{"id":453,"date":"2013-07-01T11:16:41","date_gmt":"2013-07-01T15:16:41","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/internetmonitor\/?p=453"},"modified":"2013-07-01T11:16:41","modified_gmt":"2013-07-01T15:16:41","slug":"law-enforcement-and-mining-social-media-wheres-the-oversight","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/2013\/07\/01\/law-enforcement-and-mining-social-media-wheres-the-oversight\/","title":{"rendered":"Law Enforcement and Mining Social Media: Where&#8217;s the Oversight?"},"content":{"rendered":"<p>A Pennsylvania detective had a nickname of a suspect, but no real name. He turned to Facebook, found a picture, and eventually apprehended the person. This anecdote from a <a href=\"http:\/\/www.washingtonpost.com\/business\/technology\/state-photo-id-databases-become-troves-for-police\/2013\/06\/16\/6f014bd4-ced5-11e2-8845-d970ccb04497_story.html\"><em>Washington Post<\/em> investigation<\/a> into law enforcement use of facial recognition software illustrates how social media can be a boon for catching criminals.<\/p>\n<p>As people share more about their thoughts and actions on social media and as algorithms grow more sophisticated, law enforcement\u2019s ability to mine such information for clues into how to prevent crimes raises concerns of profiling and questions of oversight.<\/p>\n<p>Law enforcement profiling predates social media. From 1956 to 1971, FBI counterintelligence program <a href=\"http:\/\/vault.fbi.gov\/cointel-pro\">COINTELPRO<\/a> tracked <a href=\"http:\/\/www.slate.com\/articles\/news_and_politics\/history\/2013\/06\/prism_j_edgar_hoover_would_have_loved_the_nsa_s_surveillance_program_topic.html\">political organizations and their leaders<\/a>, including Martin Luther King, Jr.<\/p>\n<p>Recently, the ACLU\u2019s \u201cMapping the FBI\u201d project uncovered intelligence gathering that used <a href=\"http:\/\/www.aclu.org\/blog\/criminal-law-reform-racial-justice-national-security\/shhhh-what-fbi-doesnt-want-you-know-about\">racial and ethnic mapping<\/a>. The project&#8217;s documentation includes a <a href=\"https:\/\/www.aclu.org\/files\/fbimappingfoia\/20111019\/ACLURM011609.pdf\">2009 memo<\/a> from the bureau\u2019s Detroit office that called Michigan\u2019s Middle East and Muslim community\u00a0\u201cprime territory for attempted radicalization and recruitment by\u201d terrorist groups. The FBI\u2019s reason: most State Department-labeled terrorist groups originate in the Middle East and South Asia.<\/p>\n<p>In 2010 a 20-year-old Arab-American man in California <a href=\"http:\/\/www.wired.com\/threatlevel\/2010\/10\/fbi-tracking-device\/all\/\">found a tracking device on his car<\/a> and learned the FBI had been surveilling him, a US citizen, for months, if not longer. Since 2011 the Associated Press has <a href=\"http:\/\/www.ap.org\/Index\/AP-In-The-News\/NYPD\">investigated<\/a> the NYPD\u2019s spying on Muslim communities, documenting what <em>The Atlantic<\/em> calls \u201c<a href=\"http:\/\/www.theatlantic.com\/politics\/archive\/2013\/03\/the-horrifying-effects-of-nypd-ethnic-profiling-on-innocent-muslim-americans\/274434\/\">horrifying effects<\/a>\u201d on both those surveilled, who have not been accused of any crimes, and on counterterrorism efforts as a whole\u2014in six years, the program did not generate a single lead.<\/p>\n<p>The <a href=\"https:\/\/www.propublica.org\/article\/nsa-data-collection-faq\/\">NSA<\/a> and British intelligence agency <a href=\"http:\/\/www.guardian.co.uk\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\">GCHQ<\/a> collect raw Internet traffic that includes email, social media, and chats. US law enforcement agencies at all levels can obtain information from Internet and communication companies with court orders. But police don\u2019t need permission to monitor what already flows freely on the web. <em>Ars Technica<\/em> <a href=\"http:\/\/arstechnica.com\/tech-policy\/2013\/06\/meet-prisms-little-brother-socmint\/\">reported<\/a> on the London Metropolitan police\u2019s extensive efforts to monitor social media:<\/p>\n<blockquote><p>For the past two years, a secretive unit in the Metropolitan Police has been developing the tools for blanket surveillance of the public&#8217;s social media conversations. Operating 24 hours a day, seven days a week, a staff of 17 officers in the National Domestic Extremism Unit (NDEU) has been scanning the public&#8217;s tweets, YouTube videos, Facebook profiles, and anything else UK citizens post in the public online sphere.