Thank You:
Link; http://olgamagdalenalazin.blogspot.com/2017/02/fbi-refused-white-house-request-to.html
'via Blog this'
Thursday, February 23, 2017
The Global Anti-Trump Movement Takes Shape - olazin@g.ucla.edu - Google Apps for UCLA Mail
The Global Anti-Trump Movement Takes Shape - olazin@g.ucla.edu - Google Apps for UCLA Mail:
'via Blog this'
Is Trump Moderating on Foreign Policy? Not in the Least.
Trump's leading foreign policy advisers are obsessed with Iran and making dangerous moves from East Asia to the Middle East.
By Conn Hallinan, .
Share
“Chaos,” “dismay,” “radically inept” — those are just a few of the recent headlines analyzing Donald Trump’s foreign policy.
In truth, disorder would seem to be the strategy of the day. Picking up the morning newspaper or tuning on the national news sometimes feels akin to opening up a basket filled with spitting cobras and Gabon Vipers.
But the bombast emerging for the White House hasn’t always matched what the Trump administration does in the real world. The threat to dump the “one-China” policy and blockade Beijing’s bases in the South China Sea has been dialed back. The pledge to overturn the Iran nuclear agreement has been shelved. And NATO’s “obsolesce” has morphed into a pledge of support.
Is common sense setting in, as a New York Times headline suggests: “Foreign Policy Loses Its Sharp Edge as Trump Adjusts to Office”?
Don’t bet on it.
Obsessed with Iran
First, this is an administration that thrives on turmoil, always an easier place to rule from than order. What it says and does one day may be, or may not be, what it says or does another. And because there are a number of foreign policy crises that have stepped up to the plate, we should all find out fairly soon whether the berserkers or the calmer heads are running things.
The most dangerous of these looming crises is Iran, which the White House says is “playing with fire” and has been “put on notice” for launching a Khorramshahr medium-range ballistic missile. The missile traveled 630 miles and exploded in what looks like a failed attempt to test a re-entry vehicle. Exactly what “on notice” means has yet to be explained, but Trump has already applied sanctions for what it describes as a violation of the 2015 Joint Comprehensive Program of Action — UN Security Council Resolution 2231 — in which Iran agreed to dismantle much of its nuclear energy program.
A 2010 UN resolution did indeed state that Iran “shall not undertake activity related to ballistic missiles.” But that resolution was replaced by UNSCR 2231, which only “calls upon Iran not to test missiles,” wording that “falls short of an outright prohibition on missile testing,” according to former UN weapons inspector Scott Ritter.
The Iranians say their ballistic missile program is defensive, and given the state of their obsolete air force, that is likely true.
The Trump administration also charges that Iran is a “state sponsor of terror,” an accusation that bears little resemblance to reality. Iran is currently fighting the Islamic State and al-Qaeda in Syria and Iraq, and, through its Houthi allies, al-Qaeda in Yemen. It has also aided the fight against al-Qaeda in Afghanistan.
As Ritter points out, “Iran is more ally than foe,” especially compared to Saudi Arabia, “whose citizens constituted the majority of the 9/11 attackers and which is responsible for underwriting the financial support of Islamic extremists around the world, including Islamic State and al-Qaeda.”
In an interview last year, leading White House strategist Steve Bannon predicted, “We’re clearly going into, I think, a major shooting war in the Middle East again.” Since the U.S. has pretty much devastated its former foes in the region — Iraq, Syria, and Libya — he could only be referring to Iran.
The administration’s initial actions vis-à-vis Tehran are indeed worrisome. U.S. Secretary of Defense Jim Mattis recently considered boarding an Iranian ship in international waters to search it for weapons destined for the Houthis in Yemen. Such an action would be a clear violation of international law and might have ended in a shoot-out.
The Houthi practice a variation of Shiism, the dominant Islamic school in Iran. They do get some money and weapons from Tehran, but even U.S. intelligence says that the group is not under Tehran’s command.
The White House also condemned a Houthi attack on a Saudi warship — which Trump Press Secretary Sean Spicer initially called an “American” ship — even though the Saudis and their Persian Gulf allies are bombing the Houthis, and the Saudi Navy — along with the U.S. Navy — is blockading the country. According to the UN, more than 16,000 people have died in the three-year war, 10,000 of them civilians.
Apparently the Trump administration is considering sending American soldiers into Yemen, which would put the U.S troops in the middle of a war involving the Saudis and their allies, the Houthis, Iran, al-Qaeda, the Islamic State, and various separatist groups in southern Yemen.
