M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone
-
0:00 - 0:1132C3 preroll music
-
0:11 - 0:15M.C.: Hey! So, can you hear me OK? Yeah.
-
0:15 - 0:20I am M.C. and I work on Transparency
Toolkit along with Brennan Novak -
0:20 - 0:26and Kevin Gallagher. Basically, what
we try to do is “Watch the Watchers”. -
0:26 - 0:31Back in May we released a database of
over 27.000 people in the Intelligence -
0:31 - 0:37Community called ICWATCH. And this is
people who are talking about their work on -
0:37 - 0:42classified programs on the public
internet. So we collected it using -
0:42 - 0:46search terms like the code words
mentioned in the Snowden documents. -
0:46 - 0:51And today we’re releasing
an update to ICWATCH -
0:51 - 0:56doubling the data in the database.
-
0:56 - 1:01applause
-
1:01 - 1:07And that’s already vive, if
anyone wants to look at it. -
1:07 - 1:12For the people who aren’t familiar with
this project and the sorts of things -
1:12 - 1:17available on the research methods I’d like
to go through an interesting example of -
1:17 - 1:20research things that can
be found in this database. -
1:20 - 1:26So this is Lauren Russell, and she works
at L-3, a major intelligence contractor. -
1:26 - 1:31But she started her career as an army
interrogator in Iraq. She says that -
1:31 - 1:37the information that she collected was
used to capture dozens of people. -
1:37 - 1:40But part of her job was also to assure
safe and humane treatment of hundreds -
1:40 - 1:45of detainees. So that’s good at least. But
then, a few years after that, she went and -
1:45 - 1:50worked for a different company called
Exelis in Afghanistan. And this job -
1:50 - 1:56was quite different. It involved finding
people to kill. So she says as part -
1:56 - 2:00of this work that she “utilized F3EA
methodology to conduct analysis on raw and -
2:00 - 2:05fused HUMINT, SIGINT, and COMINT helping
to create 125 Targeting Support Packets -
2:05 - 2:09then nominated to the Joint Priority
Effects List (JPEL) for kinetic targeting.” -
2:09 - 2:14So there’s a lot of not very obvious terms
and gibberish there. And this is a pretty -
2:14 - 2:18common problem by going through these
résumés. So I want to break down how you -
2:18 - 2:23would interpret that sentence. “Signals
Intelligence” is what the NSA does. -
2:23 - 2:28It’s collecting data from intercepted
communications. COMINT – Communications -
2:28 - 2:31Intelligence – is specifically Signals
Intelligence from communication data. -
2:31 - 2:35So what the NSA does
when they read your email. -
2:35 - 2:39HUMINT, Human Intelligence is
Intelligence on human sources. -
2:39 - 2:46So things like data gain
from informers or from torture. -
2:46 - 2:50The “direct priority of XLES” is a list of
people the US military and its allies are -
2:50 - 2:55trying to kill and capture in Afghanistan.
-
2:55 - 2:59F3EA stands for “Find, Fix, Finish,
Exploit and Analyze”. It’s a rapid -
2:59 - 3:03intelligence collection and analysis
methodology used for targeting. And -
3:03 - 3:07we recently found out in the Drone
Papers that this is often used for -
3:07 - 3:13drone targeting. And “Kinetic Targeting”
simply means attacking a moving target. -
3:13 - 3:17So looking at her profile again: she says
that she “F3EA methodology -
3:17 - 3:21to conduct analysis on raw and fused
HUMINT, SIGINT and COMINT helping to -
3:21 - 3:25create 125 Targeting Support Packets
then nominated to the direct priority -
3:25 - 3:29of XLES for conduct targeting.” Basically
what she means is that based on -
3:29 - 3:33intercepted communications and information
from human sources, possibly gained under -
3:33 - 3:39the rest from torture she is deciding
who should be killed and captured. -
3:43 - 3:49The Intelligence Community has long
had an attitude of “Collect It All”. -
3:49 - 3:53And General [Keith B.] Alexander
started trying to collect all the data -
3:53 - 3:58that they could from every source.
One of the first projects to this end -
3:58 - 4:03was something called Real Time Regional
Gateway (RT-RG). It’s a master project to -
4:03 - 4:08store, combine, search and analyze data
from many different sources at once. -
4:08 - 4:12Everything from intercepted communications
to data from drones to data from -
4:12 - 4:18interrogations to even mundane things like
traffic patterns and the prize of potatoes. -
4:18 - 4:23They started this program in 2005.
The initial version was built by SAIC -
4:23 - 4:27for use in Iraq. And these days it’s
mostly used in Afghanistan. -
4:27 - 4:32It searches the US soil because according
to documents published in “Der SPIEGEL” -
4:32 - 4:38last year Germany is the 3rd largest
contributor to RT-RG. This source -
4:38 - 4:41of collection analysis tools are used
for some programs that you might have -
4:41 - 4:47heard of too, like CoTraveller – the
program the NSA has to figure who is -
4:47 - 4:52going places with who else. And there is
a specific analytic tool. This part of -
4:52 - 4:58RT-RG called SIDEKICK that uses relative
velocities to calculate this from any -
4:58 - 5:02different data sources, so that they can
calculate that for people across networks. -
5:02 - 5:04Unfortunately, this is really
computationally intensive because they -
5:04 - 5:09need to pre-compute all of the travel
behaviour for all the pairs of selectors. -
5:09 - 5:12But it’s feasible for them to do
computationally intensive things the time -
5:12 - 5:18that it’s built because it’s built on
Hadoop and accumulo for distributed data -
5:18 - 5:27processing and storage. So they’re quite
serious about this. The goals for RT-RG -
5:27 - 5:33are quite lofty. One of the creators, in
an interview with “Defence News” described -
5:33 - 5:37their aim is being able to use intercepted
communications and integrate it with -
5:37 - 5:42signals with geolocation. So that they can
instantly find people and target them. -
5:42 - 5:47Another counter-terrorism official told
the Wall Street Journal that RT-RG -
5:47 - 5:53literally allows them to predict the
future. Decorrelation means it’s the -
5:53 - 5:57strongest correlation tool ever. So their
goals of this seem to be two-fold: First -
5:57 - 6:03of all to be able to kill or smite any
potential enemies. And 2nd one to be -
6:03 - 6:08omniscient. To know everything that’s
happening at once. And to correlate it and -
6:08 - 6:13use that to predict what will happen in the
future. And these goals sound a little bit beyond -
6:13 - 6:19what you would expect from someone
who is trying to simply protect people or -
6:19 - 6:22stop terrorism. It sounds more like
they’re trying to become some sort -
6:22 - 6:27of God. Who by collecting and analyzing
everything know everything that’s -
6:27 - 6:32happening everywhere and can just smite
any enemies from above. Instantly. -
6:32 - 6:37But the thing is they are'nt a God. There are
people working on these and they're -
6:37 - 6:40normal people. And they’ve crazy
resources and they intercept -
6:40 - 6:44a lot of data. But they also use data
that’s freely available to anyone for -
6:44 - 6:50a lot of their work. Open Source
Intelligence. This is a pamphlet from -
6:50 - 6:55a startup called ZeroFox that uses data
from Social Media to track ISIS. -
6:55 - 7:00And tools like this are quite common.
There’s another tool called “LM Wisdom” -
7:00 - 7:04that’s made by Lockheed Martin. And
they have a wonderful promotion video -
7:04 - 7:09on their website explaining exactly how it
works – that I’d like to play. -
7:09 - 7:12with lowered voice:
Hopefully this’ll work… -
7:12 - 7:16audio/video starts Female Narrator:
Social Media content has the power -
7:16 - 7:19to incite organized movements
and sway political outcomes. -
7:19 - 7:23Person in Video: “It’s an opposition
terrorist organization in Iran.” -
7:23 - 7:26Female Narrator: Monitoring and analyzing
the massive and rapidly changing -
7:26 - 7:31open source intelligence data, or OSINT,
and turning it into actionable intelligence -
7:31 - 7:37for decision-makers is an imperative.
