New Media Politics:
Rethinking Activism and
National Security in Cyberspace
Edited by
Banu Baybars-Hawks
New Media Politics:
Rethinking Activism and National Security in Cyberspace
Edited by BanuBaybars-Hawks
This book first published 2015
Cambridge Scholars Publishing
Lady Stephenson Library, Newcastle upon Tyne, NE6 2PA, UK
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
Copyright © 2015 by Banu Baybars-Hawks and contributors
All rights for this book reserved. No part of this book may be reproduced,
stored in a retrieval system, or transmitted, in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without
the prior permission of the copyright owner.
ISBN (10): 1-4438-7710-7
ISBN (13): 978-1-4438-7710-7
This book is dedicated to the memory of Dr. Dwight L. Teeter, Jr., a
journalism historian and legal scholar. Dr. Teeter passed away on February
27, 2015. His academic career spanned fifty years and included teaching at
the University of Texas at Austin, the University of Kentucky, and the
University of Wisconsin at Madison. His last home institution was the
University of Tennessee in Knoxville, where he served as dean of the
College of Communications from 1991 to 2002 and continued to teach as a
professor until he retired at the end of .2014
Dr. Teeter had a major impact on the lives of so many of his students
and colleagues. With the announcement of his death, countless messages
of mourning were shared at an interpersonal level and via social media.
Some of the words or phrases used to describe Dr. Teeter were “witty,”
“genuine,” “honest,” “incredibly smart,” and “class act.” Many expressed
how Dr. Teeter went beyond being an educator and was also a friend who
often extended a helping hand and provided words of encouragement. Dr.
Teeter genuinely cared about the well-being of others, and it was a great
joy for him to see his students and mentees find success in life.
Dr. Teeter was passionate about the issues of press freedom and
government transparency. In the 13th edition of his textbook Law of Mass
Communications, Dr. Teeter expressed deep concern about the recent
expansions of government secrecy and intrusions into privacy by the
government, law enforcement agencies, and private businesses. This was a
topic that he was looking forward to researching upon retirement. It is
unfortunate that we will never have the opportunity to read the scholarly
work that this brilliant scholar would have produced. Perhaps we may
comfort ourselves with the knowledge that the many individuals inspired
by Dr. Teeter’s writings will in some way continue his work by asking
difficult but important questions pertaining to the free flow of information
and press freedom. Research that sought to reveal social injustices and
protect vital social and political freedoms always brought a smile to Dr.
Teeter’s face. That smile will be profoundly missed, but fondly
remembered.
TABLE OF CONTENTS
List of Figures and Tables
x
Acknowledgements
xi
Part I.
Chapter One
Introduction—Occupying Cyberspace: Cyberactivism, Cyberterrorism
and Cybersecurity
Banu Baybars-Hawks
2
Chapter Two
Resistance from within Hegemony: The Rise of Semi-Anonymous
Resistance in the New Media Environment
Sarphan Uzunoğlu
15
Chapter Three
34
Electronic Intifada: Platform for Conflict Transformation
Eser Selen
Chapter Four
Cyberactivism in Syria's War: How Syrian Bloggers Use the Internet
for Political Activism
Yenal Göksun
49
Chapter Five
The Multitudes: From Ideological Disease to Conceptual Cure
Cristina Ivan
63
Chapter Six
Activism, Transmedia Storytelling and Empowerment
Eloisa Nos Aldas
78
viii
Table of Contents
Chapter Seven
95
The Dynamics of a New Mediated Protest Cycle: Networked, Transitional
and Radical?
Pantelis Vatikiotis
Chapter Eight
The Internet's Impact on Social Movements: The Role of Facebook
in the January 25 Revolution in Egypt
Hussni Nasr
112
Part II.
Chapter Nine
Networks and Netwars: The Future of Terror
Aşkın İnci Sökmen
134
Chapter Ten
The Social Media OSINT Challenge to US Intelligence:
Culture not Gigabytes
Abdelrahman Rashdan
155
Chapter Eleven
Legitimizing Securitization of Cyberspace by using "Risk" Discourse
Sevda Ünal
173
Chapter Twelve
Opinion Production by UGC: An Analysis of Readers' Reviews
about Online News related to Al-Qaeda
Bilge Narin and Bahar Ayaz
186
Chapter Thirteen
Technology, Surveillance, and National Security: Implications
for Democracy
Catherine A. Luther
198
Chapter Fourteen
215
The Dialectics of Internet Censorship: A Mouffian Analysis of Resistance
and Subversion in the Case of Turkey
Çağrı Yalkın
New Media Politics
ix
Chapter Fifteen
229
From the “Worst Menace to Societies” to the “Robot Lobby”: A Semantic
View of Turkish Political Rhetoric on Social Media
Suncem Koçer
Chapter Sixteen
244
Internet Surveillance and Censorship: Discourses of Security, Privacy
and Morality
İrem İnceoğlu
Chapter Seventeen
257
At a Critical Crossroads: New Media, Government and Society in Turkey
Banu Baybars-Hawks
Contributors
269
The Social Media OSINT Challenge to US Intelligence:
Culture not Gigabytes
Abdelrahman Rashdan
Assistant Lecturer of Political Science
Future University in Egypt
Abstract
The unprecedented pace of technological development gave birth to new forms of open
source (OS) information that has been increasingly valuable overtime. Internet
development made social media a more powerful tool of communication and
information dissemination. From an intelligence perspective, the most useful OS
information might be that where the online user feels most comfortable and secured in
expressing his/her views. However, today’s boom in the usage of social media makes the
intelligence services face an influx of unending information stream with a lot of noise
involved, which requires very precise mechanism of access, filtration and tracking.
Another challenge would be the organizational culture in the IC involved in terms of
valuing the importance of information collected through open sources. This paper
discusses the challenges that open source intelligence (OSINT) poses to the United
States’ IC and some of the different means it uses to overcome them.
CHAPTER
THE SOCIAL MEDIA OSINT
CHALLENGE TO US INTELLIGENCE:
CULTURE NOT GIGABYTES
ABDELRAHMAN RASHDAN
Introduction
In year 2000, the US Chairman of the National Intelligence Council
(NIC) John Gannon said, "Community can succeed only if it exploits the
changes taking place in the larger information industry" (Gannon 2008).
Seven years later, the US Director of the Open Source Center (OSC), Doug
Naquin, admitted a lack of deep understanding in the Intelligence
Community (IC) of how open source relates to intelligence. Naquin says
that the mission of the intelligence is to "win football games" rather than
"pass the ball;" (Central Intelligence Retirees' Association 2007) the
mission is not merely about "stealing secrets" yet it goes beyond that,
according to him.
Although the IC has come long way concerning the usage of Open
Source Intelligence (OSINT), the rapid developments in the information
technology pose a challenge to the IC. The challenge is not so much about
the effective use of sophisticated technology to keep a close eye on the OS
information boost, yet based on evidence up to year 2007, it is rather the
"educational problem" that makes Naquin in 2007 refer to some IC
members as "folks internally who are still wondering why I am sitting at
the same table they are" (Ibid). The same problem dates back to the 1990s
as the later-on assistant director of Central Intelligence for Analysis and
Production Dr. Mark M. Lowenthal noted, "OSINT has been treated as
something that gets absorbed as part of one's professional development or
something that is obtained during one's free time by reading a newspaper
or browsing the Internet" (George and Kline 2006, 276).
CHAPTER
The unprecedented pace of technological development gave birth to
new forms of OS information which has been increasingly influential
overtime. Internet development made social media a more powerful tool of
communication and information dissemination. In a world in which civil
society and non-state actors are gaining more power, the lack of trust
among some IC members for OSINT and the effective engagement of
social media do imperil US national security and undermines its foreign
policy interests. To put it clearly, those reluctant IC members represent a
stronger challenge against the effectiveness of the IC than the rapid
technological changes in OS information and social media. Some recent
indications, however, show that the IC has moved a long way forward to
bypass the mentioned obstacles in managing the volume of OS information
and dealing with the educational problem inside.
Background
The industry of OSINT—defined as the "intelligence that is produced
from publicly available information and is collected, exploited and
disseminated in a timely manner to an appropriate audience for the purpose
of addressing a specific intelligence requirement"1—suffered historically
for different reasons. Following the collapse of the Soviet Union, there was
a general tendency to reduce the intelligence budget that was coupled with
the unfamiliarity of the political leadership with the OS information. Thus,
the OSINT's main arm at the time, Foreign Broadcast Information Service
(FBIS)—established in 1941 under the name of Foreign Broadcast
Monitoring Service (FBMS)—was forced to reduce its staff into almost
half as well as a good percentage of its foreign national staff (Central
Intelligence Retirees' Association 2007, 6). Unexpectedly, the cuts in the
budget of FBIS came in a time when the IC needed OSINT most because
of the nature of the threats rising after the end of the Cold War era. The
attention was shifting from the sophisticated military programs of the
Soviet Union to rather relatively smaller threats represented in hostile
states and non-state actors (Best Jr. and Cumming 2008, 5). Such potential
and actual threats needed intense collection of information that was in fact
openly available yet needed collection and analysis. The 1996 AspinBrown Commission recommended that the IC should make more effort to
"harness the vast universe of information now available from open
sources" (GPOAccess 1996).
The rise of the internet caused the traditional equation of the sources of
intelligence to be questioned. The estimated ratio of classified to
unclassified information on Russia, for example, was reversed from 80:20
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
during the Cold War into 20:80 post-Cold War (Best Jr. and Cumming
2008, 4). A red flag was waived by two commissions, in addition to the
mentioned Aspin-Brown. Investigations over the 9/11 concluded that the
IC has overlooked OS information that was referring to an impending
attack by al-Qaeda. The 9/11 and WMD Commissions stressed on the need
to utilize OSINT more and recommended the establishment of the Open
Source Center (OSC). The 9/11 Commission called the Director of
National Intelligence (DNI) to "establish an intelligence center for the
purpose of coordinating the collection, analysis, production and
dissemination of open source intelligence to elements of the intelligence
community" (Jane's Intelligence Digest 2007). In 2005, the OSC was
established under the office of DNI to take over the functions and
resources of the FBIS and widen its scope and duties.