Putting U.S. ground forces into Yemen is a “dangerous idea,” according to Jon Finer, chief of staff for former U.S. Secretary of State John Kerry. But a U.S. war with Iran would be as catastrophic for the Middle East as the invasion of Iraq. It would also be unwinnable unless the U.S. resorted to nuclear weapons, and probably not even then. For all its flaws, Iran’s democracy is light years ahead of most other U.S. allies in the region and Iranians would strongly rally behind the government in the advent of a conflict.
Nuclear Escalation
The other foreign policy crisis is the recent missile launch by North Korea, although so far the Trump administration has let the right-wing prime minister of Japan, Shinzo Abe, carry the ball on the issue. Meeting with Trump in Florida, Abe called the Feb. 12 launch “absolutely intolerable.” Two days earlier Trump had defined halting North Korean missile launches as a “very, very high priority.”
The tensions with North Korea’s nuclear weapons and missile program are long standing, and this particular launch was hardly threatening. The missile was a mid-range weapon and only traveled 310 miles before breaking up. The North Koreans have yet to launch a long-range ICBM, although they continue to threaten that one is in the works.
According to a number of Washington sources, Barack Obama told Trump that North Korea posed the greatest threat to U.S. military forces, though how he reached that conclusion is puzzling. It is estimated North Korea has around one dozen nuclear weapons with the explosive power of the Hiroshima and Nagasaki bombs, about 20 kilotons. The average U.S. warhead packs an explosive force of from 100 to 475 kilotons, with some ranging up to 1.2 megatons. The U.S. has more than 4,000 nuclear weapons.
While the North Koreans share the Trump administration’s love of hyperbole, the country has never demonstrated a suicidal streak. A conventional attack by the U.S., South Korea, or Japan would be a logistical nightmare and might touch off a nuclear war, inflicting enormous damage on other countries in the region. Any attack would probably draw in China.
What the North Koreans want is to talk to someone, a tactic that the Obama administration never really tried. Nor did it consider trying to look at the world from Pyongyang’s point of view. “North Korea has taken note of what happened in Iraq and Libya after they renounced nuclear weapons,” says Norman Dombey, an expert on nuclear weapons and a professor of theoretical physics at Sussex University. “The U.S. took action against both, and both countries’ leaders were killed amid violence and chaos.”
The North Koreans know they have enemies — the U.S. and South Korea hold annual war games centered on a military intervention in their country — and not many friends. Beijing tolerates Pyongyang largely because it worries about what would happen if the North Korean government fell. Not only would it be swamped with refugees, it would have a U.S. ally on its border.
Obama’s approach to North Korea was to isolate it, using sanctions to paralyze to the country. It has not worked, though it has inflicted terrible hardships on the North Korean people. What might work is a plan that goes back to 2000 in the closing months of the Clinton administration.
That plan proposed a non-aggression pact between the U.S., Japan, South Korea, and North Korea, and the re-establishment of diplomatic relations. North Korea would have been recognized as a nuclear weapons state, but would agree to forgo any further tests and announce all missile launches in advance. In return, the sanctions would be removed and North Korea would receive economic aid. The plan died when the Clinton administration got distracted by the Middle East.
Since then the U.S. has insisted that North Korea give up its nuclear weapons, but that’s not going to happen — see Iraq and Libya. In any case, the demand is the height of hypocrisy. When the U.S. signed the Nuclear Non-Proliferation Treaty, it agreed to Article VI that calls for “negotiations in good faith” to end “the nuclear arms race at an early date and to nuclear disarmament.”
All eight nuclear powers — the U.S., Russia, China, France, Britain, India, Pakistan, and Israel — have not only not discussed eliminating their weapons. All are in the process of modernizing them. The NPT was never meant to enforce nuclear apartheid, but in practice that is what has happened.
A non-aggression pact is essential. Article VI also calls for “general and complete disarmament,” reflecting a fear by smaller nations that countries like the U.S. have such powerful conventional forces that they don’t need nukes to get their way. Many countries — China in particular — were stunned by how quickly and efficiently the U.S. destroyed Iraq’s military.
During the presidential campaign, Trump said he would “have no problem” speaking with North Korean leader Kim Jung Un. That pledge has not been repeated, however, and there is ominous talk in Washington about a “preemptive strike” on North Korea, which would likely set most of north Asia aflame.
Dangerous Flashpoints
There are a number of other dangerous flashpoints out there besides Iran and North Korea.