Lockheed Martin’s Wisdom software suite -
7:37 - 7:42offers an advanced capability to collect,
manage and analyze vast amounts -
7:42 - 7:48of open source data. Enabling analysts
to understand, measure and anticipate -
7:48 - 7:52real-world advance through Social Media.
Person in Video: “Think of Wisdom as your -
7:52 - 7:59eyes and ears on the web. Wisdom is
that tool that would allow it to do this -
7:59 - 8:00at scale!”
Female Narrator: Wisdom’s advanced -
8:00 - 8:05Big Data collection capability and data
store automatically identify and harvest -
8:05 - 8:09online Social Networking data of
operational interest. As well as -
8:09 - 8:15socio-cultural data from standard online
open sources like newspaper feeds and -
8:15 - 8:20structured databases. Wisdom’s high-
performance analytic algorithms analyze -
8:20 - 8:26the content in near realtime distinguishing
noise from high-value information. -
8:26 - 8:31Capturing trends, sentiment and influence;
turning open source data into predictive, -
8:31 - 8:36actionable intelligence.
audio/video stops -
8:36 - 8:37M.C.: Yeah, so…
applause -
8:37 - 8:41…that’s what they’re doing. And they’re
not just using this to target terrorists. -
8:41 - 8:46It was recently revealed that they are
helping Walmart use this to find employees -
8:46 - 8:50that are organizing for better working
conditions and find the main organizers -
8:50 - 8:54and fire them. Using
data from Social Media. -
8:54 - 8:59So it’s used for Corporate purposes as
well. And LM Wisdom wasn’t even made -
8:59 - 9:03for surveillance in the first place.
I tracked down one of the people -
9:03 - 9:09who created it. And at that time he worked
for General Electric and was hoping to -
9:09 - 9:14make a… to help NBC make tools so
that they can figure out which sites -
9:14 - 9:20to partner with to make their videos go
viral. So it’s not just governments that -
9:20 - 9:23are using Open Source Intelligence because
there’s no barriers to access it and -
9:23 - 9:28there’s many applications. There’s even
many people search databases that -
9:28 - 9:31have information like people’s address,
and phone number, and relatives, -
9:31 - 9:35and how old they are. And these include
many, many people. Probably everyone -
9:35 - 9:39in the US. And they’re used by many people
for all sorts of purposes from private -
9:39 - 9:48detectives to people that are selling
advertisements. If this data is available -
9:48 - 9:53already and it’s used for everything from
figuring out who to kill to stopping unions -
9:53 - 9:57from organizing to trying to sell things
to people – why can’t we use it to -
9:57 - 10:01understand surveillance programs, too?
Why can’t we use it to understand human -
10:01 - 10:05rights abuses. Why not use it for
accountability? So we started to build -
10:05 - 10:10tools to do this and in the near future
we’d like to make it possible for anyone -
10:10 - 10:14to make something like ICWATCH or other
databases in less than a day and without -
10:14 - 10:20programming. Long-term goal is to build
software similar to what the Intelligence -
10:20 - 10:24Community has. Things similar to LM-Wisdom,
things similar to Real Time Regional Gateway. -
10:24 - 10:30So that people can collect all this
information in one place and analyze it. -
10:30 - 10:33I’d like to show a demo of some of the
tools that we’ve been working on. It’s -
10:33 - 10:41possible to just – this won’t work at all
but we’ll see. So this is Harvester. It’s -
10:41 - 10:49a tool for collecting data from online
sources in an automated fashion. You can -
10:49 - 10:53choose different data sources, say
“Indeed” – this is a résumé website – and -
10:53 - 10:58say you want to find anyone who mentioned
XKeyscore and for sake of timing let’s -
10:58 - 11:08just get people in Maryland. And “start
collecting”, and it might take a second -
11:08 - 11:13because it’s still a bit rough. But it
opens a browser, goes finds other people -
11:13 - 11:19who mention XKeyscore in Maryland and it
goes and downloads all of their résumés -
11:19 - 11:24in one place… you can kind of see them
as they download because this is being -
11:24 - 11:49slowed a bit down right now. That just
works key services and fairly small. -
11:49 - 11:58Something shouted from out of the audience
M.C.: laughs -
11:58 - 12:02applause
-
12:06 - 12:12Takes a second to load,
still kind of rough… -
12:12 - 12:19Yeah, so we’re hoping to add many different
data sources, so that people can collect -
12:19 - 12:23data from sources online as well as just
take a pile of pdf’s on their computer, -
12:23 - 12:27point at the directory and it will load
them and OCR them and people will be able -
12:27 - 12:31to search through them
in a searchable database. -
12:31 - 12:36So while this is loading why don’t I go
and walk through some of the rest of the -
12:36 - 12:40pipeline. So our goal is to have tools
for collecting data, loading it into -
12:40 - 12:47a database; and then tools for matching
data across various sources on the same -
12:47 - 12:50person or the same company. So it should
take someone’s résumés and Social Media -
12:50 - 12:54profiles and everything and link it
together and then also link that to the -
12:54 - 12:57companies they work(ed) for, the other
people they know, the locations they’ve -
12:57 - 13:02lived. As well as tools for extracting
things from data. So to be able to go -
13:02 - 13:04through a résumé, extract all the code
words mentioned, to be able to go through -
13:04 - 13:08a document and extract all the
companies mentioned and generating -
13:08 - 13:13entities that way. And tools for searching
through data in databases where you can -
13:13 - 13:18search for search queries and browse by
categories. And for viewing data and -
13:18 - 13:24network graphs and maps. Let’s see if this
is done… Right now it just shows the -
13:24 - 13:33raw JSON. The connection between tools
is a bit rough. But we should be able to -
13:33 - 13:41index the data and load it into a search
tool. Will take a second. Hopefully this -
13:41 - 14:06works. Ouh, it’s going! Yah… So it takes
a little bit. Index… And you can see… -
14:06 - 14:14The data will be at… It kind of circle
loaded into a subscriptions list… -
14:14 - 14:17So there’s a searchable database on all the
people who are working on XKeyscore -
14:17 - 14:27in Maryland!
applause, cheers from audience -
14:27 - 14:33So I think that in using this Free
Software and open data really the key is -
14:33 - 14:38because we have far, far fewer resources
than the Intelligence Community. And we -
14:38 - 14:41don’t even have the resources that a
company like Lockheed Martin has. We can’t -
14:41 - 14:45internally build all of this software. I
hope that we will anticipate every future -
14:45 - 14:51use to be able to help people adapt to
that. Having people be able to take our -
14:51 - 14:54data, take our tools and adapt it to their
own situations is absolutely key to -
14:54 - 14:58actually ensuring that they’re useful. And
there are also a lot of open source tools -
14:58 - 15:01that the Intelligence Community has,
really. It’s like accumulo, the thing -
15:01 - 15:05that’s used in Real Time Regional Gateway.
