DHS media monitoring could chill public dissent, EPIC warns
Documents show not all of DHS' monitoring has a public safety purpose
Computerworld - The U.S. Department of Homeland Security is engaging in media monitoring activity that achieves no public safety goals and will likely have a chilling effect on legitimate criticism of the agency, a leading privacy advocacy group warned Friday.
The Electronic Privacy Information Center's conclusion is based on an analysis of documents it received from the government this week in response to a Freedom of Information Act (FOIA) request.
The documents show that DHS has hired General Dynamics to monitor and summarize reports from numerous media outlets, blogs and social networking sites.
Computerworld is one of dozens of news media and blog sites that are being monitored by the DHS under a broad initiative aimed at improving the government's situational awareness. Others on the list include The New York Times, Wired, the Huffington Post and the Drudge Report.
The information gathered from such sites is intended to help the DHS' Office of Operations Coordination and Planning keep on top of potential threats and hazards to public safety, the DHS documents say.
According to the DHS, one of OPS' missions is to maintain real-time situational awareness by gathering, coordinating, and sharing information among federal, state and local law enforcement. The media and social network monitoring supports the activities of a broader Network Operations Center which issues advisories, alerts and bulletins relating to national security threats.
The problem is that some of the media and network monitoring appears to have little to do with furthering public safety, said Ginger McCall, director of EPIC's Open Government Project.
For instance, as part of its $11 million contract with the DHS, General Dynamics is supposed to collect reports that reflect adversely on the U.S. government, including the DHS, the Federal Emergency Management Agency, the CIA and ICE (Immigration and Customs Enforcement).
The company is expected to generate "reports on DHS, Components, and other Federal Agencies: positive and negative reports on FEMA, CIA, CBP, ICE, etc. as well as organizations outside the DHS" the documents show.
The DHS could not be reached for comment.
McCall pointed to DHS training materials obtained by EPIC that summarize reaction to news media reports about a proposal to bring Guantanamo detainees to a local prison in Standish, Mich. The report is based on comments made by local residents on Facebook, Twitter, three different blogs and reader comments on an unidentified media site.
The report concludes that residents on the whole were opposed to the plan. It included verbatim comments made by an unidentified Facebook user and a union representative at the Standish Maximum Correctional Facility.
It also included verbatim Facebook comments made by an unidentified individual running a Standish car dealership, which the report said was reflective of minority perspective on the issue.
It is unclear if that particular report was generated by General Dynamics, but it is held up as an example of the kind of reporting the DHS wants to emulate, McCall said. In each case, the comments in the DHS report are anonymous and appear designed only to highlight public opinion on both sides of the issue.
Even so, the fact that the DHS is engaged in monitoring and gathering such information could have a chilling effect on free speech, McCall said.
The documents "prove that the agency is looking specifically for media stories that are critical to DHS or the U.S. government," McCall said. "It is monitoring political dissent online," as part of its broader media monitoring activities.
The DHS is justified in gathering information that helps fulfill its mission to protect against terrorists and other domestic threats, McCall said. However, collecting information on public reaction to various developments should not be part of that mission.
"They are completely out of bounds here," McCall said. "The idea that the government is constantly peering over your shoulder and listening to what you are saying creates a very chilling effect to legitimate dissent.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts