Google & Facebook: Alliances with intelligence to make privacy obsolete. Matthaus Litteken CS 305



Similar documents
experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation

What is Prospect Analytics?

Social Media Strategy:

IT Tools for SMEs and Business Innovation

The adidas Group Social Media Guidelines

Smart Policing Initiative Website and Social Media

Freedom of Information Act Request and Request for Expedited Processing

Quick Guide: Selecting ICT Tools for your Business

A Guide to Promoting your Project

Connect Startup Toolbox: Social Media Marketing by Alyssa Gregory

Facebook and Social Networking Security

Bloomberg BusinessWeek Business Exchange. Available on the ipad

Espionage and Intelligence. Debra A. Miller, Book Editor

American Graduate: Let s Make It Happen Social Media Best Practices

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

Tutorial: Big Data Algorithms and Applications Under Hadoop KUNPENG ZHANG SIDDHARTHA BHATTACHARYYA

SOCIAL MEDIA VALUATION AND THE VALUE OF A USER

Spy Software Gets a Second Life on Wall Street - WSJ

Big Data. What is Big Data? Over the past years. Big Data. Big Data: Introduction and Applications

WHITE PAPER. Virtual Impact. The Internet s Effect on How Candidates Look for Jobs and How Companies Look for Candidates.

Facebook Advertising Playbook

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

Adaptive Business Management Systems Privacy Policy

The key to knowing the best price is to fully understand consumer behavior.

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

Cloud Computing: The Gathering Storm

STOP. THINK. CONNECT. Online Safety Quiz

Digital marketing strategy

POSEIDON social network for carers

OPSEC and Safe Social Networking

Capturing Meaningful Competitive Intelligence from the Social Media Movement

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

EQUIPMENT RENTAL by George M. Keen, Senior Consultant

Social Media: Managing Your Online Presence

What is Content Marketing?

RESEARCH 33 STATS TO KNOW WHEN MARKETING TO THE CONSTRUCTION INDUSTRY

Robert Birmingham / Consultant GetMoreClicks.net rkb@mail99.com What is Online Reputation Management?

Big Data Big Security Problems? Ivan Damgård, Aarhus University

TOOLS YOU CAN USE Maximizing a Film s Outreach with Web 2.0 By Kristin Henry, Working Films, Project Manager and Website Administrator

Preparing Millennials to Lead in Cyberspace October 2014

SOCIAL MEDIA CHRIS SIGFRIDS SENIOR ONLINE MARKETING MANAGER CARIE FREIMUTH VICE PRESIDENT, ASSOCIATE PUBLISHER

Corporate Spying An Overview

How To Be Successful With Social Media And Marketing

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

With Internet.org, Facebook Looks to Do Well While Doing Good

Katy Young s Guide to... Twitter

Crowdfunding KEVIN M. MCGOVERN FAMILY CENTER FOR VENTURE DEVELOPMENT IN THE LIFE SCIENCES. The new buzzword in Capital Formation

ANTITERRORISM AWARENESS FOR SOCIAL NETWORKING

VerIS a Framework for Gathering Risk Management Informa8on from Security Incidents

Marketing Director s Guide to Selecting CRM

Setting the Standard for Safe City Projects in the United States

Resume to apply for phd program >>>CLICK HERE<<<

Using mobile apps to build your business

Counterterrorism and Cybersecurity

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

As the US debates privacy a Berlin start up surges with...

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, What Cloud Computing is and How it Works

MEMBER SOCIAL MEDIA SETUP GUIDEBOOK

Things to remember when using social media

CAM Coach. How Technology Supports Complementary and Alternative Practice

A Parents' Guide to ConnectSafely.org

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi.

How To Market Your Law Firm Through Social Media

Transcription:

Google & Facebook: Alliances with intelligence to make privacy obsolete Matthaus Litteken CS 305

Google Ties To CIA Robert David Steele - Google took money from the CIA when it was poor and it was starting up. In June 1999, the then up-start Google received a $25 million round of equity funding led by Sequoia Capital and Kleiner Perkins Caufeld & Byers, the latter of which the CIA s In-Q-Tel had developed a close relationship with to advance priority technologies of value to the intelligence community.

Google Ties To NSA 2008 - the NSA awarded Google a $2 million contract. NSA bought four Google search appliances, two-years replacement warranty on all of them, and 100 hours of consulting support. Google is also providing the search features for a Wikipedia-style site, called Intellipedia, on which agents post information about their targets that can be accessed and appended by colleagues. 2010 - Google is teaming up with the National Security Agency to investigate the recent hack attack against its network in a bid to prevent another assault.

Facebook Ties to CIA Facebook funds came indirectly from a corporation with strong CIA ties. It s a long chain of association: once Facebook begins to take of, venture capital frm ACCEL gives Facebook $12.7 million. One of the 18 member investors of ACCEL, James Bryer, is also on the board of a venture capital frm called NVCA. Sitting on the board of NVCA with Bryer is Gilman Louie, who is on the board of In-Q-Tel.

In-Q-Tel In-Q-TEL is a non-proft venture capital frm, a frm run by the CIA to invest in high-tech companies for the sole purpose of keeping the CIA equipped with the latest in information technology in support of United States intelligence capability. In-Q-TEL primarily invests in new Data Mining Technologies. Technologies that mine places like Myspace, and Facebook essentially give the CIA access to trends in various demographics as well as their thought patterns and behaviors.