FBIS and OSC
As early as year 2000, FBIS was planning for an "open source portal"
that would act as a "one-stop shop for all open source intelligence, whether
collected by FBIS or not" (Gannon 2008). The initiative was building on
previous efforts done through the collaboration of the CIA's Directorate of
Science and Technology and the Directorate of Intelligence to form the
Office of Advanced Analytical Tools (AAT) (Ibid). The AAT was
implementing cognitive and analytical tools to facilitate managing large
volume of information and presenting it in an accessible format to the
CIA's officers. The analytical advanced tools included clustering that
facilitate early warning functions; link analysis that help detect patterns of
activities; visualization to display complex data in various formats and
automated database population to reduce the man-hours spent on the
system (Ibid). In addition, FBIS was able to recognize the importance of
engaging with the broader non-IC community to enhance its own
performance and products. In-Q-Tel, thus, was established in 1999 by the
CIA to "bridge the gap between the technology needs of the [IC] and new
advances in commercial technology," according to its mission on the
nonprofit corporation's website (In-Q-Tel “Our Aim”). In-Q-Tel works to
develop unconventional information technology solutions for strategic
problems facing the IC and to fuel the private research on information
technology that would benefit all the partners through orchestrating the
work of its partner organization (Gannon 2008).
Baring in mind that all those relatively complex functions were running
under an under-funded and understaffed FBIS in an environment that was
CHAPTER
much less active when it comes to the interaction with new media, one can
extrapolate the complexity and sophistication of OSC today.
Internet and social media
While the internet represented a challenge to the IC in the 1990s and
drove the calls for reform and development of OSINT, the relatively-new
social media is now representing yet a new challenge. Recent statistics
show that the number of internet users reached 2.4 billion and 2.2 billion
email users in 2012 (Pingdom 2013); there was over one trillion unique
URL in 2008 (Google Official Blog 2008); there is over 200 million blogs
in 2010 (Kolsky 2010); about 1.23 billion monthly active Facebook users
(Sedghi 2014) and more than 200 million monthly active Twitter users
tweeting more than 500 million tweets per day (US Securities and
Exchange Commission 2013). In addition, Flickr has over six billion
photographs (Emspak 2012), and websites like YouTube have more than
100 hours of content uploaded every minute (YouTube Official Blog
2013). Overall, about 73% of adults online use social media, according to
2013 statistics (Duggan and Smith 2013).
Social media, being a complex term that involves different kinds of
media, can be defined as "a group of internet-based applications that build
on the ideological and technological foundations of Web 2.0 and that allow
the creation and exchange of user-generated content" (Ibid). Social media
can be divided in terms of social presence—acoustic, visual or physical
contact—and self-presentation as shown in figure 1 below. (Duggan and
Smith 2013) 2
Fig. 1
From an intelligence perspective, the most useful information might be
where the OS user feels most comfortable and secured in expressing his
views. The user's interaction with others can also be a target for an OSINT
collector; yet depending on the nature of the collection task assigned, the
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
importance of social presence differs. Thus, blogs, social network sites and
virtual social worlds should capture the prime focus of OSINT on social
media. Based on the availability of the collection and analytical tools,
explained later in the paper, the burden of dealing with sophisticated
virtual social worlds might exceed the benefits leaving social media
OSINT with the more tractable targets of blogs and social networking
sites.
Challenges and solutions
While the classic function of OSINT as performed by FBIS was to
monitor and translate foreign media, the evolution of social media
complicated and multiplied the tasks required by OSINT. Four main kinds
of challenges are posed by the social media against OSINT: knowledge
management, the nature of data in terms of language and cultural context,
access to data and the IC’s “educational problem.”
OS information—defined as "publicly available information that
anyone can lawfully obtain by request, purchase or observation" (National
Open Source Enterprise 2006)—fall into three categories: a) general open
source information, b) open proprietary information and c) closed
proprietary information (Jane's Intelligence Review 2000). While the first
is almost of no legal or ethical cost, obtaining the third type of information
involves high cost since it is available within the securest area of target.
Blogs and twitter are mostly accessible to all while Facebook and Skype
do have some privacy measures that have to be addressed for OSINT to
function.
To be able to exploit such information, after developing the methods to
access it, collectors and analysts should be able to understand the value of
the piece of raw information; understand the context in which it exist;
assess the timeliness; maintain a watching-brief for sudden information
that can be hidden later; and to divide the collection-management
requirements into easily-grouped tasks (Jane's Intelligence Review 2000).
As it might be clear, when applying such steps to OSINT, especially social
media, the vast amount of data would choke collectors and analysts. Thus,
the role of advanced computer technology and professional private
contractors becomes prime.
Knowledge management
The accumulated knowledge in a given OSINT entity would exacerbate
rapidly since raw social media intelligence is adding up to sifted ones
CHAPTER
every second, in addition to the knowledge and experience the collectors
and analysts are gaining overtime. Hence, techniques of Knowledge
Management (KM) can be most useful. The techniques of KM, which used
to be primarily a private sector phenomena, can play an important role in
the management, manipulation, presentation, filtration, retrieval and
storage of information and intelligence gathered from social media of
OSINT (Jane's Intelligence Review 2000).
KM techniques combine human expertise with computer-based
solutions that can facilitate the OSINT process and deal with the influx of
different kinds of data constantly inputted into the OS. Meanwhile,
because the scope of US intelligence after the Cold War has been widened
to include different and radically various spots in the world, plain off-theshelf software might not be the best choice.
For example, take a hypothetical case. If the son of a local leader from
among the Libyan rebels was conducting a Facebook chat with someone in
the office of the Libyan Permanent Representative to the United Nations at
the beginning of the 2011 revolution and the hypothetical conversation
was:
A: Elga2ed ayyamo ma3dooda
B: 3ambetreedo mosa3da?
