Merken

Spook Sociology

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
sound-meaning home and this is what we need to
be
so um good afternoon everyone would like
you to take it like to thank you to take but taking the time out to come to this briefing we're gonna take you through some a few risk factors for people getting involved in extremism so you can spot this when it's happening in your own community and maybe you know state intervention to prevent people getting involved in the wrong thing so extremism is defined as a worldview that encourages violence influence political change and so this can also include things like surveilling people to collect
metadata and then using that to figure out which killed so this is 1 of the people who decided to kill based on
metadata she talks about how she uses f 3 a methodology to conduct analysis on Ron use UNC giving comments helping degree 125 jottings per packets in the nominating them the joint prairie effects lists for kinetic targeting and so she's using all of this intercepted communications information possibly gained under duress and torture and and various metadata to determine who to killing capture the and yeah thanks to the
information released by Edward Snowden we have on more insight into how thought you know this extremism reaches this is the joint prioritize effects less and a redacted version of X and we know from this node in documents stats the UK and involved in putting names on the joint partite effects list in Yemen and places which have not which would not admitted to parliament before and before the report that reporting was done and and here after opposing has revealed that the NSA operation staged in Germany have also been involved in a the intersection of information we use the putting people on the as well so this is a list of you used to kill and capture so what are the who was uh who can become a violent extremist like this what are the factors that lead someone down to the path of using tumors in this way there are these different engagement factors things like feelings grievance injustice feeling under threat and for identity meaning of along a desire for status is therefore excitement adventure need to
dominate control others things like that are what we people to become so these are worth watching looking out for I think maybe
we can take you through a few of them 1 by 1 and we don't have time to go through all of them but do a few of them so let's look at an example of people feeling under threat 1st of all a
K on this is the presentation that the City of London Police the City of London Corporation have been using to brief nursery school teachers in primary school teachers in London and just in case the images clear or just explain to what they are but this is occupy London outside supports which is there for you know like 2011 3 2012 and the image in the middle is the is and the IRA bombing of doctrines which happened in 1996 those some loss of life there and all in the far side that's the possible mean Tavistock Square on 7 7 in with the suicide bombings in London 13 people died that I now as he was taking just a moment appreciate the worldview that created this light and his honor obviously on immediate level is incredibly offensive right and that I you know I might say take a moment to think what the state of mind which should actually see these things equivalence we what must it be like to be live in a world where yeah so of Occupy London and the 7 7 bombings and so similar in equivalent what was to be like to be that afraid it in the completeness of up in a non-discriminatory basis and there's a few more of these and other things
that even police thinks of threats and left-wing extremism right wing extremism of its aid and readable demand what's and politics just politics generally I'm about local issues occupy student protesters unexplored as public was also seen as a threat this is quite unique thinking you know and it's difficult to get yourself into the mind-set of an extremist like this you think what it must be like that in a bit afraid of urban explorers and you are possible bombers that's a real pervasive states of fear and 1 of the 1 losing so helpful and of urban explorers an occupier considered dangerous extremists that the intelligence community should be as well they engage much more violent extremism them those groups on average and so last years so you might remember the every BC database called she watch from about point it was 27 thousand nodes over 100 thousand people in the intelligence Trinity it's resonates that we collected from linked another public websites and so when we release this arrow because of your this your what to expect and in the weeks afterward and still occasionally we are receiving various threats from people in the intelligence community who felt very much threatened by us just reposting the information that they have published online on the public Internet themselves already and so these range from now on everything from people saying we grab the
take it down to all the way up to death threats but most of them or something like this something the middle where the Sega now personally enabling in assisting terror organizations Islamic State in Iraq and Syria that was a very real and immediate threat to me this code is from someone who is in the army reserves and lives in Indiana last and and in this has not been deployed is not in any way in any sort of the of answer as I can tell and and posted this information about their work online themselves and it was still up when they sent me this e-mail on the link and well and so it's very interesting that people feel threatened by their own information being posted online by someone else and and they should not by the opposing it but they feel threatened by some arbitrary adherence organization that I have absolutely no relation to and so there is a very very high level of feeling enters threat so it's feeding on threat looks like a possible engagement in fact if they getting involved in the intelligence community and so does any to dominate and control others and lots of and will also be a suggestive evidence from about this in this node in the snow and documents on these were few slides and that came out gchq and joint threat research and intel intelligence greater to the information this a DCG the bit that tries to manipulate and information to and control and influence people and you can have a look at some of them pop psychology here question can I get Ganges and the kid dynamics within
groups in ways that which you could try and manipulate them and pull them apart
and the Senate from interface flies which might seen before and in each these control dominating all collected all professor we exploit all these control and overnight and there seems
to be this obsession with information dominance this is a picture of the synonyms Jennifer not Infonomics than the the Center for Information Dominance which is a center for training people information warfare and there are a lot of centers Reformation dominance in intelligence from the SES he also has it's a the frustration dominance on with which is focused more on data collection and they're about a thousand people in the if you watched it and they're talking about how they are skilled in information elements and various things like that and so very obsessed with using information to control other people
I'm so another engagement factor which is cited in in this slide we started off with his opportunistic involvement and his fund optimistic involvement what the
NSA calls fourth-party opportunities which is taking
advantage of operations mounted mounted by others and taking information that you need to think they collect and what there you know repurposing rather charming call victims the victim stealing strokes
sharing its victims sharing some what would you know they much nicer victim stealing doesn't the
so I can will 1 to another indicator factor and this is a moment of friends and family they sort of peer pressure and some families a more high pressure than others right and so this is what the
NSA says about and the 3rd party relationships within it so easily extended members of the intelligence-gathering family and anything like willing to share advanced techniques to the proven reliable upon in return for that part willingness to do something politically risky a demanding relationship um and provide a variety of reasons are attentively should really disrupted by foreign political perturbations and few senior officials outside of defense intelligence apparatus is of a wishing to anything connected to the US Senate they is a relationship in which they're expecting a constitute politically politically risky thing in the knowledge that's their partners are working under the under understood understood of secrecy and maybe no informing on members of their governments even never mind the public and so is an example of how this kind of relationship works and the the regarding reported on DCG ch since gchq documents which play it explicit heat these kind of pressure it's where excuses even love and American money and must its waste be seen to put its weight and that's you know the pressure that they might not be doing enough to satisfy the industry partners and looking at Germany
and come to an end if they don't documentation and officials within the B and the on that we know something but E um impressed our American partners while working and working with the German government to enact the interpretation of privacy laws by the long time
and Ch deep gchq in other in other documents took some credit for this is what I said influence of friends and family this I am OK and we the desired stasis if you look to
is that documents there are uh lots of references to this is 1 guy says you know with the large you work in a community it's on most prices mothers most cussing is people around and you will see the cool new things stand and a safe the
place to find it this is a gchq documents where it had a telling annotators unit addition unit and position given you know access to a lot sensitive data have fun with it and make the most of it so desires takes and sometimes it's their
1st illustrates itself and bizarre it's
and this is a trophy that's given out to you people and then secured access operations that stays hacking group when they retire as this dragon for free and it says on its just and map has in Latin but where the dragon written under an assumed to be given to you people this particular part of town whenever they we share and is founded on a summer nite such as Facebook profile just profile picture clearly very kind of it it the I don't know if the so um with us we focus on are 1 of the so I mentioned earlier this database that