It was released by the NSA and made open -
15:05 - 15:11source. And Gaffer which is a graph
database recently released by GCHQ. -
15:11 - 15:16So we can sort of take those and possibly
also build on those in some cases. -
15:16 - 15:18As well are using the same tools
chuckles -
15:18 - 15:22And it’s appropriate because our goal is
to enable people to collect and use -
15:22 - 15:28information in the same way that the
Intelligence Community can. -
15:28 - 15:32But, well, I think that we should aim
to collect it all and collect all the -
15:32 - 15:35information that we can. I think we also
need to be careful to avoid a lot of the -
15:35 - 15:40mistakes that the Intelligence Community
has made. Because some of the effects are -
15:40 - 15:46quite bad and lead to people being killed
for no reason at all. And – it’s quite -
15:46 - 15:50absurd. And the main one of these,
I think, is de-humanizing people. -
15:50 - 15:53Torture techniques are specifically
designed to de-humanize people. -
15:53 - 15:56When people are looking at data that
they’ve intercepted, they’re not looking -
15:56 - 16:00at a person, they’re looking at meta-data,
they’re looking at numbers on a screen. -
16:00 - 16:06It’s not something that’s easy to find a
way around. When I was working on ICWATCH -
16:06 - 16:11I was grabbling with this problem quite a
bit. So I decided to try to see who some -
16:11 - 16:16of these people are and try to put faces
to these issues. So I started going to -
16:16 - 16:19Intelligence conferences. Many of these
conferences are quite open and you can -
16:19 - 16:24just go in. And I wasn’t that out of place
either, I just told people that I made -
16:24 - 16:27tools to collect and analyze
Open Source Intelligence. -
16:27 - 16:29laughter and applause
-
16:29 - 16:36There're many people doing.
-
16:36 - 16:38There’re many people doing simmilar
things out there, too. Like I met the -
16:38 - 16:42Zerofox people who were one of the examples
I showed earlier at one of these conferences. -
16:42 - 16:45They are actually very, very nice. And
-
16:45 - 16:48there were also some people who were quite
interested in what I was doing. There was -
16:48 - 16:51one recruiter from Northrop-Grumman who
seemed somewhat interested in hiring me -
16:51 - 16:54and I looked her up later and found
a bunch of job listings where she was -
16:54 - 16:59trying to hire people who… to work on
programs related to XKeyscore. It wasn't -
16:59 - 17:04all good, I got kicked out of one conference.
I got some strange requests like there was -
17:04 - 17:10one guy who was trying to figure how to
use open data to help venture capitalists -
17:10 - 17:15figure out what porn the founders of the
startups they funded watched. I’m not sure -
17:15 - 17:18that’s even possible. But it was really
weird and he was asking me for help and -
17:18 - 17:20I was like “I don’t think I can
help with that, sorry!” -
17:20 - 17:27laughter and applause
-
17:27 - 17:31Of course there were some negative comments
on things like Manning and Snowden -
17:31 - 17:34and some confusion like there was someone
who is making insider threat detection -
17:34 - 17:39software, who was talking about how it
would stop a situation like when Snowden -
17:39 - 17:43leaked documents to Wikileaks and
things like that. So people don’t actually -
17:43 - 17:46know what’s going on. But generally most
of them were decent people and some of -
17:46 - 17:49them were quite nice, some of them were
quite funny. And some of them really -
17:49 - 17:53seemed to think that what they were doing
is saving lives. So they’re not evil people -
17:53 - 17:58who want to hurt others but they’re not
infallible either. They’re human beings. -
17:58 - 18:03And our strategy – looking at individuals
– scares a lot of people. But what you -
18:03 - 18:10have to realize is that institutions are
made up by people. It’s easier to just -
18:10 - 18:13look at the institution. It’s easier to
just look at an abstract program. Just -
18:13 - 18:16like it’s easier not to think of the
person who you just decided to kill in a -
18:16 - 18:21drone strike as a person. That’s why these
things continue to happen. I think that -
18:21 - 18:25there’s a lot of benefit to looking at
people as people, both to avoid some of -
18:25 - 18:29the problems the Intelligence Community
has as well as because people’s data trails -
18:29 - 18:32are part of the data trails of the
institutions. And if we’re only looking at -
18:32 - 18:36institutions we’re missing part of the
data trail the people leave. -
18:36 - 18:41Though, of course, no one person is
responsible for the wrong-doings of the -
18:41 - 18:47Intelligence Community. So we shouldn’t
demonize any one person. But… -
18:47 - 18:50these are the people who go to work every
day and perpetuate the actions of the -
18:50 - 18:55Intelligence Community. So I think everyone
involved is a little bit at fault. -
18:55 - 18:58And the other benefit of looking at people
as people is that we can start to -
18:58 - 19:01understand them. Because you have to
understand what their hopes are, what -
19:01 - 19:05their fears are. How they see the world.
What upsets them. And what might cause -
19:05 - 19:09them to change their behaviour. And from
that we can start to maybe come up with -
19:09 - 19:13alternatives. So let’s look at some of
these people and look at some of their -
19:13 - 19:22stories. This is Jason Epperson. He works
on Intelligence collection for Special -
19:22 - 19:27Operations. In his spare time he enjoys
coaching children sports. He currently -
19:27 - 19:32works at the US Special Ops Command
(USSOCOM) helping different agencies -
19:32 - 19:35collect data, share it, say and figure out
what data they need, just generally -
19:35 - 19:39helping them integrate it. But when he
started his career back in 1998 also -
19:39 - 19:44working on collecting data for Special
Operations. Then later, in 2004, he went -
19:44 - 19:50to work at the US Central Command in the
NSA cryptologic services group and he was -
19:50 - 19:53focused on tracking down high-value
targets and individuals. And he claimed -
19:53 - 19:57that as a result of his work, numerous
high-value individuals were captured -
19:57 - 20:04or killed. It is especially interesting
because he was working on this in 2007 -
20:04 - 20:09when PRISM was launched and at the top
of his résumé he lists in his specialties -
20:09 - 20:15PRISM as “possible”, so that’s kind of a
dinagra but based on his background it -
20:15 - 20:21might not be. So I think it probably is
actually PRISM. -
20:21 - 20:28Then after he was working there he went
and started working counter-radicalization -
20:28 - 20:31efforts – things like boosting the
capacity of Muslim Faith Leaders to win -
20:31 - 20:34hearts and minds and establishing
competing social networks to counter -
20:34 - 20:37Al Qaeda ideology and he’s very clear in
his job description that he’s not killing -
20:37 - 20:43people, he’s just helping allies of the US
figure out who is who, set Interpol notices for. -
20:43 - 20:47But the most interesting thing about him
isn’t any of his jobs. It’s this -
20:47 - 20:51publication that he has at the bottom of
his résumé called “An Examination of the -
20:51 - 20:56Effect of Government Data Mining on US
Citizens”. And this clearly an area where -
20:56 - 21:00he has a lot of expertise. And he
presented this at a conference back in -
21:00 - 21:052010. I still don’t have a copy yet. It’s
not easily available. I think it might be -
21:05 - 21:10possible to get either by buying it from
the company directly or by going to the -
21:10 - 21:15Library of Congress that seems to have
some copies of the conference proceedings. -
21:15 - 21:20That could be quite interesting. Both
because he was relatively high up, he was -
21:20 - 21:24in command of nearly 400 people back when
PRISM started and he was working with the -
21:24 - 21:28NSA. It’s possible that he had some role
early on in the program and this might -
21:28 - 21:34provide some clues. And then also the
little “data mining on US Citizens” a bit -
21:34 - 21:37in the title is kind of interesting
because that’s supposed to be the last -
21:37 - 21:40protection – I think that’s kind of a super
protection because most US citizens -
21:40 - 21:43wouldn’t find it very comforting if the
Chinese Government said: “Oh yeah, we have -
21:43 - 21:47a mass surveillance program but we only
spy on people who aren’t Chinese citizens.” -
21:47 - 21:51That’s not really comforting to them, so I
don’t see why it would be. But it’s been -
21:51 - 21:55the one thing that people were impeding.
