Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy Security Social Networks The Internet United States

LinkedIn Used To Create Database of 27,000 US Intelligence Personnel 82

An anonymous reader writes: A new group, Transparency Toolkit, has mined LinkedIn to reveal and analyze the resumes of over 27,000 people in the U.S. intelligence community. In the process, Transparency Toolkit said it found previously unknown secret codewords and references to surveillance technologies and projects. "'Transparency Toolkit uses open data to watch the watchers and hold the powerful to account,' the group's website says. 'We build free software to collect and analyze open data from a variety of sources. Then we work with investigative journalists and human rights organizations to turn that into useful, actionable knowledge. Currently, our primary focuses are investigating surveillance and human rights abuses.'"
This discussion has been archived. No new comments can be posted.

LinkedIn Used To Create Database of 27,000 US Intelligence Personnel

Comments Filter:
  • unknown code words ?

    Has a strange new computer language been discovered ?

    or just "forth" subroutines !

    Go Forth and factor !

    • unknown code words ?

      How can they tell the difference between a new unknown codeword and a typo? For that matter, is CLOUD SYNERGY a secret program or a marketing term?

      (If you want to create the ultimate hiding-in-plain-view secret program, start it with the ACTION ITEM view controller driving ELEVATOR PITCH monitoring devices built on PARADIGM SHIFT technology with STRATEGIC ROLE functionality and optional COMPETITOR STRATEGY and BIG PICTURE modules, all tied together via CRITICAL PATH and CUSTOMER FOCUS software. 50% of peo

    • by Anonymous Coward

      If you have a sizable chunk of 27000 folks misspelling the same exact $THING, then it might just be something that the general public hasn't heard about but is known in the inner circles of these organizations.

  • Riiight... (Score:4, Funny)

    by Etherwalk ( 681268 ) on Thursday May 07, 2015 @03:22AM (#49636059)

    So it's mining for a mix of deliberate misinformation and incompetence?

    I mean, couldn't you just get that from Congress?

    • by AHuxley ( 892839 )
      It depends how the US saw its needs been met for a massive in flow of university skill sets over decades.
      Every applicant would face same database search- state and federal, a interview with family, friends depending on the position, contractor, gov, mil.
      Historically that could be done as part of the draft or national service 'testing' for math, languages in some countries.
      Other nations just had vast university networks to feed in their maths, science, anthropology, language, computer science, psychology
  • by Anonymous Coward

    e.g. you search for one of the tools Snowden refers to, and it leads to CVs with those skills on it, which mentions others:

    https://www.linkedin.com/pub/jason-miller/39/741/a49

    "Skilled in the use of several Intelligence tools and resources: ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE, FASTSCOPE, OCTAVE/CONTRAOCTAVE, PINWALE, UTT, WEBCANDID, MICHIGAN, PLUS, ASSOCIATION, MAINWAY, FASCIA, OCTSKYWARD, INTELINK, METRICS, BANYAN, MARINA"

    I bet Monster.com would be a real gold mine for

  • by Thanshin ( 1188877 ) on Thursday May 07, 2015 @03:36AM (#49636121)

    When you decide to dedicate part of your life to annoy powerful people who regularly break the law and later become immune to the consequences, at some point you have to decide whether to try to be invisible, risking a mistake that could make you disappear; or trying to be as visible as possible, to make it too cumbersome to dispose of you.

    I wonder how does one take that decision.

    • En ksa süre içerisinde ingilizce örenip buralardan bir eyler örenmek istiyorum.
  • by Chrisq ( 894406 )
    Everyone mentioning "area 51" or "the Philadelphia experiment" must be a member of the intelligence community
    • by Entrope ( 68843 )

      Yeah, data quality in this seems pretty poor. It looks like the only "useful"/interesting fields are -- no surprise -- the skill and contact lists. Most of these resumes only have matching keywords under skills, and I would guess the only useful thing you can do with the data set is social network analysis. The data is also practically anti-normalized: Most of the fields for a given user are repeated for each position that a person has held, so grepping for things turns up way more hits than it should.

      I

  • only a moron would include 'Unknown Code Words' and 'references to surveillance technologies and projects' in a resume. Seems to be over 27,000 of them.

    • only a moron would include 'Unknown Code Words' and 'references to surveillance technologies and projects' in a resume. Seems to be over 27,000 of them.

      Which part of "intelligence community" don't you understand? :-)

  • by Mal-2 ( 675116 ) on Thursday May 07, 2015 @04:09AM (#49636201) Homepage Journal

    Were LinkedIn profiles used in the little games of Spot The Fed at DEF CON? Seems that if you could tie someone to their profile, you could determine a lot more about them than they're actually willing to tell you directly.

  • Or maybe draw up a list of Islamic militants and post it. Oh, they won't? Why is that then? A bit scared of what might happen? Boo hoo.