A: Fakkar 3ammi be3awaylo
To be able to interpret those three sentences, an analyst would need to
clarify the identities of the two parties through their Facebook accounts;
know not only Arabic, but the Libya colloquial accent and techniques of
Arabic chat typing using English letters in addition to the history about
tribes in Libya and different rivalries. In other words, analyst need to have
profiles, language and cultural context. Accordingly, the brief chat would
lead the analyst to understand that the Libyan local leader is about to
initiate civil disorder against the Libyan president and he is asking for
international backing from the Libyan mission to the UN. The second reply
from side A literally means "remind the head of the mission of his tribal
affiliation;" for an analyst to be able to interpret this he/she needs to search
for the historical relations between the tribe that the UN official belongs to
and the one that the Libyan president descends from and check if they are
rivals. Thus, the final reporting for this brief chat can be:
A: We will initiate revolution against Qaddafi
B: Do you need help?
A: Give us international backing
What makes it more complicated is that there has to be a way to
identify such conversation when it takes place. In about eight month from
its establishment, the OSC was able to routinely monitor "300 jihadist
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
websites, around 500 television stations" in addition to a larger number of
newspapers and radio broadcasts by mid-2006 (Jane's Intelligence Digest
2007). Yet, monitoring such conversations on social media is a different
challenge. With 1.23 billion monthly active Facebook users constantly
inputting data through their accounts, not to mention Twitter, MySpace
and other online social media, human abilities and simple software do fall
short of handling it. Hence, the development of sophisticated and advanced
computer software becomes fundamental to the day-to-day operations of
OSINT. Software must be able to develop the classic function of
translation performed by FBIS in order to cater for the different languages
and dialects in the regions where US has policy interests.
A fundamental part of the progress of the IC's utilization and
exploitation of social media OSINT is the partnerships with the private
sector. "We need outside help, and we know it!" Gannon said in 2000
referring to the community's need to stay on top of the information
technology curve (Gannon 2008). As explained above, the IC's investment
in new technologies is based on partnerships with topnotch software
developers, like IBM, and academic institutions, like Columbia University
and John Hopkins University, which was granted $48 million by the
Defense Department to “develop technology that is capable of
automatically translating and analyzing speech and text in multiple
languages” (Best Jr. and Cumming 2008, 7) Such investments and
partnerships are made through direct interaction between the IC and the
private sector or through research arms of the IC such as In-Q-Tel.
In 2009, for example, In-Q-Tel announced its strategic partnership with
Visible Technologies, which is one out of 15 different investments and
partnerships done by In-Q-Tel in 2009 alone. The privately-held company
is, according to its website, a leading provider of Social Intelligence
solutions designed to improve and accelerate business outcomes (Visible
Technologies "Company Overview"). Through the partnership, In-Q-Tel
can easily gain actionable insight from social media conversations through
the platform that "delivers clear and comprehensive view of complex
information, integrating real-time data into a navigable and easy-to-use
application that understands the context and tone of online dialogue" (InQ-Tel 2009 “Visible Technologies…”). In a white paper published on the
company's website, the components of social intelligence are explained. It
starts by monitoring and capturing the social networks for specific
keywords, phrases or content, this data then is processed and mashed up
with existing information to create the needed insight and finally the last
phase comes in to combine manual and automated processes to make the
insights created actionable (Kolsky 2010). Per day, Visible ingests millions
CHAPTER
of posts coming from hundreds of millions of social and mainstream media
websites (Visible Technologies “FAQs”). Customers such as In-Q-Tel get
their customized real-time feed, which is based on a series of keywords,
about the conversations taking place on these social media websites.
Ultimately, In-Q-Tel can harness intelligence coming out of social media
to use it strategically or tactically in the production of the OSINT products
through its constant collaboration with the IC.
Language and culture
Defense Department is already heavily invested in programs that
facilitate language challenges. Global Autonomous Language Exploitation
(GALE), for example, is a program run by the Defense Advanced
Research Projects Agency (DARPA). GALE is made to develop
"computer software technologies to absorb, translate, analyze and interpret
huge volumes of speech and text in multiple languages" (DARPA).
Through an automatic system, the engines convert data into information
that is easily understandable by monolingual English-speaking analysts.
Input format include blogs, talk shows and published news which are taken
through the process of collection, transcription, translation, word
alignment, placement into XBanks, distillation and finally resource
distribution (Linguistic Data Consortium, University of Pennsylvania).
Hence, GALE is most useful for interpreting of OSINT social media that
include YouTube, Skype, Facebook, Twitter and others.
The development of GALE is done in partnership with entities, such as
Columbia University's Natural Language Processing (NLP) research,
through research grants. The NLP states on its webpage, "We are
participating in the DARPA Global Autonomous Language Exploitation
(GALE) program, a five-year federal initiative that is seeking to go far
beyond search engine technology to answer complex questions from
multilingual, multimodal sources…" (Neutral Language Processing:
Columbia University). The initial creation of the program was done by
IBM "under the auspices" of DARPA to deal with Arabic and Chinese
languages (Soltau et al. 2007).
Similarly, running under the DNI, Intelligence Advanced Research
Projects Activity (IARPA) is operating the Socio-Cultural Content in
Language (SCIL) program which "intends to explore and develop novel
designs, algorithms, methods, techniques and technologies to extend the
discovery of the social goals of members of a group by correlating these
goals with the language they use" (IARPA). In other words, SCIL is doing
linguistic analysis to "predict power, influence and rifts in social groups"
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
as Columbia's NLP—which is participating in the program—describes it
(Neutral Language Processing: Columbia University). In the same manner,
this program can be utilized effectively in OSINT work on social media.