“We don’t collect it on US citizens”. And -
21:55 - 22:00just seeing that on the title of a paper
is like a tiny admission that maybe they -
22:00 - 22:08do. So some of these (?) files tell other
interesting stories about people’s lives. -
22:08 - 22:12If you’ve seen any of my other talks, this
is someone you’ve heard me talk about -
22:12 - 22:16a lot. Solomon Varnado. He spent most of
his life in the military intelligence -
22:16 - 22:20community, focused on Signals Intelligence
and Geolocation. He took down his résumé -
22:20 - 22:26after ICWATCH launched. But I actually
recently found another résumé of his on -
22:26 - 22:31another website that has additional
information like on the side in the -
22:31 - 22:36military he ran diversity programs and a
sexual assault prevention program and -
22:36 - 22:39things like that. I first came across this
profile because he mentions a lot of -
22:39 - 22:45interesting code words. This is probably
the first known mention of XKeyscore back -
22:45 - 22:55in 2004/2005. But these aren’t the most
interesting part of his résumé. Later on -
22:55 - 22:58he… after he works on Intelligence
Collection Management – just Standard -
22:58 - 23:05Signals Intelligence Collection – he goes
and he works for L-3 Stratis. And there he -
23:05 - 23:09says that he identified, collected, and
performed direction finding -
23:09 - 23:13of specified target signals using
PENNANTRACE, DISPLAYVIEW and CEGS. -
23:13 - 23:14But I wasn't sure what “PENNANTRACE” was
-
23:14 - 23:17so I found it a definition
very conveniently located in -
23:17 - 23:22another résumé. That said it was an
airborne collection platform for PENNANTRACE. -
23:22 - 23:28That sounds like some sort of
Signals Intelligence collection platform. -
23:28 - 23:32And the other interesting thing about this
job is that he said that he called for -
23:32 - 23:36external review of intelligence management
processes which is not something I see -
23:36 - 23:39normally. And he was there for a fairly
short time, only a couple of months. -
23:39 - 23:43After staying at most of his other jobs
for over a year. And then at his next job -
23:43 - 23:45he was also there for
only a couple of months. -
23:45 - 23:48He was working at Pluribus International,
also on Drone Intelligence, -
23:48 - 23:50this time definitely Drone Intelligence,
on Predator drones because he -
23:50 - 23:54mentions Airhandler which we now know
more about thanks to the catalogue -
23:54 - 23:58released by The Intercept. It’s a
-
23:58 - 24:02geo-processing system for geolocation
data from Predator drones. -
24:02 - 24:06And the update to ICWATCH
includes all the data on all of the words -
24:06 - 24:14mentioned in that catalogue. And then
he leaves the Intelligence Community -
24:14 - 24:19entirely after that job. And he goes and
works as a used car salesman at this used -
24:19 - 24:23car dealership. And it turns out he is
actually – found him on this other résumé -
24:23 - 24:26that I just found – He’s actually quite
a successful used cars salesman. -
24:26 - 24:28He’s won a bunch of awards.
He’s one of the best -
24:28 - 24:31salesmen in the region. So he’s doing quite
well. And he won a bunch of awards -
24:31 - 24:32and he's in the military too,
so it seems like -
24:32 - 24:36he’s very committed to what he
does. But still that’s quite a huge career -
24:36 - 24:40change and it sounds like maybe he was
starting to get upset with some of how -
24:40 - 24:43things are really being done and he
couldn’t figure out a way to fix it after -
24:43 - 24:47calling for external review
so he just left. -
24:49 - 24:54applause
-
24:54 - 25:02And then, this is Michael Dial. Michael
Dial is a pipe fitter and a plumber. And -
25:02 - 25:08this is him with his family. He’s actually
a pipe fitter and a plumber. But he’s not -
25:08 - 25:14just any pipe fitter. He has security
clearance. And he goes and he fits pipes -
25:14 - 25:18in secure facilities. As you might expect
he does a lot of pipe fitting for naval -
25:18 - 25:27ships. He also does things like he goes to
embassies and other secret locations in -
25:27 - 25:38Afghanistan and Iraq, Ecuador, Serbia
and sets up their pipes. He also did some -
25:38 - 25:44pipe fitting in Djibouti at some sort of
Homeland Security facility which -
25:44 - 25:50coincidently is also where many of the
drone programs are run out of. So there’s -
25:50 - 25:55some interesting cases like that’s where
there are people like Michael Dial who -
25:55 - 25:59aren’t involved in Intelligence at all,
directly. But the information in the -
25:59 - 26:05résumés still provides very interesting
useful details about where secret -
26:05 - 26:08facilities are located and other aspects
of the Intelligence Community. Because -
26:08 - 26:11secret facilities don’t just materialize
out of thin air. They need people to build -
26:11 - 26:16them, they need people to operate them.
So from tracking down these people we can -
26:16 - 26:19start to map them. And then there’re other
useful things like we can figure out which -
26:19 - 26:26companies clean the NSA. I’m sure that
has all sorts of useful applications. -
26:26 - 26:34This is Eleana Costa. He lives in D.C. and
he works for the DOD. And this is him at his -
26:34 - 26:38High School Graduation back in 1988. He
has been working in Military and -
26:38 - 26:45Intelligence for nearly 20 years. And back
in 2003, he worked on Psi Ops programs. -
26:45 - 26:51Specifically he worked on Psi Ops programs
in Paraguay, Columbia and Bolivia. And -
26:51 - 26:56these were in support of DEED, the drug
enforcement agency and the CIA. -
26:56 - 26:59And there are a few other reasons ICWATCH
you mention involvement in Psi Ops in -
26:59 - 27:04Latin America for the DEA. It seems me
quite an extensive thing especially since -
27:04 - 27:09I didn’t collect any data on this
specifically, and I had just suddenly a bunch -
27:09 - 27:14of people on the database on this, so:
maybe worth looking into a bit. And then -
27:14 - 27:17after that he went and he worked on Psi
Ops programs in Iraq. So it’s kind of -
27:17 - 27:22interesting. Then he went and worked
at the DOD on Human Intelligence. -
27:22 - 27:27The other interesting thing about Kiliana
Costa is that he’s one of the people who -
27:27 - 27:34deleted his résumé after ICWATCH
launched and that was how I found him. -
27:34 - 27:41laughter and applause
-
27:41 - 27:46So after ICWATCH launched a lot of people
were positively interested in it, but we -
27:46 - 27:49also got a lot of threats because… it’s
really absurd, because all we’re doing is -
27:49 - 27:53collecting information that people
explicitly, independently, willingly -
27:53 - 27:57posted online about the profession;
as we’re not posting addresses or -
27:57 - 28:03anything like that. And making it more
searchable. Just like google does. -
28:03 - 28:07But a lot of people in the Intelligence
Community contacted us and for the first -
28:07 - 28:12few weeks, we saw a new response
every day. Some of these were kind of -
28:12 - 28:18interesting and reveals some sort of non-
sensical mind sets of people in the -
28:18 - 28:25Intelligence Community. Like this guy.
This is Alexander Irinovitch. He sent me -
28:25 - 28:29a…, actually a nice email, a very nice
email. It was really nice. Saying that he -
28:29 - 28:33couldn’t understand why he was in ICWATCH
because he wasn’t involved in surveillance. -
28:33 - 28:37He was working at a private company that
had nothing to do with surveillance. -
28:37 - 28:43So I looked at his profile and I saw that
he was working at unit 8200, the Israeli -
28:43 - 28:47Intelligence unit which, okay, there are
mandatory military services not that -
28:47 - 28:51weird, though he was there for several
years, not just the mandatory portion, -
28:51 - 28:58and this is the Intelligence unit that
spies on Palestinians. And then I looked -
28:58 - 29:03at where he works now. And he works for a
company called Verint. According to their -
29:03 - 29:09website they make software for analyzing
data from wiretaps. So I think that has to -
29:09 - 29:13do with surveillance. I’m not sure why he
interpreted that as “nothing to do with -
29:13 - 29:17surveillance”. But it’s kind of interesting
interpretation, I think it makes sense for him -
29:17 - 29:20to be in the database, but of course,
for any particular profile, there is -
29:20 - 29:23some noise. So it’s up to whoever
is looking at it to make the call -
29:23 - 29:26and do the research.
