SlideShare a Scribd company logo
Academic Project Used Marketing Data
to Monitor Russian Military Sites
Commercially available location data is increasingly used for sensitive
surveillance by researchers, government agencies
Wall Street Journal
20 July 2020
In 2019, a group of Americans was observing the cellphone signals coming from
military sites across Eastern Europe.
At one of the locations, the Nyonoksa Missile Test Site in northern Russia, the
group identified 48 mobile devices present on Aug. 9, one day after a mysterious
radiation spike there generated international headlines and widespread
speculation that a Russian missile test had gone wrong.
The Americans were able to track the movements of those devices over time.
One went to the Paradisus Varadero Resort and Spa in Varadero, Cuba, for nine
days. Others scattered across the country—going to the Russian cities of St.
Petersburg and Moscow or to secure Russian military districts in Severodvinsk
and Archangel. One went to Ganja, Azerbaijan, which runs along a strategic
overland trade corridor between Asia and Europe.
The trackers weren’t professional intelligence analysts with access to secret
intercepts. Rather, they were a team of academic researchers in Starkville, Miss.,
working with their graduate research assistants and undergraduate interns on
the campus of Mississippi State University, using a commercially available
software program.
The data they used was GPS location information usually drawn from cellphone
apps—typically from games, weather services and such—and collected and
made available for purchase by the advertising industry.
The effort was a demonstration to the military of the power of commercial
cellphone data to provide valuable intelligence. From the data, they could begin
to make inferences—Nyonoksa, for instance, had the fewest devices present of
any of the three sites they were monitoring, leading them to conclude either
that it was more heavily restricted than the other three or that the recent
radiation accident had forced an evacuation.
By monitoring cellphones in Russian government buildings and foreign
embassies in Moscow, they were able to conclude that no high-level Russian
officials or foreign diplomats had visited the test sites recently. And they homed
in on the Azerbaijan trip as worthy of future study “because of contentious
relations between Russia and Azerbaijan” and the importance of the corridor
around Ganja as an overland connection between Europe and Asia.
The researchers’ experiment underscores how the global marketing industry’s
practice of collecting and reselling reams of user data, often for marketing and
advertising purposes, can be turned toward other ends. The data can be easily
purchased and exploited by foreign and domestic national-security agencies,
law-enforcement officials and others for surveillance and monitoring.
The sites that the Mississippi State researchers were able to pull cellphone data
from were extremely sensitive: Besides drone test facilities, they also were
monitoring numerous U.S. and foreign embassies and the Kremlin Senate
building in Moscow, documents show.
The team was working on a U.S. Army-sponsored, unclassified, experimental
project that sought to leverage “open-source” commercial data for intelligence
purposes. The team’s monitoring efforts were described in detail in unclassified
documents obtained by The Wall Street Journal from Mississippi State under
state open-records laws.
“This project has served as a great opportunity for both undergraduate and
graduate students at MSU to develop real-world skills and knowledge that will
benefit them greatly as they seek employment in the future,” said David May,
the principal investigator on the study and a sociology professor at Mississippi
State.
Edric Thompson, a spokesman for the U.S. Army Combat Capabilities
Development Command, which funded the project, said it was selected for
military funding because it had “good potential use for being able for our
soldiers to share information with each other.”
Mr. Thompson said the collection of cellphone location data was permitted
under Army regulations so long as no personal characteristics about the phone’s
owner were collected. He said the Mississippi State study also included an
analysis of the ethical and policy implications about the use of such data that
would help inform the military in the future.
The tool that enabled this kind of bird-dogging of personnel at Russian airfields
was sold by Babel Street, an open-source intelligence software platform that is
widely used by law enforcement, intelligence agencies, military units and private
companies. Babel Street has contracts with government agencies big and
small—from the Department of Homeland Security and the U.S. military to
county police departments across the country.
Babel Street publicly advertises itself as a social-media monitoring service,
allowing its law-enforcement, intelligence and military clients to mine public
social-media data for leads about criminal activity and do real-time monitoring
of unfolding events.
But Babel Street also sells a product called “Locate X”—access to cellphone
location data drawn from the advertising industry. The existence of the product,
which isn’t described on the company’s website, was revealed in March by the
website Protocol. The company didn’t respond to requests for comment.
For the military and intelligence officials, such data can show staffing levels at
sensitive sites and movement patterns of officials, and give clues about the
behavior of adversaries. For law enforcement, marketing data offers the
opportunity to try to identify suspects in the vicinity of crimes.
According to documents reviewed by the Journal and people familiar with the
company, Locate X provides advertising data drawn from the marketing industry
to intelligence, military and law-enforcement agencies for monitoring purposes.
Its terms of service say that the customer may not even disclose the existence
of Locate X. Mississippi State cited a confidentiality obligation in its contract with
Babel and declined to answer questions about the product.
The federal government did a governmentwide evaluation of Locate X,
according to documents reviewed by the Journal, which also showed that Babel
Street has worked closely with U.S. government agencies and contractors to
develop and refine the product.
Documents reviewed by the Journal show that in the U.S., Babel Street had sold
its products to nearly every major defense, national-security or law-
enforcement agency, including the Central Intelligence Agency, the National
Security Agency, the Justice Department, the Department of Homeland Security,
the Defense Intelligence Agency and U.S. Cyber Command. Records show that
Babel Street products are sold to governments world-wide—including in
Canada, the United Kingdom, Australia, New Zealand, Singapore, Germany and
others.
Babel Street is part of a growing ecosystem of companies taking consumer data
collected by some of the world’s largest corporations and mobile-app
publishers, and repackaging it for intelligence, law-enforcement and military
agencies.
In many cases, consumers have no forewarning that anyone—global intelligence
agencies or local cops—might be buying it and using it to monitor them.
The uses of such data also raise unsettled legal and ethical questions about
global privacy and consumer consent. Typically, consumers aren’t identified by
their names in such data sets, but rather by an alphanumeric identifier. But as
the Mississippi State project shows, it is fairly simple to home in on individuals
of interest at some of the highest-security sites in the world and track intimate
details of their lives.
“We as individuals walk around with multiple devices and have multiple devices
in our homes. There is a tremendous amount of data that doesn’t personally
identify us by our name, driver’s licenses, Social Security number or address,
which nevertheless will have very significant consequences for our lives,” said
Marc Groman, a lawyer who specializes in privacy, technology and
cybersecurity.
“When a consumer downloads an app and gives that app consent to collect and
track their precise location, does the consumer understand that the app may
then share or sell that precise location with a wide range of third parties—
potentially including the Department of Homeland Security, the Army, law
enforcement or other stakeholders? The answer is no,” said Mr. Groman, who
previously worked for the Obama White House.
On the other hand, location data is widely available for commercial purposes.
Advertisers use it to target ads; brands use it to understand customer behavior;
and Wall Street firms increasingly rely on it to inform investment decisions.
“This is the argument about private versus government access to data,” said
Stewart Baker, a lawyer who has served in senior positions at both the National
Security Agency and the Department of Homeland Security and is now a lawyer
in private practice at Steptoe & Johnson LLP.
“On the one hand, the private parties accessing the data can’t arrest anybody,
but they can use the data for other much more trivial purposes. And when
government gets access to the data, they can do with it things that are much
more painful for the person under scrutiny.” But, said Mr. Baker, “there is a lot
more value in catching criminals than in selling a barbecue set.”
Commercial data drawn from mobile devices, particularly involving location
data, can have surprising implications.
The fitness app Strava publicly released a map in 2017 of three trillion individual
GPS data points from users who logged their running or cycling routes. But
within that data, researchers at nongovernmental organizations and journalists
gleaned a trove of valuable national-security information—like the location of
U.S. forward-operating bases in Afghanistan, the routes of military supply
convoys and the location of secret CIA facilities.
The running routes were even detailed enough to show the internal layout of
sensitive facilities and bases.

More Related Content

Similar to Academic project used marketing data to monitor russian military sites

Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
Jun Hao Lim
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
LeonardN9WWelchw
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 

Similar to Academic project used marketing data to monitor russian military sites (20)

Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
Prism
PrismPrism
Prism
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Intelligence chief defends internet spying program
Intelligence chief defends internet spying programIntelligence chief defends internet spying program
Intelligence chief defends internet spying program
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Time to grab the US healthcare pie : Kapil Khandelwal, www.kapilkhandelwal.com
Time to grab the US healthcare pie : Kapil Khandelwal, www.kapilkhandelwal.com Time to grab the US healthcare pie : Kapil Khandelwal, www.kapilkhandelwal.com
Time to grab the US healthcare pie : Kapil Khandelwal, www.kapilkhandelwal.com
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for Privacy
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
House rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryHouse rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcry
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
 

More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP

More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP (20)

A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)
 
An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"
 
"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors
 
Chinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI RaceChinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI Race
 
The mismeasuring of AI: How it all began
The mismeasuring of AI: How it all beganThe mismeasuring of AI: How it all began
The mismeasuring of AI: How it all began
 
Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!
 
Inside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on RedditInside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on Reddit
 
Regulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit detailsRegulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit details
 
Bariatric Surgery at 16
Bariatric Surgery at 16Bariatric Surgery at 16
Bariatric Surgery at 16
 
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering LivesPalestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
 
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to KnowWho’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
 
Why ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic MathWhy ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic Math
 
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing DataU.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
 
Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?
 
AI is already writing books, websites and online recipes
AI is already writing books, websites and online recipesAI is already writing books, websites and online recipes
AI is already writing books, websites and online recipes
 
What happens when ChatGPT lies about real people?
What happens when ChatGPT lies about real people?What happens when ChatGPT lies about real people?
What happens when ChatGPT lies about real people?
 
The Brilliant Inventor Who Made Two of History’s Biggest Mistakes
The Brilliant Inventor Who Made Two of History’s Biggest MistakesThe Brilliant Inventor Who Made Two of History’s Biggest Mistakes
The Brilliant Inventor Who Made Two of History’s Biggest Mistakes
 

Recently uploaded

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Academic project used marketing data to monitor russian military sites

