Federal documents detailing the attacks at the U.S. Capitol show a mix of FBI techniques, from license plate readers to facial recognition, that helped identify rioters. Digital rights activists say the invasive technology can infringe on our privacy.
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
What if Petraeus was a hacker? Email privacy for the rest of usPhil Cryer
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at B-Sides Las Vegas August 1st, 2013 at 1900)
This is a copy of my presentation at the 2013 VT Family Law Conference. This lecture discusses the growing importance of electronic evidence in divorce litigation, and provides suggestions on how to locate, recover, and preserve emails, social media posts, pictures, and computer files. It also covers the legal risks that attorneys and their clients face if they are too aggressive in pursuing electronic evidence.
Obama administration defends massive phone record collectiontrupassion
The Obama administration on Thursday defended its collection of the telephone records of millions of Americans as part of U.S. counter terrorism efforts, re-igniting a fierce debate over privacy even as it called the program critical to warding off an attack.
The admission came after Britain's Guardian newspaper published on Wednesday a secret court order authorizing the collection of phone records generated by millions of Verizon Communications(VZ.N) customers.
Privacy advocates blasted the order as unconstitutional government surveillance and called for a review of the program amid renewed concerns about intelligence-gathering efforts launched after the September 11, 2001, attacks on the United States.
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
What if Petraeus was a hacker? Email privacy for the rest of usPhil Cryer
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at B-Sides Las Vegas August 1st, 2013 at 1900)
This is a copy of my presentation at the 2013 VT Family Law Conference. This lecture discusses the growing importance of electronic evidence in divorce litigation, and provides suggestions on how to locate, recover, and preserve emails, social media posts, pictures, and computer files. It also covers the legal risks that attorneys and their clients face if they are too aggressive in pursuing electronic evidence.
Obama administration defends massive phone record collectiontrupassion
The Obama administration on Thursday defended its collection of the telephone records of millions of Americans as part of U.S. counter terrorism efforts, re-igniting a fierce debate over privacy even as it called the program critical to warding off an attack.
The admission came after Britain's Guardian newspaper published on Wednesday a secret court order authorizing the collection of phone records generated by millions of Verizon Communications(VZ.N) customers.
Privacy advocates blasted the order as unconstitutional government surveillance and called for a review of the program amid renewed concerns about intelligence-gathering efforts launched after the September 11, 2001, attacks on the United States.
How the Patriot Act Works by Ed Grabianowski Browse th.docxwellesleyterresa
How the Patriot Act Works
by Ed Grabianowski
Browse the article How the Patriot Act Works
Homeland Security National Operations Center
Photo Courtesy of U.S. Department of Homeland Security
Introduction to How the Patriot Act Works
The Patriot Act is a U.S. law passed in the wake of the September 11, 2001 terrorist attacks. Its
goals are to strengthen domestic security and broaden the powers of law-enforcement agencies
with regards to identifying and stopping terrorists. The passing and renewal of the Patriot Act has
been extremely controversial. Supporters claim that it's been instrumental in a number of
investigations and arrests of terrorists, while critics counter the act gives the government too
much power, threatens civil liberties and undermines the very democracy it seeks to protect.
Let's take a look at what the Patriot Act is, the support and criticism behind it and if the Patriot
Act is really working.
Main Provisions of the Patriot Act
The Patriot Act's full title is Uniting and Strengthening America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism Act of 2001. It's split into 10 parts, and it covers a
lot of ground. Here is a summary.
Title I - This section pertains to the protection of civil liberties. It authorizes federal money to
accomplish much of the act's provisions and authorizes the Secret Service to create a nationwide
electronic crime task force. This section also gives the president the authority to confiscate the
property of any foreign person who is believed to have aided in a war or attack on the United
States. Such seizures can be submitted secretly to courts as evidence.
Title II - This section broadens the ability of law-enforcement agencies to conduct surveillance
on "agents of foreign powers." It allows the interception of communications if they're related to
terrorist activities and allows law-enforcement agencies to share information related to terrorist
http://people.howstuffworks.com/patriot-act.htm/about-author.htm#grabianowski
http://people.howstuffworks.com/patriot-act.htm
http://www.dhs.gov/index.shtm
http://people.howstuffworks.com/government-channel.htm
http://money.howstuffworks.com/personal-finance/money-index.htm
http://money.howstuffworks.com/question449.htm
http://computer.howstuffworks.com/workplace-surveillance.htm
activities with federal authorities. In addition, Title II authorizes roving surveillance -- that is, a
court order allowing surveillance on a particular person allows officers to use any means
available to intercept that person's communications, regardless of where the person goes.
Previously, a court order would only allow a wiretap on a specific line in one location. Further, it
allows the government to order files from the providers of communications services with details
about specific customers' use of the service. For example, an Internet service provider can be
ordered to provide in ...
