The CIA admits to monitoring Twitter, Facebook, and blogs. This shouldn't surprise anyone, but the tools they’re using might be enough to get you to rethink posting anything personal or ever checking in...
How and why the Government is Stalking you
The spring of 2011--what is now known as ‘The Arab Spring’--saw a new phenomenon emerge on the global political stage. A new type of revolution upended one Middle Eastern regime after another. In almost every country the story was the same: protestors and activists used social media to coordinate and communicate their activities. This mixture of activism and open communication proved to be a potent combination.
"We Use Facebook to Schedule the protests, Twitter to coordinate, and YouTube to tell the world," said a protester.
While you might think this scares governments into cracking down on the Internet and social networking, it has produced the opposite effect. Governments with the ability to monitor online networking have instead looked at it as a valuable reservoir of information that they can mine to stay one step ahead of online activists.
Social activity on the Internet generates mountains of data on social sentiment and public opinion. A government with the power to monitor this data flow can predict the direction of social sentiment and public opinion, and use this information to preemptively shape the online discussion and, presumably, its outcome.
What we know about government social media monitoring comes from a combination of what they say they do, what those of us in the industry know is possible, and common sense. The government response to most direct queries is “that’s classified”. But in an AP article about government use of social networks, the CIA admitted to monitoring twitter, facebook, and blogs. This shouldn’t surprise anyone, but the tools they’re using might be enough to get you to rethink posting anything person personal or ever checking in.
In 2009, the venture arm of the CIA, called In-Q-Tel, put money into a company called Visible Technologies. Visible developed technology, which--last we knew--crawled over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, online forums, Flickr, YouTube, Twitter and Amazon. A Visible spokesman said that the CIA wanted Visible to keep track of foreign social media, and give spooks “early-warning detection on how issues are playing internationally.”
A defense contractor named Raytheon has developed a deep analytics tool called Riot (Rapid Information Overlay Technology) that gathers all your social data and reports on who you are, what you say, how you feel about different topics, who you know, and where you go.
The most interesting and disturbing part of this software is its ability to use social data to figure out where you are likely going to be and when. Using social networks like Twitter, Facebook, and Google+, these tools can develop a sophisticated psychological profile of users. Because the majority of social networking is now done from mobile devices, they can also determine where you typically are on a current day, and where you will probably go next (this type of technology is already publicly available in products such as Google Now personal assistant). Layer on top of this what we already know about the close relationship between mobile providers and the government, and it’s a safe bet that if the government wants to know where you and what you’re up to right now, they know.
Taking it Further: Controlling the Conversation and Astroturfing
Beyond simple monitoring, the government is actively using their capabilities to control the conversation online and direct public opinion. It’s well known that humans value social proof highly, and that a herd behavior often develops around popularity of any kind. And we now know that the government is capitalizing on this behavior: the US government is running a large ring of puppet accounts as part of Operation Earnest Voice (OEV)--a practice commonly called “astroturfing”.
The little declassified information we have about OEV comes from a contract awarded by Central Command (Centcom), which oversees military operations, to a California corporation called Ntrepid. The stated goal of this technology is to support, “classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US." But Isaac R. Porche, a researcher at the RAND corporation, claims it would not be easy to exclude US audiences when dealing with internet communications.
Operation Earnest voice is built to allow 50 real users to manage 10 fake accounts each. These 500 accounts appear to be from anywhere in the world they user would like, “replete with background , history, supporting details, and cyber presences that are technically, culturally and geographically consistent.” What it does, effectively, is create a network of online personas that, when working in a coordinated fashion, can control the tone and direction of just about any online conversation.
These accounts could have some very useful applications outside of the stated goal; they could be used to help monitor social networking sites, and they would be quite powerful in influencing social movements through hashtags and what’s hot features on twitter and Google+. Also, the personas could quite effectively drown out viewpoints that the government would like to suppress. By dominating forums and engaging in some basic SEO, government propaganda would be hard to distinguish from the truth.
So what can you do?
The explosion of Big Data in our society gives us tools and opportunities we couldn’t have imagined 20 years ago, we can now freely promote what we believe in and even bring about real change. But this comes at a cost, in the process we’ve given up dramatic amounts of data about ourselves, we’re telling the world who we care about, what really matters to us, and where we are going to be. Social Networks are great, but they offer a trade off. So before you join foursquare or start geotagging your images, take a moment to think: Do I want everyone to know this about me?
If you’re interested in learning more about how this type of data mining is done, we just finished a book on this very topic that we're offering you for free! Data Science Secrets explores in greater detail the process's that enable companies to do this and other amazing things with their data. Free for for a limited time, get your copy today by signing up below: