[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
DHS MONITORING OF SOCIAL NETWORKING AND MEDIA: ENHANCING INTELLIGENCE
GATHERING AND ENSURING PRIVACY
=======================================================================
HEARING
before the
SUBCOMMITTEE ON COUNTERTERRORISM
AND INTELLIGENCE
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
SECOND SESSION
__________
FEBRUARY 16, 2012
__________
Serial No. 112-68
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED] CONGRESS.13
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
76-514 WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Jackie Speier, California
Joe Walsh, Illinois Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania Hansen Clarke, Michigan
Ben Quayle, Arizona William R. Keating, Massachusetts
Scott Rigell, Virginia Kathleen C. Hochul, New York
Billy Long, Missouri Janice Hahn, California
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
Michael J. Russell, Staff Director/Chief Counsel
Kerry Ann Watkins, Senior Policy Director
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE
Patrick Meehan, Pennsylvania, Chairman
Paul C. Broun, Georgia, Vice Chair Jackie Speier, California
Chip Cravaack, Minnesota Loretta Sanchez, California
Joe Walsh, Illinois Brian Higgins, New York
Ben Quayle, Arizona Kathleen C. Hochul, New York
Scott Rigell, Virginia Janice Hahn, California
Billy Long, Missouri Bennie G. Thompson, Mississippi
Peter T. King, New York (Ex (Ex Officio)
Officio)
Kevin Gundersen, Staff Director
Zachary Harris, Subcommittee Clerk
Hope Goins, Minority Subcommittee Director
C O N T E N T S
----------
Page
Statements
The Honorable Patrick Meehan, a Representative in Congress From
the State of Pennsylvania, and Chairman, Subcommittee on
Counterterrorism and Intelligence.............................. 1
The Honorable Jackie Speier, a Representative in Congress From
the State of California, and Ranking Member, Subcommittee on
Counterterrorism and Intelligence.............................. 3
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security.............................................. 4
Witnesses
Ms. Mary Ellen Callahan, Chief Privacy Officer, Department of
Homeland Security:
Oral Statement................................................. 10
Joint Prepared Statement....................................... 12
Mr. Richard Chavez, Director, Office of Operations Coordination
and Planning, Department of Homeland Security:
Oral Statement................................................. 16
Joint Prepared Statement....................................... 12
For the Record
The Honorable Patrick Meehan, a Representative in Congress From
the State of Pennsylvania, and Chairman, Subcommittee on
Counterterrorism and Intelligence:
Statement of Marc Rotenberg, President, and Ginger McCall,
Staff Counsel, The Electronic Privacy Information Center
(EPIC)....................................................... 6
Appendix
Letter Submitted to Chairman Patrick Meehan From Mary Ellen
Callahan and Richard Chavez.................................... 39
Questions Submitted by Ranking Member Bennie G. Thompson for Mary
Ellen Callahan and Richard Chavez.............................. 40
DHS MONITORING OF SOCIAL NETWORKING AND MEDIA: ENHANCING INTELLIGENCE
GATHERING AND ENSURING PRIVACY
----------
Thursday, February 16, 2012
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Counterterrorism and Intelligence,
Washington, DC.
The subcommittee met, pursuant to call, at 10:04 a.m., in
Room 311, Cannon House Office Building, Hon. Patrick Meehan
[Chairman of the subcommittee] presiding.
Present: Representatives Meehan, Cravaack, Quayle, Long,
Speier, Thompson, and Hahn.
Mr. Meehan. Good morning. I get to do this, which indicates
that the Committee on Homeland Security's Subcommittee on
Counterterrorism and Intelligence will come to order.
The subcommittee is meeting today to hear testimony
regarding tactics that are employed by the Department of
Homeland Security to monitor social networking and media to
enhance intelligence gathering, while at the same time
protecting privacy. I would like to welcome everyone to today's
hearing, and I look forward to hearing from today's witnesses
on this very, very important issue.
Over the last year, this subcommittee has had hearings on a
multitude of terror-related threats, particularly focusing on
those that have influence on the homeland, including those
posed by Hezbollah, AQAP, and Boko Haram, to be specific. A
common theme that has emerged among many of these is the
groups' use of social media and networking to recruit, to plan,
to plot attacks against the homeland or U.S. interests abroad.
I emphasize that a lot of this was focused on foreign-based
websites on which this activity was presumed to be taking
place.
In December, we held a hearing on the terrorists' use of
social media. While there was disagreement among the witnesses
on the effectiveness of that, we do know that terrorists use
social media. All agreed that terrorist groups used these tools
ultimately to their advantage.
However, the use of social media isn't confined to
terrorists. It is also a criminal issue and represents an
entirely new operating space for all sorts of bad actors. I saw
it as a Federal prosecutor. Social media is now used by
individuals who share pictures with family and friends, but it
is also used by terrorists or other kinds of criminals
operating everything from frauds to other kinds of bad acts.
I understand the importance of following leads wherever it
may take investigators. So if there are leads on a social media
or social network such as Twitter or Facebook, it may be
appropriate to follow them, so long as the Government activity
is consistent with the long-standing protections against
improper intrusions into protected areas of personal privacy.
Following leads means collecting intelligence, because,
ultimately, no terrorism or criminal investigation can be
effective without good intelligence. I understand and support
intelligence collection within the rules of the law.
In addition to following leads, social media provides a
forum for the Government to have situational awareness of
breaking events--something I know you spend a great deal of
time--terrorist attacks, natural disasters--where the
Department of Homeland Security is responsible for providing
real-time situational awareness and information sharing across
the Federal Government and down to the State and local
enforcement level, to first responders as well, in the event of
a terror attack or a natural disaster. For example, my good
friend on the committee, Mr. Long, who experienced tornadoes in
his district, may have an appreciation of the need for real-
time communication, sort of the virtual 9-1-1.
But, conversely, the Government can use tools to
communicate with people about disasters to enhance situational
awareness among the citizenry. In these cases, intelligence
collection and dissemination is a win-win for the Government
and the people.
But a few weeks ago, it was reported that the Department of
Homeland Security has instituted a program, and I quote: ``to
produce short reports about threats and hazards using publicly
available information.'' As I said, I support that. However, in
what I view as something that we have to determine whether it
crosses the line, these reports also revealed that DHS has
tasked analysts with collecting intelligence on any media
reports, ``that reflect adversely on the U.S. Government and
the Department of Homeland Security, including both positive
and negative reports on FEMA, CBP, ICE, among others.''
In one example, DHS used multiple social networking blogs,
including Facebook and Twitter, three different blogs, and
reader comments in newspapers to capture the reaction of
residents to a possible plan to bring Guantanamo detainees to a
local prison in Standish, Minnesota.
In my view, collecting and analyzing, disseminating private
citizens' comments could have a chilling effect on individuals'
privacy rights and people's freedom of speech and dissent
against their Government. I fully recognize that if an
individual willingly uses Facebook, Twitter, or the comments
section of a newspaper website, they, in effect, forfeit their
right to an expectation of privacy. However, other private
individuals reading your Facebook status updates is different
than the Department of Homeland Security reading them,
analyzing them, and possibly disseminating and collecting them
for future purposes. My guess is that the average American has
no problem with other private individuals reading their
voluntary on-line writings and postings in open forums but may
feel a bit of unease knowing the Federal Government may be
doing the same.
I fully recognize these are very complex and nuanced
issues, and that is why we are holding today's hearing. I look
forward to hearing from today's witnesses on how they are
collecting intelligence to keep us safe and aware, yet also
ensuring personal individual privacy.
The Chair now recognizes the Ranking Minority Member of the
subcommittee, the gentlewoman from California, Ms. Speier, for
any comments that she may have.
Ms. Speier. Thank you, Mr. Chairman. I would like to
associate my comments with yours. I think that they were
outstanding and really place a good frame on the discussion we
are going to have today.
I would also like to thank the witnesses who will be
testifying today.
You know, the explosion in the use of social media has
changed communication as we know it. With just the touch of a
button, millions of people can post and receive information
through Twitter, Facebook, blogs, and text messaging in an
instant. In just the short time that we have been sitting here
in this hearing, there have been over 3 million comments that
have been posted to Facebook and a half a million tweets that
have been sent.
Over the past year, we have seen the impact of using social
media first-hand. Last year, the Arab Spring was driven by
potesters who organized and communicated largely via social
media. We have also seen the power of social media here in the
United States over the past few months as protesters organize
via Twitter and Facebook for the Occupy Wall Street movements
throughout the country. We have seen bills before Congress
stopped in their tracks by the power of social media.
This growing universe of social networking presents great
challenges and opportunities to the mission at the Department
of Homeland Security as it works to keep our Nation safe.
Through this hearing, we hope to learn how the Department of
Homeland Security is harnessing the power of social media. Is
it possible that DHS could use social media to communicate
emergency recovery and response information to the general
public? Can this information be generated quickly? How would
such technology have improved the response to disasters like
Hurricane Katrina? What about the case of a man-made disaster
or a mass evacuation like we saw last year in the nuclear
meltdown in Japan? Could Twitter and instant messaging be used
to let people know where to evacuate and what to avoid?
The vast amounts of publicly available data also present a
potentially great resource for open-source information
collection. In 2010, we saw alert citizens report suspicious
activities in Times Square that led to the arrest of Faisal
Shahzad. Could similar public reporting be done using social
media? How can DHS fully exploit the benefits and opportunities
of social media without impeding on the civil rights and civil
liberties of those who choose to use social media? Can DHS
actively and effectively monitor social media in an open and
above-board way without being accused of spying on lawful
activities?
Last month, the press reported widely on a case where a
couple from England was prevented from entering the United
States because of a tweet. Was this an overreaction? Could or
should a mere tweet or posting prevent a person from boarding a
plane or entering the United States?
I am looking forward to learning from the witnesses exactly
how DHS uses social media and what DHS is doing to make sure
that in its use of social media it is not being perceived as
being a Big Brother. I want to learn from the witnesses what
privacy protections are in place with regard to DHS's using
social media and how the individual components are being
trained on these protections.
Further, I am very interested to find out today how the
Department can even handle the sheer volume of open-source
postings that may be found on any of the various social
networking websites. Further, if the Department begins to use
social media as open-source tools, as the Office of
Intelligence and Analysis Under Secretary has indicated, how
will its analysts be trained to continue to respect the civil
liberties of those that choose to use social media?
Social media could possibly be an integral tool in
recognizing and preventing emerging threats. However, there has
to be some specific systems in place that can manage this
information while continuing to respect civil rights and civil
liberties. I look forward to hearing what steps are being taken
in this area.
I yield back.
Mr. Meehan. Thank you, Ranking Member Speier, for your
observations, which I, as well, share.
We are also pleased to have in attendance the Ranking
Member of the committee. The gentleman from Mississippi, Mr.
Thompson, is with us. As is the custom of the subcommittee
where there are moments when we are graced with the presence of
those Ranking and senior members, we give to them the
opportunity to make an opening statement if they wish. So, at
this minute, the Chair would recognize Mr. Thompson for any
comments that he might have.
Mr. Thompson. Thank you very much, Mr. Chairman, for your
gracious introduction. I would like to thank you and the
Ranking Member for holding this hearing today. I would also
like to thank the witnesses for their testimony also.
Social media outlets provide the general public with new
avenues of discovering, reading, and sharing news, information,
and other forms of content. With an increasing number of people
relying on this form of technology as a primary information-
gathering resource, social media has supplemented, and in some
cases replaced, traditional media outlets as a source of news
and information.
Social media allows DHS to quickly and efficiently
disseminate accurate and useful information to hundreds of
thousands of people simultaneously. For instance, prior to a
natural disaster such as a hurricane or a flood, State and
local officials can use SMS to convey evacuation warnings and
notices to people living in affected areas. After a disaster,
the same means can be used to direct people to FEMA. Both the
Majority and Minority of this committee have a Twitter page.
I think we all agree that social media outlets are useful.
However, usefulness alone is not the only criteria we value.
Rapid deployment of accurate information, combined with the
ability of the average citizen to interact with public
officials, will ultimately increase DHS's trust and
accountability. To ensure that accountability and trust are
embraced as a value, DHS must employ proper safeguards,
including guidelines on information-gathering activities and a
clear policy on creating a profile or data-mining. If
information-gathering activities should occur, clear protocols
that adhere to the Constitution and the Privacy Act must be
developed to direct such activities. The public must be
confident that interacting with DHS on a website or blog or
Facebook will not result in surveillance or a compromise of
Constitutionally-protected rights.
Further, the use of social media must not replace
traditional methods of information distribution. When used
appropriately, social media is an efficient and effective way
to communicate with people. If used improperly by a Federal
agency, public trust and confidence will be compromised or
forever destroyed.
Given the high stakes involved, DHS cannot afford to make a
mistake. I trust that in your efforts to navigate the
Department's journey in the world of social media, you will
work closely with the committee and keep us informed of your
activities. We look forward to being your GPS.
With that, I yield back.
Mr. Meehan. Thank you, Mr. Chairman, for that sense of
direction.
We will stop it there. Other Members of the committee are
reminded that opening statements may be submitted for the
record.
We are pleased to have a distinguished panel of witnesses
before us today on this very, very important topic.
The first is Ms. Mary Ellen Callahan. She was appointed the
chief privacy officer and the chief Freedom of Information Act
officer by Department of Homeland Security Secretary Napolitano
in March 2009.
Created by Congress in 2002, the Department's privacy
officer is the first statutorily mandated privacy office in any
Federal agency, whose mission is to preserve and enhance
privacy protections for all individuals, to promote the
transparency of Homeland Security operations, and to serve as
the leader in the Federal privacy community. Ms. Callahan is
responsible for evaluating Department-wide programs, systems,
and technologies, and rulemaking for potential privacy impacts,
and for providing mitigation strategies to reduce any privacy
impact.
Prior to joining the Department, Ms. Callahan was a partner
with the law firm of Hogan & Hartson, where she specialized in
privacy and data security law. She serves as vice chair of the
American Bar Association's Privacy and Information Security
Committee of the Antitrust Division. Now as chief privacy
officer, she co-chairs both the CIO Council's Privacy Committee
and the Information-Sharing Environment Privacy Guidelines
Committee.
Thank you for being here today, Ms. Callahan.
I would also like to recognize Mr. Richard Chavez, who is
the director of Office of Operations Coordination and Planning
at the Department of Homeland Security.
He provides counsel directly to the Secretary of Homeland
Security on a wide range of operational issues, to include
prevention, protection, mitigation, response and recovery
operations, continuity of operations, and planning. He leads an
office of approximately 550 people who are responsible for
monitoring the security of the United States on a daily basis
and providing National situational awareness and developing the
National common operating picture.
His office provides vital decision support information to
the Federal interagency, Governors, homeland security advisors,
law enforcement, private-sector, and critical infrastructure
operators in all States and territories and more than 50 urban
major areas Nation-wide.
Mr. Chavez has over 30 years of Government experience,
serving with DHS and the Department of Defense as an Air Force
officer and a senior civilian in the Office of the Under
Secretary of Defense for Policy.
Before I recognize you for your comments, I have before me
on the table a report from the Electronic Privacy Information
Center. I ask unanimous consent to insert in the record a
statement from EPIC.
Hearing no objection, so ordered.
[The information follows:]
Statement of Marc Rotenberg, President, and Ginger McCall, Staff
Counsel, The Electronic Privacy Information Center (EPIC)
Thank you, Mr. Chairman, for the invitation to submit this
statement for the record for this hearing on ``DHS Monitoring of Social
Networking and Media: Enhancing Intelligence Gathering and Ensuring
Privacy'' to be held on February 16, 2012 before the House Subcommittee
on Counterterrorism and Intelligence. We ask that this statement be
included in the hearing record.
EPIC thanks you and Members of the subcommittee for your attention
to this important issue. The DHS monitoring of social networks and
media organizations is entirely without legal basis and threatens
important free speech and expression rights. Your decision to hold this
hearing will help protect important American rights.
The Electronic Privacy Information Center (EPIC) is a non-partisan,
public interest research organization established in 1994 to focus
public attention on emerging privacy and civil liberties issues. EPIC
works to promote Government accountability and transparency
particularly with respect to activities that implicate Constitutional
rights and fundamental freedoms. EPIC has been analyzing law
enforcement monitoring of social networks and on-line media for several
years. In early 2011, EPIC submitted comments to the Department of
Homeland Security on the agency's proposal to undertake monitoring of
social network and news organizations.\1\ EPIC has also pursued several
Freedom of Information requests to obtain relevant documents so that
the Members of your committee and the public would have the opportunity
to meaningful assess the agency's activities.
---------------------------------------------------------------------------
\1\ EPIC, Comments of the Electronic Privacy Information Center to
the Department of Homeland Security ``Systems of Records Notice'' DHS-
2011-0003, March 3, 2011, available at: http://epic.org/privacy/
socialmedia/Comments%20on%20DHS-2011-0003-1.pdf.
---------------------------------------------------------------------------
i. epic obtained documents that reveal that the dhs is monitoring
social network and media organizations for dissent and criticism of the
agency
In April 12, 2011, EPIC submitted a Freedom of Information Act
(``FOIA'') request to the Department of Homeland Security (``DHS'')
seeking agency records detailing the media monitoring program. The
request sought the following documents:
All contracts, proposals, and communications between the
Federal Government and third parties, including, but not
limited to, H.B. Gary Federal, Palantir Technologies, and/or
Berico Technologies, and/or parent or subsidiary companies,
that include provisions concerning the capability of social
media monitoring technology to capture, store, aggregate,
analyze, and/or match personally-identifiable information.
All contracts, proposals, and communications between DHS and
any States, localities, Tribes, territories, and foreign
governments, and/or their agencies or subsidiaries, and/or any
corporate entities, including but not limited to H.B. Gary
Federal, Palantir Technologies, and/or Berico Technologies,
regarding the implementation of any social media monitoring
initiative.
All documents used by DHS for internal training of staff and
personnel regarding social media monitoring, including any
correspondence and communications between DHS, internal staff
and personnel, and/or privacy officers, regarding the receipt,
use, and/or implementation of training and evaluation
documents.
All documents detailing the technical specifications of
social media monitoring software and analytic tools, including
any security measures to protect records of collected
information and analysis.
All documents concerning data breaches of records generated
by social media monitoring technology.\2\
---------------------------------------------------------------------------
\2\ EPIC FOIA Request, Apr. 12, 2011, available at: http://
epic.org/privacy/socialnet/EPIC-FOIA-DHS-Social-Media-Monitoring-04-12-
11.pdf; see also Olivia Katrandjian, DHS Creates Accounts Solely to
Monitor Social Networks, ABC News, Dec. 28, 2011, available at: http://
abcnews.go.com/US/dhs-creates-fake-accounts-monitor-social-networks/
story?id=15247533#.-
TzvuuONSQ3o.
---------------------------------------------------------------------------
When the agency failed to comply with FOIA's deadlines, EPIC filed
suit on December 23, 2011. As a result of this lawsuit, DHS disclosed
to EPIC 285 pages of documents, including statements of work,
contracts, and other agency records related to social network and media
monitoring.\3\
---------------------------------------------------------------------------
\3\ DHS Social Media Monitoring Documents, available at: http://
epic.org/foia/epic-v-dhs-mediamonitoring/EPIC-FOIA-DHS-Media-
Monitoring-12-2012.pdf; see e.g. Charlie Savage, Federal Contractor
Monitored Social Network Sites, The New York Times, Jan. 13, 2012,
available at: http://www.nytimes.com/2012/01/14/us/federal-security-
program-monitored-public-opinion.html; Jaikumar Vijayan, DHS Media
Monitoring Could Chill Public Dissent, EPIC Warns, Computerworld Jan.
16, 2012, available at: http://www.computerworld.com/s/article/9223441/
DHS_media_monitoring_could_chill_public_dissent_EPIC_warns; Ellen
Nakashima, DHS Monitoring of Social Media Concerns Civil Liberties
Advocates, Washington Post, Jan. 13, 2012, available at: http://
www.washingtonpost.com/world/national-security/dhs-monitoring-of-
social-media-worries-civil-liberties-advocates/2012/01/13/
gIQANPO7wP_story.html.
---------------------------------------------------------------------------
These documents reveal that the agency had paid over $11 million to
an outside company, General Dynamics, to engage in monitoring of social
networks and media organizations and to prepare summary reports for
DHS.\4\ According to DHS documents, General Dynamics will ``Monitor
public social communications on the internet,'' including the public
comment sections of NYT, LA Times, Huff Po, Drudge, Wired's tech blogs,
ABC News.\5\ DHS also requested monitoring of Wikipedia pages for
changes \6\ and announced its plans to set up social network profiles
to monitor social network users.\7\
---------------------------------------------------------------------------
\4\ EPIC, DHS Social Media Monitoring Documents at 1.
\5\ EPIC, DHS Social Media Monitoring Documents at 127, 135, 148,
193.
\6\ EPIC, DHS Social Media Monitoring Documents at 124, 191.
\7\ EPIC, DHS Social Media Monitoring Documents at 128.
---------------------------------------------------------------------------
DHS required General Dynamics to monitor not just ``potential
threats and hazards,'' ``potential impact on DHS capability'' to
accomplish its homeland security mission, and ``events with operational
value,'' but also paid the company to ``Identify[] reports that reflect
adversely on the U.S. Government, DHS, or prevent, protect, respond or
recovery Government activities.''\8\
---------------------------------------------------------------------------
\8\ Attachment 1; EPIC, DHS Social Media Monitoring Documents at
51, 195.
---------------------------------------------------------------------------
Within the documents, DHS clearly stated its intention to ``capture
public reaction to major Government proposals.''\9\ DHS instructed the
media monitoring company to generate summaries of media ``reports on
DHS, Components, and other Federal Agencies: Positive and negative
reports on FEMA, CIA, CBP, ICE, etc. as well as organizations outside
the DHS.''\10\
---------------------------------------------------------------------------
\9\ EPIC, DHS Social Media Monitoring Documents at 116.
\10\ EPIC, DHS Social Media Monitoring Documents at 183, 198.
---------------------------------------------------------------------------
In one DHS-authored document, titled ``Social Networking/Media
Capability Analyst Handbook'' the agency presented examples of good
summary reports and flawed summary reports. One report held up as an
exemplar was titled ``Residents Voice Opposition Over Possible Plan to
Bring Guantanamo Detainees to Local Prison-Standish MI.''\11\ This
report summarizes dissent on blogs and social networking cites, quoting
commenters who took issue with the Obama administration's plan to
transfer detainees to the Standish Prison.
---------------------------------------------------------------------------
\11\ EPIC, DHS Social Media Monitoring Documents at 118.
---------------------------------------------------------------------------
These documents clearly show an agency program that aims to
document legitimate on-line dissent and criticism. The agency has not
established any legal basis for this program.
News media reports indicate that the Department of Homeland
Security is not the only agency engaging in this sort of monitoring.
Recent news stories confirm that the Federal Bureau of Investigation
has also been developing a similar social network and media monitoring
program.\12\
---------------------------------------------------------------------------
\12\ Marcus Wohlson, FBI Seeks Digital Tool to Mine Entire Universe
of Social Media, Chicago Sun Times, Associated Press, Feb. 12, 2012,
available at: http://www.usatoday.com/USCP/PNI/Nation/World/2012-0213-
PNI0213wir-FBI-social-media_ST_U.htm.
---------------------------------------------------------------------------
ii. there is no legal basis for the dhs' social network and media
monitoring program
The agency has demonstrated no legal basis for its social network
and media monitoring program, which threatens important free speech and
expression rights.
Law enforcement agency monitoring of on-line criticism and dissent
chills legitimate criticism of the Government, and implicates the First
Amendment. Freedom of Speech and Expression are at the core of civil
liberties and have been strongly protected by the Constitution and the
U.S. courts.\13\ Government programs that threaten important First
Amendment rights are immediately suspect and should only be undertaken
where the Government can demonstrate a compelling interest that cannot
be satisfied in other way.\14\ Government programs that note and record
on-line comments, dissent, and criticism for the purpose of subsequent
investigation send a chilling message to on-line commenters, bloggers,
and journalists--``You are being watched.'' This is truly what George
Orwell described in 1984.
---------------------------------------------------------------------------
\13\ See e.g. United States v. Stevens, 130 S. Ct. 1577, 1585, 176
L. Ed. 2d 435 (2010) (holding that the ``First Amendment itself
reflects a judgment by the American people that the benefits of its
restrictions on the Government outweigh the costs'').
\14\ See e.g. NAACP v. Button, 83 S.Ct. 328 (1963); Citizens United
v. Fed. Election Comm'n, 130 S. Ct. 876 (2010).
---------------------------------------------------------------------------
As EPIC has stated in prior comments to DHS, the agency's social
network and media monitoring program would also violate the Privacy
Act.\15\ The Privacy Act requires agencies to:
---------------------------------------------------------------------------
\15\ EPIC, Comments of the Electronic Privacy Information Center to
the Department of Homeland Security ``Systems of Records Notice'' DHS-
2011-0003, March 3, 2011, available at: http://epic.org/privacy/
socialmedia/Comments%20on%20DHS-2011-0003-1.pdf.
``establish appropriate administrative, technical, and physical
safeguards to insure the security and confidentiality of records and to
protect against any anticipated threats or hazards to their security or
integrity which could result in substantial harm, embarrassment,
inconvenience, or unfairness to any individual on whom information is
maintained.''\16\
---------------------------------------------------------------------------
\16\ 5 U.S.C. 552a(e)(10) (2010).
The DHS program, as described in the agency's own documents, would
involve collecting information, including Personally Identifiable
Information (``PII''). While the agency acknowledges that PII are
covered under the Privacy Act and seeks to limit some collection, the
documents obtained by EPIC also reveal that there are several
exceptions to the ``no PII'' rule, including allowances for collection
of PII of anchors, newscasters, or on-scene reporters who . . . use
traditional and/or social media.\17\ This would allow the agency to
build files on bloggers and internet activists, in violation of the
Privacy Act.
---------------------------------------------------------------------------
\17\ DHS Social Media Monitoring Documents at 107.
---------------------------------------------------------------------------
The Privacy Act imposes limitations on the dissemination of
personal information collected by an agency. As EPIC has noted in its
comments the DHS, the agency's social network and media monitoring
program permits the collection and disclosure of information that
contravenes the text and purpose of the Privacy Act.\18\ DHS has
indicated that it plans to regularly relay the records to Federal,
State, local, Tribal, territorial, foreign, or international government
partners.\19\ The DHS Chief Privacy Officer (``CPO'') has stated that
the records would be transferred both by ``email and telephone'' to
contacts inside and outside of the agency.\20\ The CPO has also stated
that ``[n]o procedures are in place'' to determine which users may
access this system of records.\21\
---------------------------------------------------------------------------
\18\ EPIC, Comments of the Electronic Privacy Information Center to
the Department of Homeland Security ``Systems of Records Notice'' DHS-
2011-0003, March 3, 2011, available at: http://epic.org/privacy/
socialmedia/Comments%20on%20DHS-2011-0003-1.pdf.
\19\ EPIC, Comments of the Electronic Privacy Information Center to
the Department of Homeland Security ``Systems of Records Notice'' DHS-
2011-0003, March 3, 2011, available at: http://epic.org/privacy/
socialmedia/Comments%20on%20DHS-2011-0003-1.pdf; DHS Social Media
Monitoring Documents at 139, 207.
\20\ Department of Homeland Security, Privacy Impact Assessment for
the Office of Operations Coordination and Planning Publicly Available
Social Media Monitoring and Situational Awareness Initiative, 8, Jan.
6, 2011.
\21\ Department of Homeland Security, Privacy Impact Assessment for
the Office of Operations Coordination and Planning Publicly Available
Social Media Monitoring and Situational Awareness Initiative, 10, June
22, 2010, DHS Social Media Monitoring Documents at 156, 145.
---------------------------------------------------------------------------
DHS' program also fails to comply with Privacy Act requirements
that agencies make ``reasonable efforts to assure that records are
accurate, complete, timely, and relevant for agency purposes'' prior to
their dissemination outside of the Federal Government. DHS has readily
admitted that its social media monitoring initiative explicitly relies
on unverified sources of information to construct the records that DHS
will then disseminate to State, local, Tribal, territorial, foreign, or
international government partners. As the DHS CPO has stated, ``[u]sers
may accidentally or purposefully generate inaccurate or erroneous
information. There is no mechanism for correcting this.''\22\ The
agency unlawfully shifts responsibility for verifying the agency's
information onto the social media users the agency plans to follow:
``the community is largely self-governing and erroneous information is
normally expunged or debated rather quickly by others within the
community with more accurate and/or truthful information.''\23\
---------------------------------------------------------------------------
\22\ DHS Social Media Monitoring Documents at 156, 145.
\23\ DHS Social Media Monitoring Documents at 156, 145.
---------------------------------------------------------------------------
As EPIC has previously stated in comments to DHS, the collection of
information about individuals obtained from social networks and the
monitoring of media organizations falls outside of the agency's
statutory authority. The agency has failed to cite any statutory
provision that would indicate that Congress gave the DHS authority to
engage in intelligence collection, let alone to violate the
Constitutional rights of individuals using the internet to express
criticisms of the agency or the U.S. Government. In fact, the one
statutory provision cited by the agency only allows the DHS Secretary
to ``access, receive, and analyze law enforcement information,
intelligence information, and other information from agencies of the
Federal Government, State and local government agencies and private
sector entities.'' (Emphasis added). It does not authorize the agency
to initiate a program to gather or collect that information itself. The
only relevant provision that does mention gathering narrows the term to
``incident management decision making.''
Hence, DHS' monitoring and gathering of social network and media
information is not within the agency's delegated duties. DHS monitoring
of stories or individuals that ``report adversely'' on the agency (or
the Government more broadly) is even further outside of its delegated
duties. The agency has failed to establish any legal basis for this
program.\24\
---------------------------------------------------------------------------
\24\ The Attorney General has established elaborate Guidelines for
domestic investigations. The Attorney General Guidelines for Domestic
FBI Investigations, available at www.justice.gov/ag/readingroom/
guidelines.pdf. While EPIC does not necessarily endorse the standards
set out in the DIOG, we note that they require at a minimum a predicate
that justifies a Federal investigation. Expressing criticism of the
Government or a particular Federal agency alone can simply never be the
basis for a Federal investigation under the Attorney General
Guidelines.
Circumstances Warranting Investigation
A predicated investigation may be initiated on the basis of any
of the following circumstances:
a. An activity constituting a Federal crime or a threat to
the National security has or may have occurred, is or may be occurring,
or will or may occur and the investigation may obtain information
relating to the activity or the involvement or role of an individual,
group, or organization in such activity.
b. An individual, group, organization, entity, information,
property, or activity is or may be a target of attack, victimization,
acquisition, infiltration, or recruitment in connection with criminal
activity in violation of Federal law or a threat to the National
security and the investigation may obtain information that would help
to protect against such activity or threat.
c. The investigation may obtain foreign intelligence that
is responsive to a foreign intelligence requirement.
Id. at 21. See, generally, EPIC, ``The Attorney General
Guidelines,'' available at http://epic.org/privacy/fbi/
---------------------------------------------------------------------------
iii. epic's recommendations
The problems described above are significant and far-reaching. An
agency that was established to help protect the United States against
future foreign attacks is now deploying its significant resources to
monitor political opposition and the work of journalists within the
United States. It has no legal basis to do so, and in pursuing the
monitoring of social networks and media organizations for activities
that ``reflect adversely'' on the agency and the U.S. Government, it
has transformed its purpose from protecting the American public to
protecting simply itself.
We specifically recommend that the subcommittee take the following
steps to address the immediate risks to Constitutional liberty:
Require that the DHS immediately and permanently cease the
practice of monitoring social networks and media organizations
for the purpose of identifying political and journalistic
activities that ``reflect adversely'' on the agency or the
Federal Government.
Require that the DHS suspend the social network and media
organization monitoring program until safeguards are put into
place which will ensure oversight, including annual reporting
requirements.
Require that other agencies, including the Federal Bureau of
Investigation, which have developed or are in the process of
developing similar programs provide publicly available, annual
reports to Congress that set out in the detail the legal
standard for this activity and describe how Constitutional
rights will be safeguarded.
iv. conclusion
EPIC respectfully requests that the subcommittee take the steps
outlined in this statement, including requiring the immediate and
permanent end to DHS' practice of monitoring for dissent; adopting
guidelines for greater oversight of the DHS' social network and media
monitoring program, and imposing the same oversight requirements on
similar social network and media monitoring programs at other agencies.
Thank you for your consideration of our views. We would be pleased
to provide any further information the Committee requests.
Mr. Meehan. Now, for all panelists, I know you gave us some
detailed testimony in written form. If you could do your best
to summarize your submitted testimony, we would appreciate
that.
I now welcome back Ms. Callahan and recognize her first for
her testimony.
Thank you.
STATEMENT OF MARY ELLEN CALLAHAN, CHIEF PRIVACY OFFICER,
DEPARTMENT OF HOMELAND SECURITY
Ms. Callahan. Thank you very much, sir.
Good morning. Chairman Meehan, Ranking Member Speier,
Ranking Member Thompson, and Members of the committee, thank
you for this opportunity to discuss the Department of Homeland
Security's uses of social media and the privacy protections my
office has embedded into all of these uses.
As described in our written testimony, communications and
social media provide important benefits to the American public
and to the Department. With that said, as the Chairman and the
Ranking Member acknowledged, there is a great deal of personal
information that, although publicly available, is not necessary
for the Department to see or use.
Let me be clear: DHS recognizes the use of social media by
Government actors must occur with appropriate privacy, civil
rights, and civil liberties protections. For this reason, DHS
has created Department-wide standards designed to protect
privacy in each category of its use.
There are essentially three uses of social media by the
Department of Homeland Security: First, external communications
and outreach between the Department and the public; second,
awareness of breaking news and events and situations related to
homeland security, known as situational awareness; and third,
when DHS has the appropriate authorities to use social media
for operational use such as law enforcement and investigations.
In each category, the Department has established standards that
are designed to incorporate privacy protections ex ante, to
create uniform standards across the components and Department,
and to be transparent about the scope of our activities.
The Department utilizes the opportunity social networking
presents to provide the public with robust information. For
example, DHS has a presence on many of the major social
networking platforms. FEMA, of course, is well-known for
utilizing social media effectively for education and in
emergencies.
DHS established Department-wide standards for use of social
media for communications and outreach purposes through the
development and publication of two Privacy Impact Assessments,
known as PIAs. All DHS profiles and communications via social
media must adhere to these PIAs.
As my colleague Mr. Chavez will describe, the Office of
Operations Coordination and Planning has a statutory
responsibility to provide situational awareness and establish a
common operating picture for the Federal Government. The
Privacy Office and Operations work together closely and develop
detailed standards and procedures associated with reviewing
social media, launched three pilots, and then did a privacy
compliance review of those pilots. Together, the National
Operations Center and the Privacy Office designed a holistic
set of privacy protections to be implemented whenever social
media is being reviewed for situational awareness, and then
memorialized them in a publicly available PIA in June 2010.
Several months later, as part of a mandated privacy
compliance review, my office determined that the PIA should be
updated to allow for the collection and dissemination of
personally identifiable information in a very limited number of
situations. After January 2011, limited personally identifiable
information on a few categories of individuals may be collected
only when it lends credibility to the report or facilitates
coordination. The categories are essentially: Public figures
who make public statements or are part of an event; or people
who are in potential life-or-death circumstances.
The first weekend that personally identifiable information
was allowed to be collected and disseminated was the weekend
that Congresswoman Giffords was shot in Arizona. Learning
immediately who was the impacted Member of Congress was very
useful for the Department, for the Federal Government, and
facilitated rapid coordination.
There may also be situations where particular programs
within the Department or its components may need to access
material on social media or individual profiles in support of
authorized missions such as law enforcement. Given the breadth
of the Department's mission and the fact that access,
collection, and use of social media or other publicly available
information is governed by specific legal authorities rather
than Department-wide standards, the Department takes a
different approach to embedding privacy protections into this
type of social media, implementing privacy protections through
a policy and management directive.
The Department is finalizing a management directive for
privacy protections in the operational use of social media,
which will systematize the previous component policies, be
enforceable throughout the Department, and will identify the
authorities, restrictions, and privacy oversight related to the
use of social media for operational purposes. The directive
will also provide instructions on how to embed privacy
protections into the operational use of social media and in
each investigation performed by Departmental personnel.
Essentially, the standard is, if you can't do it off-line, you
can't do it on-line.
In light of the scope and availability of information,
including personal information, found in social media, the
Privacy Office intends to continue to monitor the Department's
use of social media in all three categories. The Department has
established a comprehensive compliance regime. It is every
employee's responsibility to adhere to those standards, and the
Privacy Office will seek to confirm that compliance in order to
protect the public's trust in the Department's use of social
media.
Thank you, sir.
[The joint statement of Ms. Callahan and Mr. Chavez
follows:]
Joint Prepared Statement of Mary Ellen Callahan and Richard Chavez
Chairman Meehan, Ranking Member Speier, and Members of the
subcommittee, we appreciate the opportunity to be here today to discuss
the Department of Homeland Security's (DHS) use of social media, and
the privacy protections the DHS Privacy Office has put into place.
Social media are web-based and mobile technologies that turn
communication into an interactive dialogue in a variety of on-line
fora. It may be appropriate for the Government, including DHS, to use
social media for a variety of reasons. The President has challenged his
administration to use technology and tools to create a more efficient,
effective, and transparent Government.\1\ DHS recognizes that the use
of social media by Government actors must occur with appropriate
privacy, civil rights, and civil liberties protections; whether DHS is
disclosing its information and press releases via social media
platforms like Twitter and Facebook, reviewing news feeds for
situational awareness, or researching identified, discrete targets for
legitimate investigatory purposes. Accordingly, DHS has created
Department-wide standards designed to protect privacy, civil rights,
and civil liberties in each category of its use.
---------------------------------------------------------------------------
\1\ President Barack Obama, Memorandum on Transparency and Open
Government (January 21, 2009), available at http://www.gpoaccess.gov/
presdocs/2009/DCPD200900010.pdf; OMB Memorandum M-10-06, Open
Government Directive (December 8, 2009), available at http://
www.whitehouse.gov/omb/assets/memoranda_2010/m10-06.pdf.
---------------------------------------------------------------------------
There are three general ways in which DHS utilizes social media,
and each has associated privacy protections:
External communications and outreach between the Department
and the public;
Awareness of breaking news of events or situations related
to homeland security, known as ``situational awareness;'' and
Operational use, when DHS has the appropriate authorities,
such as law enforcement and investigations.
In each category, the Department has established and enforces
standards that incorporate privacy protections ex ante, create uniform
standards across the components and Department, and are transparent
with regard to the scope of our activities.
external communications and outreach
Consistent with the President's 2009 Memorandum on Transparency and
Open Government, the Office of Management and Budget's (OMB) Open
Government Directive \2\ and OMB's Memorandum M-10-23, Guidance for
Agency Use of Third-Party Websites and Applications,\3\ the Department
uses the social networking medium to provide the public with robust
information through many channels. For example, DHS currently has a
presence on many of the major social networking platforms, including
Facebook, Twitter, and YouTube. In addition, FEMA launched a FEMA app
for smartphones that contains preparedness information for different
types of disasters. Similarly, the Transportation Security
Administration has MyTSA Mobile Application, which enables the
traveling public access to relevant TSA travel information, such as
types of items that may be carried through TSA security checkpoints, or
estimated wait times.
---------------------------------------------------------------------------
\2\ See supra note 1.
\3\ http://www.whitehouse.gov/sites/default/files/omb/assets/
memoranda_2010/m10-23.pdf.
---------------------------------------------------------------------------
In 2009, the Department established a Social Media Advisory Group,
with representatives from the Privacy Office; Office of General
Counsel; Chief Information Security Officer; Office of Records
Management; and Office of Public Affairs to ensure that a variety of
compliance issues including privacy, legal, security, and records
management issues are addressed as DHS uses social media. This group
governs and provides guidance on social media initiatives related to
external communications and public outreach by reviewing
recommendations from Components and offices and evaluating Terms of
Service agreements and Terms of Use policies. The group also developed
a social media use plan, while working to ensure compliance issues are
addressed and resolved before the first Department use of a particular
application of social media.
DHS also established Department-wide standards for use of social
media for communications and outreach purposes through the creation,
and development of, two Privacy Impact Assessments (PIAs). The PIAs
address two types of uses of social media within the communications/
outreach category: (1) Interactive platforms where the Department has
official identities, using those profiles to provide information about
the Department and its services, while having the ability to interact
with members of the public such as allowing them to post comments on
the official Department page or profile;\4\ and (2) unidirectional
social media applications encompassing a range of applications, often
referred to as applets or widgets, that allow users to view relevant,
real-time content from predetermined sources, such as podcasts, Short
Message Service (SMS) texting, audio and video streams, and Really
Simple Syndication (RSS) feeds.\5\
---------------------------------------------------------------------------
\4\ http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia-
dhs_socialnetworkinginter-
actions.pdf.
\5\ http://www.dhs.gov/xlibrary/assets/privacy/
privacy_pia_dhswide_unidirectionalsocial- media.pdf.
---------------------------------------------------------------------------
The PIAs analyze the Department's use of social media and
networking for communications purposes, if and how these interactions
and applications could result in the Department receiving personally
identifiable information (PII), and the privacy protections in place.
The PIAs describe the information the Department may have access to,
how it will use the information, what information is retained and
shared, and how individuals can gain access to and correct their
information. For example, official DHS accounts across social media and
networking websites and applications must be identified by the
component or Department seal as well as an anonymous, but easily
identifiable user name account displaying a DHS presence, such as ``DHS
John Q. Employee.'' Both the communications and outreach PIAs also
include periodically-updated appendices that identify the specific
Department-approved profiles and applications. In addition, the PIAs
contain provisions that Department-approved profiles are subject to
Privacy Compliance Reviews by the DHS Privacy Office.
situational awareness
The Office of Operations Coordination and Planning (OPS), National
Operations Center (NOC), has a statutory responsibility (Section 515 of
the Homeland Security Act (6 U.S.C. 321d(b)(1))) to provide
situational awareness and establish a common operating picture for the
Federal Government, and for State, local, Tribal governments as
appropriate, in the event of a natural disaster, act of terrorism, or
other man-made disaster, and (2) ensure that critical terrorism and
disaster-related information reaches Government decision-makers.
Traditional media sources, and more recently social media sources, such
as Twitter, Facebook, and a vast number of blogs, provide public
reports on breaking events with a potential nexus to homeland security.
By examining open-source traditional and social media information,
comparing it with many other sources of information, and including it
where appropriate into NOC reports, the NOC can provide a more
comprehensive picture of breaking or evolving events. To fulfill its
statutory responsibility to provide situational awareness and to access
the potential value of the public information within the social media
realm, in 2010, the NOC launched the first of three pilots using social
media monitoring related to specific natural disasters and
international events.
Beginning with the pilots, the reason the NOC utilizes social media
tools is to identify breaking or evolving incidents and events to
provide timely situational awareness and establish a more complete
common operating picture. The NOC views information from a variety of
sources to include open-source reporting and a variety of public and
Government sources. The NOC synthesizes these reports for inclusion in
a single comprehensive report. These reports are then disseminated to
DHS components, interagency partners, and State, local, Tribal,
territorial, and private-sector partners with access to the NOC's
common operating picture. The content of the reports may be related to
standing critical information requirements, emerging events potentially
affecting the homeland, or special events such as the Super Bowl or the
United Nations General Assembly.
Prior to implementing each social media pilot, the Privacy Office
and the Office of Operations Coordination and Planning developed
detailed standards and procedures associated with reviewing information
on social media websites. These standards and procedures are documented
through a series of pilot-specific PIAs.\6\
---------------------------------------------------------------------------
\6\ The NOC and the Privacy Office developed three PIAs in the
pilot stage of the NOC Media Monitoring Initiative: Haiti Social Media
Disaster Monitoring Initiative, January 21, 2010, available at http://
www.dhs.gov/xlibrary/assets/privacy/privacy_pia_ops_haiti.pdf; 2010
Winter Olympics Social Media Event Monitoring Initiative February 10,
2010, available at http://www.dhs.gov/xlibrary/assets/privacy/
privacy_pia_ops_2010winterolympics.pdf; and April 2010 BP Oil Spill
Response Social Media Event Monitoring Initiative, April 29, 2010,
available at http://www.dhs.gov/xlibrary/assets/privacy/
privacy_pia_ops_bpoilspill.pdf.
---------------------------------------------------------------------------
The NOC pilots occurred during the 2010 Haiti earthquake response,
the 2010 Winter Olympics in Vancouver, British Columbia; and the
response to the April 2010, Deepwater Horizon Gulf Coast oil spill. For
each of these pilots, the NOC utilized internet-based platforms to
provide situational awareness and develop a common operating picture
directly related to the response, recovery, and rebuilding efforts in
Haiti by reviewing information on publicly-available on-line fora,
blogs, public websites, and message boards.
Following the three discrete social media monitoring pilots by the
NOC, the Privacy Office did a thorough (and public) Privacy Compliance
Review of the NOC's implementation of the PIAs' privacy protections.\7\
The Privacy Office's review found that the NOC's social media
monitoring activities did not collect PII, did not monitor or track
individuals' comments, and complied with the stated privacy parameters
set forth in the underlying PIAs.
---------------------------------------------------------------------------
\7\ http://www.dhs.gov/xlibrary/assets/privacy/privacy-privcomrev-
ops-olympicsandhaiti.pdf. Three Privacy Compliance Reviews have been
completed and published by the Privacy Office, available at: http://
www.dhs.gov/files/publications/gc_1284657535855.shtm.
---------------------------------------------------------------------------
Given the positive assessment of the three pilots, OPS and the
Privacy Office designed a holistic set of privacy protections to be
implemented whenever information made available through social media is
being reviewed for situational awareness and establishing a common
operating picture. In June 2010, the Department released its Publicly
Available Social Media Monitoring and Situational Awareness Initiative
PIA, incorporating these protections.\8\ This PIA describes how the NOC
uses internet-based platforms that provide a variety of ways to review
information accessible on publicly-available on-line fora, blogs,
public websites, and message boards. Through the use of publicly-
available search engines and content aggregators, the NOC reviews
information accessible on certain heavily-trafficked social media sites
for information that the NOC can use to provide situational awareness
and establish a common operating picture, all without monitoring or
tracking individuals' comments or relying on the collection of PII,
with very narrow exceptions, discussed below.
---------------------------------------------------------------------------
\8\ http://www.dhs.gov/xlibrary/assets/privacy/
privacy_pia_ops_publiclyavailablesocial- media.pdf.
---------------------------------------------------------------------------
The NOC does not: (1) Actively seek PII except for the narrow
exceptions; (2) post any information on social media sites; (3)
actively seek to connect with internal/external social media users; (4)
accept internal/external personal users' invitations to connect; or (5)
interact on social media sites. The NOC is, however, permitted to
establish user names (consistent with the criteria established in the
communications and outreach PIAs) and passwords to form profiles and
follow relevant Government, media, and subject matter experts on social
media sites as described in the June 2010 PIA; and to use search tools
under established criteria and search terms that support situational
awareness and establishing a common operating picture.
As part of the publication of the June 2010 PIA, the Privacy Office
mandates Privacy Compliance Reviews every 6 months. After conducting
the second Privacy Compliance Review, the Privacy Office determined
that this PIA should be updated to allow for the collection and
dissemination of PII in a very limited number of situations in order to
respond to the evolving operational needs of the NOC. After January
2011, this PII on the following categories of individuals may be
collected when it lends credibility to the report or facilitates
coordination with Federal, State, local, Tribal, territorial, and
foreign governments, or international law enforcement partners:
(1) U.S. and foreign individuals in extremis, i.e., in situations
involving potential life or death circumstances;
(2) Senior U.S. and foreign government officials who make public
statements or provide public updates;
(3) U.S. and foreign government spokespersons who make public
statements or provide public updates;
(4) U.S. and foreign private-sector officials and spokespersons who
make public statements or provide public updates;
(5) Names of anchors, newscasters, or on-scene reporters who are
known or identified as reporters in their posts or articles, or
who use traditional and/or social media in real time to provide
their audience situational awareness and information;
(6) Current and former public officials who are victims of
incidents or activities related to homeland security; and
(7) Terrorists, drug cartel leaders, or other persons known to have
been involved in major crimes of homeland security interest,
(e.g., mass shooters such as those at Virginia Tech or Ft.
Hood) who are killed or found dead.\9\
---------------------------------------------------------------------------
\9\ The most recent PIA update (authorizing these narrow PII
categories collection) was finalized January 6, 2011, and is available
at: http://www.dhs.gov/xlibrary/assets/privacy/
privacy_pia_ops_publiclyavailablesocialmedia_update.pdf.
---------------------------------------------------------------------------
For this narrow category of individuals, DHS may only collect the
full name, affiliation, position or title, and publicly-available user
ID, when it lends credibility to the report. DHS determined that this
information improves the efficacy and effectiveness of the social media
monitoring initiative without an unwarranted invasion of privacy of
individuals in each of these categories. For this narrow category of
individuals the PII is only stored in the narrative report in which it
is used, and is not tracked for any other reason. DHS published a
System of Records Notice \10\ that describes the creation of these
seven exceptions for the collection of PII and narrowly tailored, how
much information can be collected, and how the information can be used.
Furthermore, the Privacy Office is commencing its semi-annual Privacy
Compliance Review in late February to ensure that the NOC continues to
adhere to the privacy protections identified in the PIA.
---------------------------------------------------------------------------
\10\ http://edocket.access.gpo.gov/2011/2011-2198.htm.
---------------------------------------------------------------------------
operational use
There may be situations where particular programs within the
Department or its components may need to access material on social
media or individual profiles in support of authorized missions. Given
the breadth of the Department's mission, and the fact that access,
collection, and use of social media and other publicly-available
information is governed by specific legal authorities, rather than
Department-wide standards, the Department has taken a different
approach in embedding privacy protections into Department use of social
media for operational purposes, with authority-based requirements
implemented through policy and Management Directives. For example,
components of DHS such as U.S. Customs and Border Protection, U.S.
Immigration and Customs Enforcement, Federal Protective Service,
Federal Air Marshals Service, U.S. Coast Guard, and U.S. Secret Service
have the authority to engage in law enforcement activities which may
include the use of on-line and internet materials. Other DHS offices
and components may be authorized to utilize social media for specific
law enforcement purposes such as investigating fraud. The Office of
Intelligence and Analysis also has some overt collection authorities
for intelligence purposes which may include the use of on-line and
internet materials.
DHS has established objective criteria by which those investigatory
components can access publicly-available information. DHS components
cannot review individuals' information unless they have appropriate
underlying authority and supervisory approval. Moreover, Office of
Operations Coordination and Planning and Office of Intelligence and
Analysis have additional specific policies on the use of social media
for operational purposes. One of DHS' responsibilities is to confirm
our work is being done under the appropriate legal framework for
Federal law enforcement activities. However, with increased access to
individuals' personal information posted on the internet and social
media sites, these DHS components have been reminded that they must
also be conscious of privacy considerations.
At DHS, we work every day to strike a balance between our need to
use open-source internet and social media information for all purposes,
but particularly law enforcement and investigatory purposes to further
our mission, while protecting First Amendment rights, Fourth Amendment
rights, and privacy.
In 1999, the Department of Justice issued guidelines for Federal
law enforcement agents that outline on-line investigative principles
that are applicable, but do not explicitly reference, social media. In
2011, the Office of the Director of National Intelligence issued
guidelines that outline how intelligence community professionals should
use technology, including social media. Both guidelines address the
following topics: Obtaining information from publicly-available media
under the same conditions that apply to obtaining information from
other sources generally open to the public; passively observing and
logging real-time electronic communications on media open to the public
under the same circumstances in which these activities could be
undertaken when attending a public meeting; and retaining the contents
of a stored electronic message, such as on-line traffic, if that
information would have been retained had it been written on paper.
Moreover, Federal law enforcement agents communicating on-line with
witnesses, subjects, or victims must disclose their affiliation with
law enforcement when DHS guidelines would require such disclosure if
the communication were taking place in person or over the telephone--
they may communicate on-line under a non-identifying name or fictitious
identity if DHS guidelines and procedures would authorize such
communications in the physical world.\11\ Finally, Federal law
enforcement agents may not access restricted on-line sources absent
legal authority permitting entry into a private space. Until a
Department-wide Management Directive on using social media for
operational purposes is finalized, the Secretary has instructed all
components to adhere to the DOJ or ODNI guidelines as appropriate.
---------------------------------------------------------------------------
\11\ See, e.g., On-line Investigative Principles for Federal Law
Enforcement Agents (Department of Justice, 1999) and Civil Liberties
and Privacy Guidance for Intelligence Community Professionals: Properly
Obtaining and Using Publicly Available Information (Office of the
Director of National Intelligence, 2011).
---------------------------------------------------------------------------
In light of the varying authorities and responsibilities within the
Department, instead of having a Privacy Impact Assessment with general
standards (such as for communications and situational awareness
purposes), the Department is developing a Management Directive for
Privacy Protections in Operational Use of Social Media. The Management
Directive will be enforceable throughout the Department, and will
identify the authorities, restrictions, and privacy oversight related
to use of social media for operational purposes. The Management
Directive will also provide instructions on how to embed privacy
protections into the operational use of social media and each
investigation performed by Department personnel. The Privacy Office has
already investigated one component's use of social media for
investigatory purposes; its conclusions are informing the Management
Directive.
Consistent with the Department's approach to embed privacy
protections throughout the life cycle of Department activities, the
Privacy Office will conduct a Privacy Compliance Review or assessment
of the Department's adherence to the social media Management Directive
approximately 6 months after the Directive is implemented.
conclusion
In light of the scope and availability of information including PII
found in social media venues, the Privacy Office intends to continue to
monitor the Department's use of social media in all three categories--
communications and outreach, situational awareness, and operational
use--to ensure privacy protections are built-in and followed.
Mr. Meehan. Thank you, Ms. Callahan.
Now I recognize Mr. Chavez for his testimony.
STATEMENT OF RICHARD CHAVEZ, DIRECTOR, OFFICE OF OPERATIONS
COORDINATION AND PLANNING, DEPARTMENT OF HOMELAND SECURITY
Mr. Chavez. Good morning, Chairman Meehan, Ranking Member
Speier, and Members of the subcommittee. I also would like to
thank you for inviting me here today to talk to you about the
National Operations Center use of social media monitoring to
provide real-time or near-real-time situational awareness of
potential occurring events or incidents that may impact the
safety, security, and resilience of the homeland.
As stated in Section 515 of the Homeland Security Act, as
amended, the National Operations Center is the principal
operations center for the Department of Homeland Security and
shall provide situational awareness and a common operating
picture for the entire Federal Government and for State, local,
and Tribal governments as appropriate in the event of a natural
disaster, act of terrorism, or other man-made disaster, and
ensure that critical terrorism and disaster-related information
reaches Government decision-makers.
In order to fulfill these statutory responsibilities, the
National Operations Center, also known as the NOC, gathers
reports from multiple sources, to include open-source media
reporting. Media reporting is often the first indication of a
potential incident. For this reason, the NOC utilizes and
incorporates media reporting into its incident reports. The
primary focus of our reporting is on what is happening, and not
who is reporting the event.
As previously stated, the NOC gathers reports from a
variety of sources and synthesizes them into one single
comprehensive incident report that is distributed again to the
DHS leadership, DHS components, and other Federal, State,
local, Tribal, territorial, and non-governmental and private-
sector partners for action as appropriate.
The after-action assessments relating to the Government's
response during Hurricane Katrina highlighted the importance of
real- and near-real-time information from media reporting to
enable a more timely response during a dynamic catastrophic
event. In 2006, following Hurricane Katrina, the NOC began
assessing the incorporation of media reporting for major media
networks into incident reports to provide responders with real-
time information. To date, incorporating media reporting into
the NOC's incident reports has enabled our partners to have
greater awareness during events and incidents.
Here is a real-world example of how the NOC incorporates
media reporting. In early January 2012, the media in Charlotte,
North Carolina, was first on scene reporting damage after
severe weather erupted across multiple counties near Charlotte.
The media reports were combined with reporting from State and
local sources. The end result, again, was a more timely
incident report that provided specific and comprehensive
information to our partners, enabling them to make informed
decisions.
The NOC incorporates media reporting into incidents across
the full spectrum of Homeland Security operations: Prevent and
protect, respond and recover.
Another real-world example of how NOC incorporates media
reporting into its incident reports also occurred in early
January 2012. The incident occurred in Austin, Texas. The media
in Austin posted incident information about evacuation of a
high school after a suspicious device was seen in a vehicle on
campus. The media reported that, according to county sheriff's
office spokesmen, sheriff's deputies were responding to an
explosive device in a car. Through additional Government
reporting, the NOC learned that the scene was secured and that
no explosive device was found by law enforcement officials.
Again, I would like to emphasize that it is the ``what,''
not the ``who,'' that is relevant for NOC reporting purposes.
The NOC adheres to strict enforcement of privacy guidelines
with regard to media reports. The NOC, in coordination with the
DHS Office of Privacy, evaluates processes and incident reports
on a recurring basis to ensure our privacy guidelines are being
complied with.
Again, thank you for the opportunity to speak with you
today, and I am happy to answer any questions you may have.
Mr. Meehan. Well, thank you for your testimony, Mr. Chavez.
As I said in my opening statement, I am concerned about
some of the news reports and materials related to DHS
monitoring of social media and the networks. So I will now
recognize myself for a few minutes of questioning.
The testimony has been revealing in the sense of giving us
the overall perspective. I think all of us appreciate the
ability for the Governmental entities to broadcast through the
various pieces so people know about what you are doing.
Mr. Chavez, you talked a lot about, sort of, media
monitoring. There is an expectation on the part of many of
those who are reporters and otherwise, they know they are
putting their product out so that it can be reviewed. So I
think we can go past those kinds of things.
We also appreciate, as I said in my opening statement,
about the opportunity to avail ourselves in real time of
breaking information that can be communicated in certain ways
that are now available so that there is the ability to keep
those that need to make the decisions up on the latest
information.
But you are sensitive--we are here today because where we
are trying to find is where that line is where the public
citizen--it is not just the expectation of privacy, because we
know they are communicating in public fora or even quasi-public
fora. But we are talking now about monitoring on-line
information in blogs, in websites, in message boards. Some of
these have, you know, the indicia of, sort of, quasi-privacy
communities, so to speak.
So my real question for you is to help us understand what
you are doing to assure that individual communication is not
leading to individuals being identified by the Government and
what you are doing to assure that we are not creating a
chilling effect so that somebody in a community who is
concerned about a particular issue will be more reluctant to
write a letter to the editor, to post something on a blog.
I will close my opening comments--and I know you have come
prepared to answer these, but we are all very concerned about a
couple of the circumstances that have happened. Most
specifically, what looks as if it is a directive within the
contract you have with a private contractor who is employed to
help you disseminate or gather information. It is identifying
media reports that reflect adversely on the U.S. Government,
DHS, or prevent, protect, respond, or recovery activities. So,
in effect, we are asking somebody to go out and let us know
what people are saying that is negative about us. This appears
to be what was asked for in the contract with General Dynamics.
So I would like you to tell me what it is that we are doing
to assure that private commentary is not being misused and what
we can do to assure that the activities of monitoring are not
going to create some kind of a chilling effect on individuals'
willingness and readiness, not only to comment, but, frankly,
to make comments which may be critical of the Government.
Ms. Callahan.
Ms. Callahan. Thank you, sir.
With regard to the privacy protections that the Department
has implemented specifically with regard to situational
awareness, to be very clear, as Mr. Chavez said, it is the
``what,'' not the ``who,'' that is being identified and that we
are concerned with.
As you are aware, my office not only mandated privacy
compliance reviews every 6 months to make sure that indeed we
are just focusing on the event, on the situation, to know what
is going on, and not worried about the individual; in addition
to that, the National Operations Center has very robust
auditing capability, that they go and review both the sites
that are being done, how long they are on it, and what
information is being implemented into the report.