In addition to SCIL, other social media sources can interpret culture.
There has been an increasing investment in connecting IC analysts and
collectors all over the world through social media tools which helps in
interpreting the culture and improving the overall intelligence product.
Intellipedia, formally launched in 2006, is a collaborative online
intelligence repository built on the Wikipedia software where members of
the IC with the needed clearance could create their entries about different
intelligence topics and the same Wikipedia process of editing and revising
would follow. The project, which was developed out of a 2004 CIA paper
operates on three levels: unclassified, secret and top-secret versions; in
January 2014, Intellipedia had a total of about 269,000 content pages,
597,000 registered users and 11.1 million edits (MuckRock 2014). This
IC's version of social media application does improve the final intelligence
product, allows more speedy interaction and reviews and "really bring our
expertise right to the war without leaving our desks," as a CIA officer put
it (MuckRock 2014). The KM process is also made easier and more
effective through Intellipedia; the classical tedious process starts with a
supervisor assigning an analysts with a topic, the analyst scans through
gigantic amount of information, writes his product, sends it to supervisor
who shares it with reviewers until the product is in an acceptable form,
then it is published on the organization's website. After some time, that
product becomes irrelevant and needs another production process to be
updated. What Intellipedia brought to the table was revolutionary for
allowing the analyst to update an already existing entry which a lot of
other analysts worked on before him and may be concurrently working
with him, which is a major step away from the classic "stovepipes." It
makes the same product accessible to analysts based in different location
around the world, which allows for the ones with more cultural interaction
with the target to add their perspectives. The intelligence accumulation is
then made more centralized in a way that allows healthy discussion and
improvement of the product to take place while the product is still in its
original location.
Access to data
Another main challenge that faces the IC pertaining OSINT is the
access to data. As explained in the case of In-Q-Tel partnership with
Visible Technologies, the partnerships with the private sector to monitor
CHAPTER
and provide intelligence on social media can work smoothly if the
information is publicly available and does not need any privacy invasion to
get hold of. Yet, some social media applications do protect the rights of
their users, which might be pushing the kind of OS information to a higher
categorization level of closed proprietary information. In such instances,
the IC's legal argument is most effective.
The Department of Justice's Office of Legislative Affairs, for example,
routinely files hundreds of applications under the Foreign Intelligence
Surveillance Accord (FISA) to the Foreign Intelligence Surveillance Court
(FISC) demanding the release of information for thousands of users. FISA
surveillance is allowed if the target is a foreign power or an agent of a
foreign power, whether a criminal activity was committed or not
(Electronic Privacy Information Center “Foreign Intelligence…”). In 2012,
the Department of Justice submitted 1,789 applications to FISC seeking
authority to conduct electronic surveillance of which none was denied,
while the FBI sent 15,229 National Security Letter requesting information
concerning 6,223 different US persons (Electronic Privacy Information
Center 2013). Such FISA applications and FBI requests reached their peak
in years 2007 and 2008 respectively (Electronic Privacy Information
Center 2014).
At the same time, some social media organizations accept subpoena as
a justification to reveal their clients’ personal information, while others
volunteer the needed information out of patriotic reasons. Through some
investigation, Christopher Soghoian, a privacy researcher and activist with
a PhD in the field of informatics, noticed that some corporations proudly
share personal information of their clients without any legal claims, not
even emergency claims—requiring no complicated legal paperwork for the
urgency of the cases involved—by the government. The chief security
officer of MySpace told Soghoian that “it is a matter of pride that the
company does not charge for the tens of thousands of requests they get per
year” (Hacking Conferences, Information Security, how to's 2010).
Sources refer to about 10 to 20 daily requests Facebook used to receive in
2009 when the corporation had one-sixth of its current number of users, as
reported by the Newsweek (Summers 2009). It is worth mentioning that all
such data on government requests to reveal personal data of social media
users do not include the intelligence ones that usually skip public records.
Some mediators work on facilitating such contact between the government
and the social media organizations. Over 740 internet service providers
have their legal contact information available on an online database that is
made to “serve subpoenas, court orders, and search warrants” (Search).
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
Companies sometimes choose to inform their users about the
possibility of revealing their information to third parties for different
reasons through including some direct clauses in their privacy statement.
The privacy statement of Facebook, for example, clearly allows IC's legal
monitoring; it states (Facebook 2009):
We share your information with third parties when we believe the sharing
is permitted by you [user], reasonably necessary to offer our services, or
when legally required to do so. […] We may disclose information pursuant
to subpoenas, court orders, or other requests (including criminal and civil
matters) if we have a good faith belief that the response is required by law.
This may include respecting requests from jurisdictions outside of the
United States where we have a good faith belief that the response is
required by law under the local laws in that jurisdiction, apply to users
from that jurisdiction, and are consistent with generally accepted
international standards. We may also share information when we have a
good faith belief it is necessary to prevent fraud or other illegal activity, to
prevent imminent bodily harm, or to protect ourselves and you from people
violating our Statement of Rights and Responsibilities. This may include
sharing information with other companies, lawyers, courts or other
government entities.
The statement "when legally required" is wide enough to include any
legal document passed by the IC to Facebook indicating the IC's right to
surpass individual privacy to gather neccessairy informaiton, even if it was
a general law that allow gathering information on any individuals who is
suspected of potentially posing a future threat. "…When we have a good
faith belief it is necessary to prevent…" is even a wider claim to share
users' information in the absence of a legal basis with entities that go
beyond law enforcement and judiciary ones.
The same legal statement can be found in the privacy policy of Skype,
a software application that allows users to make voice/video calls and
chats over the Internet with about 2 billion minutes a day of users'
connection in 2013 (Skype: Big Blog 2013) and 663 million registered
users in 2010 (Telecom Paper 2011). The privacy statement says that
Skype can provide "personal data, communications content and/or traffic
data to an appropriate judicial, law enforcement or government authority
lawfully requesting such information;" in addition, "Skype will provide
reasonable assistance and information to fulfill this request" (Skype 2014).
CHAPTER
"Educational Problem"
Yet, a fundamental problem persists; the IC is "slow" in recognizing
the value of the OSINT, based on a 2008 report submitted to the Congress
(Best Jr. and Cumming 2008, 4). The reasons behind that, as explained in
the report, is that relying on OSINT counters the principle mission of IC of
discovering and stealing secrets, and because the IC views clandestinecollected information as being more valuable because of being more
difficult to collect. This "cultural philosophy," as another 2007 report by
the House Permanent Select Committee on Intelligence described it
(Permanent Select Committee on Intelligence 2006), becomes harder to
combat when it comes to social media. If members of IC were
downplaying the importance of newspapers and talk shows on TV station,
it is more likely that they will not value much a status update on Facebook
or an immature video on YouTube.
Improvements
Practical steps have been taken to try to change this culture that is
prevalent among certain class of IC members, which include the
engagement of the IC themselves in social media. Shifting the work flow
process over Intellipedia, for example, would be an incentive for those IC
reluctant members to get online and join the community and thus they
would become more appreciative of the importance of social media.
Social media staff orientation
A-Space, or Analytic Space, is another social media application used
by the IC. Under the sponsorship of the DNI, the contracted ManTech
International Corp. developed the online collaborative environment that
was launched in 2008 (Bain 2008). Much like the classified version of
MySpace, A-Space is designed to foster the sense of community among
analysts in a secured worldwide online environment that is only accessible
through public key infrastructure. It allows analysts to use shared and
personal workspaces, wikis, blogs, widgets, RSS feeds and other tools
(Ibid). Such social media application allows the atmospherics that are
experienced by analysts deployed around the world to be shared, which
improves the final intelligence product.
However, part of the cultural resistance against Intellipedia and the like
is based on the possibility of the system being hacked (Vogel 2009). This
legitimate concern of hacking is actually shared by almost all companies
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
working online. There is always a possibility of hacking and that is why
companies continue to build stronger firewalls and hire the most talented
in cyber security including the white-hat hackers. For example, In-Q-Tel,
having strong connections with the private sector, does address such IC
concerns. In 2009, FireEye Inc., the leader in malware protection systems,
managed to secure a strategic investment and technology development
agreement with In-Q-Tel. Ashar Aziz, CEO of FireEye, said that this
agreement allows FireEye to "provide the US Intelligence Community
with a technology solution to help defeat cyber threats, and to directly
address critical national security needs" (In-Q-Tel 2009 “In-Q-Tell
Invests…”).
The MI5, Britain's domestic intelligence service, does face a similar
cultural problem yet deals with it through a different approach. To keep
with the pace of developments in social media, MI5 is defying spending
cuts and advertising for new intelligence officer positions that would be
filled with young operatives that "have a better grasp of internet trends
than the old Whitehall hands" (O'Neill 2011).
Indications of improvement
It is important to note that although OSINT sources are increasingly
being defined as the modern tools of communication, US has policy
interests in places where classic forms of media are still prevalent. As
Naquin puts it, "What does it matter if something's on the Internet if only
two percent of the people of Country X have access to the Internet? They
may get their information somewhere else" (Central Intelligence Retirees'
Association 2007).
In 2010, the US government spotted such problem in Cuba, a country
where the US has key policy interests. Hence, a government program was
designed to widen the nation-wide internet usage through helping in
spreading the needed infrastructure and at the same time gain access to a
critical segment of the population through which a needed policy interest
can be fostered. A USAID program was secretly established to
“renegotiate the balance of power between the state and society,” as one
USAID document puts it (Butler et al. 2014). Although there was no direct
evidence to link the IC with the down-mentioned "Cuban Twitter" covert
operation, Peter Kornbluh, director of the National Security Archive's
Cuba Documentation Project, said that "if this is what USAID is doing in
Cuba, what has the CIA been doing there all this time? (Democracy Now
2014)
CHAPTER
A 2014 Associated Press investigation—based on more than 1,000
pages of documents—details the steps of a secret plan taken by the US
government “to build a social media project aimed at undermining Cuba's
communist government” (Butler et al. 2014). ZunZuneo, or the “Cuban
Twitter,” which seemingly bypassed congressional review, was launched
in 2010 with the help of the USAID in Cuba and got developed through
front companies that “would distance ZunZuneo from any US ownership”
(Butler et al. 2014). The operation went through several stages that
included collecting half a million phone numbers of Cuban youth
subscribers, building a subscriber base through "non-controversial
content," then introducing political content that aimed at inspiring "smart
mobs" by Cubans against their government (Butler et al. 2014).