every this earlier on and it's a hundred other people talking about tells us of what they do for work our and explain it to potential employers just on public internet and this is amazing because the village we need is so secret that this is 1 of the few ways that we can do the actual research on who's involved what they're doing and and look at some of the broader trends and so the art lately overall before looking at some of the lower scale looking individual people so I just have a sock to tries to and do analysis of the word and how things changed over time in the intelligence community and I actually added the back and so is very easy to the anyone to did you even some basic programming to and add new trends in to try new trends we can probably make it more accessible if you were interested there are some limitations of of this I want to know in advance and the data that we collected is not the purpose it's not a perfect representative dataset it focused almost a researcher and you're in English is focused mostly on the American intelligence community obviously assertions that we ran shape the results that we get because when work collecting this in were say searching for words mentioned in the standard documents are known intelligence contractors or other terms that we found another resonators that interesting and look at the results use but is large enough that there are some interesting worded trends you can spot the other thing is that sometimes is some external factors that affected their likely Jim was launched in 2003 so on generally there is a peak in most terms assistance Ursula laughter 2003 just because people are posting more about their outpost linked work the really work and generally um and sometimes the add yields the profiles of like actually add languages or skills that makes it harder to track those things but overheard a after that point because it's on it we Wiesener time-correlated way because if you want to see when someone is speaking a certain language as part of a job in a particular year and you can look at the job descriptions not reducing federal deals with effect from the transfer could and so 1 thing we did was we
looked at some of the top languages that occur in this data and English is predictively freely higher before mostly English speakers on Arabic is also a critique is predictably and the 2nd most spoken language in and for a while was by a long shot but now it's going and further down and then there's some obvious another obvious languages that match and intelligence priorities in past overdue chinese per se are Mannosidase common languages that a lot of people in the American intelligence can be speak like German and Spanish as shown the in French she's coming from the learned of 1 interesting thing in this graph and would most interesting part is the relative frequency of languages and and we can see the popularity of inverse Arabic and Russian was far more popular than Arabic until 2001 at which point Arabic suddenly became much more popular and now it's going back down in this at about the but the same novels Russian and so you can see interesting trends of when people start to be paranoid about particular groups you regions or countries and and then suddenly these are recruiting more more people that speak language and we do the same thing with countries in you watch and see similar trends rather a the US is obviously fairly high up those not the topics that were in the middle of the mind is the highest 1st and the brown the purple 1 is a rock and then after that the 1 the peaks Afghanistan which actually follows the same pattern of when the US was at war in those countries and that's quite interesting to see and there's a bit less focus on countries like China and then I would expect and subsequent and there's an obvious ones like Mexico and Canada people American told it's been there probably going to be talking about this because it happened with neighbouring countries and it's a look at the Snowden codewords that mentioned in these documents so this is the overall number of people mentioning i so think of words and documents over time it goes up it peaks and you 9 and goes back down on but that could just be because there you go words they don't know about 2 people mentioned lesson errors may that's hard to tell exactly by and we can see also which I am still words are mentioned in the documents and the ones that people tend to mention the resonators are typically tools are databases are not like programs or initiatives users tend to be more secretive and what's relevant to future employers but there I know how to use this tool to intercept people's communications I know how to use this database of telephone metadata and most of these we have a pretty good idea of what they are and there's 1 other 1 roof and this 1 of the most popular ones that say um some server database but we direction what it is but it's 1 of the most commonly mentioned so the figure out what that is at some point I know and there's just great things there um this is if they think they're not quite line yeah there's a that there's iteration sharing systems I reach and there's an cell phone telephone metadata databases and Internet metadata databases by angry is the a search system for a text documents so a variety of things haven't so that you know is that by observing this in any public way we're changing the data and I have several months ago we said in January In December we we collected all of the resonates that people had initially they were in their everyday lives in the original version of IC watch and of those 27 thousand 130 1030 people had deleted there remains and 664 had made the regimens private and possibly just because they want to do a possibly because they saw that what we were doing and and what their data collected in the future around some people also change their resonates we added this change tracking functionality our mental change them to see more benign like this person changed intercepted and translated termination communications to simply process target fishing communications and they don't have to try to change their profiles in ways that make it harder to collect centered in the future and the same person went through and intelligence analysis was the term that cause them to shopping original database so they removed the word intelligence from every single entry in the rest many but which did really work fervor hiding there was me in this case these we already have their profile year-old but it's on a will be K is amended that before we collected make hard to get the feature at some point so aside from these engage of factors and the broader trends and what sort of challenges to uh speech face and what are some of the major pitfalls and issues that the responding to and and when we can identify some of these challenges pretty easily because if you look through this look at the talk about all the time and lots of of this is there's lots of criticisms of the intelligence community for this looking at the whole high status of like targeting things properly and this too much data complain nasty comes up in the NSA documents and this and not with all all the time it's just masses and masses and masses of references in fact it so you well many the problem that even like that the Canadians even refers to the Haystack and have slide 52 the paste but also in the there isn't the 2nd challenge and which they talk were quite a lot and this the cause of many of the greatest intelligence failures at that work is not enough data sharing and this is becoming more more problem because there are a lot more a more is more private contractor so there's more dispersion of the work being done in the intelligence community and each of
those groups feel some ownership of their data and what's to control its and do what there what was it a little who can access its and ideally not let many many blacks so they don't share data with other agencies at archery with other companies which makes it harder for and actually use the data for any of the objectives and so it's really used to challenges that are at the biggest challenges of intelligence we collecting all the data but they don't have to go through it and then even assurance that there can be at other people how can go through it and I give the user the useful so that's almost pointless collections and most of the time and these are
2 of the same challenges that phase collecting it on the system and the and so it's interesting to try to get solutions to them and it's also obviously the case that the response this node methylations has of course and discomfort in the intelligence community and 1 of the more interesting restrictions on what you you all when more interesting actions in terms of both the gchq action is of the and legal challenges that happened in the in the UK surveillance not the study because they've legal challenges have 1 anyway battles on the right but because they have extracted a lot of information from the agencies will like working like as of superpowered frequent information request hands free devices like that and my a whole new and key capabilities of them on the record for the 1st time and just a couple of weeks ago Privacy International released a thousand pages of gchq in UK and intelligence agency documents relating to bulk personal datasets which are these massive
databases which are and include data pretty much whenever everyone in the so things like possible databases and travel databases which um the British government has only recently admitted that gchq has access to I'm so this is 1 of the documents just and released by pressing international which they got from the you know find that an the Investigatory Powers Tribunal and its toll it's talking about the price the precious life from the UK Intelligence Committee talking to itself that they're feeling about and this dynamic and they're talking about it at the very least would expect in increased in significant public interest in and debate which is something that I
like and this is kind of interesting because this is again is them giving pedals themselves in this context in the context of new information coming forward it we need to be exemplary in the way we operate our existing processes about personal data for these massive datasets and this is really very interesting in the context of other documents in this cash and that this is an newsletter sent out the M I 6 analysts in September 2011 which is giving a list of do's and don'ts and and reminding people of the rules operating these databases remind people that you should be looking at using this massive database revealed in the UK to look up and your addresses and birthday cards you should be using it and check your possible details torrential personal travel I'm and you should be using it to check data data of your family members the and this is another reminder out about this and posts noted that in 2014 and the example inappropriate self-service of his of would be to use the database the database of all organic travel which is taken a you when you show your possible and costs or a report the page records the example of inappropriate cell search would be to use the data to remind yourself we you've troubles you cannot urine records instead they suggest that amendments people men I think should be and I checking the Sentiment impulse goalkeeping a running record of when they've been to fill in the city travel documents it's kind of amazing and they got you to bring that kind of thing out is a from and this data point here clearly a challenge that are facing prisoners another interesting challenge is I In parties some missing would with describing and maybe in it and people not wanting to fall into and fall