Changes to Privacy People more willing to share private information with friends and strangers indiscriminately Current and previous employment Friends, family, address, contact info Hobbies, interests, political views & afliations Photos of everyone & everything Relationship status, home town, education Broadcasting private thoughts, current activities, current location

Picasa Encourages people to share photos online Google Apps Tag photos online by participants using facial recognition. Teach Picasa and Google to better recognize faces, yours and your friends. Google Earth & Google Maps GPS on smart phone to get directions, now Google knows where you are and where you're going

Social Media & The Government 2009 - Training course that describes how IRS employees may use various Internet tools -- including social networking sites and Google Street View -- to investigate taxpayers. The Justice Department released a presentation entitled "Obtaining and Using Evidence from Social Networking Sites." The slides detail several social media companies' data retention practices and responses to law enforcement requests. It notes that Facebook was often cooperative with emergency requests while complains about Twitter s short data retention policies and refusal to preserve data without legal process.

Profling NSA is funding research into the mass harvesting of social networks that could harness advances in internet technology - specifcally the forthcoming "semantic web" championed by the web standards organization W3C - to combine data from social networking websites with details such as banking, retail and property records, allowing the NSA to build extensive, all-embracing personal profles of individuals.

Profling Continued Spindex - Microsoft revealed Spindex, a Web service designed to aggregate its users various social-networking feeds onto a single screen. The application is a product of Microsoft s FUSE Labs, a Microsoft division devoted to building software with a social connectivity focus. We're doing their work for them. We create pages all about ourselves and our friends and family. We describe what we do, what we like, who we are.

Profling Continued Police and Intelligence agencies used to have to leave their ofces to gather information on people they were profling. Now they just need to visit a few social media sites and connect the dots. Social media aggregators like Spindex will only make their jobs easier. It will connect the dots for them.

Conclusion Ties between Google, Facebook and intelligence tenuous but real Huge amounts of personal (and private?) information at their disposal. Who is they? Who has access? How is it used? People have been trained to profle themselves Even if you aren't profling yourself, your friends and family may be profling you Is privacy impossible in today's world?

Sources Microsoft Unveils Spindex, Social Networking Aggregator - eweek.com - Nicholas Kolakowski May 5, 2010 - http://www.eweek.com/c/a/messaging-and- Collaboration/Microsoft-Unveils-Spindex-Social-Networking-Aggregator-190324/ While Fending Off DoJ Subpoena, Google Continues Longstanding Relationship With US Intelligence - Homeland Security Today - Anthony L. Kimery January 25, 2006 - http://www.hstoday.us/content/view/62/111/ Ex-Agent: CIA Seed Money Helped Launch Google - Steele goes further than before in detailing ties, names Google's CIA liaison Paul Joseph Watson - Prison Planet Alex Jones - December 6, 2006 - http://www.infowars.com/articles/bb/google_cia_seed_money_launched_google.htm In-Q-Tel Wikipedia - http://en.wikipedia.org/wiki/in-q-tel Five cases that highlight evil at Google - Techtangerine February 21, 2010 - http://www.techtangerine.com/2010/02/21/fve-cases-that-highlight-evil-at-google/ Zuckerberg: I know that people don't want privacy cnet news January 10, 2010 - by Chris Matyszczyk - http://news.cnet.com/8301-17852_3-10431741-71.html Facebook, the CIA, and You. - Brainsturbator by thirtyseven July 6, 2007 - http://www.brainsturbator.com/articles/facebook_the_cia_and_you/ CIA enlists Google's help for spy work Times Online - Jonathan Richards March 31, 2008 - http://technology.timesonline.co.uk/tol/news/tech_and_web/article3652494.ece Google intelligence cooperation reprise Homeland Stupidity Michael Hampton October 30, 2006 - http://www.homelandstupidity.us/2006/10/30/googleintelligence-cooperation-reprise/ Google Asks NSA to Help Secure Its Network - wired.com - Kim Zetter - February 4, 2010 - http://www.wired.com/threatlevel/2010/02/google-seeks-nsa-help/ CIA Invests in Social Media Monitoring Firm Mashable Jennifer Van Grove - October 19, 2009 - http://mashable.com/2009/10/19/cia-social-mediamonitoring/ EFF Posts Documents Detailing Law Enforcement Collection of Data From Social Media Sites Electronic Frontier Foundation Marcia Hofmann March 16, 2010 - http://www.ef.org/deeplinks/2010/03/ef-posts-documents-detailing-law-enforcement CIA s Venture Capital Arm, In-Q-Tel, Invests in Social Web Monitoring Firm Resource Shelf Noah Shachtman - October 19, 2009 - http://www.resourceshelf.com/2009/10/19/cias-venture-capital-arm-in-q-tel-invests-in-social-web-monitoring-frm/ FBI, Feds collect Facebook, social media data; Why are you surprised ZDNet - Larry Dignan March 17, 2010 - http://www.zdnet.com/blog/btl/fbi-fedscollect-facebook-social-media-data-why-are-you-surprised/31996