Kornbluh, who is the author of several books including Bay of Pigs
Declassified: The Secret CIA Report on the Invasion of Cuba (1998),
explained the possible link between Zunzuneo and the IC. "Back in the
mid-1980s, when the CIA was banned from supporting the Contras in
Central America by Congress and passed the operations to the National
Security Council so that they could be conducted from there. And here we
may have a situation where covert operations have simply been passed to
USAID, where there isn’t very much scrutiny. [...] I think there’s quite a
bit of programming and operations that we don’t know about directed
towards Cuba" (Democracy Now 2014). If the IC is connected to
ZunZuneo then it is clear that it has moved a long way in not only
collecting intelligence through open sources, but utilizing them to undergo
covert actions.
Indeed, more partnerships and projects remain classified since the IC's
aim is to stay on top of innovation in information technology. Yet, based
on the available data and the examples explained above, it is safe to say
that the IC is not taken by surprise as a result of the rapid innovation in
social media. The work of the OSC in collaboration with other IC research
arms, such as In-Q-Tel, does allow the IC to get over most of the explained
challenges and thus exploit the available information to improve the
intelligence product. In addition, the creation of IC's own social media
does allow information sharing, fosters the community sense, sharpens the
final product and, mostly importantly, help overcome the “educational
problem” in the IC. The world's increasing dependence on internet and
social media is an advantage for the IC as long as the latter is on top of the
rapid developments in the field.
Directing the CIA from 1947 to 1950, Admiral Hillenkoett once said
that role of intelligence is like working a "gigantic jigsaw puzzle" that
finally becomes a "picture" (Hilsman 1952). Joseph Nye, a former head of
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
the NIC in the 1990s, took it one step ahead to say that the "open source
intelligence is the outer piece of the jigsaw puzzle, without which one can
neither begin nor complete the puzzle" (Best Jr. and Cumming 2008, 5).
The steps that the IC as a whole is taking towards the active
engagement of the social media OSINT might make the statement of the
former director of the Defense Intelligence Agency, Lt. General Samuel V.
Wilson, come true; he said, "The real intelligence hero is Sherlock
Holmes, not James Bond" (Best Jr. and Cumming 2008, 4).
Notes
1
As defined in Sec. 931 of Public Law 109-163, entitled "National Defense
Authorization Act for Fiscal Year 2006."
2 “Skype” and “Twitter” are added by this author to the table and were not
mentioned in the original cited table.
Works Cited
Bain, Ben. 2008. "A-Space set to launch this month." Federal Computer
Week, Sep. 3. http://fcw.com/articles/2008/09/03/aspace-set-tolaunch-this-month.aspx.
Best Jr., Richard A., and Alfred Cumming. 2008. "Open Source
Intelligence (OSINT): Issues for Congress." Open Congressional
Research Service, Jan. 28.
https://opencrs.com/document/RL34270/2008-01-28/.
Butler, Desmond, Jack Gillum, and Alberto Arce. 2014. “US secretly
created 'Cuban Twitter' to stir unrest.” AP, Apr. 4.
http://bigstory.ap.org/article/us-secretly-created-cuban-twitterstir-unrest.
Central Intelligence Retirees' Association. 2007. CIRA Newsletter. 32 (4):
7. http://www.fas.org/irp/eprint/naquin.pdf .
DARPA."Global Autonomous Language Exploitation (GALE)."
http://www.darpa.mil/Our_Work/I2O/Programs/Global_Autonom
ous_Language_Exploitation_(GALE).aspx
Democracy Now. 2014. “Is USAID the New CIA? Agency Secretly Built
Cuban Twitter Program to Fuel Anti-Castro Protests.” Apr. 4.
http://www.democracynow.org/2014/4/4/is_usaid_the_new_cia_a
gency
Duggan, Maeve, and Aaron Smith. 2013. “Social Media Update 2013.”
Pew Research Internet Project, Dec. 30.
http://www.pewinternet.org/2013/12/30/social-media-update2013/.
Electronic Privacy Information Center. “Foreign Intelligence Surveillance
Act (FISA).” http://epic.org/privacy/terrorism/fisa/#Overview.
Electronic Privacy Information Center. 2013. “2012 FISA Orders Up,
National Security Letters Down, No Surveillance Request
Denied.” May 2. http://epic.org/2013/05/2012-fisa-orders-upnational-s.html.
Electronic Privacy Information Center. 2014. “Foreign Intelligence
Surveillance Act Court Orders 1979-2014.” May 1.
http://epic.org/privacy/wiretap/stats/fisa_stats.html.
Emspak, Jesse. 2012. "What a World Without Facebook Would Be Like."
TechNews Daily, Feb. 7. http://www.technewsdaily.com/3758world-facebook.html.
Facebook. 2009. "Facebook's Privacy Policy - 5. How We Share
Information." October 29.
https://www.facebook.com/note.php?note_id=+322339455300.
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
Gannon, John C. 2008. “NIC Chairman Address to Washington College of
Law.” Central Intelligence Agency, June 20.
https://www.cia.gov/news-information/speechestestimony/2000/gannon_speech_10062000.html.
George, Roger Z., and Robert D. Kline, eds. 2006. Intelligence and the
National Security Strategist. Maryland: Rowman & Littlefield.
Google Official Blog. 2008. "We Knew the Web was Big..." July, 25.
http://googleblog.blogspot.com/2008/07/we-knew-web-wasbig.html.
GPOAccess. 1996. “Commission on the Roles and Capabilities of the US
Intelligence Community: Executive Summary.” Mar. 1.
http://www.gpoaccess.gov/int/int003.pdf.
