p>\n<p>\u201cDepending on how you \u2018tune\u2019 your detection algorithms, you can err on one side or the other,\u201d Schneier writes. \u201cYou can increase the number of false positives to ensure that you are less likely to miss an actual terrorist plot, or you can reduce the number of false positives at the expense of missing terrorist plots. To reduce both those numbers, you need a well-defined profile.\u201d<\/p>\n<p>The problem is that for terrorism, he writes, \u201cThere is no well-defined profile, and attacks are very rare. Taken together, these facts mean that data mining systems won\u2019t uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.\u201d<\/p>\n<p>This is why the NSA\u2019s eavesdropping program \u201cspat out thousands of tips per month,\u201d said Schneier, and \u201cevery one of them turned out to be a false alarm.\u201d Although \u201cuseless for finding terrorists,\u201d the NSA\u2019s data-mining is\u00a0<a target=\"_blank\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2006\/07\/terrorists_data.html\" >\u201cuseful for monitoring political opposition<\/a>\u00a0and stymieing the activities of those who do not believe the government&#8217;s propaganda.\u201d<\/p>\n<p>\u201cWhat this is really about is furthering the militarization of domestic law enforcement and going further down the rabbit hole into the belief that it is possible to control the 99% if you just have enough surveillance and enough armed force,\u201d said ex-CIA official Robert Steele, speaking about ASU\u2019s LookingGlass platform.<\/p>\n<p>Indeed, although the NCTC\u2019s criteria for generating kill lists remains secret, a leaked NCTC document obtained by\u00a0<a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/article\/2014\/08\/05\/watch-commander\/\" >The Intercept<\/a>\u00a0in July revealed that the criteria to add individuals to watch lists of \u201cknown or suspected terrorists\u201d in the first instance was vague, requiring only \u201creasonable suspicion,\u201d not \u201cconcrete facts.\u201d Supporting evidence for doing so could be as thin as a single, uncorroborated social media post \u2013 which perhaps explains why 40% of suspects on the main watch list are not linked to any \u201crecognized terrorist group.\u201d<\/p>\n<p>Extrajudicial assassinations known as &#8220;signature&#8221; strikes, targeting groups of terrorism suspects whose identities are not known, reportedly have far more fluid criteria in determining whether they are plotting or engaged in terrorist activity \u2013 so fluid that State Department officials\u00a0<a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2012\/05\/29\/world\/obamas-leadership-in-war-on-al-qaeda.html\" >complained<\/a>\u00a0to the White House that the CIA\u2019s criteria is \u201ctoo lax.\u201d They joked that if the CIA sees \u201cthree people doing jumping jacks\u201d in a hostile territory, it would be designated a terrorist training camp. Hence, drone warfare in Pakistan and Yemen has frequently targeted \u201cterrorist suspects\u201d about whom the CIA \u201cwere not certain beforehand of their presence\u201d and \u201cwhose names they do not know.\u201d<\/p>\n<p>\u201cThe algorithms being developed at ASU remind me of the algorithms used as the basis for signature strikes with drones,\u201d said former senior NSA executive Thomas Drake. In 2006, Drake leaked information about the NSA\u2019s data-mining project Trailblazer to the press. Although the U.S. government attempted to prosecute him under the Espionage Act in 2010, the case collapsed.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa2.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46550\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa2.jpg\" alt=\"gchq-spying pentagon facebook nafez mosadeq nsa2\" width=\"700\" height=\"525\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa2.jpg 1000w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/08\/gchq-spying-pentagon-facebook-nafez-mosadeq-nsa2-300x225.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p>I asked Drake whether the ASU\u2019s algorithms could be applied to fine-tuning the generation of &#8220;kill lists&#8221; for drone strikes. \u201cYour hunch is right,\u201d he said. \u201cHaving the U.S. government and Department of Defense fund this kind of research at the university level will bias the results by default. This is a fall-out of big data research of this type, using algorithms to detect patterns when the patterns themselves are an effect \u2013 and mixing up correlation with causality. Under this flawed approach, many false positives are possible and these results can create an ends of profiling justifying the means of data-mining.\u201d<\/p>\n<p>________________________<\/p>\n<p><em>Dr Nafeez Mosaddeq Ahmed isa member of the TRANSCEND Network for Peace, Development and Environment. He is director of the Institute for Policy Research &amp; Development,<\/em> <em>a bestselling author, investigative journalist and international security scholar who writes for <\/em>The Guardian<em> on the geopolitics of environmental, energy and economic crises. He is the author of<\/em> <a target=\"_blank\" href=\"http:\/\/crisisofcivilization.com\" >A User&#8217;s Guide to the Crisis of Civilization: And How to Save It<\/a><em>, and the forthcoming science fiction thriller, <\/em><a target=\"_blank\" href=\"http:\/\/zro.pt\" >Zero Point<\/a><em>. The Sibel Edmonds memoirs, <\/em><a target=\"_blank\" href=\"http:\/\/www.classifiedwoman.com\/\" >Classified Woman: The Sibel Edmonds Story<\/a><em> is available from all good online booksellers.<\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.occupy.com\/article\/pentagon-funds-new-data-mining-tools-track-and-kill-activists-part-iii\" >Go to Original \u2013 occupy.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Department of Defense&#8217;s multimillion dollar university research program, the Minerva Research Initiative, is developing new data mining and analysis tools for the U.S. military intelligence community to capture and analyze social media posts. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[],"class_list":["post-46547","post","type-post","status-publish","format-standard","hentry","category-transcend-members"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/46547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=46547"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/46547\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=46547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=46547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=46547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}