- The Syrian civil war continues to rage, and Trump is talking about sending in U.S. ground forces — though exactly who they would fight is not clear. Patrick Cockburn of the Independent once called Syria a three-dimensional chess game with nine players and no rules. Is that a place Americans want to send troops?
- The commander of U.S. forces in Afghanistan — now America’s longest running war — is asking for more troops.
- The war in eastern Ukraine smolders on, and with NATO pushing closer and closer to the Russian border, there is always the possibility of misjudgment. The same goes for Asia, where Bannon predicted “for certain” the U.S. “is going to go to war in the South China Sea in five to 10 years.”
How much of the White House tweets are provocation and grandiose rhetoric is not clear. The president and the people around him are lens lice who constantly romance the spotlight. They have, however, succeeded in alarming a lot of people. As the old saying goes, “Boys throw rocks at frogs in fun. The frogs die in earnest.”
Except in the real world, “fun” can quickly translate into disaster, and some of the frogs are perfectly capable of tossing a few of their own rocks.
Foreign Policy In Focus columnist Conn Hallinan can be read at dispatchesfromtheedgeblog.wordpress.com and middleempireseries.wordpress.com.
FORGET TRUMP: PETER THIEL IS head of SECURITATE
TONIGHT, PETER THIEL, an openly gay immigrant hailing from San Francisco, will address the Republican National Convention in Cleveland. His speech will close out the coronation of Donald Trump as the nominee claof his party, which three days earlier finalized a platform affirming the definition of marriage as “between one man and one woman.”
Thiel may seem an unlikely warm-up act for a raving nativist like Trump. But the pair are actually an impeccable ideological tag-team. In fact, Thiel outmatches Trump both in the preposterousness of his capitalistic ambition and in the sheer pathology of his political inconsistency.
Like Trump’s, Thiel’s speech will be one of the few in Cleveland (or Philly, for that matter) worth viewing in full, if only because the libertarian billionaire is, even more so than the man he’s opening for, a bizarre and fascinating man—his support for Trump is just one more strange item on a long list. And, unlike those who have taken the stage before him, Thiel isn’t a retired general, washed-up actor, incendiary evangelical, or reality show star, but a complicated member of the Silicon Valley elite.
Many Americans found Thiel the same way they found Donald Trump: on a screen, presented as something between caricature and real-world business figure. In The Social Network, Hollywood’s 2010 rendition of the Facebook creation myth, Thiel’s character appears briefly to write Mark Zuckerberg a $500,000 check and suggest that he utterly betray his best friend and co-founder, Eduardo Saverin — a fictionalized version of one of the greatest moments of treachery in modern business history. And unless you’re within or near the tech bubble, this may be your only impression of Thiel, who, despite his titanic stature in the startup sector, never crossed over to the national stage before Thursday night.
It’s a testament to Thiel’s contradictions that he’s so poorly understood even back home. In Silicon Valley, the tech sector was amazed when Thiel backed Trump as a party delegate, aberrant behavior in a community that sees itself as essentially open-minded and tolerant. How could a California futurist, who co-founded PayPal and beat every other VC in town to Facebook, support Stone Age politics? Thiel, who was born in West Germany, was a lifeline to startups founded by and employing people from a variety of ethnic backgrounds, and now supported a presidential candidate who’d like to make life considerably harder for many of those same people.
In truth, extreme ideology was old hat for Thiel by the time Trump’s 2016 campaign began; he’s been a strong donor for both Ted Cruz and Ron Paul. Thiel gave hundreds of thousands of dollars over multiple campaigns, going back to at least 2009, to support Cruz, the Texas senator who pledged to make his opposition to gay marriage “front and center” in his presidential campaign and proposed a constitutional amendment to preserve bans on the practice. During the 2012 campaign, Thiel donated over $2 million to a Paul-supporting Super PAC.
Thiel has also postured as a libertarian, and even as his ideology shifts toward something more nihilistic — The Economist now calls him a “corporate Nietzschean” — he continues to rail against government programs like Medicare and Social Security. Meanwhile, he is chairman and co-founder of Palantir Technologies, a mass-surveillance-software company that makes a good deal of its money selling to the government; Palantir’s clients reportedly include the Department of Defense (including the NSA and various military branches), the Department of Homeland Security, the FBI, and the CIA. Thiel is, inexplicably, pro-monopoly. And don’t forget that Peter Thiel believes death is nothing but a bug in the feature set of mankind, and one he can buy his way out of.
What, if not ideological incoherence, could make Thiel a better pairing for Trump, for whom free trade is bad, but corporate interests are good; military spending is good, but military intervention is bad; immigrants are bad, and he married one? Voters love Trump’s wealth and crazed chatter — Thiel is just one more “self-made man” with bombastic theories to drive them wild.