Krempley 1
POL 300
Google/Multi-National Corporations, International Surveillance, and Human Rights
Abstract
The many news reports on cyber security, identity theft, Wikileaks, and NSA intelligence gathering programs over the past few years have shown the international community that the World Wide Web is anything but a safe place to store sensitive information, or any information for that matter. This study will examine how closely multi-national corporations in the information technology sector, such as Google, are involved with national governments on these issues. The study will analyze events in the U.S. and China and attempt to uncover whether or not these have directly infringed upon peoples’ basic human rights.
Question
With emerging information regarding the NSA's PRISM program and China's "Golden Shield Project", has either country directly infringed on peoples' basic human rights?
Hypothesis
As more information is uncovered regarding the true nature of the aims of these internationally implemented programs, it has become increasingly clear that there have been multiple violations of peoples' human rights in both the United States and China with their respective monitoring programs.
The NSA and the PRISM Project
"Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information on both foreign subjects and US citizens. Some of these surveillance programs, including a secret program called PRISM, capture the private data of citizens who are not suspected of any connection to terrorism or any wrongdoing." (Sottek&Kopstein, 2013) Under the guise of a "war on terror", the United States government has consistently upped its efforts to gather as much information as possible regarding the activities of international and domestic citizens alike. Most U.S. citizens were wholly unaware that the government had been running a secret filtration program to determine threat levels of individual citizens both domestically and abroad. This PRISM project and its intentions have recently been leaked in the Edward Snowden fiasco that took the country and the media by storm.
"PRISM is a tool used by the US National Security Agency (NSA) to collect private electronic data belonging to users of major internet services like Gmail, Facebook, Outlook, and others. It’s the latest evolution of the US government’s post-9/11 electronic surveillance efforts, which began under President Bush with the Patriot Act, and expanded to include the Foreign Intelligence Surveillance Act (FISA) enacted in 2006 and 2007." (Sottek&Kopstein, 2013) FISA, "...may be the most powerful court you have never heard of -- operating out of a bunker-like complex blocks from the Capitol and the White House -- sealed tightly to prevent eavesdropping.The FISA Court's larger mission is to decide whether to grant certain types of government requests-- wiretapping, data anal ...
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
Government Employs Backdoor Searches ACSB standards: Social and Ethical Issues, Technology in Society he Central Intelligence Agency (CIA) conducts foreign covert operations, counterintelligence operations, and collects and analyzes foreign intelligence for the president and his staff to aid in national ecurity decisions. The National Security Agency (NSA) is responsible for global monitoring, collection, and processing of information for foreign intelligence and counterintelligence purposes. The Federal sureau of Investigation ( FBI ) conducts domestic counterintelligence and counterterrorism operations in addition to its role as the lead law enforcement agency in the country. hese three agencies have implemented sophisticated programs to capture, store, and analyze electronic communications. The Downstream program (formerly called PRISM) extracts data from the ervers of nine major American Intemet companies including AOL, Apple, Facebook, Google, Microsof, Paltalk, Skype, Yahoo, and YouTube to obtain direct access to audio, video, photographs, emails, ocuments, and connection logs for each of these systems. The Upstream program taps into the infrastructure of the Internet to capture the online communications of foreigners outside the United States ulile their communications are in transit. The leaders of the intelligence agencies argue that these programs are essential to fighting terrorism. The agencies can also provide a dozen or more examples of ow use of the data gathered by these programs has thwarted the efforts of terrorists around the world. he programs are authorized by Section 702 of the FISA Amendments Act which authorizes surveillance of any foreigner overgeas, provided the purpose is to obtain "foreign intelligence " The Act loosely efines "foreign intelligence" to mean any information that "relates to" the conduct of foreign affairs. This broad definition mears that the target being survelled need not be a terrorist. The target needs only be thought to have information that is relevant to the government's foreign intelligence objective-whatever that may be. he process of gathering foreign electronic communications necessarily means the incidental capture of many conversations involving an American (who may be here in the United States) and a foreign arget. They may well be having a totally innocent communication with a foreign triend, relative, or business partner who is not suspected of any wrongdoing whatsoever. The total number of Americans' ommunications "incidentally" collected since the inception of Section 702 is well into the millions. fection 702 also allows the government to pool all the messages it intercepts into a giant database and then search the database, including conversations involving Americans - without a warrant. Varrantless survelliance of communications between Americans and foreigners is known as a "backdoor search because it effectively evades other provisions of United States law that require an ndiv.
Rapid7 Report: Data Breaches in the Government SectorRapid7
Rapid7, the leading provider of security risk intelligence solutions, analyzed data collected and categorized by the Privacy Rights Clearinghouse Chronology of Data Breaches. Using this data, the company outlined patterns for government data breaches, including year, month, location and breach type patterns. This information and tips for protecting infrastructure can ensure that government IT environments stay protected against malicious attacks and unintended disclosure.
Criteria Ratings PointsThreadContent18 to 16 ptsCruzIbarra161
Criteria Ratings Points
Thread:
Content
18 to >16 pts
Advanced
Posts display clear
content mastery while
analyzing/evaluating
each of the assigned
prompts.
Posts are critical in their
approach to each of the
assignment prompts,
providing evidence of
clear thinking, analytical
insight, and relevant
research.