    Typical 21st century armchair warriors, pick on easy targets and make it look like you're a hero Sticking It To The Man when you know you're really living in a comfy democracy where nothing particularly bad is going to happen to you. Try doing the same in various other countries around the world and see how long it is before someone kicks down your door at 3am and your famil

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Maybe they don't care? Maybe the Islamic militant nor the russian or north korean guys have no influence over what happens in their daily life and the US intelligence community does? Hell, how fucking many Islamic militants can you find on linkedIn?

      I can accept that my neighbors car runs worse than mine, doesn't mean I shouldn't take care of mine until it runs like my neighbors.

    • by Anonymous Coward

      At least the Islamic militants do not pretend that they are there to create peace, liberty and democracy.

    • Or maybe draw up a list of Islamic militants and post it. Oh, they won't? Why is that then? A bit scared of what might happen? Boo hoo.

      Yes, you're right.

      Islamic militants post their resume on LinkedIn in perfect American English with all the right keywords to make sure ISIS's clueless Human Resources minions don't throw their resumes in the trash by mistake.

      It also helps that when they decapitate someone in an online video, they hire someone to close caption the video, translate it, and make sure all the names of the participants, from the executioner, down to the make up artists, and the fashion consultants, get clearly written into the c

      • Or maybe draw up a list of Islamic militants and post it. Oh, they won't? Why is that then? A bit scared of what might happen? Boo hoo.

        Yes, you're right.

        Islamic militants post their resume on LinkedIn in perfect American English with all the right keywords to make sure ISIS's clueless Human Resources minions don't throw their resumes in the trash by mistake.

        It also helps that when they decapitate someone in an online video, they hire someone to close caption the video, translate it, and make sure all the names of the participants, from the executioner, down to the make up artists, and the fashion consultants, get clearly written into the credits (because like they say in Hollywood, if my name is not in the credits, I will f___g kill you).

        Right. Just like US intelligence personnel post their "code words" on LInkedIn, oblivious of the mad skillz of the lefties..

    • Re: (Score:3, Insightful)

      Or maybe draw up a list of Islamic militants and post it. Oh, they won't? Why is that then? A bit scared of what might happen? Boo hoo.

      Typical 21st century armchair warriors, pick on easy targets and make it look like you're a hero Sticking It To The Man when you know you're really living in a comfy democracy where nothing particularly bad is going to happen to you. Try doing the same in various other countries around the world and see how long it is before someone kicks down your door at 3am and your family never see you again.

      Yet here you are, in your armchair picking safe fights with people on a harmless Internet forum. Bravo.

    • by moeinvt ( 851793 )

      When Islamic militants start a social network, I'm sure people will be interested in mining it.

      If we're in such a nice comfy "democracy" why don't we have complete transparency in government? How are government personnel able to engage in blatant criminal activity without fear of consequences?

      Cheers to these guys. There should be a searchable database of ALL employees of the government we're paying for.

      • There should be a searchable database of ALL employees of the government we're paying for.

        The janitor is a Soviet spy.

    • ...or maybe they're helping expose the morally-bankrupt twats what work in the security services? If everyone thought less of the 'intelligence community' than they do of their local estate agent or lawyer or whatever, then maybe, just maybe we'd bet the intelligence community we want rather than one that's way too big and way too intrusive and has it's head way too far up its own arse.

    • These 21st century "armchair warriors" exist because they're striving to prevent further decline toward *becoming* one the countries that steal people away at night. It's not about sticking it to the Man so much as it is about maintaining accountability. If we held people who start wars of aggression accountable, maybe we wouldn't have quite so many problems with terrorists. Ignoring and or minimizing the domestic side of the issue isn't helpful.

    • It's not 100% safe, or hadn't you been tracking the state of Whistle-blowers or people in the press who get imprisoned? Whether it's just "more free" than Russia but less free than Norway and we can pat ourselves on the back or not -- the assumption that secret organizations keeping us safe without any oversight is anti-Democratic. America is better than Russia BECAUSE of the ACLU and other organizations and individuals that stand up to secrecy and how people are treated. The only thing we know is what we k

  • by wiredog ( 43288 ) on Thursday May 07, 2015 @06:24AM (#49636551) Journal
  • After numerous invitations to join LinkedIn, I started to sign up. Then I get to the point where they ask for my email password! Turns out that LinkedIn data mines your address book, then sends out invitations to all in it. I run a couple special interest groups, and I know when any member joins LinkedIn, because the Sig mail address gets an invitation

    Just between us billy goats gruff, there is no legitimate service that demands your password, that it is foolish to think they aren't reading everything tha

    • When I signed up I did not have to do that. It was an optional convenience feature and I said nope.

      • When I signed up I did not have to do that. It was an optional convenience feature and I said nope.

        Problem is twofold - a lot of people are not clever enough to realize they are giving LinkeIn access to at least their mail, and the same dummies are probably even their whole computer.

        THe other is optional or not, its a slimy organization that would even ask for that access.

        So no thank you.