-
29:26 - 29:30And sometimes other people who complained
also helped us find interesting details. -
29:30 - 29:34Like this guy, Joshua Lively. He’s one of
the people who reported us to the FBI for -
29:34 - 29:43domestic terrorism. He worked as a
linguist at this company. I looked at -
29:43 - 29:48his profile and he mentions a lot
of interesting code words in it. -
29:48 - 29:52Some of them didn’t make so much sense
for the time. This thing called ZB. -
29:52 - 29:56And then a few weeks later the Intercept
released this article on a thing called -
29:56 - 30:04Skynet. It’s used to use machine learning
to analyze travel data, the telecom -
30:04 - 30:08providers. And ZB is one of the databases
they use and he, coincidently, has a lot -
30:08 - 30:12of the databases that are used in this
listed in his skills. And as a linguist -
30:12 - 30:15professioned with the language that’s used
in the region that’s mainly targeted -
30:15 - 30:19in this… So I’m not sure if he’s involved
in this particular program. But it seems -
30:19 - 30:23like he’s involved in something similar.
-
30:23 - 30:28So it’s quite interesting. Generally there
are a lot of angry people in the -
30:28 - 30:32Intelligence Community. Some are nicer
than others and were just asking questions -
30:32 - 30:36being like “Can you please take my profile
down!”, some other more afraid, some other -
30:36 - 30:41were more violent and sending things like
death threats. Our server started getting -
30:41 - 30:44hit pretty hard and ICWATCH kept going
down. We wanted to be sure that we weren’t -
30:44 - 30:48going to be compelled to take the data
down some way. And the easiest way not -
30:48 - 30:52to be compelled to take the data down is
to make it so you can’t really take the -
30:52 - 30:56data down yourself. And the people had
much less incentive to go after you. -
30:56 - 31:01So we moved ICWATCH to Wikileaks which has
been great, and they’ve been wonderful -
31:01 - 31:04helping with all this. So thank you,
Wikileaks! -
31:04 - 31:10applause
-
31:10 - 31:12from the audience: Your welcome!
-
31:12 - 31:14M.C.: chuckles
laughter -
31:14 - 31:18As I mentioned earlier a lot of people are
taking down their résumés in response to -
31:18 - 31:25ICWATCH. Specifically 1.030 people have,
out of the original 27.000. And others have -
31:25 - 31:29edited them and made them private. So as
part of the update in addition to doubling -
31:29 - 31:35the number of résumés available we also
recollected all of the initial résumés -
31:35 - 31:40and you can go on the site and see which
ones are removed, which ones are made -
31:40 - 31:44private, which ones have been modified and
all of that is fug so you can easily see -
31:44 - 31:51how that’s changed.
applause -
31:51 - 31:55And some of these revealed details that
people hadn’t posted… that many wish that -
31:55 - 32:01they hadn’t posted in the first place. But
they also provide useful updates on where -
32:01 - 32:05people are working. Because they’re to
track people as they move from job to job. -
32:05 - 32:11E.g. there’s this guy, Michael Acosta,
from the original ICWATCH. From 2011 -
32:11 - 32:16to 2012 he worked at Guantanamo. He
was primarily trying to find out about -
32:16 - 32:22potential attacks on Guantanamo itself.
He monitored various detainees and -
32:22 - 32:28collaborated with the Behavioural Science
Team and was trying to figure out if -
32:28 - 32:33detainees were planning some sort of coup,
I guess. And then he started working for -
32:33 - 32:41the Airforce. And here he was working on
Drone Intelligence and targeting and such -
32:41 - 32:44things like how he was responsible for
“the production made instant upgrade of -
32:44 - 32:48DGS2 mission critical Intelligence
databases which include high value target -
32:48 - 32:53development folders” like the things used
for JPAL targeting, regional fairbriefs, -
32:53 - 32:58mission storyboards and mission target
logs with document FMV mission rollups. -
32:58 - 33:01But the most interesting thing on this
résumé isn’t any of those things. -
33:01 - 33:06It’s the thing that changed between the
original launch of ICWATCH and now. -
33:06 - 33:09And that’s that he moved and started
working for a different company. -
33:09 - 33:14He started working for this company
called… he called SOS International -
33:14 - 33:21as All Source Analyst. He unfortunately
had to leave the position that he had -
33:21 - 33:25on the site coaching High School Baseball
which he seemed to really like. -
33:25 - 33:28And he kind of liked it because right now
he’s looking for Baseball opportunities -
33:28 - 33:32in Germany. So he seems to be in Germany
working for this company called SOS -
33:32 - 33:35International that I never heard of
before. So I went on the website and they -
33:35 - 33:38have a list of the cities that they
operate in Germany. These 6 cities, -
33:38 - 33:44along with Guantanamo and a number of
other sketchy locations. And based on -
33:44 - 33:48Michael Acosta’s past record of working at
Guantanamo and on Drone targeting and -
33:48 - 33:50things like that it sounds like this
company is probably doing something quite -
33:50 - 33:56sketchy. By tracking changes to where
people work we can start to find things -
33:56 - 34:00like this we might not otherwise think to
look at. That we might not otherwise about -
34:00 - 34:03as interesting.
-
34:03 - 34:10But it’s not just open data that we
collect. Because the same tools for -
34:10 - 34:14collecting and analyzing open data
are also useful for other data sets, -
34:14 - 34:19they’re useful. Like we made a search tool
in collaboration with Church Foundation -
34:19 - 34:22for all of the published Snowden documents
that allows you to search the full text of -
34:22 - 34:26the documents, browse which code words
are in these documents, see documents that -
34:26 - 34:33mention particular countries, see the full
PDFs and articles. And we also made a… -
34:33 - 34:37when the Hacking Team data came out this
summer we mirrored the data and became one -
34:37 - 34:42of the primary mirrors of the data. We had a
torrent that was almost downing the server -
34:42 - 34:44with a lot of space and figured that none
of the other people had that, so we put it -
34:44 - 34:52up. And that got a lot of traffic, it got
about 57 M hits in the first 2 days. -
34:52 - 34:54And soon we realized there was a problem
where our server charged a lot for -
34:54 - 34:59bandwidth and did cost us 48$ everytime
someone decided to download the 400GB -
34:59 - 35:07with WGET. So that was interesting but
it’s been resolved now. It hopefully made -
35:07 - 35:11the data more accessible to people who
don’t have 400GB of harddrive space -
35:11 - 35:16available or enough internet connectivity
to download that. So then we’ve also made -
35:16 - 35:21a search tool for all of the Hacking Team
emails; that has a search interface that -
35:21 - 35:25lets you browse them like you would in a
normal email client with threading, and a -
35:25 - 35:29network graph so that you can see the
connections between senders and -
35:29 - 35:40recipients. The Intelligence Community
has a variety of collection disciplines: -
35:40 - 35:45SIGINT, OSINT, HUMINT, measurements
of Signals Intelligence, Symmetry -
35:45 - 35:49Intelligence. They have all these
different sources that they’re gathering -
35:49 - 35:56data from. I think that we should try to
duplicate this. Because there are a lot -
35:56 - 35:58of different sources that we can gather
data from as well, and we need to find -
35:58 - 36:02base to better collect data from all these
sources and to fuse them together. -
36:02 - 36:06These are some other ones that I’ve
been spending all the time looking at. -
36:06 - 36:10And there’s open source Intelligence
things like ICWATCH where you’re -
36:10 - 36:13collecting data from purely public
sources. But this is just part of the vare -
36:13 - 36:18ecosystem that we can draw on. This is
mostly information that people and -
36:18 - 36:21institutions make about themselves
publicly, either intentionally or -
36:21 - 36:26unintentionally. And it’s really difficult
to use because there’s a lot of it and it -
36:26 - 36:30needs to be collected and matched up and
pulled together in a browsable way for -
36:30 - 36:33people to be able to use it. So you can’t
really just mainly go and use it at scale. -
36:33 - 36:40You can do it a little bit but not nearly
enough. And so we’re working on making -
36:40 - 36:45this easier to use. The other sort of data,
it’s anonymously leaked documents, -
36:45 - 36:47documents that were (?) sent
journalists, that they think should be -
36:47 - 36:52public and these often pretty explicitly
reveal corruption, human rights abuses -
36:52 - 36:56or other issues. But this can also be used
to collect more data. Like we used the -
36:56 - 37:01published Snowden documents very heavily
to find code words that we could use to -
37:01 - 37:05collect the data in ICWATCH. And once we
start to collect data on secret things -
37:05 - 37:11that were recently not known at all, but
now are, and we can find data on that, we -
37:11 - 37:14can start to find data on unknown code
words and unknown things that we might not -
37:14 - 37:21otherwise recognize. And then there’s data
released by governments, from FOIA -
37:21 - 37:25requests through open data initiatives.