16 to >13 pts
Proficient
Posts address each of
the assigned prompts,
yet with modest
evidence of subject
mastery or analytical
insight.
Posts are satisfactory,
but do not provide
evidence of clear
reasoning or critical
analysis based on
careful research or
current literature
13 to >0 pts
Developing
Posts are loosely related to or
neglect 1 or more of the
assigned prompts. Posts do
not effectively develop the
discussion or move beyond
minimal or superficial
understanding of the topic.
Posts show a clear bias, or
do not provide a discernible
position on the issue.
Evidence of research is not
present.
0 pts
Not Present
18 pts
Reply:
Content
17 to >15 pts
Advanced
There are at least two
replies. Unique
contributions are made
to the discussion that
move the conversation
forward, beyond the
content of the original
post.
15 to >12 pts
Proficient
There are at least two
replies. Contributions
are made to the
discussion that generally
move the conversation
forward, beyond the
content of the original
post.
12 to >0 pts
Developing
Missing one reply and/or the
contributions made are
minimal, superficial, or
derivative in nature.
0 pts
Not Present
17 pts
Grammar
and
Spelling
15 to >12 pts
Advanced
Work is presented with
fewer than 2 errors in
grammar or spelling.
Minimal errors (1-2)
noted in Turabian
formatting or word count
requirements (400–500
for initial posts and
200–250 for each
response).
12 to >10 pts
Proficient
Posts contain fewer than
5 errors in grammar or
spelling.
Few errors (3-4) noted in
Turabian formatting
and/or word count
requirements.
10 to >0 pts
Developing
Posts contain fewer than 8
errors in grammar or spelling
that distract the reader from
the content.
Numerous errors (5+) noted
in Turabian formatting and/or
word count requirements.
0 pts
Not Present
Numerous
errors to
the point of
being
unreadable.
15 pts
Total Points: 50
Discussion Grading Rubric | PPOG540_D01_202140
CHAPTER 5
Society
Dateline: NSA Electronic Surveillance
Observers are divided over the role that the public should play in making foreign policy. James Bollington argues for an active and involved public: “International affairs cannot be a spectator sport. . . . Many must be involved; many more persuaded.”1 Walter Lippmann presents the opposite position: “The people have imposed a veto upon the judgment of the informed and responsible officials. . . . They have compelled the governments . . . to be too late with too little, or too long with too much.”2 This disagreement is very much in evidence in the controversy surrounding Edward Snowden’s June 2013 leak of documents reporting the existence of a secret National Secu ...
Dea has more extensive domestic phone surveillance op than nsaWorld Truth
For at least six years, US anti-drug agents have used subpoenas to routinely gain access to an enormous AT&T database. It’s an intrusion greater in scale and longevity than the NSA’s collection of phone calls, revealed by Edward Snowden’s leaks.
House rejects nsa spying restrictions after white house outcryWorld Truth
The US House of Representatives voted on Wednesday to reject an attempt to reign in domestic spying by the National Security Agency following a storm of lobbying by the White House against the measure.
In a 205-217 vote the House defeated an amendment introduced by Rep. Justin Amash (R-Michigan) which would have prevented the NSA from collecting the phone data of individuals not currently under investigation.
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
Running head: THE FUTURE OF ORGANIC FOOD.
Surname 7
Name:
Instructor:
Course:
Course code:
Digital Bill of Rights and Online Privacy
Introduction
The primary aim of enacting the United States’ Bill of Rights was to offer protection to individual liberties and limit the government powers in conducting unwarranted searches or seizures. In ensuring people’s privacy online, the government must continuously create awareness and re-educate the American citizens concerning the control measures put in place to collect security information from people. As the world advances digitally, people are transferring more of their personal information online and are becoming tech-savvy. Therefore protecting people’s private information in the digital space should be an important role for the government. Milanovic (38) explains that as Americans continue digitizing and collaborating on social networking sites, the question on every person’s mind is; is our privacy and freedom to use the digital space protected?
Thesis Statement
According to the enacted Bill of Rights, American people have the rights to enjoy online freedom, security and unlawful search and seizures.
People Have Rights to Enjoy Online Freedom and Privacy
Personal data breaches have become common, peoples’ televisions are sometimes used in recording their conversations, and criminals are hacking emails and occasionally being monitored by law enforcement. According to Acquisti, Alessandro, Brandimarte and Loewenstein (22), online freedom and privacy of Americans are always in jeopardy. The government of United States must create an atmosphere where people enjoy online privacy and freedom. There are several reasons why people must be allowed to enjoy online privacy and freedom.
The question many people ask is why does online freedom and privacy matter? Most times commenters and criminal justice-especially the courts struggle articulating why privacy is valuable. While research and Bill of Rights demonstrate why online privacy and freedom is essential for the average American, stakeholders, and civil society groups to continue explaining why people must be let to enjoy their freedom online. Additionally, as people enjoy online independence, the government must come up with strategies aimed at protecting such liberties and private information.