into the convex of the it's the other challenges that the agencies are having in hiring new people that is a and then there's the 2 sides the show the 1st slide is people not wanting to work for and what has been in the in the 2nd 1 is is that the security restrictions have gone so far out after a certain amending that's hard for them to get the people that they need to work for them to work for them because they will be triggered so and In the UK it's been reported that and gchq is 1 of the few bits of the British government is actually hiring moment and having increased funding this'll starts of everyone else apartment intelligence is I'm even though gchq has you know that the that has less money problems indirect rest UK government they're having issues with a meeting a recruitment targets and entertainingly day items per day and of agree that I've campaign on the streets of showed a she's under which is like hits might hits the bit of East London and trouble factory Council because they would have to be cut with the local concentration of Commission using the so I've heard of people into was when
you talk about this concept of hearing in higher and how they want to hire these people that they can hire 1st reason that won't be able to get clearance about figure how to find them how to demands of the work for them and how to get the grants from which leads to the blasting interesting question like him audio clips where someone captures this problem very well this is the a and just going to
so you atlases uh as a way to make the audio that water and of the string in the what do you do you know what you like to find a lot the variance at what we want to know what would you call that you want to know what kind of you that what we need to know that you the world but in a way of they can actually in here is that the the woman writer who be with you know with all the whole of this the the uh so ultimately the conclusion that they came to you end that discussion of was that they couldn't avoid hiring this the next minus and that they would if they were trying to hire good people that you work KKT they're just not hiring people willing to work or they could try to figure out ways to mitigate damage because they were going to be able to avoid it which even though I think a lot of the responses of this the revelations hasn't been at the level that it needs to be and it gives us of hope for a viable counter-strategies because I think that there were earth some things that we can focus on doing it you actually have a viable response to the 1 of which is continuing to do things that the intelligence really knows they can prevent which is releasing a getting documents like those acting as a private international got as well as whistleblowing and getting documents releasing those and in the 2nd way I think is to continue collecting data on intelligence community and using their own strategies against them but specifically in doing that trying to find ways to avoid the pitfalls that 2 major pitfalls of the intelligence community comes across themselves that's have a Jewish it and not knowing how to use it and not shown here so we need to find ways to did you get ordered out there but also to figure how to use it effectively and how to collaborate with other groups more openly a more effective way is rather and another thing we can do to go back to the nite on which we started this presentation is the where we can see the methodologies and when they're when they're being exposed where we know where documents have been released its and they they make sense because that engagement of factors that's the UK counter-terrorism strategy used to explain what what make people fall into terrorism as we try to demonstrating could just as easily be shown to be in a certain is like the factors which could lead people to fall into working gchq with the NSA whether methodology doesn't make sense to make fun of it behind and thank talk to uh which had
Hypermedia
Gewicht <Mathematik>
Güte der Anpassung
Besprechung/Interview
Vorlesung/Konferenz
Computeranimation
Metadaten
Mathematisierung
Extreme programming
Aggregatzustand
Soundverarbeitung
Nichtlinearer Operator
Telekommunikation
Dualitätstheorie
Subtraktion
Gruppe <Mathematik>
Prozess <Informatik>
Versionsverwaltung
Mailing-Liste
Partitionsfunktion
Teilbarkeit
Abenteuerspiel
Computeranimation
Arithmetisches Mittel
Motion Capturing
Metropolitan area network
Metadaten
Knotenmenge
Minimalgrad
Nichtunterscheidbarkeit
Information
Extreme programming
Verkehrsinformation
Wärmeleitfähigkeit
Analysis
Videospiel
Einfügungsdämpfung
Vervollständigung <Mathematik>
Momentenproblem
Besprechung/Interview
Kombinatorische Gruppentheorie
Äquivalenzklasse
Computeranimation
Übergang
Arithmetisches Mittel
Basisvektor
Gamecontroller
Bildgebendes Verfahren
Aggregatzustand
Bit
Web Site
Punkt
Selbst organisierendes System
Gruppenkeim
t-Test
Green-Funktion
Aggregatzustand
Ubiquitous Computing
Code
Computeranimation
Internetworking
Übergang
Sega Enterprises Ltd.