Hacking Conferences, Information Security, how to's. 2010. “Defcon 2010
- Your ISP and the Government Best Friends Forever Christopher Soghoian.mov.” YouTube, Dec. 12.
https://www.youtube.com/watch?v=jJDCxzKmROY.
Hilsman, Roger. 1952. "Intelligence and Policy-Making in Foreign
Affairs." World Politics 5 (1): 3. http://www.jstor.org.
IARPA. "Solicitations - Office of Incisive Analysis: Socio-cultural Content
in Language (SCIL) Program."
www.iarpa.gov/solicitations_scil.html.
In-Q-Tel. "Our Aim." http://www.iqt.org/mission/our-aim.html.
In-Q-Tel. 2009. "In-Q-Tel Invests in FireEye to Advance Cyber Security
in the U.S. Intelligence Community." Nov. 18.
http://www.iqt.org/news-and-press/pressreleases/2009/FireEye_11-18-09.html.
In-Q-Tel. 2009. "Visible Technologies Announces Strategic Partnership
with In-Q-Tel." Oct. 20.
http://www.iqt.org/news-and-press/pressreleases/2009/Visible_Technologies_10-20-09.html.
Jane's Intelligence Digest. 2007. "US Embraces Open Source Intelligence."
Apr. 11.
http://search.janes.com/Search/documentView.do?docId=/content
1/janesdata/mags/jiwk/history/jid2007/jid70079.htm@current.
Jane's Intelligence Review. 2000. "Managing Information Overload." Mar.
1.
http://search.janes.com/Search/documentView.do?docId=/content
1/janesdata/mags/jir/history/jir2000/jir00120.htm@current.
Kolsky, Esteban. 2010. "The Evolution of Enterprise Social Intelligence."
ThinkJar and Visible Technologies.
CHAPTER
http://cdn.visibletechnologies.com/wpcontent/uploads/2010/10/Defining-Social-Intelligence.pdf.
Linguistic Data Consortium, University of Pennsylvania. "Global
Autonomous Language Exploitation (GALE)."
http://projects.ldc.upenn.edu/gale/
MuckRock. 2014. "FOI Request: Intellipedia Usage Statistics.". Feb. 10.
https://www.muckrock.com/foi/united-states-of-america10/intellipedia-usage-statistics-10058/#1017757-responsivedocuments.
National Open Source Enterprise. 2006. "Intelligence Community
Directive Number 301." Federation of American Scientists, July
11. https://www.fas.org/irp/dni/icd/icd-301.pdf.
Neutral Language Processing: Columbia University. "Projects."
http://www1.cs.columbia.edu/nlp/projects.cgi
O'Neill, Sean. 2011. "If the Intelligence Service…" News International
Associated Services Ltd, Jan 29.
Permanent Select Committee on Intelligence. 2006. "Intelligence
Authorization Act for Fiscal Year 2007." US House of
Representatives, Apr. 6. http://www.gpo.gov/fdsys/pkg/CRPT109hrpt411/pdf/CRPT-109hrpt411.pdf.
Pingdom. 2013. "Internet Users in Numbers." Jan. 14.
http://royal.pingdom.com/2013/01/16/internet-2012-in-numbers/.
Search. “ISP List.” http://www.search.org/resources/isp-list/.
Sedghi, Ami. 2014. "Facebook: 10 Years of Social Networking, in
Numbers." The Guardian, Feb. 4.
http://www.theguardian.com/news/datablog/2014/feb/04/faceboo
k-in-numbers-statistics.
Skype: Big Blog. 2013. "Thanks for Making Skype a Part of Your Daily
Lives – 2 Billion Minutes a Day!" Mar. 4.
http://blogs.skype.com/2013/04/03/thanks-for-making-skype-apart-of-your-daily-lives-2-billion-minutes-a-day/.
Skype. 2014. "Skype Privacy Policy." Jan.
http://www.skype.com/en/legal/privacy/.
Soltau, Hagen, George Saon, Daniel Povey, et al. 2007. "The IBM 2006
GALE Arabic system." IBM T. J. Watson Research Center.
http://research.microsoft.com/pubs/78020/icassp07_arabic.pdf
Summers, Nick. 2009. “Facebook's 'Porn Cops' Are Key to Its Growth.”
Newsweek, Apr. 30. http://www.newsweek.com/facebooks-porncops-are-key-its-growth-77055.
THE SOCIAL MEDIA OSINT CHALLENGE TO US INTELLIGENCE
Telecom Paper. 2011. "Skype Grows FY Revenues 20%, Reaches 663 mln
Users." Mar. 8. http://www.telecompaper.com/news/skypegrows-fy-revenues-20-reaches-663-mln-users.
US Securities and Exchange Commission. 2013. "Twitter S-1 Statement."
Oct. 3.
http://www.sec.gov/Archives/edgar/data/1418091/000119312513
390321/d564001ds1.htm.
Visible Technologies. "Company Overview."
http://www.visibletechnologies.com/about/
Visible Technologies. "FAQs."
http://www.visibletechnologies.com/product/visibleintelligence/faqs/
Vogel, Steve. 2009. "For Intelligence Officers, A Wiki Way to Connect
Dots." The Washington Post, Aug. 27.
http://www.washingtonpost.com/wpdyn/content/article/2009/08/26/AR2009082603606.html.
YouTube Official Blog. 2013. "Here’s to Eight Great Years." May 19.
http://youtube-global.blogspot.in/2013/05/heres-to-eight-greatyears.html.