<\/p><\/blockquote>\n<p>Several commercial tools exist to monitor social media streams, and companies <a href=\"http:\/\/californiawatch.org\/dailyreport\/private-tech-companies-pitch-web-surveillance-tools-police-17846\">actively market them to law enforcement<\/a>. \u00a0Police departments at the University of Maryland, Hampton University, and the city of Boca Raton, Florida <a href=\"http:\/\/www.ecmuniverse.com\/news\/default.aspx\">use tools<\/a> from the Virginia-based technology company ECM Universe to surveil social media users and analyze the text of their messages. A <a href=\"http:\/\/www.ecmuniverse.com\/products\/ECM_Universe_Law_Enforcement_IBM_Solution_Profile.pdf\">brochure<\/a> touts that with the tool,<\/p>\n<blockquote><p>[A] city can monitor activist groups who are using social media to organize their efforts on the ground and receive alerts in a matter of minutes from the time of the postings when dangerous radical elements emerge from the crowd.<\/p><\/blockquote>\n<p>Such language underscores the need for oversight on how to use information gathered from social media. Participating in an activist group is not a criminal activity, and \u201cdangerous radical elements\u201d do not emerge at every activist meeting.<\/p>\n<p>US law enforcement generally needs a reason and court permission to investigate someone. Predictive analytics involves mining data to look for undetected or unconsidered patterns. Agencies\u00a0\u201cdon\u2019t necessarily know what they need to monitor on Twitter,\u201d software company SAS\u00a0<a href=\"http:\/\/support.sas.com\/resources\/papers\/proceedings12\/309-2012.pdf\">wrote<\/a>\u00a0in a paper detailing its tools, one of which maps people\u2019s friends and followers on Facebook and Twitter. Users maintain hundreds of connections on these sites, including people they may not have contacted for years or people they don\u2019t even know. To what extent will a person&#8217;s connections implicate them?<\/p>\n<p>Predictive policing has <a href=\"http:\/\/www.fbi.gov\/stats-services\/publications\/law-enforcement-bulletin\/2013\/April\/predictive-policing-using-technology-to-reduce-crime\">helped<\/a> police departments lower crime. But such efforts used previously reported and anonymized crime data; inclusion of social media data adds another dimension of concern. People don\u2019t know what governments are doing with troves of social media data, and people can\u2019t see the algorithms that police use to fight crime. As Evgeny Morozov <a href=\"http:\/\/www.zcommunications.org\/how-facebook-could-get-you-arrested-by-evgeny-morozov\">wrote<\/a>, \u201cIf no one can examine the algorithms&#8230;we won&#8217;t know what biases and discriminatory practices are built into them.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As people share more about their thoughts and actions on social media and as algorithms grow more sophisticated, law enforcement\u2019s ability to mine such information for clues into how to prevent crimes raises concerns of profiling and questions of oversight. <a href=\"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/2013\/07\/01\/law-enforcement-and-mining-social-media-wheres-the-oversight\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5507,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[13363,3619,5107,1860],"tags":[],"class_list":["post-453","post","type-post","status-publish","format-standard","hentry","category-social-media","category-surveillance","category-united-kingdom","category-united-states"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4L9BV-7j","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/posts\/453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/users\/5507"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/comments?post=453"}],"version-history":[{"count":31,"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/posts\/453\/revisions"}],"predecessor-version":[{"id":890,"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/posts\/453\/revisions\/890"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/media?parent=453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/categories?post=453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/internetmonitor\/wp-json\/wp\/v2\/tags?post=453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}