Trump supporters (clearly) don’t mind some hefty dissonance between policy talk and stories of grand success in business. If anything, the former tends to annoyingly distract from the latter. So even though Thiel, like Trump, is a bundle of grandiose, self-negating ideas that don’t add up to much of anything, he has an easy job crafting a script for himself.
He can tout his co-creation of job creator PayPal (perhaps best not to mention its five foreign-born founders).
He might rant about how political correctness is tanking the United States, a topic on which he is a published author.
He can flaunt his shrewd early investment in Facebook, the source of his billions.
He can even tantalize convention-goers with his vision of a floating techno-libertarian archipelago, far from the reaches of the federal government (no Syrian refugees allowed, of course).
Or perhaps Thiel could repeat his 2009 suggestion that American democracy suffered when the right to vote was extended to women (casual misogyny has polled well so far in this election).
But where Thiel and Trump are perhaps most aligned is in their shared disdain for a free press.
Trump, of course, tolerates the media only when it functions as something approximating his own personal megaphone. Otherwise, Trump is relentlessly anti-media, a stance that has become a key part of his anti-establishment campaign: Like most politicians, the press is “phony,” “dishonest,” and “disgusting,” and Trump is its victim.
The media is really on a witch-hunt against me. False reporting, and plenty of it - but we will prevail!
Accordingly, Trump has declared that under his presidency, he will “open up our libel laws so when [the press] write purposely negative and horrible and false” articles, “we can sue them and win lots of money. … We can sue them and win money instead of having no chance of winning because they’re totally protected.”
Trump calls the press here the "world's most dishonest people." Crowd turns towards press pen, booing. #TrumpRally
Trump’s comments were widely understood as an open attack on press freedom, even if the mechanics are unclear (under the 1964 Supreme Court ruling New York Times Co. v. Sullivan, a cornerstone of the American free press, public figures like Trump may already sue journalists for incorrect and defamatory statements made with a knowing disregard for the truth, that is, for “purposely negative and horrible and false” articles).
Thiel also wants to coercively halt the speech he finds most offensive, but he has done so through a private legal campaign rather than legislation. For nearly a decade, Forbes revealed in two stories earlier this year, Thiel has secretly funded lawsuits intended to put Gawker Media, my former employer, out of business, because the billionaire does not like their work. Granted an exclusive interview with Thiel, the New York Times essentially confirmed that storyline.
Thiel insisted to the Times that he cherished freedom of speech and journalism but believed Gawker to be “a singularly terrible bully” that acted completely outside the public interest. Yet even as he acknowledged spending somewhere “in the neighborhood” of $10 million to finance multiple lawsuits to muzzle the web publisher, he refused to detail exactly how many cases he was behind or name any of the news articles at issue, save for one involving a sex tape, published by Gawker, starring wrestler Hulk Hogan and resulting in a $140 million invasion-of-privacy judgment against the company, a verdict that is now under appeal.
News reports have speculated that other Thiel-backed lawsuits against Gawker Media, via the same firm that represented Hogan, include two pieces by me; consider that an awkwardly indeterminate disclosure. One of those stories challenged claims by Massachusetts entrepreneur Shiva Ayyadurai (the plaintiff) to have invented email; similar stories have run in the Washington Post and Los Angeles Times. (Ayyadurai toldForbes and the Times that Thiel was not funding his case “to the best of my knowledge.”) Another was an in-depth feature involving a reporter named Ashley Terrill who claimed she was harassed and surveilled by a Tinder co-founder.
The editor-in-chief of investigative magazine Mother Jones has called Thiel’s campaign part of a “pattern of press intimidation”; the director of the First Amendment Coalition said it could have a “chilling effect” and make “editors … think twice before writing another critical story”; and an adjunct professor at Columbia University’s journalism school called Thiel’s plot “sinister” and “especially troubling” because “even a successful digital publisher can be threatened with ruin by a concerted litigation attack.”
Thiel, of course, doesn’t see things this way. His strategy of “specific deterrence,” as he dubbed his intentional legal harassment of a disfavored news organization, represents another way, should Trump find himself unable to “open up” libel laws, for the wealthy and powerful to silence their critics — or anyone, really. Both Thiel and Trump, despite being wealthy white American men and therefore essentially disqualified from victimhood, have somehow cast themselves simultaneously as bullied and bully, and will find in Cleveland an audience of potential voters who feel the same way, both about the media and themselves.
CONTACT THE AUTHOR:
'via Blog this'
Intelligence: A History. A Geopolitical Whodunit. Humanity's Upgrade. - olazin@g.ucla.edu - Google Apps for UCLA Mail
Intelligence: A History. A Geopolitical Whodunit. Humanity's Upgrade. - olazin@g.ucla.edu - Google Apps for UCLA Mail:
'via Blog this'
Illustration: Erik Carter for The Intercept
DONALD TRUMP HAS inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.
Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.
Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.
“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.
Despite all the grandstanding about lucrative, shadowy government contracts, co-founder Karp does not shy away from taking a stand in the debate over government surveillance. In a Forbes profile in 2013, he played privacy lamb, saying, “I didn’t sign up for the government to know when I smoke a joint or have an affair. … We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people we’d like to be.” In that same article, Thiel lays out Palantir’s mission with privacy in mind: to “reduce terrorism while preserving civil liberties.” After the first wave of revelations spurred by the whistleblower Edward Snowden, Palantir was quick to deny that it had any connection to the NSA spy program known as PRISM, which shared an unfortunate code name with one of its own software products. The current iteration of Palantir’s website includes an entire section dedicated to “Privacy & Civil Liberties,” proclaiming the company’s support of both:
Palantir Technologies is a mission-driven company, and a core component of that mission is protecting our fundamental rights to privacy and civil liberties. …Some argue that society must “balance” freedom and safety, and that in order to better protect ourselves from those who would do us harm, we have to give up some of our liberties. We believe that this is a false choice in many areas. Particularly in the world of data analysis, liberty does not have to be sacrificed to enhance security. Palantir is constantly looking for ways to protect privacy and individual liberty through its technology while enabling the powerful analysis necessary to generate the actionable intelligence that our law enforcement and intelligence agencies need to fulfill their missions.
It’s hard to square this purported commitment to privacy with proof, garnered from documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSA’s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSA’s arsenal. According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSA’s own admission its “widest reaching” program, capturing “nearly everything a typical user does on the internet.” A subsequent report by The Intercept showed that XKEYSCORE’s “collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.
But how do you make so much data comprehensible for human spies? As the additional documents published with this article demonstrate, Palantir sold its services to make one of the most powerful surveillance systems ever devised even more powerful, bringing clarity and slick visuals to an ocean of surveillance data.
PALANTIR’S RELATIONSHIP WITH government spy agencies appears to date back to at least 2008, when representatives from the U.K.’s signals intelligence agency, Government Communications Headquarters, joined their American peers at VisWeek, an annual data visualization and computing conference organized by the Institute of Electrical and Electronics Engineers and the U.S. National Institute of Standards and Technology. Attendees from throughout government and academia gather to network with members of the private sector at the event, where they compete in teams to solve hypothetical data-based puzzles as part of the Visual Analytics Science and Technology (VAST) Challenge. As described in a document saved by GCHQ, Palantir fielded a team in 2008 and tackled one such scenario using its own software. It was a powerful marketing opportunity at a conference filled with potential buyers.
In the demo, Palantir engineers showed how their software could be used to identify Wikipedia users who belonged to a fictional radical religious sect and graph their social relationships. In Palantir’s pitch, its approach to the VAST Challenge involved using software to enable “many analysts working together [to] truly leverage their collective mind.” The fake scenario’s target, a cartoonishly sinister religious sect called “the Paraiso Movement,” was suspected of a terrorist bombing, but the unmentioned and obvious subtext of the experiment was the fact that such techniques could be applied to de-anonymize and track members of any political or ideological group. Among a litany of other conclusions, Palantir determined the group was prone to violence because its “Manifesto’s intellectual influences include ‘Pancho Villa, Che Guevara, Leon Trotsky, [and] Cuban revolutionary Jose Martí,’ a list of military commanders and revolutionaries with a history of violent actions.”
The delegation from GCHQ returned from VisWeek excited and impressed. In a classified report from those who attended, Palantir’s potential for aiding the spy agency was described in breathless terms. “Palantir are a relatively new Silicon Valley startup who are sponsored by the CIA,” the report began. “They claim to have significant involvement with the US intelligence community, although none yet at NSA.” GCHQ noted that Palantir “has been developed closely internally with intelligence community users (unspecified, but likely to be the CIA given the funding).” The report described Palantir’s demo as “so significant” that it warranted its own entry in GCHQ’s classified internal wiki, calling the software “extremely sophisticated and mature. … We were very impressed. You need to see it to believe it.”