Firstly online privacy and freedom are vital because it limits government power. Online privacy puts a limit on government power and the power of private sector organizations (Angwin 27). The more the government knows about its citizens, the more power they can have control over its people. People can misuse personal data and affect reputations, and it can also be used in influencing the decisions and shape behavior (Fisher 192). When the government and private sector organizations have access to people’s online private information, it can be used as a tool to exercise control over the people.
When private and personal information gets into the ...
Intelligence chief defends internet spying programabiross34
WASHINGTON (AP) — Eager to quell a domestic furor over U.S. spying, the nation’s top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen. He decried the revelation of that and another intelligence-gathering program as reckless.
For the second time in three days, Director of National Intelligence James Clapper took the rare step of declassifying some details of an intelligence program to respond to media reports about counterterrorism techniques employed by the government.
‘‘Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection,’’ he said in a statement.
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Nicholas Tancredi
Capstone project for a 12-week online course with the International Association of Crime Analysts. My topic was on how crime and intelligence analysts are using open source intelligence (OSINT) to investigate Internet crime.
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
OpenAI, Google and Meta ignored corporate policies, altered their own rules and discussed skirting copyright law as they sought online information to train their newest artificial intelligence systems.
I have never seen any movie like it, ever. There are no words. Simply, “The Zone of Interest” is the greatest meditation ever made on film about the banality of evil and the capacity of human beings to be indifferent towards cruelty that beggars imagination.
Kai-Fu Lee, an AI expert and prominent investor who helped Google and Microsoft get established in China, says his new startup 01.AI will create the first “killer apps” of generative AI.
Previously redacted portions of the Federal Trade Commission’s lawsuit against Amazon allege Bezos gave the go-ahead to make search results worse in favor of increasing advertising revenue
Alleged censorship of social media and disruptions to electricity and internet access have meant people under fire in Gaza can’t get the information they need to survive.
A flood of false information, partisan narratives, and weaponized “fact-checking" has obscured efforts to find out who’s responsible for an explosion at a hospital in Gaza.
He wrote a book on a rare subject. Then a ChatGPT replica appeared on Amazon.
From recipes to product reviews to how-to books, artificial intelligence text generators are quietly authoring more and more of the internet.
ChatGPT invented a sexual harassment scandal and named a real law prof as the accused. The AI chatbot can misrepresent key facts with great flourish, even citing a fake Washington Post article as evidence.
More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP (20)
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
How America’s surveillance networks helped the FBI catch the Capitol mob
1. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 1 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
How America’s surveillance
networks helped the FBI catch the
Capitol mob
Federal documents detailing the attacks at the U.S.
Capitol show a mix of FBI techniques, from license
plate readers to facial recognition, that helped
identify rioters. Digital rights activists say the
invasive technology can infringe on our privacy.
Craig Timberg
A statement-of-facts document presented to the U.S. District Court for the District of Columbia against Garret
Miller. Prosecutors determined Miller's whereabouts before his arrest by tracking his phone, one of many
technologies the FBI said it used to gather evidence against people it alleges took part in the Jan. 6 riot at the
U.S. Capitol. (Jon Elswick/AP)
2. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 2 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
Debra Maimone pulled down her American flag mask for a moment on
Jan. 6 and gazed at the unruly mob of supporters of President Donald
Trump overrunning the U.S. Capitol.
“Put your mask on,” warned her fiance, as the couple stood beneath an
unblinking array of surveillance cameras. “I don’t want them to see you.”
That scene, recorded in a cellphone video Maimone posted to the social
media site Parler, helped FBI agents identify the Pittsburgh-area couple
and pinpoint their location inside the Capitol, FBI agents said in a federal
criminal complaint filed before Maimone’s arrest last month.
Video cameras mounted throughout the complex also captured the pair
from 10 different angles, the complaint says, as they allegedly stormed
the halls of Congress, rummaged through a police bag and made off with
protective equipment that Senate officials kept on hand in case of a
chemical attack.
Their case is among more than 1,000 pages of arrest records, FBI
affidavits and search warrants reviewed by The Washington Post detailing
one of the biggest criminal investigations in American history. More than
300 suspects have been charged in the melee that shook the nation’s
capital and left five people dead.
The federal documents provide a rare view of the ways investigators
exploit the digital fingerprints nearly everyone leaves behind in an era of
pervasive surveillance and constant online connection. They illustrate the
power law enforcement now has to hunt down suspects by studying the
contours of faces, the movements of vehicles and even conversations
with friends and spouses.
But civil liberties groups warn that some of these technologies threaten
Americans’ privacy rights. More than a dozen U.S. cities have banned local
police or government officials from using facial recognition technology,
3. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 3 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
and license plate readers have sparked lawsuits arguing that it is
unconstitutional to constantly log people’s locations for government
review, with scant public oversight.
“Whenever you see this technology used on someone you don’t like,
remember it’s also being used on a social movement you support,” said
Evan Greer, director of the digital rights advocacy group Fight for the
Future. “Once in a while, this technology gets used on really bad people
doing really bad stuff. But the rest of the time it’s being used on all of us,
in ways that are profoundly chilling for freedom of expression.”
The cache of federal documents lays out a sprawling mix of FBI
techniques: license plate readers that captured suspects’ cars on the way
to Washington; cell-tower location records that chronicled their
movements through the Capitol complex; facial recognition searches that
matched images to suspects’ driver’s licenses or social media profiles;
and a remarkably deep catalogue of video from surveillance systems, live
streams, news reports and cameras worn by the police who swarmed the
Capitol that day.
Agents in nearly all of the FBI’s 56 field offices have executed at least 900
search warrants in all 50 states and D.C., many of them for data held by
the telecommunications and technology giants whose services underpin
most people’s digital lives. The responses supplied potentially
incriminating details about the locations, online statements and identities
of hundreds of suspects in an investigation the Justice Department called
in a court motion last month “one of the largest in American history, both
in terms of the number of defendants prosecuted and the nature and
volume of the evidence.”
“If the event happened 20 years ago, it would have been 100 times harder
to identify these people,” said Chuck Wexler, executive director of the
Police Executive Research Forum, a D.C.-based think tank. “But today it’s
almost impossible not to leave your footprints somewhere.”
4. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 4 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
QAnon reshaped Trump’s party and radicalized believers. The Capitol
siege may just be the start.
The federal documents cite evidence gleaned from virtually every major
social media service: Parler is mentioned in more than 20 cases, Twitter in
more than 60 and Facebook in more than 125. On Snapchat, a woman
posted videos “bragging about the attack,” according to one criminal
complaint. In another, a man was said to have posted video to TikTok of
himself fighting with National Guard members and getting pepper-
sprayed.
In at least 17 cases, the federal documents cite records from
telecommunications giants AT&T, Verizon or T-Mobile, typically after
serving search warrants for a range of subscriber data, including
cellphone locations.
Investigators also sent “geofence” search warrants to Google, asking for
the account information of any smartphone Google had detected on Jan.
6 inside the Capitol via GPS satellites, Bluetooth beacons and WiFi access
points. Investigators then compiled an “exclusion list” of phones owned by
people who were authorized to be in the Capitol on Jan. 6, including
members of Congress and first responders. Everyone else was fair game.
Federal officials filed similarly broad search warrants to Facebook,
demanding the account information associated with every live stream that
day from inside the vast complex.
One warrant targeting Brandon Miller, an Ohio man who wrote on
Facebook that he had traveled to Washington to “witness history,” yielded
his Facebook posts, credit card information, phone number and home Zip
code, giving FBI agents the clues necessary to later match his photo to
Capitol surveillance camera footage and his Ohio driver’s license.
When Miller was asked on Facebook the day after the riots whether he
5. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 5 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
and his wife, Stephanie, had gotten into trouble, he had written back, “No
not yet anyway lol,” a criminal complaint shows.
But data from a Google search warrant allowed FBI agents to map the
exact locations of their phones that day — from the point where rioters
smashed into the Senate chamber, to the speaker’s office in the heart of
the Capitol, according to the complaint. Another search warrant to their
cellular carrier, AT&T, added additional information about their
whereabouts, plus their names and home address. Stephanie Miller’s
attorney declined to comment, and Brandon Miller’s attorney did not
respond to requests for comment.
License plate readers and facial recognition software together played a
documented role in helping identify suspects in nearly a dozen cases, the
federal records show. In many cases, agents used existing government
contracts to access privately maintained databases that required no court
approval. In several cases, including for facial recognition searches, it’s
unclear what software the government used to build the cases for arrests.
The FBI declined to comment for this story. The incidents described
remain allegations, with none of the cited cases having been adjudicated
yet. In most cases, suspects’ attorneys have not yet filed defenses against
charges that in many instances are only a few weeks old, court records
show.
Many cases also hinge on imperfect technology and fallible digital
evidence that could undermine prosecutors’ claims. Blurry license plate
reader images, imprecise location tracking systems, misunderstood social
media posts and misidentified facial recognition matches all could muddy
an investigation or falsely implicate an innocent person.
Fruitless efforts to hide
Many of the Trump supporters who marauded through the Capitol that
6. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 6 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
day showed little interest in concealing their presence, posting selfies,
gloating on Twitter and sharing video of chaotic violence and ransacked
hallways. James Bonet, of Upstate New York, uploaded a Facebook video
of himself inside the Capitol’s halls, allegedly smoking a joint, a criminal
complaint states. And Dona Bissey, an Indiana follower of the extremist
ideology QAnon, posted a location-tagged photo of herself and her
friends to a publicly available Facebook page: “Picking glass out of my
purse,” she wrote, according to a charging document. “Best f---ing day
ever!!”
Others, however, attempted to hide their identities and throw off
investigators afterward, according to FBI agents’ claims. Suspects
covered their faces, switched hats during the day and threatened family
members and witnesses to keep quiet afterward, the criminal complaints
allege. They deleted social media accounts, hid out in hotels or ditched
potentially incriminating phones, according to the documents. One
suspect stopped using a car he feared might be on authorities’ radar, the
federal documents show, while another said he “fried” his electronics in a
microwave. The FBI’s surveillance efforts found them anyway.
