recommended reading

DHS program to monitor social media users draws lawsuit

Privacy advocates are suing the Homeland Security Department to obtain information on a program that monitors the social media interactions of citizens following a federal vendor's private sector plans to sabotage certain groups' online activities with similar technology.

Homeland Security officials have expanded an ongoing initiative that tracks public online communications in the interests of public safety, according a February DHS notice.

The Electronic Privacy Information Center on Tuesday filed a lawsuit under the Freedom of Information Act that seeks all government communications with contractors related to the program. The request was prompted by a leak of planning emails from government contractor HB Gary describing project proposals for a private firm to monitor and discredit the online activities of Americans, such as labor union leaders. Other emails in the cache showed that an HB Gary executive was planning a special training session with Homeland Security officials. Hacker activists from the loosely organized collective Anonymous released the communications.

EPIC is demanding records on contracts and communications between DHS and HB Gary that mention the use of social media monitoring, according to the group's FOIA request. The privacy organization also is asking for information on the technical capabilities of tools Homeland Security uses to scan social media networks. And EPIC officials want to see DHS personnel training materials for the project.

At the time DHS announced the data collection, department officials intended to follow online forums, blogs, public websites and message boards for data that would be kept on record for five years.

Government officials can create user accounts on these sites "for monitoring that supports providing situational awareness and establishing a common operating picture," the February announcement said. The notice, however, stated the DHS program would not "actively seek to connect" with social network users, accept invitations to befriend or otherwise interact with users on sites.

Routine uses of the program include sharing data with contractors that are supporting DHS projects, as well as "an agency, organization or individual when there could potentially be a risk of harm to an individual," Homeland Security officials said.

Typically, DHS staff will strike any information that can identify an individual by name when exchanging it with others. Exceptions include potential life and death situations, when it is necessary to disclose the name and location of a person who, for example, claims to be buried under rubble or hiding in a hotel overtaken by terrorists.

The DHS program can observe American and foreign private sector officials who make statements online, as well as government officials who communicate publicly, according to the notice. The gleaned information also can be shared with the Justice Department for litigation, or other governmental agencies to respond to disasters and track the spread of disease or other health threats.

Homeland Security officials declined to comment.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.