Selbst organisierendes System
Spannweite <Stochastik>
Knotenmenge
Mittelwert
Reelle Zahl
t-Test
E-Mail
Diskretes System
Datenhaltung
Relativitätstheorie
Binder <Informatik>
Widerspruchsfreiheit
Quick-Sort
Rechenschieber
Rechter Winkel
Gamecontroller
Reelle Zahl
Information
Extreme programming
Intel
Aggregatzustand
Sinusfunktion
Metropolitan area network
Wellenpaket
Geometrische Frustration
Gamecontroller
Gruppenkeim
Punkt
Element <Mathematik>
Information
Computeranimation
Schnittstelle
Inklusion <Mathematik>
Rechenschieber
Nichtlinearer Operator
Typentheorie
Systemaufruf
Information
Teilbarkeit
Computeranimation
Gewicht <Mathematik>
Elektronische Publikation
Momentenproblem
Familie <Mathematik>
NP-hartes Problem
Störungstheorie
Extrempunkt
Teilbarkeit
Computeranimation
Metropolitan area network
Systemprogrammierung
Druckverlauf
Mereologie
Indexberechnung
Drei
Varietät <Mathematik>
Metropolitan area network
Interpretierer
Datenmissbrauch
Diskrete-Elemente-Methode
Proxy Server
Ruhmasse
Familie <Mathematik>
Mathematisierung
Dienst <Informatik>
Extrempunkt
Information
Gesetz <Physik>
Computeranimation
Ortsoperator
Linienmethode
Metropolitan area network
Spezialrechner
Addition
Sensitivitätsanalyse
Einheit <Mathematik>
Ortsoperator
Computeranimation
Nichtlinearer Operator
Facebook
Freeware
Computersicherheit
Datenhaltung
Besprechung/Interview
Gruppenkeim
Profil <Aerodynamik>
Computeranimation
Mapping <Computergraphik>
Metropolitan area network
Mereologie
Vorlesung/Konferenz
Resultante
Resonanz
Bit
Punkt
Prozess <Physik>
Gemeinsamer Speicher
Formale Sprache
Selbstrepräsentation
Versionsverwaltung
Gruppenkeim
Iteration
Wärmeübergang
Aggregatzustand
Computeranimation
Richtung
Internetworking
Eins
Metropolitan area network
Metadaten
Deskriptive Statistik
Perfekte Gruppe
Prozess <Informatik>
Mustersprache
Radikal <Mathematik>
Notepad-Computer
Figurierte Zahl
Gerade
Zentrische Streckung
Lineares Funktional
Shape <Informatik>
Prozess <Informatik>
Datenhaltung
Inverse
Mixed Reality
Profil <Aerodynamik>
Ruhmasse
Frequenz
Speicherbereichsnetzwerk
Teilbarkeit
Dialekt
Rechenschieber
Strahlensätze
Twitter <Softwareplattform>
Server
Varietät <Mathematik>
Fehlermeldung
Telekommunikation
Mathematisierung
Zahlenbereich
Kraft
Sprachsynthese
Term
Hypermedia
Weg <Topologie>
Optimierung
Analysis
Soundverarbeitung
Graph
Relativitätstheorie
Physikalisches System
Quick-Sort
Mereologie
Wort <Informatik>
Beobachtungsstudie
Gemeinsamer Speicher
Gruppenoperation
Besprechung/Interview
Gruppenkeim
Physikalisches System
Term
Homepage
Objekt <Kategorie>
Knotenmenge
Datensatz
Endogene Variable
Information
Prozess <Physik>
Punkt
Adressraum
Familie <Mathematik>
Zellularer Automat
Newsletter
Dienst <Informatik>
Information
Computeranimation
Homepage
Wurm <Informatik>
Metropolitan area network
Datensatz
Videospiel
Antwortfunktion
Datenhaltung
Mathematisierung
Schlussregel
Mailing-Liste
Kontextbezogenes System
Chipkarte
Gefangenendilemma
Diskrete-Elemente-Methode
Information
Verkehrsinformation
Bit
Momentenproblem
Computersicherheit
Konvexer Körper
Stellenring
Computeranimation
Rechenschieber
Konzentrizität
Hypermedia
Metropolitan area network
Verbandstheorie
Vorlesung/Konferenz
Faktor <Algebra>
Figurierte Zahl
Hypermedia
Endogene Variable
Gruppenkeim
Strategisches Spiel
Kombinatorische Gruppentheorie
Teilbarkeit
Varianz
Zeichenkette
Übergang

Metadaten

Formale Metadaten

Titel Spook Sociology
Serientitel re:publica 2016
Teil 146
Anzahl der Teile 188
Autor McGrath, M. C.
Colvin, Naomi
Lizenz CC-Namensnennung - Weitergabe unter gleichen Bedingungen 3.0 Deutschland:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben.
DOI 10.5446/20658
Herausgeber re:publica
Erscheinungsjahr 2016
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract To end limitless surveillance programs, we must understand how they begin. This talk uses open source intelligence and close readings of legislation and legal documents to understand the origins of the modern intelligence community and major cultural shifts that shaped it. We trace these trends from the rise of counterextremism ideology used to rationalize mass surveillance programs to the intelligence community's response (and lack thereof) to the Snowden revelations.

Ähnliche Filme

Loading...