FBI says social media monitoring won't infringe privacy rights
Efforts won't focus on specific individuals or groups, agency insists
Computerworld - The FBI today said that its proposed plans to monitor social media sites as part of a broader strategy to improve real-time situation awareness will be fully vetted by the agency's Privacy and Civil Liberties Unit.
The unit will review the legal implications of the monitoring application and ensure that it meets all privacy and civil rights obligations before it is implemented, the agency said in a statement emailed to Computerworld "Although the FBI has always adapted to meet changes in technology, the rule of law, civil liberties, and civil rights, will remain our guiding principles," the agency said.
The FBI was responding to questions about its plans to use technology to quickly gather and analyze data posted on sites such as Facebook, Twitter and on blogs using simple keyword searches and phrases.
In a Request For Information (RFI) last month, the FBI said that data posted on such sites would let it more quickly detect specific and credible threats, locate those organizing and taking part in dangerous gatherings and predict upcoming events.
It noted that social media networks have been trumping police, firefighters and news media when it comes to communicating news of developing incidents and protests. "Social media is rivaling 911 services in crisis response and reporting," the RFI noted.
Similar monitoring by the U.S. Department of Homeland Security has already stoked considerable privacy concerns. Groups such as the Electronic Privacy Information Center (EPIC) and the Electronic Frontier Foundation have called for more transparency and oversight of such monitoring activities.
EPIC last month warned that some of DHS' monitoring activities appeared to have little to do with public safety; it has expressed similar concerns over the FBI's plans.
Such concerns have prompted the House Committee on Homeland Security to schedule a hearing Thursday to examine the privacy implications of DHS' social media monitoring activities.
In its statement, the FBI said that information gathered from social media networks will support the activities of its Strategic Information and Operations Center (SIOC). "In accordance with its core mission, SIOC has a responsibility to enhance its techniques for collecting and disseminating real-time publicly available open source information to improve the FBI's overall situational awareness and support of mission requirements," the FBI said.
Social media monitoring will help the agency stay on top of breaking events, crisis activity or natural disasters that have already occurred or are still in progress, the FBI said. The effort will not focus on specific persons or protected groups, but on words that relate to specific events, crisis scenarios and criminal or terrorist activities.
Examples of the words that the FBI will use in its social media searches will include 'lockdown,' 'bomb,' 'suspicious package,' 'white powder,' 'active shoot' and 'school lock down.'
The federal government already uses publicly available open source information to identify immediate or emerging threats to national security. "The type of social media application being researched by the FBI, to view publicly available information, is no different than applications used by other government agencies."
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
Read more about Privacy in Computerworld's Privacy Topic Center.
- Four Little-Known Ways WAN Optimization Can Benefit Your Organization Read this white paper to learn how far WAN optimization has come, and how to make this most of your investments by using...
- IDC ROI Infographic Trends such as evolving communication patterns, connection types, applications and bandwidth can have an impact on enterprise organizations. Learn how IT organizations can...
- Improving Business Value of WAN Optimization Want to achieve faster ROI with WAN optimization? Read the latest IDC report and discover how you can cut IT costs without compromising...
- Path Selection Infographic Path selection technology provides the ability to re-direct select traffic and application flows through alternate WAN routes based on service metrics, such as...
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- HP DevOps KnowledgeVault This interactive resource focuses on the evolution taking place in the world of software development, specifically the Agile development framework, and the gap... All Topic Center White Papers | Webcasts