‘Nothing can stop what’s coming’: Far-right forums that fomented Capitol
riots voice glee in aftermath
One man from New York’s Hudson Valley, William Vogel, had his round-
trip voyage to D.C. photographed by license plate readers at least nine
times on Jan. 6, from the Henry Hudson Bridge in the Bronx at 6:06:08
that morning to Baltimore’s Harbor Tunnel Thruway at 9:15:27 a.m. and
back to the George Washington Bridge in Fort Lee, N.J., at 11:59:22 that
night, a criminal complaint claims.
Vogel generated more evidence of his presence inside the Capitol with a
set of videos he posted to Snapchat, the complaint said. And though no
license plate scanners captured his car in D.C., they offered other clues to
his movement: A photo that morning from a stretch of Interstate 95
7. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 7 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
northeast of Baltimore showed a comically oversized “Make America
Great Again” hat on Vogel’s dashboard. Agents said in the complaint that
they later matched it to a Facebook selfie in which he appeared to be
wearing “the same large red hat.”
Installed on thousands of streetlights, speed cameras, toll booths, police
cars and tow trucks across the United States, the scanners record every
passing vehicle into databases run by contractors such as Vigilant
Systems, which reports that it has recorded 5 billion license plate
locations nationwide. In Maryland alone, government and police scanners
captured more than 500 million plates last year, state data shows.
Dominick Madden, a New York City sanitation worker who was on sick
leave when he allegedly stormed the Capitol, had his car’s license plate
scanned half a dozen times in his round-trip journey to Washington, a
criminal complaint states. Madden was also allegedly caught on video
walking through the Capitol’s Senate wing in a blue QAnon sweatshirt. He
has pleaded not guilty, and his attorney did not respond to requests for
comment.
In many cases, the documents quote suspects expressing confidence that
they had slipped beyond the FBI’s grasp. When an unnamed Parler user
warned Maimone — the Pittsburgh-area woman with the American flag
mask — that authorities would be arresting anyone who entered the
Capitol building illegally on Jan. 6, she dismissed the idea through her
account, “TrumpIsYourPresident1776.”
“Lmao yaaaaaaaaaa sure thing buddy!” she wrote in an exchange cited in
the criminal complaint charging Maimone with theft, violent entry and
disorderly conduct on Capitol grounds. A D.C. judge signed a warrant for
her arrest last month.
Authorities submitted a Parler video taken on Jan. 6 as evidence against Debra J. Maimone, who is alleged to
have illegally entered the U.S. Capitol. (TWP)
8. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 8 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
FBI agents got help identifying Maimone and her fiance, Philip Vogel (no
known relation to William Vogel), by manually comparing his voice and
hand tattoos to a Pittsburgh TV news report from last year, during which
he talked of being rescued one night after his fishing boat hit a log and
capsized, the federal complaint said.
Investigators also matched Vogel’s gray beanie to a photo he and
Maimone had posted to the Yelp profile of their contracting business,
according to the complaint. And they matched his scarf to one he’d worn
in a selfie posted to his Facebook account in which he celebrated catching
a “monster” fish in the Potomac River one day after the riot.
Attorneys for Maimone and Vogel declined to comment. The couple have
been released from custody after they each paid $10,000 in bond and
agreed to “stay away from D.C.,” court records show.
Other alleged insurrectionists ended up helping investigators even as they
attempted to cover their tracks, FBI agents wrote in charging documents.
One man entered the Capitol wearing a dark cowboy hat and a large
respirator that covered all but his eyes and forehead. But he also took a
selfie beneath a marble statue of the nation’s seventh vice president, John
C. Calhoun, a fixture of the large “crypt” room beneath the Capitol
Rotunda. A tipster who received the photo forwarded it to the FBI, a
criminal complaint said, along with a suggested name: Andrew Hatley.
Hatley denied participating in the attack, writing on Facebook: “It has
come to my attention that there was someone who looks like me at the
Capitol. I’d like to set the record straight. I don’t have that kind of
motivation for lost causes. I just don’t care enough anymore, certainly not
enough for all that.”
But he allegedly left evidence to the contrary in the logs of a social media
app, Life360, often used by family members to keep track of each other.
When a tipster told FBI agents that Hatley had the app on his smartphone,
9. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 9 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
they sent a search warrant to Life360 days after the attack. Investigators
said in the complaint that they then plotted Hatley’s travels on “an
electronic map of Washington, D.C.” based on the company’s logs.
In the just-the-facts style of FBI documents, investigators alleged the
evidence erased any doubts: “The data confirms that HATLEY’s cellular
telephone was at the U.S. Capitol Building during the events described
above on January 6, 2021.” Hatley’s attorney and Life360 declined to
comment.
Pro-Trump forums erupt with violent threats ahead of Wednesday’s rally
against the 2020 election
In another case, an FBI agent wrote in a criminal affidavit that a “self-
professed white supremacist” from Maryland, Bryan Betancur, had asked
his probation officer for permission to leave the state on Jan. 6 to hand
out Bibles in D.C. with an evangelical group. But Betancur’s court-ordered
ankle monitor gave him away, the affidavit claimed, by posting his minute-
by-minute location — from Trump’s rally at the White House Ellipse to the
Capitol’s steps — to a website investigators could track in real time. He
was arrested on Jan. 17, nine days after he told his probation officer he
believed the FBI was watching him.
Attorneys for Bissey and William Vogel declined to comment. Attorneys for
Betancur and Bonet did not respond to requests for comment.
1 phone, 12,000 pages of evidence
The documents highlight just how much digital evidence an ordinary
person sheds in everyday life: In one case, prosecutors said they gathered
more than 12,000 pages of data from a suspect’s phone using Cellebrite,
a tool popular with law enforcement for its ability to penetrate locked
phones and copy their contents. The search also recovered 2,600 pages
of Facebook records and 800 cellphone photos and videos.
10. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 10 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
The FBI said it tracked down suspected rioters who had tried
unsuccessfully to evade prosecution. In an affidavit supporting a search
warrant application, an FBI agent said that a relative of Zachary Alam had
told investigators he could be seen in video bashing some glass inside the
Capitol with his helmet and that he was on the run with no intention of
turning himself in. Agents got a D.C. judge to issue a “ping order” for his
cellphone, which had been registered with T-Mobile under the name of
Superman’s alter ego, Clark Kent, the affidavit said. That ping order
allegedly pinpointed Alam’s location to Room 17 of the Penn Amish Motel
in rural Pennsylvania. FBI agents arrested him there the next day.
Apple also gave investigators details of Alam’s iCloud account, including
his home address, log-in information and the registration dates for his
iPhone 7 and MacBook Air, the affidavit said. The tech giant was cited in
several cases where agents seized suspects’ iPhones, but no document
reviewed by The Post showed Apple providing detailed location data, as
had Google and Facebook.
Others moved to cover their tracks far too late. After days of tweeting
death threats to lawmakers and sharing Capitol selfies, saying he had “just
wanted to incriminate myself a little lol,” Garret Miller (no known relation to
Brandon Miller) had voiced a hint of caution by writing a Facebook post
saying that “it might be time for me to … be hard to locate,” a criminal
complaint states.
‘I’ll get away with anything’: 13 not-so-greatest hits from the Capitol riot
arrest records
That same day, agents obtained a search warrant for his cellphone’s
location data, which showed that his phone was inside his Dallas home.
When agents arrested him there on Inauguration Day, Miller was wearing a
shirt with Trump’s face on it that read, “I Was There, Washington D.C.,
January 6, 2021,” according to a filing by prosecutors last month opposing
Miller’s release. Miller’s attorneys did not respond to requests for
11. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 11 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
comment.
Another suspected rioter, Damon Beckley, told Louisville TV station WDRB
that he deleted his Facebook account and removed his phone’s SIM card
in hopes of evading the FBI. But agents said in a search warrant
application that they were still able to match his face in cellphone videos
and Capitol photos to his Kentucky driver’s license. (Federal investigators
in Kentucky and other states are legally authorized to view state
Department of Motor Vehicles records, no subpoena required.)
Investigators also filed a 33-page search warrant with Facebook
demanding virtually everything Beckley had done on the site dating back
to Nov. 1: all messages, draft messages, posts, comments, photos, videos,
audio recordings, video calls, “pokes,” “likes,” “tags,” searches, location
check-ins, privacy settings, session times and durations, calendar items,
event postings (past and future), friend requests (approved and rejected),
address books, friend lists and relationship status updates, as well as all
dates, times, IP addresses, location information and other metadata linked
to each item, plus any information he’d shared with the company,
including his passwords, security questions, home address, phone
number and any linked credit cards or bank accounts.
Beckley’s attorney declined to comment. In a Facebook post cited in the
warrant, Beckley defended his presence inside the Capitol by writing that
he had been “shoved in by Antifa.”
Outside help with facial recognition
In a Facebook video captioned “Peacefully storming the Capital,” a man
could be seen shouting, “In the Capitol baby, yeah!” as he joined a mob
pushing past broken glass and into the building’s threshold, according to a
criminal complaint. The FBI’s Operational Technology Division in Quantico,
Va., ran that image through the bureau’s facial recognition search tool,
which matched it to the California driver’s license photo of Mark Simon,
12. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 12 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
whom agents called a “known activist” from Huntington Beach. He was
arrested in California in January. His attorney did not respond to requests
for comment.
Authorities submitted a Facebook Live video taken on Jan. 6 as evidence against Mark S. Simon, who is alleged
to have illegally entered the U.S. Capitol. (TWP)
Investigators went beyond official databases as well, the documents say.
An amateur “sedition hunter” tweeted that the same man seemed to
appear in two videos blasting a chemical spray at officers outside the
Capitol and later talking about the clash while wearing camouflage pants
and a “Guns Save Lives” sticker inside the lobby of an Arlington hotel,
according to a criminal complaint.
Agents said they pulled the hotel’s booking reservations, then compared
driver’s license photos to the alleged rioter on the video, whom they
identified as a Texas man named Daniel Ray Caldwell. In a detention
hearing after Caldwell’s arrest, the FBI agent testified that he also “used
facial recognition technology to determine whether a picture of
Defendant’s face matched with any video on the Internet,” and that the
unidentified “software independently found a match” between Caldwell’s
photo and the hotel video, according to a magistrate judge’s order last
month.
The FBI declined to comment on its facial recognition techniques.
Caldwell’s attorney did not respond to requests for comment.
Some cases hinged on facial recognition tips submitted to the FBI by
outside agencies. After the FBI published “be on the lookout” bulletins
with suspects’ photos, officials at the Harford County state’s attorney’s
office in Maryland ran one of the images, of a man inside the Capitol with
his mask sunk beneath his chin, through an unnamed piece of facial
recognition software, according to a criminal complaint. The tool returned
the face of Robert Reeder, smiling for a Maryland driver’s license photo in
13. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 13 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
a gray hoodie like the one the suspect had worn on Jan. 6.
An FBI agent said in the complaint that Reeder cooperated several days
later by handing over a mix of photos and videos from his phone showing
himself and others surging through the Capitol. Reeder’s attorney
declined to comment.
Massive camera hack exposes the growing reach and intimacy of
American surveillance
Increasingly pervasive use of facial recognition by local police forces also
helped fuel the FBI’s nationwide manhunt. After the FBI began asking for
help by circulating bulletins with suspects’ images, 12 detectives and
crime analysts with the Miami Police Department began running the
photos through Clearview AI, a facial recognition tool built on billions of
social media and public images from around the Web.
Officers signed a contract with the tool’s creators last year, hoping for a
potential breakthrough: Their other facial recognition search only looks
through official photos, such as jail mug shots. But Clearview has faced
lawsuits from advocacy groups arguing its technology violates privacy
rights, and Google and Facebook have demanded the company stop
copying their photos into its searchable database.
The Miami police team has run 129 facial recognition searches through
Clearview and sent 13 possible matches to FBI agents for further
investigation, said Armando R. Aguilar, assistant chief of the department’s
Criminal Investigations Division, adding, “We were happy to help however
we could.”
Clearview AI’s chief executive, Hoan Ton-That, declined to provide
specifics but said in a statement to The Post that “it is gratifying that
Clearview AI has been used to identify the Capitol rioters who attacked
our great symbol of democracy.”
14. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 14 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
A passport application and a bank video
Unlike many of the Capitol insurrectionists, Philip Grillo had not
immediately given himself away: He wore a mask, did not live-stream
himself committing crimes, and stormed the Capitol shouting, “Fight for
Trump” while holding a cellphone registered in his mother’s name.
But that did not stop the FBI, as agents alleged in a criminal complaint:
After two tipsters called the bureau, saying they recognized Grillo on TV,
agents trawling through Capitol surveillance camera footage spotted him
leaping through a broken window and taking a selfie inside the Rotunda,
his mask around his neck.
They compared his face on the video to a photo from Grillo’s application
for a passport in 2017, the complaint shows, and they matched his
embroidered Knights of Columbus jacket with one spotted in a YouTube
clip of a violent brawl.
The agents said in the complaint that they also used a Verizon search
warrant to determine that Grillo’s phone had been inside the Capitol, and
they scanned license plate reader data from D.C. to New York, where he
had been a Republican Party official in Queens: His Chevrolet Traverse
had been spotted leaving New York City the night before and recorded
near the Capitol at 2 a.m. the morning of the riot.
Later, photographers spotted Grillo leaving a federal court building in
Brooklyn, using a hoodie to cover his face. His attorney declined to
comment.
The FBI also has been aided by the online army of self-proclaimed
“sedition hunters,” like the one who helped identify Caldwell. They
scoured the Web for clues to track down rioters and often tweeted their
findings publicly in what amounted to a crowdsourced investigation of the
Capitol attack. The citizen sleuths organized their pursuits with hashtags:
15. 8/4/21, 10:14 PM
The FBI's Capitol riot investigation used surveillance technology that advocates say threatens civil liberties - The Washington Post
Page 15 of 15
https://www.washingtonpost.com/technology/2021/04/02/capitol-siege-arrests-technology-fbi-privacy/
One man, Clayton Mullins, a Kentucky car dealer whose alleged assault of
a police officer was captured on YouTube video, was given the viral
hashtag “#slickback” for the way he wore his hair.
From that video, a tipster pointed the FBI to Mullins’s Kentucky driver’s
license photo, which allowed FBI investigators to figure out where he had
a bank account, according to a criminal complaint. In February, an agent
talked to a bank employee, who not only told them Mullins had been there
a day before but queued up surveillance video of him talking to a teller,
wearing no mask and with his dark hair pushed back in that signature
slick.
Mullins, whose attorney declined to comment, was released from federal
custody last month on the condition that he not leave his home in western
Kentucky, court filings show. His detention will be enforced by a location-
tracking GPS monitor.
Spencer S. Hsu, Matt Kiefer and Julie Tate contributed to this report.