    • by Entrope ( 68843 )

      You should write a letter. Or file a lawsuit. I'm sure that the US court system would show all due appreciation for your desire to prevent people from exercising their freedom to associate with LinkedIn.

      • You should write a letter. Or file a lawsuit. I'm sure that the US court system would show all due appreciation for your desire to prevent people from exercising their freedom to associate with LinkedIn.

        Huh? Hey muchacho, stupid people are gonna be stupid. I personally don't care, even though I won't violate the TOS of my ISP ot the policy of my employer by handing out both my email and it's password. for what is really a phishing expedition.

        However, I'm not above warning others that if you are handing out your password to complete strangers, you might as well not have one.

        I would have serious questions about hiring someone for a sensitive position that would hand out their company email without a thou

        • by Entrope ( 68843 )

          You must be one of those stupid people who are going to be stupid, because as someone else explained to you even before my earlier comment, LinkedIn does not require its users to submit any password for any email account. You are making entirely unwarranted (and stupid) assumptions about what other people have done, and then using those faulty assumptions to argue about what people should be allowed to do.

          • You must be one of those stupid people who are going to be stupid, because as someone else explained to you even before my earlier comment, LinkedIn does not require its users to submit any password for any email account.

            Your assessment of my stupidity doesn't change the fact that people are giving LinkedIn access to their email. It doesn't matter if its optional, because its happening.

            Tell me, if you had a business, and an email system, you'd be okay with your employees handing out their passwords?

            You are making entirely unwarranted (and stupid) assumptions about what other people have done, and then using those faulty assumptions to argue about what people should be allowed to do.

            I get several emails every week with datamined invitations to LinkedIn. These come from the accounts of people who have allowed LinkedIn access to their email. LinkedIn is sending email to everyone in their address book, and s

            • by Entrope ( 68843 )

              Are you getting those invitations from people with security clearances? If so, try letting their security officers know -- security@example.org, or whatever domain name they used. They will almost certainly get a dressing down, will probably get written up, and everyone else at the site or company will get a sternly worded reminder (in addition to their annual training) never to share their passwords with anyone, for any reason.

              You complain loudly that people with clearances shouldn't do that, but so far

              • You complain loudly that people with clearances shouldn't do that, but so far you have not even asserted that they have done that

                I'm not certain why on earth you would assume that I'm only talking about DOD.

                No one anywhere should to that. If you don't know why it's a stupid thing for anyone, anywhere to do that, I can't help you on that. Not much use in having a password at all if you voluntarily hand it out ot strangers.

                • by Entrope ( 68843 )

                  I know perfectly well why it's a stupid thing to do, regardless of whether one has a security clearance or even any significant access to trade secrets, export-controlled materials, or anything similar. I can't convince strangers about that, though, and I haven't been on the receiving end of such spam, so I don't have a solution for the general problem. I do think it is spectacularly stupid to jump, as you did, from "LinkedIn has an entirely optional way for you to give them control of your email" to "DOD

                  • I do think it is spectacularly stupid to jump, as you did, from "LinkedIn has an entirely optional way for you to give them control of your email" to "DOD employees should not be allowed to use FaceBook, period". My way of fighting that particular stupidity is to call you on it.

                    I think you are reading something in to my posts that I never said. Seeing how you used quotes, I am assuming that you are saying that I wrote exactly what you quoted..

                    Just in case I had made a typo, I went back and re-read my posts in this thread. I never mentioned Facebook at all. Much less your quotation. So why are you accusing me of making some kind of jump from LinkdIn to Facebook?

                    • by Entrope ( 68843 )

                      Facebook was a typo. Please excuse my brain for substituting one social networking site for another one. Do you get so easily butthurt because you're an oversensitive moron, or because you're a troll?

                    • That was no typo. You don't even know what a typo is. Seriously, did you graduate High School?

                      All i did was catch your lie, and called you on it. Yer pwnd, and you are a liar. What's that like Entrope? As for butthurt, frankly, you made my day.

                      Just in case you didn't catch it, Entrope, you are a liar.

                      And that, little man, is something you can quote me on.

                    • by Entrope ( 68843 )

                      I apparently know better than you what a typo is.

                      I regret thinking you had any intention of arguing in good faith, and shall not make that mistake again.

  • Wasn't LookingGlass the call sign of the SAC dooms day command air craft during the height of the cold war? There is a touch of irony if so.
  • I guess I should take those nuclear launch codes off my LinkedIn page. Remind me to get around to that sometime.
    • Too funny. I just got an email saying that "people are looking at your LinkedIn profile". "This member chose to be shown as anonymous".
  • May they never be able to get a job on the outside ever again! The price you pay for betraying your country and spying on your own.

  • https://transparencytoolkit.or... [transparencytoolkit.org]

    We're sorry, but something went wrong.
    If you are the application owner check the logs for more information.

One man's constant is another man's variable. -- A.J. Perlis

Working...