Back to News & Commentary

To the Government, Your Latest Facebook Rant Is Raw Intel

Eagle on NSA logo and Twitter logo bird looking at each other
Eagle on NSA logo and Twitter logo bird looking at each other
Hugh Handeyside,
Former Senior Staff Attorney,
老澳门开奖结果 National Security Project
Share This Page
September 29, 2016

A world awash in social media content can mean different things depending on who is looking. Advertisers see new markets, news outlets see distribution channels, activists see potential allies for their causes. Governments see something else: intelligence.

The scale on which social media content is being almost defies comprehension. 2.3 billion active social media users鈥攚ith a million more joining every day鈥攗pload hundreds of millions of photos and send 500 million tweets each day, add 300 hours of video to YouTube each minute, and create six new Facebook profiles each second.

It鈥檚 no secret that law enforcement and intelligence agencies think all that content holds the keys to identifying would-be terrorists. PBS recently ran a with a telling quote from Nick Rasmussen, the director of the National Counterterrorism Center (NCTC):

The work we鈥檙e doing now with our partners in the intelligence community often doesn鈥檛 involve really, really sensitive intelligence. It involves looking at Twitter or looking at some other social media platform and trying to figure out who that individual behind that screen name, behind that handle might actually be and whether that person poses a threat to the United States.

PBS reports that the intelligence community has even coined a new 鈥-INT鈥濃擲OCMINT, or social media intelligence鈥攖o go along with HUMINT (human intelligence), SIGINT (signals intelligence), and others.

Nor is it surprising that NCTC and other intelligence agencies would look to social media to gather information on terrorists or ISIS fighters. But it鈥檚 safe to assume that NCTC isn鈥檛 getting friend requests from those people, so the question is how intelligence and law enforcement agencies are identifying the potential 鈥渢hreats鈥 whose social media content they are scrutinizing.

For that, the government is relying on social media monitoring tools that search, scrape, and aggregate social media content from across the web. All indications are that this is a major priority for security-related agencies.

  • Earlier this month, Secretary of Homeland Security Jeh Johnson 鈥渨e鈥檝e enhanced our ability to look . . . in social media . . . for indications of a radical, violent bent.鈥
  • The FBI has been using to collect and store social media posts, map connections between users, and identify potential targets for investigation.
  • The CIA鈥檚 newly revamped Open Source Enterprise social media content, and its venture capital firm, In-Q-Tel, has in companies that design algorithms for aggregating and mining social media, such as Dataminr, Geofeedia, and PATHAR (which U.S. Customs and Border Protection as a client).

And the feeding frenzy isn鈥檛 limited to the federal government. We鈥檝e already raised concerns about social media monitoring by state agencies, local law enforcement, and schools. According to documents the 老澳门开奖结果 of Northern California obtained, at least 20 law enforcement agencies in California have acquired social media monitoring software鈥攎any within the last year.

This is government surveillance, pure and simple. It鈥檚 one thing to view a person鈥檚 social media content as part of an investigation based on preexisting suspicion of wrongdoing; it鈥檚 another to start with the vast social media web and try to identify suspicious behavior using secret, proprietary algorithms. That kind of mass, suspicionless monitoring could have serious consequences.

Chilling effects

Foremost among those consequences is a likely chilling effect on speech and expression that the First Amendment protects. People stop voicing unpopular or controversial opinions when they know that the government is listening. In fact, has shown that even people who said they had 鈥渘othing to hide鈥 were more likely to self-censor their online statements when reminded about government surveillance. The result is an impoverished discourse: we can鈥檛 have open and honest debates if we鈥檙e worried that the government will monitor and target people whose opinions it disfavors.

Those fears are not unfounded:

  • The FBI is as the basis for deciding who to interview, investigate, or target with informants or undercover agents.
  • The government鈥檚 watchlisting guidance shows that a single Facebook post or tweet may be all it takes to place someone on a watchlist, with consequences that can range from repeated, invasive screening at airports to detention and questioning in the United States or abroad.
  • Social media monitoring in 鈥淐ountering Violent Extremism,鈥 or 鈥淐VE鈥 programs, which call on teachers, religious leaders, and mental health professionals to identify and report on individuals purportedly at risk of 鈥渞adicalization.鈥

These government measures amount to what is effectively punishment for First Amendment-protected speech鈥攁nd so will inevitably chill that speech.

Biased targeting

Suspicionless social media monitoring can also lead to biased targeting of racial and religious minorities. For instance, government surveillance of social media accounts associated with the Black Lives Matter movement is well-documented, and CVE programs overwhelmingly and unfairly focus on American Muslims. These are just the most recent examples of government surveillance of minority activists and communities stretching back to the 1960s and 70s鈥攕urveillance that promotes fear, distrust, and self-censorship in those communities.

Privacy violations

Monitoring and retention of social media content also raises acute privacy concerns. That may seem counterintuitive, since users have chosen to make such content public. Social media monitoring technology, however, aggregates and arrays content in ways that enable law enforcement and intelligence agencies to track our movements, networks, and associations. While people expect that the statements they make publicly online can be viewed by a wide audience, they do not expect that law enforcement and intelligence agencies will compile, monitor, and analyze those statements, creating digital dossiers more revealing than any paper file the government could assemble.

Reinforcing fear of 鈥渞adical鈥 speech

Finally, pervasive social media monitoring embraces and perpetuates the false notion that the adoption of ideas considered 鈥渆xtreme鈥 or 鈥渞adical鈥 places people on a path toward violence. and have debunked this theory and reinforced that a person鈥檚 decision to engage in political or ideologically motivated violence is a complex one, and that no reliable indicators exist that can be used to predict who will commit a terrorist act. So instead of identifying real threats, dragnet monitoring is more likely to flood agencies with information on innocent individuals and innocuous conduct.

Social media combines the pen, the camera, and the megaphone in a way that lifts individual voices but is proving irresistible to security agencies. We need more information about those agencies鈥 efforts to monitor social media networks (which is why in May we filed a Freedom of Information Act request with five such agencies)鈥攊nformation that should facilitate a public conversation about setting strict limits on such monitoring and incorporating accountability mechanisms for violating those limits. We can only hope that that conversation isn鈥檛 hampered by fear and self-censorship.

Learn More 老澳门开奖结果 the Issues on This Page