The report conceded, however, that “it would take an enormous effort for an in-house developed GCHQ system to get to the same level of sophistication” as Palantir. The GCHQ briefers also expressed hesitation over the price tag, noting that “adoption would have [a] huge monetary … cost,” and over the implications of essentially outsourcing intelligence analysis software to the private sector, thus making the agency “utterly dependent on a commercial product.” Finally, the report added that “it is possible there may be concerns over security — the company have published a lot of information on their website about how their product is used in intelligence analysis, some of which we feel very uncomfortable about.”
However anxious British intelligence was about Palantir’s self-promotion, the worry must not have lasted very long. Within two years, documents show that at least three members of the “Five Eyes” spy alliance between the United States, the U.K., Australia, New Zealand, and Canada were employing Palantir to help gather and process data from around the world. Palantir excels at making connections between enormous, separate databases, pulling big buckets of information (call records, IP addresses, financial transactions, names, conversations, travel records) into one centralized heap and visualizing them coherently, thus solving one of the persistent problems of modern intelligence gathering: data overload.
A GCHQ wiki page titled “Visualisation,” outlining different ways “to provide insight into some set of data,” puts succinctly Palantir’s intelligence value:
Palantir is an information management platform for analysis developed by Palantir Technologies. It integrates structured and unstructured data, provides search and discovery capabilities, knowledge management, and collaborative features. The goal is to offer the infrastructure, or ‘full stack,’ that intelligence organizations require for analysis.
Bullet-pointed features of note included a “Graph View,” “Timelining capabilities,” and “Geo View.”
Under the Five Eyes arrangement, member countries collect and pool enormous streams of data and metadata collected through tools like XKEYSCORE, amounting to tens of billions of records. The alliance is constantly devising (or attempting) new, experimental methods of prying data out of closed and private sources, including by hacking into computers and networks in non-Five Eyes countries and infecting them with malware.
A 2011 PowerPoint presentation from GCHQ’s Network Defence Intelligence & Security Team (NDIST) — which, as The Intercept has previously reported, “worked to subvert anti-virus and other security software in order to track users and infiltrate networks” — mentioned Palantir as a tool for processing data gathered in the course of its malware-oriented work. Palantir’s software was described as an “analyst workspace [for] pulling together disparate information and displaying it in novel ways,” and was used closely in conjunction with other intelligence software tools, like the NSA’s notorious XKEYSCORE search system. The novel ways of using Palantir for spying seemed open-ended, even imaginative: A 2010 presentation on the joint NSA-GCHQ “Mastering the Internet” surveillance program mentioned the prospect of running Palantir software on “Android handsets” as part of a SIGINT-based “augmented reality” experience. It’s unclear what exactly this means or could even look like.
Above all, these documents depict Palantir’s software as a sort of consolidating agent, allowing Five Eyes analysts to make sense of tremendous amounts of data that might have been otherwise unintelligible or highly time-consuming to digest. In a 2011 presentation to the NSA, classified top secret, an NDIST operative noted the “good collection” of personal data among the Five Eyes alliance but lamented the “poor analytics,” and described the attempt to find new tools for SIGINT analysis, in which it “conducted a review of 14 different systems that might work.” The review considered services from Lockheed Martin and Detica (a subsidiary of BAE Systems) but decided on the up-and-comer from Palo Alto.
Palantir is described as having been funded not only by In-Q-Tel, the CIA’s venture capital branch, but furthermore created “through [an] iterative collaboration between Palantir computer scientists and analysts from various intelligence agencies over the course of nearly three years.” While it’s long been known that Palantir got on its feet with the intelligence community’s money, it has not been previously reported that the intelligence community actually helped build the software. The continuous praise seen in these documents shows that the collaboration paid off. Under the new “Palantir Model,” “data can come from anywhere” and can be “asked whatever the analyst wants.”
Along with Palantir’s ability to pull in “direct XKS Results,” the presentation boasted that the software was already connected to 10 other secret Five Eyes and GCHQ programs and was highly popular among analysts. It even offered testimonials (TWO FACE appears to be a code name for the implementation of Palantir):
[Palantir] is the best tool I have ever worked with. It’s intuitive, i.e. idiot-proof, and can do a lot you never even dreamt of doing.This morning, using TWO FACE rather than XKS to review the activity of the last 3 days. It reduced the initial analysis time by at least 50%.
Enthusiasm runs throughout the PowerPoint: A slide titled “Unexpected Benefits” reads like a marketing brochure, exclaiming that Palantir “interacts with anything!” including Google Earth, and “You can even use it on a iphone or laptop.” The next slide, on “Potential Downsides,” is really more praise in disguise: Palantir “Looks expensive” but “isn’t as expensive as expected.” The answer to “What can’t it do?” is revealing: “However we ask, Palantir answer,” indicating that the collaboration between spies and startup didn’t end with Palantir’s CIA-funded origins, but that the company was willing to create new features for the intelligence community by request.
On GCHQ’s internal wiki page for TWO FACE, analysts were offered a “how to” guide for incorporating Palantir into their daily routine, covering introductory topics like “How do I … Get Data from XKS in Palantir,” “How do I … Run a bulk search,” and “How do I … Run bulk operations over my objects in Palantir.” For anyone in need of a hand, “training is currently offered as 1-2-1 desk based training with a Palantir trainer. This gives you the opportunity to quickly apply Palantir to your current work task.” Palantir often sends “forward deployed engineers,” or FDEs, to work alongside clients at their offices and provide assistance and engineering services, though the typical client does not have access to the world’s largest troves of personal information. For analysts interested in tinkering with Palantir, there was even a dedicated instant message chat room open to anyone for “informally” discussing the software.
The GCHQ wiki includes links to classified webpages describing Palantir’s use by the Australian Defence Signals Directorate (now called the Australian Signals Directorate) and to a Palantir entry on the NSA’s internal “Intellipedia,” though The Intercept does not have access to copies of the linked sites. However, embedded within Intellipedia HTML files available to The Intercept are references to a variety of NSA-Palantir programs, including “Palantir Classification Helper,” “[Target Knowledge Base] to Palantir PXML,” and “PalantirAuthService.” (Internal Palantir documents obtained by TechCrunch in 2013 provide additional confirmation of the NSA’s relationship with the company.)
One Palantir program used by GCHQ, a software plug-in named “Kite,” was preserved almost in its entirety among documents provided to The Intercept. An analysis of Kite’s source code shows just how much flexibility the company afforded Five Eyes spies. Developers and analysts could ingest data locally using either Palantir’s “Workspace” application or Kite. When they were satisfied the process was working properly, they could push it into a Palantir data repository where other Workspace users could also access it, almost akin to a Google Spreadsheets collaboration. When analysts were at their Palantir workstation, they could perform simple imports of static data, but when they wanted to perform more complicated tasks like import databases or set up recurring automatic imports, they turned to Kite.
Kite worked by importing intelligence data and converting it into an XML file that could be loaded into a Palantir data repository. Out of the box, Kite was able to handle a variety of types of data (including dates, images, geolocations, etc.), but GCHQ was free to extend it by writing custom fields for complicated types of data the agency might need to analyze. The import tools were designed to handle a variety of use cases, including static data sets, databases that were updated frequently, and data stores controlled by third parties to which GCHQ was able to gain access.
This collaborative environment also produced a piece of software called “XKEYSCORE Helper,” a tool programmed with Palantir (and thoroughly stamped with its logo) that allowed analysts to essentially import data from the NSA’s pipeline, investigate and visualize it through Palantir, and then presumably pass it to fellow analysts or Five Eyes intelligence partners. One of XKEYSCORE’s only apparent failings is that it’s so incredibly powerful, so effective at vacuuming personal metadata from the entire internet, that the volume of information it extracts can be overwhelming. Imagine trying to search your Gmail account, only the results are pulled from every Gmail inbox in the world.
MAKING XKEYSCORE MORE intelligible — and thus much more effective — appears to have been one of Palantir’s chief successes. The helper tool, documented in a GCHQ PDF guide, provided a means of transferring data captured by the NSA’s XKEYSCORE directly into Palantir, where presumably it would be far easier to analyze for, say, specific people and places. An analyst using XKEYSCORE could pull every IP address in Moscow and Tehran that visited a given website or made a Skype call at 14:15 Eastern Time, for example, and then import the resulting data set into Palantir in order to identify additional connections between the addresses or plot their positions using Google Earth.
Palantir was also used as part of a GCHQ project code-named LOVELY HORSE, which sought to improve the agency’s ability to collect so-called open source intelligence — data available on the public internet, like tweets, blog posts, and news articles. Given the “unstructured” nature of this kind of data, Palantir was cited as “an enrichment to existing [LOVELY HORSE] investigations … the content should then be viewable in a human readable format within Palantir.”
Palantir’s impressive data-mining abilities are well-documented, but so too is the potential for misuse. Palantir software is designed to make it easy to sift through piles of information that would be completely inscrutable to a human alone, but the human driving the computer is still responsible for making judgments, good or bad.