We take these issues very seriously, sir. We absolutely
understand and agree that these are----
Mr. Meehan. Who is directing what is being monitored?
Ms. Callahan. Mr. Chavez.
Mr. Chavez. The key words, I guess, or the mechanism that
we use to identify information that is coming across the media,
whether it be social or the traditional media that is out
there, again, these are key words associated with events that
have happened in the past and also with the equities of the
Department of Homeland Security, again, looking at the safety,
security, and resilience missions that are out there.
So, as you said in your opening statement, I believe, that
there are any number of blogs going on at any one time and a
plethora of information that is flowing through there, there is
no way we could look at all of it. So we use the tools, again,
with these keyword searches that are commercially available for
looking at search items, particularly, again, keywords, that we
can pull out of there and look at, again, what the situation is
that is evolving.
Mr. Meehan. But you are looking at keywords, but my
question is, are there circumstances under which--who is the
one that is waking up in this vast array of information out
there? Because the limited number of people that you have
working for you, unquestionably, without some sense of
direction, they could be spending limitless time, in effect,
floating on a sea without any kind of product that is produced.
So there has to be some sense of direction. Where does the
line get drawn with regard to overlooking, sort of, general
words out there versus looking at specific incidents, specific
issues, and identifying people, as happened in Michigan?
Mr. Chavez. There are guidelines for sites that the
individuals within the Media Monitoring Center can monitor.
Again, those sites are submitted for approval through the
Privacy Office, and they are strictly adhered to by the
individuals who are actually looking at the information that is
coming across there and gathering them for us.
So there is a series of checks and balances.
Ms. Callahan. If I can, sir, in order to be transparent
about this, in the Privacy Impact Assessment we have a list of
the representative keywords. The Privacy Office reviews that
list every 6 months and makes sure that we stay within it. The
list is ``disaster,'' it is, you know, ``flood,'' ``tornado,''
and things like that.
With regard to individuals, as I indicated in my oral
testimony, we don't collect information on individuals. We do
not monitor them with regard to any First Amendment activity.
But individuals may be the first person at the scene, and so
they may go and report there has been a train derailment in
Michigan. We do not then go and say that, ``Mary Ellen Callahan
reported a train derailment.'' We then corroborate it with
another source that is identified----
Mr. Meehan. My time has expired, so I am hoping some others
will pick this up.
We know about the disasters. I don't think we are worried
about the disasters. What we are worried about are the
individual circumstances where there may be issues out there. I
point back again to the Michigan circumstance where there was a
controversial decision by the Government, and DHS played a role
in assessing community response to that incident. That wasn't a
natural disaster; that was an incident that was created by the
Government, and the Government then was monitoring the
community response.
That is where I want to--who is going to make the
decisions? Who is making the protections against circumstances
under which the Government is playing a role in not just
analyzing but filtering back, recording, and reporting about
things that people in the community have said about
Governmental activity?
Ms. Callahan. I would be happy to answer the Standish
question whenever the Members have given me the time to do so.
Mr. Meehan. Thank you so much.
I will turn it over to the Ranking Member, Ms. Speier.
Ms. Speier. Thank you, Mr. Chairman.
I am deeply troubled by the document that has just been put
into the record by EPIC.org. While you have probably not had
the opportunity yet to review it, Mr. Chairman, I would like to
request that after they do review it, that they report back to
this committee and provide us with answers to the questions
raised. But I am going to start with a couple of them.
They made a FOIA request back in April. DHS ignored it.
Then EPIC filed a lawsuit on December 23, 2011, when the agency
failed to comply with the FOIA deadlines. As a result of filing
the lawsuit, DHS disclosed to EPIC 285 pages of documents.
So I am just making note of that. You shouldn't stonewall.
When a FOIA request is made, you should comply with it within
the deadlines. No entity should be required then to file a
lawsuit. So I am just putting you on notice about that.
But what is interesting about what they have pointed out is
that, while you say there is no personally identifiable
information in this contract that General Dynamics has, in fact
they point out that there are some exceptions to the no-PII
rule. One of them allows for the collection of personally
identifiable information of anchors, newscasters, or on-scene
reporters who use traditional and/or social media. This would
allow the agency to build files on bloggers and internet
activists, in violation of the Privacy Act.
I find that outrageous. I would like to ask you to amend
the contract with General Dynamics to exempt that kind of
information from being collected.
Ms. Callahan. First, ma'am, with regard to the FOIA
response, I completely agree. It did not meet my standards in
terms of the timeliness of the response, and I have taken
action to look into why it was delayed. That was unacceptable,
and I completely concur with your statement.
With regard to the reporters, to clarify, the reporter's
information is collected--and, as noted in my written
testimony, the only information we collect on the reporters, if
at all, is the name, their affiliation, their title, if any,
and their publicly available identification. We are only
collecting the information if it adds to the credibility of the
report or allows coordination.
So it is very rare that we actually collect any information
about the reporters. But it could be a circumstance where you
link to a reporter's blog who is at a news site. For example,
in Michigan and the train derailment, if the person posted it
on his personal blog, we may be authorized to link to it. We
would not be authorized to collect it or use it for a
personal--an individual, but only if the reporter is relevant
and adds credibility to the report itself.
Furthermore----
Ms. Speier. I am----
Ms. Callahan [continuing]. To clarify, ma'am, just to
clarify, the reporter information is only stored in that
report. We are not cutting across the different reports. We are
not saying how many different reporters do it. It is
information that is publicly available, and it is not
associated with their opinions but instead with the situation
or the event that is occurring.
Ms. Speier. I am suggesting to you that it is irrelevant,
you do not need it, and you should suspend that part of the
contract.
Now, this document also suggests that you are capturing
public reaction to major Government proposals. Now, again, if
this is, in fact, true, if this is part of the contract, I
believe that should be suspended as well. This is not a
political operation; it should not be a political operation.
Capturing public reaction to major Government proposals is not
something you should be doing.
Ms. Callahan. I completely agree with you, ma'am. I 100
percent agree with you, which is why the report that they point
to on page 118 in the FOIA report actually was never a live
report. It was never disseminated by the National Operations
Center. It would not have met the privacy standards that are in
the five publicly available Privacy Impact Assessments we have
done. Furthermore, it is an example of an early August 2009
example of what could be possible. We, together with the
National Operations Center, agreed that that is well outside
the scope.
In fact, if you look at the document, it is within a very
early, February 2010, training manual as an identification of a
weekly report, because it is a compilation of other elements.
If you look at the previous pages, you can see that they
identify, like, ``This is not acceptable,'' ``This is not
appropriate,'' ``Redact the personally identifiable
information.''
That Standish, Michigan, report is one that only appears--
actually, the only place it exists in the Department is in my
files because of the privacy compliance review we did before
launching the initiative. It is----
Ms. Speier. All right. My time is about to expire, so let
me suggest the following. EPIC makes three recommendations at
the end of their report. They recommend you cease collecting
information on journalists' activities, that you suspend the
social network and media organization monitoring program until
safeguards are put in place, and that you comply with providing
Congress with an annual report that sets out in detail the
legal standards for this activity. I, for one, wholeheartedly
agree with their recommendations.
Mr. Chairman, I actually think we should have EPIC and
others in the privacy community come and testify. I am deeply
troubled by what we have heard so far this morning.
The fact that you agree with me but yet much of this
conduct continues is deeply troubling.
I yield back.
Mr. Meehan. Thank you, Ranking Member Speier.
At this point in time, I would like to turn it over to the
gentleman from Mississippi, the Ranking Member of the
committee, Mr. Thompson, for questions he may have.
Mr. Thompson. Thank you very much, Mr. Chairman.
Ms. Callahan, will you provide the committee with a copy of
the FOIA information that you provided to EPIC?
Ms. Callahan. Of course. Absolutely, sir.
Mr. Thompson. Thank you.
Also, will you provide us with your analysis of why the
FOIA request went unresponded to and what did you do in that
situation but also what will you do going forward so that other
requests won't be treated so cavalierly?
Ms. Callahan. Absolutely, sir.
Mr. Thompson. Mr. Chavez, do we create log-ons to monitor
individuals in this process?
Mr. Chavez. Actually, we do not monitor individuals at all.
What we are looking for, again, as I talked about, the
keywords. Within the keywords you won't find anyone's name.
Like, say, they are all verbs, those types of things that we
are looking for. So, no, we don't create log-ins for
individuals to do that, and we are not looking or monitoring
individuals.
Mr. Thompson. Are there any times that you take down names
of individuals?
Mr. Chavez. Again, given the seven criteria that we have
for life-saving, those type of circumstances, are the only time
that we would collect the names, use the PII.
Mr. Thompson. Who makes that determination?
Mr. Chavez. That is part of our training course that we do
for the individuals who are doing the media monitoring. We look
at those processes. Again, they are audited twice a year. The
most recent one was just done in November.
Mr. Thompson. Who is ``we'' doing the training?
Mr. Chavez. Actually, the National Operations Center, in
coordination with the Privacy Office.
Mr. Thompson. All right. How does this interface with the
General Dynamics contract?
Mr. Chavez. Those are the individuals who are doing the
media monitoring for us.
Mr. Thompson. So let me get this straight. DHS is training
a private contractor to do the media monitoring?
Mr. Chavez. Part of it, yes, on their privacy rules and
those types of things, indeed, we are.
Mr. Thompson. Why are we training private contractors?
Mr. Chavez. Well, to collect--their skill set, to collect
the information we are. But what they don't come with is,
again, the DHS guidance that we have to give them.
Mr. Thompson. I thought private contractors generally had
an expertise that we didn't have internally as an agency, and
we would go outside to pick that capacity up. But now what you
just said is for some reason we are training the outside people
to do the internal work.
Mr. Chavez. It is not overall training. Again, they do have
those skill sets that they use. What we add from the
Department, again, are those checks that we use to ensure,
again, that the privacy guidelines are complied with. That is
the part of the training that we do, and that is it.
Mr. Thompson. Well, explain to me what skill sets General
Dynamics, with an $11 million contract, would have outside of
DHS's capabilities.
Mr. Chavez. Well, what they offer, again, is the 24/7
monitoring of those sites. They are skilled technicians in
surfing the web and also doing an analysis of the information
that they get when they do get hits on websites and producing
synopsized reports that, again, comply with the privacy
guidelines that are out there, and pushing those out to us so
we can send those out to our partners.
Mr. Thompson. So your testimony is we don't have the skill
sets at DHS to monitor websites?
Mr. Chavez. We do. Right now, again, we have that as part
of one of our contracts that is out there.
Mr. Thompson. Is it a sole source contract?
Mr. Chavez. No, it is not.
Mr. Thompson. Well, will you provide the committee with the
procurement document? How long has it been out there?
Mr. Chavez. I will get back with you on that. I will give
you the full details on it.
Mr. Thompson. Was the original contract for the $11 million
a sole source contract?
Mr. Chavez. I do not know. I will have to check on that for
you, sir.
Mr. Thompson. How long have you been working with the
agency?
Mr. Chavez. Two years.
Mr. Thompson. How long has this General Dynamics contract?
Mr. Chavez. In the 2 years I have been there.
Mr. Thompson. So you inherited the General Dynamics
contract?
Mr. Chavez. Yes, sir.
Mr. Thompson. All right. Well, please get it to me.
The questions raised by the EPIC insertion, as well as what
everyone has commented, raise significant issues around
safeguards. Mr. Chairman, I think you would help a lot of
people if at some point we could, as Ranking Member Speier
suggested, maybe bring those individuals and others who might
have an interest before the committee to talk about it.
I yield back.
Mr. Meehan. Thank you, Mr. Ranking Member. We appreciate
your presence here today on the subcommittee.
The Chairman now recognizes the gentleman from Minnesota,
Mr. Cravaack.
Mr. Cravaack. Thank you, Mr. Chairman.
Thank you for coming here today and briefing us.
I think what everybody is really concerned about here is
our Constitutional rights. Because we in the United States, we
have this great document called the Constitution, and we have
to walk this fine line of data attainment to protect the United
States but to, at the same time, make sure that we have
safeguards in place that we have freedom of speech, which we
value highly.
So, with that said, what safeguards are in place that when
the DHS does collect and distribute personally identifiable
information, PIIs, outside a specific narrow event such as a
life-or-death situation, can you kind of expand upon that a
little bit?
Then with that said, what would be the penalty associated
with distributing that information illegally? Have there been
any cases where that has occurred?
Is there a report currently going from General Dynamics to
you, to Congress that would also, when these people are
identified, that Congress is aware of that?
So, with that, Ms. Callahan, could you start off?
Ms. Callahan. Absolutely, sir. Thank you very much for that
question.
As I have described and Mr. Chavez has described, the only
personally identifiable information that can be collected are
these seven very narrow categories: Public officials or in a
public event or making a public statement or life-or-death, as
you pointed out.
As part of the review by the National Operations Center,
every week they go and check to make sure no personally
identifiable information is provided. I review each of the
media monitoring that I receive as part of the ordinary course
of business, just to see if they continue to comply with the
privacy protections that we describe in our five publicly
available Privacy Impact Assessments and privacy compliance
reviews. We then do these semi-annual reviews of the entire
system to look at all the processes therein.
Prior to me authorizing any personally identifiable
information, there were, to my recollection, two circumstances
where public officials were named in the circumstance--for
example, President Obama. There was no circumstance with regard
to individuals who are not in a public capacity who have been
named.
Actually, that example of having a public official like the
President is why we agreed to have those seven very narrow
categories that could be disclosed. Again, identifying
Gabrielle Giffords as the target of the attack in Arizona
actually helped coordinate the response more quickly, because
we had that authorization.
With regard to the penalty, if, indeed, that had taken
place, there would be significant penalties. There would be
training and possibly taking them off the job if, indeed, there
was a recidivist behavior. We have not yet seen that.
With regard to a report from General Dynamics, I don't know
of that, but I do know that we have been doing these semi-
annual privacy compliance reviews, which are available on our
website, for exactly the reason that everyone has identified:
To make sure that we are following the privacy protections that
we have identified and that we are not monitoring, reviewing,
or collecting First Amendment-protected speech.
Mr. Cravaack. Mr. Chavez, do you have any comment on that,
as well?
Mr. Chavez. No, that is exactly it. Again, we follow the
guidelines that the Privacy Office sets forth. We do audit on a
regular basis the individuals who are doing those types of
things. We have a series of individuals that are reviewing the
data, again, to make sure that the PII is not inappropriately
passed on, displayed, or stored.
Mr. Cravaack. Okay.
I would like to dovetail on what the Ranking Member said.
Why did you pick General Dynamics, for example, to be the
contractor for monitoring social sites and not keep it in-
house, so to speak?
Mr. Chavez. Sir, again, that was before my time. That is
the contract I inherited. But I can get you the information on
that.
Mr. Cravaack. Okay. Who in DHS issued the directive for
this establishment of this committee? You know, I agree, you
have to get resource information and intelligence anywhere you
can possibly get them, for various reasons. But who initiated
the directive to initiate this social networking?
Mr. Chavez. DHS did, again, before my time, right after
Hurricane Katrina. Again, with the advantages of looking at the
media to get a more timely response, see what is going on,
provide greater situational awareness, the decision was made to
monitor the social--or the media monitoring, traditional media.
Then later on it evolved into the social media.
Mr. Cravaack. Okay. One of the things that did kind of
raise a red flag for me is reports on DHS components and other
Federal agencies, positive or negative reactions to certain
Federal organizations. Who gave that directive?
Ms. Callahan. As I understand, sir, that is part of the
General Dynamics contract. As was said, it predates Mr. Chavez.
The purpose of that is not to keep track of what they are
negatively saying, but for operational purposes to understand
whether or not the Department is candidly meeting its
standards. If, indeed, there is a long line as TSA, we don't
care who is in the long line, but if someone tweets and says
there is a long line, we then convey that information to TSA.
It is part of the operational awareness that the National
Operations Center does.
Mr. Cravaack. Okay. My time has expired. I do have an issue
with that, but I will yield back at this time. So thank you.
Mr. Meehan. Thank you. Thank you, Mr. Cravaack.
So, at this moment, the Chair will recognize the gentleman
from--it is ``Missoura'' where you are from, right, not
``Missouri''?
Mr. Long. Right. You bet.
Mr. Meehan. Mr. Long.
Mr. Long. Thank you, Mr. Chairman.
Mr. Chavez, what can the agency point to as your legal
basis for your social network and media monitoring program,
which a lot of us I think today have expressed concerns
threaten important free speech and expression rights? What
legal basis can you point us to that either this activity could
even be concerned with----
Mr. Chavez. It was, again, Section 515 of the Homeland
Security Act, as amended, to provide situational awareness and,
again, that common operating picture.
Mr. Long. That is the legal basis for it?
Mr. Chavez. Yes, sir, that is the legal basis.
Mr. Long. Okay.
Ms. Callahan, I, as a lot of us today, are very concerned
about the chilling effect on our core First Amendment rights to
political speech and free speech in general. Are there--what
can you point us to? Are there protections to ensure that only
necessary personal data is used and retained no longer than
necessary to protect against accidental or deliberate misuse?
Ms. Callahan. I, too, sir, am very concerned about the
First Amendment and want to make sure that that is wholly
protected with regard to this activity. We spent 9 months
designing this program and have detailed it in the public
Privacy Impact Assessments and compliance reviews.
The standard by which we operate is, again, not the ``who''
but the ``what is taking place.'' What is the event that is
going on? If an individual alerts us to that event, then that
is the first report, but not the exclusive report.
The way, sir, that we have the privacy protections embedded
into the program is to make sure that no personally
identifiable information is collected or disseminated unless it
meets those seven categories.
Mr. Long. No what information?
Ms. Callahan. Personally identifiable information.
Mr. Long. Okay.
Ms. Callahan. No personally identifiable information is
collected except for those public figures or in a life-or-death
circumstance. The National Operations Center goes and very
robustly audits that, and then we go in every 6 months to make
sure that, indeed, the representations are correct.
The personally identifiable information, the very narrow
topics--which, again, are public figures making public
statements or part of an event, or a life-or-death
circumstance--are stored only in the report. We are not doing a
table or an analysis of each of the different reports. They are
only stored in that.
In fact, I published a System of Records Notice, which is
required under the Privacy Act. It was not necessary for me to
do this; the general System of Records Notice for operations
would have covered this activity. But for transparency
purposes, when I finally authorized the use of personally
identifiable information, we published that System of Records
Notice to go and say, these are the seven categories that we
are doing--public figures at public events, or life-or-death
circumstances--in order to be very clear about what we are
doing with information and, candidly, sir, what we are not
doing with information.
Mr. Long. So, in your mind, you are convinced that what you
are doing is consistent with existing DHS policy?
Ms. Callahan. Consistent with DHS policy, consistent with
the Privacy Act, and consistent with the First Amendment, yes,
sir.
Mr. Long. Okay.
I have another question for you, Ms. Callahan. As the
public becomes aware of Government activity monitoring social
media to gain rapid understanding of events, what are the risks
of people or groups trying to affect those events, I guess--
say, people with bad intentions using the different platforms
of social media to manipulate the Government understanding to
their advantage? What can be done to guard against this
problem?
Ms. Callahan. My colleague Mr. Chavez may also have some
thoughts about that. But I think that, because we don't rely on
just one individual source but we actually confirm the sources
and look for making sure that we have multiple sources
identifying, for example, the train wreck in Michigan, would be
one element.
Also, to confirm, the National Operations Center, the
situational awareness, is not attempting to investigate or
confirm the validity of the event, just that an event has been
reported.
Mr. Chavez.
Mr. Chavez. Ms. Callahan is absolutely right. No single
source of information ever provides us with a complete picture.
Oftentimes we use multiple sources--or, all the time we use
multiple sources of information to corroborate information that
we are getting in.
So it is all part of the big picture. In order to get the
big picture, again, in this environment, we look to multiple
sources that are out there, not a single source, to corroborate
that information that is being produced.
Mr. Long. How does that affect people trying to I guess put
a different spin or take advantage of----
Mr. Chavez. There is always that--yes, there is always that
deception.
Mr. Long. That was kind of my question.
Mr. Chavez. If it doesn't match up with the preponderance
of information coming in that is counter to the information we
are receiving, then we can pretty much write off that. Plus we
are not investigating that information, we are turning that
over to the appropriate law enforcement or Government agency to
look at what is happening again and is it really happening.
Mr. Long. Okay. I have no time to yield back, but if I did,
I would.
Mr. Meehan. Well, thank you, Mr. Long. Thank you for your
questions. I am going to exercise the prerogative to ask a
couple of follow-up questions and certainly would make that
opportunity available to anybody who would like to as well or
not.
Ms. Callahan, you spent some time talking about the
circumstances in Michigan and about some protections. I know
you haven't stated it today I spent time going through your
written testimony and other sorts of things. I know you
suggested that this is an anomalous circumstance. This is being
identified as an event that happened, but maybe the statement
would be but it wouldn't happen today. You have a moment, tell
me how you have cured that kind of a circumstance and how we
would not have a repeat where there is an incident that occurs
in which the Government begins to be looking for the
information that was disseminated, collected, and disseminated
in Michigan.
Ms. Callahan. Yes, thank you, sir. To clarify slightly,
that information was never disseminated, it was never a live
report, it does not meet the standards of the privacy impact
assessments and would not have actually been done. It was an
early example of what could possibly be done. Together with the
National Operations Center, we both agreed that we don't care
about First Amendment speech, we don't care about the events.
Mr. Meehan. Well, you do care. What you are trying to say
is that is not what you are inquiring about?
Ms. Callahan. We care about the events, not the First
Amendment elements. Right, we care about the events. Candidly
even in that example, Guantanamo Bay and the transition of any
prisoners from Guantanamo Bay is actually not within the
Homeland Security mission. So it wouldn't even have met that
threshold question. That is the current threshold standard that
we implemented since January 2010, making sure it is a Homeland
Security mission and an event and a situation. So for those two
that is kind of a threshold point. We then would not--as I
said, no element of First Amendment protected speech is
collected, disseminated, or analyzed.
We also make sure that--as I said, I review the media
monitor reports when I receive them to make sure that they
continue to be compliant, that we are only reporting on the
what and not the who. So I think all of these multiple levels
are an example of why that Standish, Michigan, to give an
example, is an anomaly. It is obsolete, and it only is in the
handbook that was done, that is 2 years old, and was quickly
replaced once we started to work on the pilots and to fine-tune
to make sure that we can provide situational awareness and
protect privacy.
Mr. Meehan. Let me go back then to prospectively where we
may be looking at other kinds of events, as you say the who,
not the what. Now I know there were attempts to look at things
like the Olympics, there was an effort to track information
that may be related to that. I can foresee a number of other
events, conventions, are you going to be monitoring activity
around conventions?
Ms. Callahan. Again, I turn it over to Mr. Chavez, but we
do monitor National security special events to make sure. For
example, we monitored the Super Bowl. But again it is not about
the who, but the what. How are the roads moving, how are the
processes, are there any suspicious activities?
Mr. Meehan. You are not calling in the plays for Bill
Belichick, are you?
Ms. Callahan. I abstain on which--who I was supporting in
the Super Bowl, but it is the what, it is the event.
Mr. Chavez. Holistically we are monitoring the whole
Homeland Security enterprise, not just the events. We are
looking for the same, again, keywords criteria that would
indicate any type of action----
Mr. Meehan. You keep saying keywords. What I am trying to
get to is who begins the process of identifying what should be
analyzed. I guess the what, not the who, but who is it that is
saying to go after the what. I don't know where this has begun.
Mr. Chavez. Right. It is not the National Operations
Center. Again the National Operations Center is the messenger.
Mr. Meehan. Who is giving the direction? I want your
analysts to look into X. Where does that come from?
Mr. Chavez. That again does not come from the National
Operations Center.
Mr. Meehan. I know it doesn't.
Ms. Callahan. So if I can just step back for a second, sir.
The National Operations Center is to provide situational
awareness for the entire Homeland Security enterprise. The way
that we implemented the Social Media Initiative was to provide
these keywords that you can use on publicly commercially
available software that you can basically refine, no see
individual Tweets, but see what is trending and what is
happening and if there are elements. The keywords, as I said,
are disclosed in my privacy impact assessment.
Mr. Meehan. But when your analysts start work in the
morning, do they just pick up a keyword book and start going
out looking for----
Ms. Callahan. No, it is programmed in all the time, is what
I was going to say. It is programmed in all the time. We don't
modify the keywords, disaster, flood, tornado, train wreck,
derailment, those sorts of things.
Mr. Meehan. You keep talking to me about incidents that are
disasters, and I get that. We are going to put that aside. Part
of the mission here was to monitor activities that may be--we
are Homeland Security, we are worried about the potential that
there could be someone acting in some capacity that would
threaten our homeland and cause harm to the American citizens.
I get that, too. We are also worried about the fine line in
which people may be talking about things they don't like about
their Government, it is legitimate protest. So where are there
activities that are taking place that it could be a
collaboration of individuals from outside the country that are
meeting at a convention all over the world. Does somebody say,
hey, let's watch what is happening there. I need to know where
this process begins, who's telling people to track the what?
Mr. Chavez. The individual Government agencies we provide,
we will call them our customers, are the ones who determine
whether or not the data is actionable or not, whether or not to
pursue a follow-up, each of those executing their own
authorities to do the investigations to collect intelligence in
those type things. Often again the reports we provide through
the social media monitoring are a supplement to getting the
information to these organizations.
Mr. Meehan. So it might be a legitimate investigative
agency that has the capacity to in their own right but using
legitimate investigative tools and protections, they are asking
you to get secondary publicly available information that fills
a gap or something of some sort?
Mr. Chavez. Most definitely. Again once the reports come in
we very seldom get the direction from an outside organization
to look for specific things because under their own authorities
they can drill down farther than the National Operations Center
can on information that was provided.
Mr. Meehan. Where does the top of the line come from; is
this a career professional that makes these decisions or public
appointee in the DHS who may be overseeing what is being looked
at?
Mr. Chavez. Let me take an example of the intelligence
field with their skill sets they have in the enterprise. There
are individuals, both political appointees and senior
officials, that again take a look at the information they have
and decide whether or not to take action on to pursue
investigations to open up whatever, again under their
authorities, they can do to defend the homeland and produce
that information in these reports.
Ms. Callahan. If I could summarize, sir. The Situational
Awareness Initiative we have been talking about is essentially
breaking news, here is what is happening. To your point, if
indeed someone receiving a report of breaking news and they
have the underlying authority to investigate it, then they go
off on their own track and the operations nor does the Privacy
Office know they are doing it separate and apart from we are
going to do audits and reviews of social media when the
management directive is final. So they are breaking news and
then other there are other authorities in the Department and
also throughout the Federal Government.
Mr. Meehan. Final question. Breaking news, the Attorney
General just decides he is going to try Guantanamo detainee in
New York City. There is a lot of news about that now. Is it
possible that you would be contacted by somebody who said
follow what is happening, report to us what the reaction is to
that?
Mr. Chavez. In the history of the time I have been at the
National Operations Center, no, sir, that has not happened.
Mr. Meehan. What would be your protection against that kind
of request? How to you tell a political appointee who is high
up in the administration that is not appropriate for us to
monitor?
Mr. Chavez. It is not only appropriate, it is not under our
authority. It is illegal to do that.
Mr. Meehan. Well, that is a good answer to any kind of a
political appointee. At this point I have gone well over my
time.
Mr. Thompson.
Mr. Thompson. Yes, I do. Ms. Callahan, you talked about
taking 9 months to put this program together.
Ms. Callahan. Yes, sir.
Mr. Thompson. Did you vet the program with any outside
stakeholders or was it strictly an internal process?
Ms. Callahan. Actually, sir, with regard to the situational
awareness I discussed it in my quarterly meeting with advocates
that takes place, I believe after the initiative launched but
before it became a program, so during the three pilot phrases.
In addition, one of my staff testified in front of my FACA
committee, the Data Privacy and Integrity Advisory Committee
early in the process. In fact in December I had hoped to have
one of Mr. Chavez's colleagues testify in front of the Data
Privacy and Integrity Advisory Committee, but unfortunately--he
was there, he was prepared to testify about this very issue
because of the importance of the issue but we ran out of time.
But yes, we have discussed this publicly and gotten advice on
it.
Mr. Thompson. Well, I am concerned that given what I am
picking up that there are a lot of people who have interest in
privacy and this whole area that has not been included in the
discussion. What I would like for to you do is provide us with
those organizations or individuals who you have collaborated
with over that 9 months to develop this program.
Ms. Callahan. To be clear, sir, I did not discuss this
outside the Department until it was launched as a pilot under
the Haiti earthquake, but then I did discuss it, as I said, in
several advocate meetings, that I have quarterly advocate
meetings with advocates and we did discuss it publicly in the
FACA committee. But we are happy to provide you that
information. Yes, sir.
Mr. Thompson. Whoever the advocate, whoever attended, how
broad that attendance is, all that, just please get it to us.
Ms. Callahan. Absolutely.
Mr. Thompson. The other concern I have is taken off of from
what the Chairman was talking about, is the notion of
identifying political and journalistic activities that reflect
adversely on the agency or the Federal Government. Ms. Chavez,
it is your testimony that you don't do this?
Mr. Chavez. Indeed, we don't do that. What we do do again
is if there are long lines at the airport, at the screening
centers, those types of things, those would come up to us, and
we would pass it on to the appropriate DHS component for action
again through corroboration, is this really happening, what is
happening and what we need to do to fix that. But identifying
individuals again or an individual that is making that would be
irrelevant to us. There is something happening, go check it
out.
Mr. Thompson. Well, okay. I will go back to the General
Dynamics contract again. Obviously some of us are troubled by
it. Why would you ask them to look at the Drudge Report or New
York Times or L.A. Times?
Mr. Chavez. We don't focus again on any one media source.
There are many that are out there. It all goes back to the
information that they are providing, not the provider of that
information.
Mr. Thompson. So they are the only source of--so in other
words, they have this expertise that they can look at the blogs
and read the newspapers better than the Department if that is
what you want to do?