This, of course, can be spun or things can -
37:25 - 37:31be held back. So it’s not ideal to use on
its own. But it can be used like the other -
37:31 - 37:352 types with in combination with each other.
You can use that to provide context, you -
37:35 - 37:43can use open source data to frame FOIA
requests and things like that. So the goal -
37:43 - 37:47of Transparency Toolkit is to make it
easier to collect all these types of data -
37:47 - 37:51in one place and to start to use this data
in the same ways that the Intelligence -
37:51 - 37:55Community uses the data collected from
all the various collection disciplines. -
37:55 - 38:00Except their goal isn’t to kill people or be
some sort of omniscient to God-like being -
38:00 - 38:04but we just want to build some sort of
external structure of accountability. -
38:04 - 38:10To make it easier to uncover and understand
things like surveillance programs or human -
38:10 - 38:15rights abuses or corruption. And when we
can find the people and companies that are -
38:15 - 38:18involved in things like surveillance we
can start to map who’s doing what. -
38:18 - 38:22And we can start to request information
about specific contracts. And we know who -
38:22 - 38:25we can ask questions about particular
programs. And then we can start to use the -
38:25 - 38:30data to start legal cases against specific
companies. And we can start to take more -
38:30 - 38:35concrete actions than we would be able to,
otherwise, if we were dealing simply in -
38:35 - 38:39theory or in guesses as to
what’s going on. -
38:39 - 38:42So – open source intelligence – let’s just
be more pro-active and more direct with -
38:42 - 38:49our techniques. And it also lets us find
some of this information earlier, because -
38:49 - 38:52many of the programs mentioned in the
Snowden documents were mentioned first -
38:52 - 38:59in other and open data sources. And if we
can start to figure out where these are -
38:59 - 39:02and start to figure out what they are,
then we know what data we’re missing and -
39:02 - 39:05we can start to go after it with FOIA
requests or trying to find it by other -
39:05 - 39:14means. But all of this a really, really
big project and we can’t… this is not -
39:14 - 39:17going to work if it’s just us working on
it. We need to work with other people. -
39:17 - 39:21We need to work with activists who have
ideas of how they want to use the data. -
39:21 - 39:24We need to work with journalists that
collect the data and write stories about -
39:24 - 39:27it. We need to work with human rights
lawyers to help them with their research -
39:27 - 39:30help them build legal cases based on the
findings. We need to work with NGOs and -
39:30 - 39:35human rights researchers who want to
collect and use open data in their work. -
39:35 - 39:38And we need more people going through
databases like ICWATCH. This doesn’t -
39:38 - 39:42require any special expertise. You gain
the knowledge that you need as you’re -
39:42 - 39:46going through them looking up terms. It’s
not easy but it can be quite interesting -
39:46 - 39:52once you combine all of these obscure
terms and it’s like “Oh, that’s what -
39:52 - 39:57they’re doing!” and oftentimes what
they’re doing is something entirely absurd -
39:57 - 40:01like reading all your email
or killing people. -
40:01 - 40:06And we also need software developers to
help develop software and help us figure -
40:06 - 40:11out how all of these tools should fit
together. So if anyone’s interested in -
40:11 - 40:15working with us to take on the
Intelligence Agencies of the world and -
40:15 - 40:18figure out what they’re doing please let
us know. I think it sounds a bit insane -
40:18 - 40:23and I know that, but (they) have far more
resources and far more experience but if -
40:23 - 40:28we keep ignoring the situation and we
continue as we are now making scattered -
40:28 - 40:31attempts to change things that aren’t
coordinated, that are based on limited -
40:31 - 40:36information, nothing is going to change
longterm. So I think we need to collect -
40:36 - 40:41all the information we can and figure out
how to effectively combine it and use it -
40:41 - 40:46for concrete goals. And I think we need
to do this with free software and open -
40:46 - 40:49data, because against such powerful
adversaries they’re probably the best -
40:49 - 40:51hopes we have.
-
40:51 - 41:02applause
-
41:02 - 41:06Herald: Thank you, thank you so much!
Now we have the round of Q&A, -
41:06 - 41:12for anyone who liked to ask a question,
please forward to the mikes on both sides -
41:12 - 41:17of this Saal (Hall). Start
taking the question from… -
41:17 - 41:18is nodding towards first person asking
…yeah. -
41:18 - 41:25Q: So I’d like to ask about documents
which are scans. Which are sometimes -
41:25 - 41:30released as official open source
information. What kind of workflow do you -
41:30 - 41:36have or even if you have any kind of
workflow for some OCR on these…!? -
41:36 - 41:41M.C.: A serious (?) that depends on the
document. There’s some open source -
41:41 - 41:47software called Tesseract that’s quite
good, but it doesn’t always work in cases -
41:47 - 41:51where there needs to be more specialized
parsing. I like to use something that’s -
41:51 - 41:55called Abbyy (FineReader) which is,
unfortunately, not open source and we are -
41:55 - 41:59looking for an alternative. For the
published Snowden documents, because we -
41:59 - 42:04needed to extract the classification
headers and that wasn’t so working with -
42:04 - 42:07Tesseract. But Tesseract
works for most things. -
42:07 - 42:10listens to unrecorded comment
from the audience -
42:10 - 42:15Yeah.
-
42:15 - 42:20Herald: Thank you. Do we have question
from… [the internet]? Yeah, oui! -
42:20 - 42:24Signal Angel: Yes, rooty is asking on IRC:
What would you recommend the NSA to -
42:24 - 42:28develop towards a future
of Social Usefulness!?? -
42:28 - 42:36E.g. what value have databases from
2015, people cell phone sensors in 2115!?? -
42:36 - 42:41Could you give the NSA, maybe
CEO there, useful work!?? -
42:41 - 42:43M.C.: Can you rephr..-, sorry !??
