Transparency Watch Releases Searchable Database Of 27,000 US Intelligence Workers

from the publicly-posted-information,-searchable-by-the-public dept

Intelligence gathering on intelligence gatherers. Watching the watchers. Whatever you want to call it, Transparency Toolkit is doing it. It has gathered 27,000 publicly-posted resumes from members of the “intelligence community” and turned them into a searchable database.

The database — ICWatch — was put together using software specifically constructed by Transparency Watch (and posted at Github). Not only can the database be searched through TW’s front end, but the data is also available in raw form for data-mining purposes.

Some may find this searchable database to be a form of doxxing, but TW says that isn’t the intent. Instead, it’s meant to give the public additional insight into the inner workings of the intelligence community, as well as allowing researchers and journalists to sniff out information on still-unrevealed surveillance programs.

“These resumes include many details about the names and functions of secret surveillance programs, including previously unknown secret codewords,” Transparency Toolkit said.

“We are releasing these resumes in searchable form with the hopes that people can use them to better understand mass surveillance programs and research trends in the intelligence community.”

What Transparency Watch has done is simplified a task anyone could have performed prior to the compilation of the ICWatch database. In fact, nearly two years ago, the ACLU’s Chris Soghoian pointed out that public LinkedIn profiles were coughing up classified program names posted by intelligence community members in their listed skills and work history.

This is all Transparency Watch has done — only in aggregate and accessible to those without a LinkedIn account.

The data was collected from LinkedIn public profiles using search terms like known codewords, intelligence agencies and departments, intelligence contractors, and industry terms, the group said.

What Soghoian noted back in 2013 remains true. Searches for known NSA programs frequently bring up other program names, all posted publicly by employees and contractors with an apparent disregard for the agency’s “everything is a secret” policies.

A search for “PINWALE” brings up a profile listing the following:

Cultweave, UIS, Nucleon, CREST, Pinwale, Anchory, Association, Dishfire, SharkFinn, GistQueue, GoldPoint, Mainway

And another listing these terms:

Snort, TRAFFICTHIEF, PINWALE, BOUNDLESS INFORMANT, BLARNEY, BULLRUN, CARNIVORE

You can also find out who’s involved in Predator drone flights. Or who’s participated in the NSA’s Tailored Access Operations.

Some may argue that this algorithmic collection of resumes and LinkedIn profiles may be dragging some people under the “intelligence community” umbrella that shouldn’t really be there. That’s likely true, but this is one of those inescapable outcomes of dragnet operations. They may also argue that turning over this information to the public may cause some of those listed to be subjected to harassment or put them in danger. Also, this may unfortunately be true as well.

But there’s a simple solution, albeit one that can’t be applied retroactively.

As the government so frequently points out to us, publicly-posted information carries no expectation of privacy. The same goes for government employees and government contractors in sensitive positions who choose to disclose information about their skills and employment publicly. If any danger to these people exists, it has always existed. ICWatch may make the job simpler, but it’s done nothing any person can’t do on their own, using simple search tools.

Filed Under: , , , ,
Companies: linkedin, transparency watch

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Transparency Watch Releases Searchable Database Of 27,000 US Intelligence Workers”

Subscribe: RSS Leave a comment
13 Comments
That One Guy (profile) says:

What's good for the goose...

‘Some may argue that this algorithmic collection of resumes and LinkedIn profiles may be dragging some people under the “intelligence community” umbrella that shouldn’t really be there. That’s likely true, but this is one of those inescapable outcomes of dragnet operations. They may also argue that turning over this information to the public may cause some of those listed to be subjected to harassment or put them in danger. Also, this may unfortunately be true as well.

Boy that sounds familiar…

Some may argue that this algorithmic collection of online activity and communications may be dragging some people under the “terrorists/threat” umbrella that shouldn’t really be there. That’s likely true, but this is one of those inescapable outcomes of dragnet operations. They may also argue that turning over this information to the government may cause some of those listed to be subjected to harassment or put them in danger. Also, this may unfortunately be true as well.

They don’t like the potential responses or reactions for making such data public? Well as they love to say, ‘publicly-posted information carries no expectation of privacy.’

Or in other words: Too bad. If our private data is going to be collected and looked through, your public data is going to get the same treatment.

Anonymous Coward says:

Re: Re:

Did they violate the copyrights, expectations of privacy, or any other law or legal principle under which they can be charged? Did the violate the terms of services on the websites they scraped in such a way that they cannot legally republish that information to the public. I bet they could make a case if they wanted to.

Anonymous Howard, Cowering says:

Re: Re: AC #7

Copyrights, probably not. This appears to be a transformative work, and probably deals in facts (which were published on a publicly visible profile) rather than concepts/ideas.

Expectations of privacy, certainly not. Other than the fact that the data was scraped from public sites, the Third Party Doctrine would easily apply (they gave that information to a third party, therefore their privacy interest in it is zero — no citation beyond: read TechDirt frequently).

Any other law? Most likely; after all, they are (presumably) breathing and walking around in the United States in the early 21st century. By definition, they are violating SOME law.

Legal principle? It’s chargeable to violate a legal principle?

Terms of Service(s) are usually limited to the use of the website. The website/owner can pursue legal action if it wants to, but the FBI is unlikely to have standing to prosecute.

Vis-à-vis the bet: I wouldn’t bet against you. That doesn’t mean it’s a valid case, that it would be upheld, or that it even makes legal sense. However, given the sorry state of Federal prosecutorial decisions these days, I would bet against eventual final conviction.

AJ says:

Re: Re: Re:

The story says “publicly-posted resumes from members of the “intelligence community” and turned them into a searchable database. “. If you post your resume publicly, how do you have copyright, expectation of privacy, or any other legal argument? If they posted their info to a private website, where employers could pay to search and view it, then perhaps you have an argument.. but just on a job board or something?

Hell, they could consider it a service. If i were looking for spooks, and i needed to find one that has a specific specialty, that database would be the first place I looked. No telling how many of them find a job because of that.

Griffdog (profile) says:

more for the goose...

‘Some may argue that this automated collection of license plates may be dragging some people under the “suspected criminals” umbrella that shouldn’t really be there. That’s likely true, but this is one of those inescapable outcomes of dragnet operations. They may also argue that turning over this information to the public may cause some of those listed to be subjected to harassment or put them in danger. Also, this may unfortunately be true as well.’

Anonymous Coward says:

If you don't want to be found...

…be careful what you put in your resume.

I have worked on a variety of classified programs relating to intelligence, and I know a number of people who either have been or were in the intelligence field. None of their names appear in the database.

The question is how some people appear, and some do not. I suspect that the people I know did the same as me, and said something like “Led a variety of defense related projects,” or “Designed components and systems for government projects.” No code words, no buzz words, and no other words that would present a clue as to what we really did.

What that means, of course, is that many of us (and perhaps even most of us) can’t be found through the techniques used to develop this database, which was alluded to in the post. If you do not want to be pigeon holed as “intelligence,” or other fields, do not put that information in your resume, on your Facebook page, etc.

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...