Mr. Chavez. Well, you have to look at it also. We are not
in here currently watching television or looking at the media
reports that are coming in. We all have a vested interest in
this Homeland Security. So what we are providing is a service
where we are looking at individual action or actions that could
be happening around the United States and elsewhere that again
we see and push that information out to the Federal Government
and our State and local partners, the entire homeland security
enterprise, to let them know that something is happening. They
may already see it and be acting on it, in which case we would
receive information from those agencies on here is what is
currently going on with this also.
Mr. Thompson. Ms. Callahan, to your knowledge are there any
other branches of the Federal Government who are doing similar
kind of programs?
Ms. Callahan. I don't have a comprehensive knowledge of
this, but I do know that National Operations Center has a
unique statutory responsibility to provide situational
awareness to the Federal Government. So I am not aware that
anyone else is doing that given the NOC's authorities.
Mr. Thompson. FBI, DOD, nobody to your knowledge?
Ms. Callahan. I believe they are operating within their own
authorities consistent with what I discussed with the Chairman.
Mr. Thompson. I just asked you.
Ms. Callahan. I don't know, sir, sorry.
Mr. Thompson. So you don't know--you designed the program
without any review of whether or not another agency is doing
it?
Ms. Callahan. As I said, sir, I believe the NOC's statutory
authority is unique.
Mr. Thompson. No, no, no, just answer the question.
Ms. Callahan. I do not have any other knowledge.
Mr. Thompson. You said it took 9 months to put the program
together, and I just want to know as part of your due diligence
did you check and see whether or not another agency within the
Federal Government was doing something just like this. I would
assume that the FBI would be doing something like this, I would
assume that DOD would be doing something like this, just given
their mission. If you say you don't know, I don't think that is
the right answer from a due diligence standpoint.
Ms. Callahan. I can check with my staff, and maybe Mr.
Chavez is aware of what other people are doing in this. We are
trying to be very transparent about what we are doing and
perhaps the other departments have not necessarily taken that
tack.
Mr. Chavez. I am not aware of anyone else that is doing the
social media monitoring at again the unclassified level. The
intelligence community with their skill craft may, but no, I
don't.
Mr. Thompson. I yield back, Mr. Chairman.
Mr. Meehan. Thank you, Mr. Thompson. It appears to me as we
have been going through this issue I have got the very
difficult recognition that as I chastise my children about
spending significant time on Facebook, they are now going to be
saying to me, well, dad, it can be a career.
At this point let me turn it over to the gentleman from
Minnesota for a few follow-up questions.
Mr. Cravaack. Thank you, Mr. Chairman. Does DHS use any
other contractors to monitor to the best of your knowledge?
Mr. Chavez. Right now, no, we don't, sir.
Mr. Cravaack. Is there any plans to?
Mr. Chavez. Right now we have got all we need with, again,
the services being provided.
Mr. Cravaack. Just kind of dovetailing what the Ranking
Member was saying, one of the things I read is that you want to
capture public reaction to major Government proposals. You are
monitoring positive or negative reports on FEMA, CIA, ICE.
Mr. Thompson. Would the gentleman yield?
Mr. Cravaack. Yes, sir, I will yield.
Mr. Thompson. I asked you a question about the General
Dynamics contract. You told me there was an RFP out right now.
That was your answer to me on social monitoring. You look back
to the gentleman, you said it wasn't sole source, it was open.
That was your answer to me then.
Mr. Chavez. It is a firm fixed contract, not sole source.
Mr. Thompson. But you said there is an RFP out right now.
Mr. Chavez. RFP. I am sorry, I am not familiar.
Mr. Thompson. Request for proposal. We talked about the
General Dynamics contract. We asked about it. Your conversation
talked about whether or not it was sole sourced or it was open,
and you indicated that we are going out looking for another
contract right now.
Mr. Chavez. No. If I did, sir, I apologize, sir. I stand
corrected. It is a firm, again, fixed contract and again not
sole sourced.
Mr. Thompson. How long is this fixed for?
Mr. Chavez. Actually, I don't have that information. I
don't have the fixed.
Mr. Thompson. Thank you. Thank you for yielding.
Mr. Cravaack. Yes, sir. I will reclaim my time. Going back,
it was mentioned some of the--you know, FEMA, CIA, CBP, ICE--
these are organizations that are outside of DHS. Now if
somebody--if there was an organization outside of DHS
requesting this information, would you provide it to them?
Mr. Chavez. We don't normally get, again, requests for
information. We just take it from the media and push it to the
organizations that are out there because they have their own
information authorities, gathering authorities and those types
of things that they use. So they use our media monitoring
reports to supplement what they have already got.
Mr. Cravaack. The thing I am really having problems with I
guess is the Government proposals, reactions to Government
proposals and then feeding that information to different
organizations within the Government. You are using a public
sector source that may be used for private individual
attainment of information for other reasons then that would
benefit the public. That is what I am concerned with and how
would you go about preventing this from occurring?
Mr. Chavez. That specific purpose of the media monitoring I
have never encountered. Again, the only kind of evaluation, if
you will, of the departments or other Government agencies is
just, as I said, there is a service that is being provided,
that again there is a hold-up at the airports, as Ms. Callahan
said also, but to go out and solicit that information or to
collect it. I have not seen this in my tenure at DHS.
Mr. Cravaack. Well, now this hearing has occurred, I think
you have a higher profile. But my question would be what are
the checks and balances in there from ensuring that this is not
used for private initiatives?
Mr. Chavez. Again, with the information that comes in it is
reviewed by a number of individuals throughout the National
Operations Center and Operations Coordination and Planning to
ensure that the compliance with the PIIs out there and the
distribution lists also are pre-approved so that it doesn't get
out to sectors, again so we don't compromise proprietary
information and those types of things.
Mr. Cravaack. Can you give me an example of what kind of
information you have been gleaning thus far in regard to
Government proposals?
Mr. Chavez. I am not aware of any information we have
gathered on Government proposals.
Mr. Cravaack. Okay. All right. Say I am ICE or say I am
those who would be interested in the gun walking down in Mexico
and I want to get information in regards to what is the public
reaction to this. Say I am an organization, I am just trying to
use broad general terms so we don't have to get into another
area, a realm. How would you go about that request?
Mr. Chavez. Again, that would not be a request that was
appropriate or a function of the National Operations Center.
Given our, again, authority under the Homeland Security Act for
a situational awareness or operating picture, we are not a
pollster, we don't again solicit for opinion. We are putting
down actual incidents that are happening at any one time.
Mr. Cravaack. Okay, I am the Attorney General, I am asking
for this information.
Mr. Chavez. Okay.
Mr. Cravaack. What are you going to tell him?
Mr. Chavez. Again, that is not the appropriate mission or
within our authorities for the National Operations Center to
gather that information. There are other organizations within
in the Federal Government who do have the authority to gather
that information more thoroughly, again, than we do.
Mr. Cravaack. Mr. Chavez, you are telling the Attorney
General that I cannot acquire this information, this is a vital
need for American security.
Mr. Chavez. It would be outside the skill set of what we
actually do. We are not the source for that. So I would not be
afraid to tell the Attorney General that we are not the
organization that does that.
Mr. Cravaack. You are an Air Force officer, aren't you?
Mr. Chavez. Yes, sir.
Mr. Cravaack. Hooray. With that, I yield back.
Mr. Meehan. Mr. Long, do you have follow-up questions?
Mr. Long. Well, you know that, sure. Thank you, and to my
friend from Minnesota Mr. Chavez may be better known after this
hearing but I just checked Twitter and we are not yet a
trending topic on there.
The longer I sit here I think the more confused I get. The
title of what we are supposed to be talking about today is
``Department of Homeland Security Monitoring Social Networking
and Media: Enhancing Intelligence Gathering and Ensuring
Privacy.'' We are all kind of in agreement on that?
Ms. Callahan. Yes, sir.
Mr. Chavez. Yes, sir.
Mr. Long. Of course we had a classified briefing yesterday
and I came away from that thinking what we were trying to do is
protect the homeland and watch for events that may affect the
security of citizens here in this country. But yet today I keep
hearing about breaking news, which Twitter is pretty good for
that. So either one of you can answer this if you want. I
appreciate you being here today, but what is your charge? I
have a disconnect with the breaking news, trying to follow that
up. I mean that is history, breaking news has happened.
Prevention and protecting the citizens while ensuring their
Constitutional rights is a whole different can of worms. So
both of you can answer this: What is your charge? What do you
visualize your job and the agency job as far as--am I
completely off-base that we are supposed to be trying to
protect the homeland while ensuring privacy, as they say?
Ms. Callahan. You are correct that that is our mission.
That is the point of this hearing. I think the disconnect
perhaps is that, as I pointed out in my oral testimony, there
are three uses of social media. We have been focusing on the
second, which is the situational awareness, which is the
breaking news element, to know there is an event that could
impact the homeland.
The third element, which is the operational use you spoke
to the under secretary yesterday, about when we would do it
consistent with our authorities for law enforcement or other
investigatory purposes using social media if there was a
predicate, some sort of reasonable suspicion or elements for
that. That is kind of the third element on the prevention side.
Mr. Chavez and I have been speaking a lot about the situational
awareness, which is the second of the three uses that the
Department uses social media for.
Mr. Chavez. The National Operations Center again is part of
the bigger picture out there. We are one of the tools that
again the agencies use to again monitor the homeland and those
types of things, again that they do under their own authority.
So to put the intelligence piece in there with the Nation
Operations Center, we are providing through the National
Operations Center another piece of information that again those
individuals who can use intelligence under their authorities or
enhance their operations as with ICE, as was brought up in the
other departments or components of DHS, that is what they do
with it. We provides one piece of the information, the total
information that is out there that they can use and that source
again is the media portion of that.
Also, because the intelligence and all those other
communities that are out there looking at it, again may not see
something happening because they are executing a mission that
is out there. What we do again is provide that service that
something is happening, turn it over to the appropriate
Government agency, to include State----
Mr. Long. That is all after the fact, correct?
Mr. Chavez. Indeed. There are other organizations that
again that are looking at the prevention piece and looking,
doing assessments to determine what threats may be coming at
us. We are dealing with the here and now.
Mr. Long. I am sure there is something I am missing because
I can't believe that we would go to all this effort to look
into breaking news.
Ms. Callahan, another question for you to wrap up. I am
going to try this, can you describe the Department's on-going
privacy and civil liberty protection oversight process that is
in place now to ensure citizens' Constitutional rights are not
violated during the execution of the Department's social media
monitoring?
Ms. Callahan. Yes, sir. Thank you very much for that
question. The Congress has been very generous with my oversight
authority, and as I have described earlier, we have been doing
mandated, required privacy compliance reviews that we publish
on the website. To be clear about what is going on with regard,
we are doing these reviews every 6 months, in fact February we
started again.
We are also authorized to do investigations into individual
types of use of social media, as I said kind of that third
category in an operational sense. We are finalizing a
management directive to make sure that everyone complies with
privacy protections across the board with regard to
investigations and operational use. In there we are requiring
audits every 3 months, as well as specific investigation by my
office. So we take this issue very seriously and we try to be
as diverse and robust in working with the Office of Civil
Rights and Civil Liberties in all three categories in which the
Department uses it--communication, situational awareness, and
operational use.
Mr. Long. During those 3-month and 6-month checkups are you
finding things that are of concern to you about people's
Constitutional rights?
Ms. Callahan. We have not. No, with regard to the
situational awareness, the second use that the Department uses,
the National Operations Center has been very consistent with
the public-private protections that we have identified.
Mr. Long. Thank you all for being here today and I yield
back.
Ms. Callahan. Thank you, sir.
Mr. Meehan. Thank you, Mr. Long. I want to express my
appreciation to the panel for being with us here today. I think
we have begun an important discussion, and there is
appreciation of the difficult charge that you share with some
of the other agencies here who not only protect our homeland
but American interests around the world. I am grateful for your
service in that capacity.
I think all Americans appreciate the huge challenge of
fulfilling the responsibility of having the imagination to
appreciate what could happen and connecting the dots real-time,
all of things we are asking you to do to prevent another issue
of terrorism here on American soil, but we also appreciate that
you are one of the real protectors of the individual's rights
to privacy, what it means to be an American, and this is a
delicate and difficult area that I think we have to continue to
explore. I am asking you to continue to use your diligence and
most assuredly to assure that there isn't inappropriate
interference politically, especially inappropriate political
interference in which somebody takes your mission and uses it
for another purpose, and that every effort be made to safeguard
the rights, the privacy rights of individuals.
We may have another opportunity to follow up on things we
did not get into because, as I say, I appreciate what you are
doing at the DHS level. I am cognizant in my own State of
Pennsylvania of the historic context in which State-run but
related fusion centers and otherwise have conducted these same
kind of inquiries, and that information found its way not just
to Governmental entities but to private contractors, private
businesses who were using it for their own purpose. So this
whole question of, you know, who is collecting what
information, what are we doing to safeguard it and what are we
doing to assure that at some appropriate time it disappears.
There is a lot here. I know it is part of your job. I thank
you for the work that you are doing, but we are going to
continue to ask these tough questions because it is vital to
the protection of the most fundamental thing we have, which is
our Constitutional rights as American citizens to privacy and
to be free from inappropriate Governmental intrusion.
Thank for your work and thank you for your testimony. The
Members of the committee may have additional questions for
witnesses. If they do, we will ask you to respond in writing. I
know there are some things that were asked that you go back and
do your best to be responsive to the questions that the
committee did ask. The hearing record will remain open for 10
days.
So without objection the committee stands adjourned.
[Whereupon, at 11:35 a.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Letter Submitted to Chairman Patrick Meehan From Mary Ellen Callahan
and Richard Chavez
March 1, 2012.
The Honorable Patrick Meehan,
Chairman, U.S. House of Representatives, Committee on Homeland
Security, Subcommittee on Counterterrorism and Intelligence,
Washington, DC 20515.
Dear Representative Meehan: Thank you for the opportunity to
testify before you and your subcommittee on February 16, 2012 about
Department of Homeland Security (DHS) review of publicly available
social media websites. DHS remains fully committed to providing the
subcommittee with all of the information it requires on this topic. We
ask that our letter, along with the enclosed attachment, be
incorporated into the official record for the February 16, 2012 hearing
before your subcommittee.
At the hearing, questions were raised regarding contract language
that appeared to permit the use of social media websites to track First
Amendment-protected speech by collecting information on public dissent
or disagreement on Government activities. As detailed in our written
testimony DHS does not now, and has never collected or used, social
media reporting for such purposes. We will modify the existing contract
and all DHS documentation to clarify and align guidance language with
the Privacy Impact Assessments (PIAs).
To further illustrate this point, this week Director Chavez issued
the enclosed memorandum to the National Operations Center (Attachment
1) stating that the Office of Operations Coordination and Planning and
the Privacy Office are currently reviewing the 2011 Media Monitoring
Analyst's Desktop Binder to ensure alignment with the PIAs. Although
the media monitoring efforts are in accordance with the privacy
guidelines outlined in the PIAs it is important that all documentation
relating to media monitoring be similarly aligned. The Privacy Office
will complete its fourth Privacy Compliance Review in mid-March 2012
and this alignment will be part of the review.
