The Army’s new toolkit goes far beyond social media surveillance of the type offered by
private contractors like Dataminr, which helps police and military agencies detect perceived threats by
scraping social media timelines and chatrooms for various keywords. Instead, Army Protective Services Battalion investigators would seemingly combine social media data with a broad variety of public and nonpublic information, all accessible through a “universal search selector.”
These sources of information include “signal-rich discussions from illicit threat-actor communities and access to around-the-clock conversations within threat-actor channels,” public research,
CCTV feeds, radio stations, news outlets, personal records, hacked information, webcams, and — perhaps most invasive — cellular location data.
The document mentions the use of “geo-fenced” data as well, a controversial practice wherein an investigator
draws a shape on a digital map to focus their surveillance of a specific area. While app-based smartphone tracking is a potent surveillance technique, it remains unclear how exactly this data might actually be used to unmask threatening social media posts, or what relevance other data categories like radio stations or academic research could possibly have.
The Army procurement document shows it wasn’t just looking for surveillance software, but also tools to disguise the Army’s internet presence as it monitors the web. The contract says the Army would use “misattribution”: deceiving others about who is actually behind the keyboard. The document says the Army would accomplish this through falsifying web browser information and by relaying Army internet traffic through servers located in foreign cities, obscuring its stateside origin.
According to the document, “SEWP Solutions, LLC is the only vendor that allows USACID the ability to tunnel into specific countries/cities like Moscow, Russia or Beijing, China and come out on a host nation internet domain.”
THE DATA USED by the toolkit all falls under the rubric of “PAI,” or publicly available information, a misnomer that often describes not only what is freely available to the public, but also
commercially purchased private information
bought and sold by a wide constellation of
shadowy surveillance firms and
data brokers. Location data gleaned from smartphone apps and resold by the unregulated mobile ad industry provides nearly anyone — including the Army, it appears — with an effortless, unaccountable means of tracking the phone-owning public’s movements with pinpoint accuracy, both in the U.S. and abroad.