  • 1. Academic Project Used Marketing Data to Monitor Russian Military Sites Commercially available location data is increasingly used for sensitive surveillance by researchers, government agencies Wall Street Journal 20 July 2020 In 2019, a group of Americans was observing the cellphone signals coming from military sites across Eastern Europe. At one of the locations, the Nyonoksa Missile Test Site in northern Russia, the group identified 48 mobile devices present on Aug. 9, one day after a mysterious radiation spike there generated international headlines and widespread speculation that a Russian missile test had gone wrong. The Americans were able to track the movements of those devices over time. One went to the Paradisus Varadero Resort and Spa in Varadero, Cuba, for nine days. Others scattered across the country—going to the Russian cities of St. Petersburg and Moscow or to secure Russian military districts in Severodvinsk and Archangel. One went to Ganja, Azerbaijan, which runs along a strategic overland trade corridor between Asia and Europe. The trackers weren’t professional intelligence analysts with access to secret intercepts. Rather, they were a team of academic researchers in Starkville, Miss., working with their graduate research assistants and undergraduate interns on the campus of Mississippi State University, using a commercially available software program. The data they used was GPS location information usually drawn from cellphone apps—typically from games, weather services and such—and collected and made available for purchase by the advertising industry. The effort was a demonstration to the military of the power of commercial cellphone data to provide valuable intelligence. From the data, they could begin to make inferences—Nyonoksa, for instance, had the fewest devices present of any of the three sites they were monitoring, leading them to conclude either
  • 2. that it was more heavily restricted than the other three or that the recent radiation accident had forced an evacuation. By monitoring cellphones in Russian government buildings and foreign embassies in Moscow, they were able to conclude that no high-level Russian officials or foreign diplomats had visited the test sites recently. And they homed in on the Azerbaijan trip as worthy of future study “because of contentious relations between Russia and Azerbaijan” and the importance of the corridor around Ganja as an overland connection between Europe and Asia. The researchers’ experiment underscores how the global marketing industry’s practice of collecting and reselling reams of user data, often for marketing and advertising purposes, can be turned toward other ends. The data can be easily purchased and exploited by foreign and domestic national-security agencies, law-enforcement officials and others for surveillance and monitoring. The sites that the Mississippi State researchers were able to pull cellphone data from were extremely sensitive: Besides drone test facilities, they also were monitoring numerous U.S. and foreign embassies and the Kremlin Senate building in Moscow, documents show. The team was working on a U.S. Army-sponsored, unclassified, experimental project that sought to leverage “open-source” commercial data for intelligence purposes. The team’s monitoring efforts were described in detail in unclassified documents obtained by The Wall Street Journal from Mississippi State under state open-records laws. “This project has served as a great opportunity for both undergraduate and graduate students at MSU to develop real-world skills and knowledge that will benefit them greatly as they seek employment in the future,” said David May, the principal investigator on the study and a sociology professor at Mississippi State. Edric Thompson, a spokesman for the U.S. Army Combat Capabilities Development Command, which funded the project, said it was selected for military funding because it had “good potential use for being able for our soldiers to share information with each other.”
  • 3. Mr. Thompson said the collection of cellphone location data was permitted under Army regulations so long as no personal characteristics about the phone’s owner were collected. He said the Mississippi State study also included an analysis of the ethical and policy implications about the use of such data that would help inform the military in the future. The tool that enabled this kind of bird-dogging of personnel at Russian airfields was sold by Babel Street, an open-source intelligence software platform that is widely used by law enforcement, intelligence agencies, military units and private companies. Babel Street has contracts with government agencies big and small—from the Department of Homeland Security and the U.S. military to county police departments across the country. Babel Street publicly advertises itself as a social-media monitoring service, allowing its law-enforcement, intelligence and military clients to mine public social-media data for leads about criminal activity and do real-time monitoring of unfolding events. But Babel Street also sells a product called “Locate X”—access to cellphone location data drawn from the advertising industry. The existence of the product, which isn’t described on the company’s website, was revealed in March by the website Protocol. The company didn’t respond to requests for comment. For the military and intelligence officials, such data can show staffing levels at sensitive sites and movement patterns of officials, and give clues about the behavior of adversaries. For law enforcement, marketing data offers the opportunity to try to identify suspects in the vicinity of crimes. According to documents reviewed by the Journal and people familiar with the company, Locate X provides advertising data drawn from the marketing industry to intelligence, military and law-enforcement agencies for monitoring purposes. Its terms of service say that the customer may not even disclose the existence of Locate X. Mississippi State cited a confidentiality obligation in its contract with Babel and declined to answer questions about the product. The federal government did a governmentwide evaluation of Locate X, according to documents reviewed by the Journal, which also showed that Babel Street has worked closely with U.S. government agencies and contractors to develop and refine the product.
  • 4. Documents reviewed by the Journal show that in the U.S., Babel Street had sold its products to nearly every major defense, national-security or law- enforcement agency, including the Central Intelligence Agency, the National Security Agency, the Justice Department, the Department of Homeland Security, the Defense Intelligence Agency and U.S. Cyber Command. Records show that Babel Street products are sold to governments world-wide—including in Canada, the United Kingdom, Australia, New Zealand, Singapore, Germany and others. Babel Street is part of a growing ecosystem of companies taking consumer data collected by some of the world’s largest corporations and mobile-app publishers, and repackaging it for intelligence, law-enforcement and military agencies. In many cases, consumers have no forewarning that anyone—global intelligence agencies or local cops—might be buying it and using it to monitor them. The uses of such data also raise unsettled legal and ethical questions about global privacy and consumer consent. Typically, consumers aren’t identified by their names in such data sets, but rather by an alphanumeric identifier. But as the Mississippi State project shows, it is fairly simple to home in on individuals of interest at some of the highest-security sites in the world and track intimate details of their lives. “We as individuals walk around with multiple devices and have multiple devices in our homes. There is a tremendous amount of data that doesn’t personally identify us by our name, driver’s licenses, Social Security number or address, which nevertheless will have very significant consequences for our lives,” said Marc Groman, a lawyer who specializes in privacy, technology and cybersecurity. “When a consumer downloads an app and gives that app consent to collect and track their precise location, does the consumer understand that the app may then share or sell that precise location with a wide range of third parties— potentially including the Department of Homeland Security, the Army, law enforcement or other stakeholders? The answer is no,” said Mr. Groman, who previously worked for the Obama White House.
  • 5. On the other hand, location data is widely available for commercial purposes. Advertisers use it to target ads; brands use it to understand customer behavior; and Wall Street firms increasingly rely on it to inform investment decisions. “This is the argument about private versus government access to data,” said Stewart Baker, a lawyer who has served in senior positions at both the National Security Agency and the Department of Homeland Security and is now a lawyer in private practice at Steptoe & Johnson LLP. “On the one hand, the private parties accessing the data can’t arrest anybody, but they can use the data for other much more trivial purposes. And when government gets access to the data, they can do with it things that are much more painful for the person under scrutiny.” But, said Mr. Baker, “there is a lot more value in catching criminals than in selling a barbecue set.” Commercial data drawn from mobile devices, particularly involving location data, can have surprising implications. The fitness app Strava publicly released a map in 2017 of three trillion individual GPS data points from users who logged their running or cycling routes. But within that data, researchers at nongovernmental organizations and journalists gleaned a trove of valuable national-security information—like the location of U.S. forward-operating bases in Afghanistan, the routes of military supply convoys and the location of secret CIA facilities. The running routes were even detailed enough to show the internal layout of sensitive facilities and bases.