-
42:43 - 42:50Signal Angel: naively repeats first
of the apparent Troll questions -
42:50 - 42:52M.C.: laughs
Social Usefulness… -
42:52 - 42:56Probably the most useful thing they could
do is stop collecting the data in the -
42:56 - 43:02first place, especially the data that’s
being intercepted or illegally collected. -
43:02 - 43:07There’s probably some amounts of useful
tracking they could do, but I’m not sure -
43:07 - 43:10that’s the best approach using the tactice
that they were to collect the data at that -
43:10 - 43:13time.
-
43:13 - 43:16Herald: Thank you. So, next
question from you, please! -
43:16 - 43:20Question: Hello, thanks for the talk, that
was one of the best ones I’ve seen at this -
43:20 - 43:27congress. I was wondering what you think
about the question you’re raising about -
43:27 - 43:31“we shouldn’t make the same mistakes”.
Because I’m not totally sure that’s -
43:31 - 43:35possible because of things I’ve seen in
other communities. All communities have -
43:35 - 43:41their extremists and they will abuse this
data. And then that allows a political -
43:41 - 43:47attack on you, because they say you made
that happen, it’s not true. But it will celd -
43:47 - 43:50people. So how do you protect
against that? -
43:50 - 43:54M.C.: I think it’s hard to entirely
protect against it because we can’t -
43:54 - 43:57control the actions of other people. But
people could also go off and use this data -
43:57 - 44:02negatively by collecting it on their own,
independently of us. I was actually quite -
44:02 - 44:05impressed, after we launched ICWATCH, I
haven’t heard of anyone complaining of -
44:05 - 44:07threats that they’ve gotten from people…
-
44:07 - 44:10People in the Intelligence Community:
I haven’t heard of anyone in the -
44:10 - 44:12Intelligence Community complaining about
threats that they’ve gotten as the results -
44:12 - 44:16of ICWATCH being launched. All of the
complaints have been theoretical. The only -
44:16 - 44:19threats I’ve heard of resulting from
ICWATCH are that from the Intelligence -
44:19 - 44:22Community to us. I haven’t heard of
anything, so I’ve been very impressed with -
44:22 - 44:27the civility of the internet in that case.
And I think that maybe, by framing it, and -
44:27 - 44:30actually bringing it down to the
individual level, and making it clear that -
44:30 - 44:35these are people, that makes it a little
bit less likely that people will go after -
44:35 - 44:38them in a vicious way.
-
44:38 - 44:43Q: Have you thought of creating a kind of usage
guidelines? I mean that's not gonna change what -
44:43 - 44:48anyone does. But if someone does something
you can then say “That’s against our usage -
44:48 - 44:52guidelines” and it’s a political defence
against someone accusing it… -
44:52 - 44:56M.C.: Yeah, I don’t think there’s any way
that we can enforce something like that. -
44:56 - 45:00But we do try to be very careful with how
we’re framing it in saying – like I - -
45:00 - 45:03since a long time, all this talk saying these are
people that are not evil people. They’re -
45:03 - 45:07normal people that you should look at as
such. So I think being very careful of -
45:07 - 45:09framing it and we’ll be developing some
sort of guidelines. That’s definitely a -
45:09 - 45:11good idea.
-
45:11 - 45:14Herald: Thank you. Your question, please!
-
45:14 - 45:20Troll: Hi! First, thank you very much for
this tool that makes it possible to fight -
45:20 - 45:28back against, legally. For people who try
to punish or yeah… -
45:28 - 45:34What I have to say, or my question is: I
worked in the last 3 1/2 years, let’s say, -
45:34 - 45:40in the field of IT Forensics. And I worked
with Maltego and stuff, and so I know what -
45:40 - 45:45a lot of work it is to collect data and
bring it into good conditions, so others -
45:45 - 45:57could read it or you can get a goal, or
see a goal. And what I personally think -
45:57 - 46:05is very important: this could be very
sensible data to people and my question -
46:05 - 46:13is: How do you care that this data
which you will offer to download will keep -
46:13 - 46:20safe? That’s the first question, and
the second is: Did you think about -
46:20 - 46:28verifications? So you are collecting a lot
of data, and in a few years another person -
46:28 - 46:35wants to see if this data was correct. So
do you verify the sources like MD5 sum -
46:35 - 46:44or so you can say “This fingerprint taken
at this-day and this-time is correct?” -
46:44 - 46:51M.C.: For the first question: I don’t
think there’s really… I’m not sure (?) -
46:51 - 46:56protected because this is a version that
people posted publicly themselves. So they -
46:56 - 47:01sort of said that they don’t want it to be
protected or secured because they’re -
47:01 - 47:07posting it on the public internet. So I’m
not sure there’s really any reason to try -
47:07 - 47:12to protect it when it’s something that
they’ve published very publicly. -
47:12 - 47:16And on the second one, for verification,
that’s quite tricky with some of the data -
47:16 - 47:19especially around the Intelligence
Community because all of these things -
47:19 - 47:22are secretive and it’s hard to confirm
them. We can confirm them against each -
47:22 - 47:27other like now we have multiple résumé
sites on ICWATCH, so sometimes we can find -
47:27 - 47:31the same person’s résumé on another site
and compare over time and we can go -
47:31 - 47:34finding their profiles they have and try
to combine as much data on the same -
47:34 - 47:36as is possible and have it over time.
-
47:36 - 47:42Q: What I did: I made a fingerprint
when I downloaded a website, I made a -
47:42 - 47:46fingerprint and then I can say OK, this
is… yeah. -
47:46 - 47:49M.C.: Of truth verifying various actions
collected, then. Yeah, I mean that's a bit harder to -
47:49 - 47:55absolutely do that on the behalf all of
the full text of the web page save, then -
47:55 - 48:01we have it all published on Github so you
can verify those collected then but, yeah. -
48:01 - 48:04Herald: We’ll take the questions
from up there. -
48:04 - 48:10Jake Appelbaum: Hi, community extremist
here… So I wanted to say something which -
48:10 - 48:13is that I think what Julian did for
leaking documents you’re doing for -
48:13 - 48:18analysis. Which is really great! Because
transparency is enough – you need action! -
48:18 - 48:21And so I just wanted to say that I hope
that everyone can give and see in -
48:21 - 48:28Transparency Toolkit a lot of material
support. And maybe a round of applause! -
48:28 - 48:34applause
-
48:34 - 48:38Definitely the best talk at the congress
and I had a couple of suggestions. But -
48:38 - 48:42one of them is: I think it would be great
if you could focus on American Domestic -
48:42 - 48:43Police Agencies.
M.C.: Hmm-mhm… -
48:43 - 48:48Jake: In particular collecting the images
of Police Academy Graduation photographs. -
48:48 - 48:53And to be able to move in the direction of
facial recognition, so that we can find -
48:53 - 48:56Undercover Police Officers
that are in our midst… -
48:56 - 49:02applause
-
49:02 - 49:07And I think it would be great if you could
create a FOIA wizard, essentially, ’cause -
49:07 - 49:11everybody likes wizards, and who doesn’t
like UNIX… So it’d be great if you could -
49:11 - 49:14create a FOIA wizard where you could say:
“I wanna know about these terms” and it -
49:14 - 49:19would just generate automatically – maybe
by partnering with Macroc e.g. – -
49:19 - 49:23interesting things, where there’s a kind
of “Wait!”. Where you realize there’s a lot -
49:23 - 49:27of people working on this classified
program and it’s at this agency and they -
49:27 - 49:29have a contract with this company and
these are the people involved and just -
49:29 - 49:34automatically generate those FOIAs and
then get people to sort of sign up to put -
49:34 - 49:38their name down and sort of sponsor a
little transparency and to say “Oh, that’s -
49:38 - 49:42the FOIA I wanna get behind, I’m in a
check on it, you know, once a week, I’m -
49:42 - 49:45gonna do this thing. Through Macroc.”