A 2011 document by GCHQ’s SIGINT Development Steering Group, a staff committee dedicated to implementing new spy methods, listed some of these worries. In a table listing “risks & challenges,” the SDSG expressed a “concern that [Palantir] gives the analyst greater potential for going down too many analytical paths which could distract from the intelligence requirement.” What it could mean for analysts to distract themselves by going down extraneous “paths” while browsing the world’s most advanced spy machine is left unsaid. But Palantir’s data-mining abilities were such that the SDSG wondered if its spies should be blocked from having full access right off the bat and suggested configuring Palantir software so that parts would “unlock … based on analysts skill level, hiding buttons and features until needed and capable of utilising.” If Palantir succeeded in fixing the intelligence problem of being overwhelmed with data, it may have created a problem of over-analysis — the company’s software offers such a multitude of ways to visualize and explore massive data sets that analysts could get lost in the funhouse of infographics, rather than simply being overwhelmed by the scale of their task.
If Palantir’s potential for misuse occurred to the company’s spy clients, surely it must have occurred to Palantir itself, especially given the company’s aforementioned “commitment” to privacy and civil liberties. Sure enough, in 2012 the company announced the formation of the Palantir Council of Advisors on Privacy and Civil Liberties, a committee of academics and consultants with expertise in those fields. Palantir claimed that convening the PCAP had “provided us with invaluable guidance as we try to responsibly navigate the often ill-defined legal, political, technological, and ethical frameworks that sometimes govern the various activities of our customers,” and continued to discuss the privacy and civil liberties “implications of product developments and to suggest potential ways to mitigate any negative effects.” Still, Palantir made clear that the “PCAP is advisory only — any decisions that we make after consulting with the PCAP are entirely our own.”
What would a privacy-minded conversation about privacy-breaching software look like? How had a privacy and civil liberties council navigated the fact that Palantir’s clientele had directly engaged in one of the greatest privacy and civil liberties breaches of all time? It’s hard to find an answer.
Palantir wrote that it structured the nondisclosure agreement signed by PCAP members so that they “will be free to discuss anything that they learn in working with us unless we clearly designate information as proprietary or otherwise confidential (something that we have rarely found necessary except on very limited occasions).” But despite this assurance of transparency, all but one of the PCAP’s former and current members either did not return a request for comment for this article or declined to comment citing the NDA.
The former PCAP member who did respond, Stanford privacy scholar Omer Tene, told The Intercept that he was unaware of “any specific relationship, agreement, or project that you’re referring to,” and said he was not permitted to answer whether Palantir’s work with the intelligence community was ever a source of tension with the PCAP. He declined to comment on either the NSA or GCHQ specifically. “In general,” Tene said, “the role of the PCAP was to hear about client engagement or new products and offerings that the company was about to launch, and to opine as to the way they should be set up or delivered in order to minimize privacy and civil liberties concerns.” But without any further detail, it’s unclear whether the PCAP was ever briefed on the company’s work for spy agencies, or whether such work was a matter of debate.
There’s little detail to be found on archived versions of Palantir’s privacy and civil liberties-focused blog, which appears to have been deleted sometime after the PCAP was formed. Palantir spokesperson Matt Long told The Intercept to contact the Palantir media team for questions regarding the vanished blog at the same email address used to reach Long in the first place. Palantir did not respond to additional repeated requests for comment and clarification.
A GCHQ spokesperson provided a boilerplate statement reiterating the agency’s “longstanding policy” against commenting on intelligence matters and asserted that all its activities are “carried out in accordance with a strict legal and policy framework.” The NSA did not provide a response.
Anyone worried that the most powerful spy agencies on Earth might use Palantir software to violate the privacy or civil rights of the vast number of people under constant surveillance may derive some cold comfort in a portion of the user agreement language Palantir provided for the Kite plug-in, which stipulates that the user will not violate “any applicable law” or the privacy or the rights “of any third party.” The world will just have to hope Palantir’s most powerful customers follow the rules.
Documents published with this article:
- GCHQ VisWeek 2008 Conference Report
- Palantir Executive Summary
- NDIST Cyber Defence
- Mastering the Internet
- The Tale of Two Sources
- TWO FACE on GCHQ Wiki
- XKEYSCORE Helper Notes
- SDSG Integrated Analytics Workshop
Listen to Jeremy Scahill’s interview with Sam Biddle on Episode 4 of Intercepted (begins at 32:05).
RELATED
'via Blog this'
Subscribe to:
Posts (Atom)