Director Chavez's memorandum to the National Operations Center also
reiterates the privacy guidelines that have been in place since the
start of this program: Collection of personally identifiable
information from social media websites is permitted only in specific
circumstances and is limited to the categories described in our written
testimony and in the January 6, 2011 PIA. The information that is
collected may be retained only in the report that is generated, and is
not cross-referenced or tracked in any other way.
We appreciate the subcommittee's interest in our efforts in this
regard. We would be happy to meet with subcommittee staff or Members
individually the week of March 5, 2012 to provide you with any further
information or discussion of these issues you may require. NOC media
monitoring reports are also available for your review.
Sincerely,
Mary Ellen Callahan,
Chief Privacy Officer, U.S. Department of Homeland Security,
Richard Chavez,
Director, Office of Operations Coordination and Planning, U.S.
Department of Homeland Security.
MEMORANDUM FOR: National Operations Center
FROM: Richard Chavez, Director, Office of Operations Coordination and
Planning
SUBJECT: Media Monitoring Guidance Reminder
As part of the fourth Privacy Compliance Review that is scheduled
to occur in mid-March 2012, the National Operations Center (NOC), in
coordination with the DHS Privacy Office, will review the 2011 Media
Monitoring Analyst's Desktop Binder, any associated standard operating
procedures, and the existing media monitoring support services contract
to ensure conformity with all Publicly Available Social Media
Monitoring and Situational Awareness Initiative Privacy Impact
Assessments (PIAs) and to ensure the scope and purpose of the NOC Media
Monitoring Capability (MMC) are accurately reflected and recommend
clarifications and updates to the language if necessary. In the
interim, the NOC will continue to use the PIAs as the authoritative
source to guide the program.
The NOC MMC should continue to limit the review, use, collection,
and dissemination of non-personally identifiable information and the
seven narrow categories of personally identifiable information to
information that affect the operations of the Department of Homeland
Security (memorialized in the January 2011 PIA). No First Amendment-
protected speech relating to dissent or disagreement with the
Department and its activities should be reviewed, used, collected, or
disseminated.
The MMC can review, use, collect, and disseminate information
intended to provide guidance on DHS programs and initiatives that
inform the general public. An example would be the Transportation
Security Administration's PreCheck program. The MMC can also review,
use, and collect information related to oversight reports about DHS
components such as DHS Inspector General Reports or Government
Accountability Office Reports.
The MMC cannot review, use, collect, or disseminate information
related to individuals' positive or negative opinions or reports on the
Department, but for the narrow circumstance where the MMC reviews and
informs the relevant Component of an operational issue adversely
impacting the Component. Examples of these issues include security
violations at airports or ports of entry. In this narrow operational
circumstance, no personally identifiable information can be collected,
stored, or disseminated to the relevant Component.
______
Questions Submitted by Ranking Member Bennie G. Thompson for Mary Ellen
Callahan and Richard Chavez
Question 1. Please explain the circumstances under which DHS might
collect information on journalists.
Answer. DHS does not collect information on journalists (other than
recording the name of the author when saving a particular article so as
to ensure proper attribution, or including a individual journalist's
name that is part of that journalist's social media internet link). As
described below, DHS collects information on events.
In support of its statutory mission to provide situational
awareness and a common operating picture for the Federal Government and
for other homeland security enterprise partners, the National
Operations Center (NOC) within the DHS Office of Operations
Coordination and Planning reviews publicly available traditional and
social media postings to gain an enhanced awareness of rapidly emerging
or evolving incidents and events concerning homeland security,
emergency management, and National health. If a journalist posts a
report on a publicly available social media site about a breaking news
incident relevant to homeland security, the NOC's media monitoring
analysts may use the information posted to build a report that is
distributed to DHS leadership and other homeland security partners
including Federal interagency, State, local, Tribal, and territorial
government entities. The NOC may include reporters' names and
affiliations in the reports as described below.
The NOC includes a particular journalist's name with recorded media
in accordance with the guidelines set forth in the Publicly Available
Social Media Monitoring and Situational Awareness Initiative Privacy
Impact Assessment (PIA) (dated June 22, 2010) and its January 6, 2011
update. As stated in the PIA update and the February 1, 2011 System of
Records Notice, personally identifiable information on seven narrow
categories of individuals may be collected when it lends credibility to
the report or facilitates coordination with Federal, State, local,
Tribal, territorial, foreign, or international government partners. In
such instances DHS will only collect the following limited pieces of
information from journalists: Names, titles, and organizational
affiliation of anchors, newscasters, or on-scene reporters who are
known or identified as reporters in their post or article or who use
traditional and/or social media in real time to keep their audience
situationally aware and informed. Frequently with breaking news on
social media, the individual journalist's name or names of other key
individuals will be part of the story's internet link. In order to
disseminate these publically available links, the NOC must include the
personally identifiable information contained in the link address.
Removing the PII from the link address will render the link, and thus
the story, unusable.
All National Operations Center (NOC) social media initiative PIAs
are available to the public at www.dhs.gov/privacy.
Question 2. Please explain how DHS came to report on information
related to citizens' opinions on moving Guantanamo Bay Detainees to
Standish, MI, and whether this is an appropriate use of social media by
DHS.
Answer. The DHS Office of Operations Coordination and Planning
(OPS) never reported on potential plans to move detainees to Standish,
MI. During the development of the Media Monitoring capability, OPS
developed a Social Networking/Media Capability Analyst Handbook also
known as a Desktop Binder. The purpose of the Desktop Binder was to
serve as a desk reference for media monitoring analysts. In an early
draft version of the Desktop Binder, an example was created based on
actual information related to citizens' opinions regarding moving
Guantanamo Bay Detainees to Standish, MI. This document was part of a
``weekly report example,'' not an actual report in a very early, and
obsolete version of the Desktop Binder. This version of the Desktop
Binder was created while OPS was still in the midst of developing its
media monitoring processes, and before the media monitoring reports
were ever distributed. This example has been removed from the Desktop
Binder, and this information was never released through the situational
awareness reporting channels.
To maintain a capability focused on reviewing incident and event
information, OPS trains analysts to review information in compliance
with the parameters set forth in the Privacy Impact Assessments (PIAs).
During the report production process, reports are reviewed multiple
times to ensure PII is not inadvertently included. Reports are reviewed
at least twice, once by the analyst generating the report and then
again by the analyst's counterpart. Each report is then checked by the
media monitoring lead prior to dissemination. All reports distributed
during each 24-hour period are checked by a media monitoring capability
senior reviewer, and the media monitoring capability's quality control
leads conduct weekly reviews of all distributed reports to ensure any
inadvertent PII inclusions are identified and corrective action is
taken. As described previously, the Privacy Office conducts Privacy
Compliance Reviews every 6 months to ensure OPS is complying with the
PIAs.
Question 3. Please explain the terms of the contract and the
rationale for contracting with General Dynamics to conduct social media
situational awareness reporting.
Answer. To fulfill the National Operations Center's (NOC) statutory
responsibility to provide situational awareness, the NOC examines
publicly available traditional and social media, compares it with many
other sources of information, and includes it where appropriate into
NOC reports. At the time the contract was awarded, the Office of
Operations Coordination & Planning (OPS) did not have available Federal
employees to complete this task. OPS procured contracted services to
fulfill this function. Additionally, OPS has not ascertained if this
service will be required on a permanent basis, making it more
economical to utilize contractor services in the interim.
OPS is continuing to assess current performance to determine the
most efficient and effective mechanism for performing the media
monitoring function in light of operational needs and budgetary
direction.
The Media Monitoring contract was competed for and awarded to
General Dynamics Advanced Information Systems (GDAIS) on May 27, 2010,
under the GSA Mission Oriented Business Integrated Services (MOBIS)
contract vehicle. The Period of Performance (POP) for this contract is
July 1, 2010 through December 31, 2014, and the total contract value is
$11.3 million. The contract includes tasks to monitor open sources for
incidents relating to potential and emerging threats and hazards to the
homeland.
In accordance with the Federal Acquisition Regulation, the award to
GDAIS was based on the Evaluation Team's review and assessment of the
qualifications of multiple vendors that submitted a quotation in
response to the Request for Quotation (RFQ). The Evaluation Team made a
recommendation to the Source Selection Authority (SSA) that GDAIS
offered the best value quote for fulfilling the Department's social
media situational awareness reporting requirement. After a thorough
review of the Evaluator's assessment which included an evaluation of
the strengths, weaknesses, and risks of the quotes received, the SSA
determined that GDAIS would provide superior performance of the
Government's objectives, and was the most technically competent
contractor that had submitted a quotation.
Question 4. Please describe the way that DHS solicited feedback
from the privacy community regarding DHS' use of social media.
Answer. In addition to the five Privacy Impact Assessments (dealing
with the three pilots, the program, and the update to include seven
narrow categories of personally identifiable information) and three
Privacy Compliance Reviews, the DHS Privacy Office has engaged in
dialogue with the privacy community regarding DHS' use of social media
in a number of ways. These include several quarterly advocate outreach
meetings (Privacy Information for Advocates), Chief Privacy Officer
Testimony before the Data Privacy and Integrity Advisory Committee
(DPIAC) in public meetings, DHS Privacy Office staff testimony before
the DPIAC, and inter-agency and intra-agency discussions. The Privacy
Impact Assessments and other documentation are available at
www.dhs.gov/privacy.
The Chief Privacy Officer invites privacy organizations and privacy
advocates (who have requested to participate) to quarterly
informational meetings during which the Chief Privacy Officer provides
updates on DHS privacy issues. To date, 24 distinct organizations have
requested invitations. The quarterly Privacy Information for Advocates
meetings allow the Chief Privacy Officer and privacy advocates to
discuss privacy issues that impact DHS and individuals. In 2010 and
2011, Chief Privacy Officer Mary Ellen Callahan spoke in depth about
DHS's use of social media and the situational awareness initiative at
four of the quarterly meetings. Additionally, the March 2012 Privacy
Information for Advocates meeting provided an opportunity to update
advocates on the social media situational awareness initiative at
length, including discussing examples, as well as clarifying
misconceptions.
The DPIAC was established by the Secretary of Homeland Security as
a discretionary committee under the Federal Advisory Committee Act to
provide advice to the Secretary and to the DHS Chief Privacy Officer,
upon request, on policy, programmatic, operational, administrative, and
technological issues within DHS that relate to personally identifiable
information, as well as data integrity and other privacy-related
matters. Committee members are individuals from the private sector,
academia, non-governmental organizations, and State government who have
expertise in privacy, security, and emerging technologies.
The DPIAC holds several public meetings throughout the year to
receive updates from the DHS Privacy Office, learn more about how DHS
components have implemented privacy, and gain information on specific
DHS programs that have privacy implications. In 2010 and 2011, Chief
Privacy Officer Mary Ellen Callahan provided public testimony on the
development, progression, and modification of the social media
situational awareness initiative at four of these meetings.
Additionally, DHS Privacy Office staff publicly testified at DPIAC
meetings on the social media situational awareness initiative. In
September 2010, one of the Associate Directors for Privacy Compliance
testified on the development of Privacy Compliance Reviews generally,
and how public Privacy Compliance Reviews focusing on the social media
situational awareness initiative function. In March 2011, another
Associate Director for Privacy Compliance publicly testified on the
social media situational awareness initiative, focusing on the addition
of the seven narrow categories of personally identifiable information
that would be collected. Finally, in December 2011, staff from the
National Operations Center (NOC), which runs the social media
situational awareness initiative, was scheduled to publicly testify on
the social media situational awareness initiative and the associated
Privacy Compliance Reviews. However, the testimony was postponed due to
extended deliberations by the DPIAC on pending recommendations from the
committee to the Department. Information about DPIAC, and the publicly
available meetings, can be found at www.dhs.gov/privacy.
Throughout 2010-2012, the DHS Privacy Office also provided
information about DHS' use of social media, whether for public
communications and outreach, situational awareness, or operational use,
to interagency privacy groups, including the Innovation and Emerging
Technologies Subcommittee of the CIO Council Privacy Committee. These
briefings were provided as examples of ways to embed privacy
protections in Government use of social media generally, including
developing Privacy Impact Assessments and System of Records Notices as
necessary.
In addition to providing information via interagency fora, in 2011,
the DHS Privacy Office hosted an intra-agency privacy compliance
meeting where staff from the National Operations Center updated DHS
Component Privacy Officers on the social media situational awareness
initiative and corresponding Privacy Compliance Reviews, as well as
fielded questions from the Component Privacy Officers about the
initiative.
Question 5. Please explain who/what determines what the NOC looks
at and searches for on social media sites.
Answer. The Senior Watch Officer (SWO) within the National
Operations Center (NOC), as guided by the Privacy Impact Assessments
(PIAs), determines the NOC's search parameters. There are 13 broad
Items of Interest (IOI) that focus analysts' efforts when searching
publicly available social media sites. The IOI categories provide a
general framework for the NOC's searches. The following are the
categories:
(1) terrorism (includes media reports on the activities of
terrorist organizations in the United States and abroad);
(2) weather/natural disasters, emergency management (includes all-
hazard reports, such as reports on hurricanes, tornadoes,
flooding, and earthquakes);
(3) fire (includes reports on the ignition, spread, response, and
containment of wildfires, industrial fires, and explosions);
(4) trafficking/border control issues (includes reports on the
trafficking of narcotics, people, weapons, and goods into and
out of the United States);
(5) immigration (includes reports on apprehension of illegal
immigrants and border control events or incidents);
(6) HAZMAT (includes reports on chemical, biological, and
radiological hazardous materials discharges);
(7) nuclear (includes reports terrorist attempts to obtain nuclear
materials, security incidents at nuclear facilities, and
potential threats to nuclear facilities);
(8) transportation security (includes reports on security breaches
and incidents or threats involving rail, air, road, and water
transit);
(9) infrastructure (includes reports on attacks or failures in
transportation networks, telecommunications networks, energy
grids, utilities, domestic food and agriculture, Government
facilities, and financial infrastructure);
(10) National and international security (includes reports relating
to threats against American citizens, political figures,
military installations, embassies, and consulates);
(11) National and international health concerns (includes reports
on outbreaks of infectious diseases and recalls of food or
other items dangerous to public health);
(12) public safety (includes reports on public safety incidents,
building lockdowns, bomb threats, mass shootings, and building
evacuations); and
(13) cybersecurity (includes reports on cybersecurity matters such
as cyber attacks, computer viruses, and the use of technology
for terrorism purposes).
There were originally 14 IOI categories. IOI 14 was ``Reports on
DHS, Components, and other Federal agencies: Includes both positive and
negative reports on FEMA, CIS, CBP, ICE, etc. as well as organizations
outside of DHS.'' This IOI has been subsequently eliminated in order to
prevent misunderstandings about the intended use of this information.
Analysts conduct searches using publicly available streaming media
and news-based search engines. These tools allow analysts to search by
keyword or a collection of terms. The keywords and terms that inform
searching are pre-loaded onto the publicly available search tools. The
core social media websites utilized by the NOC are listed in Appendix A
of the January 6, 2011 Privacy Impact Assessment that is available to
the public via www.dhs.gov/privacy. The core search terms, or keywords,
utilized by the NOC are listed in Appendix B of the same publicly
available document.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|