I think that would be a way to take this -
49:45 - 49:49information in a legal manner and to make
it actionable. And I think there’s lots of -
49:49 - 49:54other interesting things you could do that
are not about the law. But I leave that to -
49:54 - 49:57the imagination of other people. It should
be legal but it doesn’t need to be through -
49:57 - 50:02legal channels like, say, FOIA. So thanks
for the work that you’re doing, M.C. and -
50:02 - 50:06I hope that you will expand it to,
basically, all of the pigs of the whole -
50:06 - 50:10world. And I would really encourage you
to read Hannah Ahrend’s “Eichmann in -
50:10 - 50:16Jerusalem”, because you described a
fundamental thing: these people aren’t -
50:16 - 50:21evil. But actually, Evil itself doesn’t
exist. These people are the Banality of -
50:21 - 50:26Evil. They’re people who have soccer
practice, and they have a dog, and they -
50:26 - 50:30like to go home and fuck their wife, and
they’re regular people who do drone -
50:30 - 50:32strikes.
-
50:32 - 50:36applause
-
50:36 - 50:40Herald: Thank you. We
have a question on mike 1. -
50:40 - 50:47Q: How easy is it to add support for new
databases or new sources of information? -
50:47 - 50:51M.C.: It depends on the source and how
that site is structured. But generally -
50:51 - 50:55it’s not too difficult. The adding to
proper new sources does require -
50:55 - 51:00programming at this point. But it’s not
particularly complex programming and we -
51:00 - 51:03have some libraries that make some
parts of it easier, as well. And if you’re -
51:03 - 51:06interested in adding a data source we’re
more than happy to help with that. -
51:06 - 51:11Q: Awesome! My favourite is the list of…
the report of when people were denied -
51:11 - 51:16security clearance and why and if their
appeal was then, like, removed. -
51:16 - 51:18M.C.: Yeah, that would
be quite interesting! -
51:18 - 51:24Q: Okay!
-
51:24 - 51:29Herald: If there’s no further
questions… moment… -
51:29 - 51:34yeah, okay! Please!
-
51:34 - 51:44Q: Yesterday it was said that we have to
make sure that they know that we watch -
51:44 - 51:51them and make sure that they know that we
watch them. Because some day they will get -
51:51 - 51:58prosecuted. So, in some way. I think
you are exactly doing this. So this is -
51:58 - 52:12brilliant. Are you already in the stage
where you’re thinking you can start -
52:12 - 52:18concrete legal actions against some
individuals that you are getting -
52:18 - 52:25information with your tools. We’ve been
working with some lawyers towards that. -
52:25 - 52:29We are looking to do more in this, so if
you know… if you have any ideas for -
52:29 - 52:32particular situations where this may be
applicable, our lawyers, that we should -
52:32 - 52:37work with, let us know! But we’re working
towards that and making some progress. -
52:37 - 52:42Q: Thanks!
-
52:42 - 52:45Herald: Getting a question
from up there, please! -
52:45 - 52:50Q: I just wanna say that you are a
visionary who is more passionate than -
52:50 - 52:53anybody I have ever collaborated with
and it’s a total honor. -
52:53 - 52:54applause
-
52:54 - 52:57Herald: Thank you.
-
52:57 - 53:03M.C.: Yeah, and just to everyone, that’s
Brennan who also works on Transparency -
53:03 - 53:07Toolkit. He made the awesome UI for
Harvester and Lookingglass that you saw -
53:07 - 53:09in the Tabs of all this.
-
53:09 - 53:15applause
-
53:15 - 53:18Jake: If no one else is gonna ask a
question, I’d like to ask a question which -
53:18 - 53:21I know the answer to but no one else
in the room does. And I think it’s very -
53:21 - 53:25fascinating. I wonder if you could talk
about lessons that you’ve learned from -
53:25 - 53:28studying about the South African
Resistance to Apartheid. -
53:28 - 53:30M.C. is laughing
Jake: And maybe you could talk about the -
53:30 - 53:35things that drive you to work on these
things. E.g. what inspires you to justice? -
53:35 - 53:39E.g. experiences at MIT and maybe – I mean
if you don’t want to talk about it, I’m -
53:39 - 53:43sorry for asking it. But if you do wanna
talk about it I think you can inspire -
53:43 - 53:49everyone else here to raise their fist
with you! In solidarity. -
53:49 - 53:57M.C.: Yeah… Okay… I guess it’s been
nearly 3 years now, so maybe that’s okay -
53:57 - 54:06to talk about. 3 years ago there was this
case at MIT… everyone has probably heard -
54:06 - 54:14of Aaron Swartz and he was being
prosecuted for downloading documents from -
54:14 - 54:22JSTOR. And I was brought in trying to figure out
MIT’s role in this situation, and if you -
54:22 - 54:26might be able to sway a public opinion,
a few people in Boston. I think some of -
54:26 - 54:31them are in this room. And we were trying
to help him. And eventually, part way into -
54:31 - 54:36the process, he became afraid and decided
that it would be more risky for us to help -
54:36 - 54:39him, with the prosecutor who might lash
back, so we stopped. But one of the things -
54:39 - 54:46that I did in this process was, I sent out
a survey to all of the professors at MIT -
54:46 - 54:54asking their opinion on his case. And
whether they identified with his actions. -
54:54 - 54:59And I got a lot of response to this
survey. Some were quite nice and were -
54:59 - 55:04quite supportive. Some were very vicious,
saying that he should go to jail and that -
55:04 - 55:09he is a waste of humanity and he works at
this Harvard Center for Ethics, so how is -
55:09 - 55:13this ethical. And things like that. They
were quite horrible. And initially he had -
55:13 - 55:18access to this database and somehow over
the next year, when we weren’t doing much, -
55:18 - 55:22he lost access to this database. And he
emailed me asking for access again. And -
55:22 - 55:27back then I was on some stupid kick about
research ethics and redaction and thought -
55:27 - 55:31that there’s no reason to… It really seems
that’s like “I cannot give you the answers -
55:31 - 55:35about the names”. I was just stupid because
the names are the most useful part of that -
55:35 - 55:42data. And I kind of abandoned him, along
with a lot of other people in that. And I -
55:42 - 55:50feel like if I had given him the names
that might have been something that could -
55:50 - 55:53be used to find supporters within MIT or
people who were rallying against him. And -
55:53 - 55:56I don’t think it would have made a huge
difference but it might have made just a -
55:56 - 56:02little bit. And that was one of the things
that really showed me the power of data on -
56:02 - 56:06individuals and the role of individuals
within institutions. And I feel like I -
56:06 - 56:11really failed there. So
I don’t want to do that again. -
56:11 - 56:16applause
-
56:16 - 56:21Herald: Thank you. Unfortunately, we need
to wrap up because we are out of time. -
56:21 - 56:27Thank you for attending this very
interesting lecture and, quite touching -
56:27 - 56:28in the end.
-
56:28 - 56:34postroll music
-
56:34 - 56:38Subtitles created by c3subtitles.de
in 2016. Join and help us do more!
- Title:
- M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone
- Description:
-
Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a third type of open data that is often overlooked- the information people and companies post about themselves. People need jobs. Companies need to hire people. Secret prisons do not build themselves.
By making it feasible for anyone to collect public data online in bulk and exploring ways to effectively use this data for concrete objectives, we can build an independent, distributed system of accountability.
M. C. McGrath
- Video Language:
- English
- Duration:
- 56:40
Bar Sch edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
Maggie S (Amara staff) edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
C3Subtitles edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
Bar Sch edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
Retired user edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
Schnapspraline edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
raven edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone | ||
Bar Sch edited English subtitles for M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone |