Facebook, the CIA, and You.

+ expand info  //  view thread  //  5 responses  //  print article

I Facebooked Your MomAfter over a decade of being immersed in the conspiracy theory culture—and I’m still there wether I like it or not—my core beef remains the same.  It’s not something unique to conspiracy research.  It’s a universal problem with all true believers: exaggeration for dramatic effect.  Subtlety is interesting.  Details are brainfood.  Overstatements are good for getting people alarmed and worked up, but what happens when people start realizing they were decieved?

Is Facebook a CIA front, devoted to identifying, tracking and crushing dissent in the college generation?  Actually, no.  Facebook is a website, devoted to “social networking.” However, there’s also a lot more going on behind the curtain.  As always, it’s the grey areas that interest me the most.  So with this article, I want to ask refined and specific questions to get accurate and detailed answers.  Because it’s not an exaggeration to say that there are very real ties between Facebook and CIA—and there’s a whole covert landscape of semi-legal databases, companies selling private information, and the new horizon of computer-driven “Data Mining”. 

In short, this is a great angle to sneak a peek one of the most hidden, and profitable, sectors of the US economy.  What we’ll see is a lot less simple than a good conspiracy theory, but I also think it’s a hell of a lot more interesting than the “Facebook = CIA” mantra that passes for “investigation” on the internets.

We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile.”

Let’s start right there.  The quote above is from Facebook’s Terms and Conditions—specifically, their privacy policy.  With a declaration like that, you have to give these folks credit for being pretty damn blunt about the nature of the game.  Facebook is a long-term investment in my generation, just like MySpace.  The payoff these days is millions and millions in advertising revenue—but what about the payoff one decade from now, when their databases have multi-gigabyte files about you?  Your interests, habits, porn preferences, mindless surveys, purchases, friends, bulletins, and little sparkly animated .gif files?  How much do you think that information will be worth—to advertisers, to corporations, to the military, to intelligence services?

Just Kids Being Kids

Mark Zuckerberg FacebookAnyone who has concerns about their “privacy” being violated by Facebook is completely, unconditionally justified in their concern.  After all, Facebook was born out of data theft—founder Mark Zuckerberg stole tens of thousands of digital files on his fellow Harvard students, directly from the University’s “secure” servers. Maybe that’s alarming to you, but I find it endearingly psychotic.  Anyone who can found a multi-billion dollar business with stolen property is worth paying attention to.  From the always-excellent Fast Company magazine:

Harvard didn’t offer a student directory with photos and basic information, known at most schools as a face book. Zuckerberg wanted to build an online version for Harvard, but the school “kept on saying that there were all these reasons why they couldn’t aggregate this information,” he says. “I just wanted to show that it could be done.” So one night early in his sophomore year, he hacked into Harvard’s student records. He then threw up a basic site called Facemash, which randomly paired photos of undergraduates and invited visitors to determine which one was “hotter” (not unlike the Web site Hot or Not). Four hours, 450 visitors, and 22,000 photo views later, Harvard yanked Zuckerberg’s Internet connection. After a dressing-down from the administration and an uproar on campus chronicled by The Harvard Crimson, Zuckerberg politely apologized to his fellow students. But he remained convinced he’d done the right thing: “I thought that the information should be available.” (Harvard declined to comment on the episode.)

The next anaecdote in the article is even more telling and fairly funny, too.  Since Fast Company was kind enough not to sue me over my excessive quotitude in the Clotaire Rapaille article, I figure I’ll push the envelope a little further:

The new project consumed so much of his time that by the end of the first semester, with just two days to go before his art-history final, he was in a serious jam: He needed to be able to discuss 500 images from the Augustan period. “This isn’t the kind of thing where you can just go in and figure out how to do it, like calculus or math,” he says, without a trace of irony. “You actually have to learn these things ahead of time.” So he pulled a Tom Sawyer: He built a Web site with one image per page and a place for comments. Then he emailed members of his class and invited them to share their notes, like a study group on cybersteroids. “Within two hours, all the images were populated with notes,” he says. “I did very well in that class. We all did.”

Regardless of your moral stance on cheating, you have to admit the dude is CEO material.  Anyone willing to cheat on such a brazen and effective level is worth giving a lot of money to, these days.  That’s what Venture Capitalism is all about.

Speaking of Venture Capitalism

In-Q-Tel LogoIn-Q-Tel is interesting company.  Considering they’ve changed their name 3 times in 8 years and all their money comes from the CIA, that’s probably inevitable.  Their website lays things out in simple and upfront terms (allegedly):

In-Q-Tel was established in 1999 as an independent, private, not-for-profit company to help the CIA and the greater US Intelligence Community (IC) to identify, acquire, and deploy cutting-edge technologies.  In-Q-Tel’s entrepreneurial strategic investment and technology advancement model gives it the agility - lacking within traditional government approaches - to help the IC benefit from the rapid pace of change in information technology and other emerging technology fields.

In-Q-Tel’s mission is to deliver leading-edge capabilities to the CIA and the IC by investing in the development of promising technologies.  Because early-stage technologies are often unproven, In-Q-Tel takes the calculated risks necessary to develop, prove, and deliver them to the Intelligence Community.

In-Q-Tel is very much worth investigating further.  I don’t mean that as an ominous, pre-Casolaro warning—it’s just that the company’s portfolio is full of fascinating companies doing fascinating work.  I would also recommend, to any college-attending humans reading this, investigating their Outreach ProgramI realize some readers find that immoral, but it’s worth noting that money with blood on it is still valid currency, exchangable for food, equipment and firearms.

Ever heard of Attensity?  “Two of the clearest and most charismatic speakers in the text mining business are Attensity cofounders Todd Wakefield and David Bean,” sez Text Technologies.  (That’s a site worth digging around, by the way.)

Keyhole, Inc was also an asset of In-Q-Tel until Google bought them in 2004, for an undisclosed sum.  Keyhole does work in “geospatial data visualization applications,” but we know them as the engine behind GoogleEarth, the greatest piece of software humankind has ever created. 

In-Q-Tel has considerable overlapping tentacles with SAIC—the Science Applications International Corporation, who are a study unto themselves.  If you’re unfamiliar with their $8 billion global operation, you should definitely check out this recent Vanity Fair article.

Stay Skeptical

They Rule Wal-MartOf course all this information is interesting—but where’s the connection to Facebook?  Does this mean that Facebook is somehow a CIA front company as well? I’d have to say “hell no,” but let’s take a look at the basic equation behind the claim so you can, like...decide for yourself.

It’s a long chain of association: once Facebook begins to take off, venture capital firm ACCEL gives facebook $12.7 million.  One of the 18 member investors of Accel, James Bryer, is also on the board of a venture capital firm called NVCA.  Sitting on the board of NVCA with Bryer is Gilman Louie, who is on the board of In-Q-Tel.  Gilman Louie is also responsible for bringing Tetris to the United States. He got started in video games, and developed several flight simulators for the Air Force.

The NVCA link is weakest in the chain.  First of all, James Bryer and Gilman Louie were two of twenty-six board members.  Second of all, and probably more important: neither Bryer nor Louie are on the NVCA board any longer. (Here’s a list of the 2007-2008 officers.) Currently, Gilman Louie is still doing work with In-Q-Tel, and Bryer is on the board of directors for good old Wal Mart—which actually is a conspiracy, and probably a CIA front as well. 

For the sake of objectivity, here’s how Prison Planet sums things up:

So who do we have to thank for this? According to the official story, TheFaceBook was founded by 3 students from the CIA’s favorite breeding ground of Harvard University. Their first $500,000 in funding came from Peter Thiel, founder and former CEO of Paypal.

Thiel is also a former columnist for the Wall Street Journal and a graduate of Stanford University, the home of NSA computer research and CIA mind control projects like MK ULTRA. He is an avowed neocon and globalist whose book ”The Diversity Myth“ received praises from William Kristol, Christopher Cox, Edward Meese, and Linda Chavez. Thiel sits on the board of the radical right-wing VanguardPAC and he personally donated $21,200 to Arnold Schwarzenegger’s campaign for governor.

It’s funny how the CIA’s “favorite breeding ground” changes every time the phrase comes up—is it MIT? Yale? Stanford? Virginia Tech?  Depends on the article you’re writing, apparently.  Small quibbles aside, the basic concept here is fundamentally sound: Facebook, just like MySpace and every single other large-scale interactive website in existence, is designed to collect demographic data about the people who use it. 

Is this a violation of your right to privacy?  Yes and no. 

Yes, of course it is, but no, you don’t have a right to privacy and you never did. Nobody does.  If you’re reading this article, everything you do is being backed up to multiple databases.  (If you have any illusions about “anonymizers” or “encryption”, please do us both a favor and read this Crytogon article ASAP.)

High-Tech Stupid

There’s also the question of effectiveness—although “Data Mining” is a hot buzzword, and the “War on Terror” is the catchphrase of the century, are they really two great tastes that belong together?  Surprisingly, quite a number of experts say “hell no.”

The most vocal and eloquent among them are Jeff Jonas and Jim Harpers, who recently published a paper in Policy Analysis titled Effective Counterterrorism and the Limited Role of Predictive Data Mining.  That’s a mouthfull, and it breaks down to this:

One of the fundamental underpinnings of predictive data mining in the commercial sector is the use of training patterns. Corporations that study consumer behavior have millions of patterns that they can draw upon to profile their typical or ideal consumer. Even when data mining is used to seek out instances of identity and credit card fraud, this relies on models constructed using many thousands of known examples of fraud per year.

Terrorism has no similar indicia. With a relatively small number of attempts every year and only one or two major terrorist incidents every few years—each one distinct in terms of planning and execution—there are no meaningful patterns that show what behavior indicates planning or preparation for terrorism. Unlike consumers shopping habits and financial fraud, terrorism does not occur with enough frequency to enable the creation of valid predictive models.

Without patterns to use, one fallback for terrorism data mining is the idea that any anomaly may provide the basis for investigation of terrorism planning. More concretely, though, using data mining in this way could be worse than searching at random; terrorists could defeat it by acting as normally as possible.

This is really one of the major flaws in the War on Terror, period.  Consider the recent “attack” in Glasgow—I was in Ireland when that happened and people weren’t “terrified”, they weren’t even alarmed.  They were rolling their eyes and laughing.  Driving a Jeep into the front door and setting yourself on fire?  These people are retarded. This is the enemy we’re supposed to live in fear of?

Glasgow Terror Jeep Attack

Further Reading for Curious Primates

First, some recent additions to the BIPT Library:

The Geeks of War - John Edwards

Facebook: Threats to Privacy A 2005 report, weighing in at 76 pages, that adresses this question in considerably more depth than this article.

Introduction to Data Mining and Knowledge Discovery A very readable primer, 39 pages long.

If this kind of stuff is interesting to you—and I can understand if it’s not—then I’d like to recommend two websites to you that will prove invaluable.  The first is Cryptogon, which I was late to catch on to.  That’s always a good thing, because it means there’s a huge archive to catch up on, and I’m still data mining to this day.  Cryptogon is run by Kevin Flaherty, who’s written some very juicy stuff, and it’s become one of the few sites I check up on daily, along with PhysOrg and of course, the news page of J. Orlin Grabbe.  (Hail Eris.)

The second site is DefenseTech—a news portal that is a flat-out goldmine for anyone interested in the tools and technology that are used to supress dissent and control the world.  If that’s not interesting to you, I find that confusing. To each their own, though, and that’s a beautiful thing.

Brainsturbator Forum LogoAlso, if you’re interested in what will become a future Brainsturbator article on the Sentient World Simulator—essentially a full-scale virtual Earth built by DARPA for wargaming and economic testing, check out the resources collection in the forum.  Brainsturbator Forum is rapidly growing into a monster with far more resources and information than the actual Brainsturbator site—my humble thanks to everyone who is making that possible. 

And of course, this article is an outgrowth of the ongoing project at Skilluminati Research and there will be much more along these lines over there for anyone curious:

5 responses to "Facebook, the CIA, and You."

  • avatar

    Jul 06, 2007 at 11:55 PM
    Captain Marginal

    That bit about CIA breeding grounds cracked me up. I was thinking the same thing. The choice of the words “breeding ground” is interesting too, I see it referred to that way almost every time. Who started that?

    Oh, and thanks for the heads-up on cryptogon, that site is amazing! I had read one article from there after the Virginia Tech shooting and never bothered to check the archives. It’s GOLD, Jerry, GOLD!

    On a related note, that Virginia Tech article is a perfect example of “exaggeration for dramatic effect”, at least on the comment section.

  • avatar

    Jul 07, 2007 at 12:34 AM

    Is Facebook a CIA front? All leads seem to be crystal clear…

    Myspace was infliltrated by spooks. One “chick” was lead to some progressive pal of mine’s (sadly they were deleted why I do not know) blog and anyway wrote me back something about a post about philosophy. Anyway later I looked back over her (if she was who she said she was) profile and saw the training images and shit and then BOOM there’s a link to CIA under “companies”.

    Just only moments later she’s got some spook-words going over on a bulletin and some kind of esoteric CIA-speak “code” thing going on. So- duh- I deleted the person IMMEDIATELY! I feel grateful that they did not influence or get into any shit with my own individual network of “Friends”.

    Anyway the point is I did do the right thing about this and it shows how dangerous things can become and how persuasive these people can be to infiltrate Myspace to influence public opinion directly or indirectly and try to quash progressive movements.

    But more than that the biggest point is this: DELETE TOM FROM YOUR FRIENDS LIST! That way you will not be sharing “everyone’s network” and will be one step closer to freeing yourself from um being as easily looked up by everybody from the caliber or Mr. Rogers to Jeffrey Dahmer (the latter being the equivalent of the caliber of people I’m complaining about). So, yeah, you’ll be from from TomTom-Bondage. I’ve been procrastinating on that but actually I’ll do that now.- Subscribe to the blog if you want tech specs and site updates and if you get some message from some creepy fucker just message him from the blog if need be. Besides there are a couple of other people I know of who you can message who are more powerful in that echelon of the Murdoch Empire than Tom (and no they don’t live in the Death Star). Anyway the point is then make your profile private once you get a chance (something I’ll work on once I get some networking shit together and the “PC” Myspace portal version of mine with a link to the “actual” private profile- Mostly so employers don’t call me on personal politics when they do their snoopy post/pre-interview stuff. And later a good way to go is to send out a bulletin with a “timer-stamp” where you type in a countdown for each bulletin and get all your Myspace people to forward it to bring up to other people you know that they should delete Tom too and maybe you can even offer to do for those friends the “community portal version” Myspace profile with Tom deleted in the first place which LINKS to their ACTUAL private profile. It’s good to stay slick and make sure that certain groups don’t have an opportunity to fuck up positive movements for change. But they’ll never win- In Burroughs theory of a “Space Age w/ Heroes and Villians” people with bad and evil and malicious agendas won’t win- I just know it. Don’t give up. If any of us humans surrender and feel that they have everything sorted out we’re putty in evil people’s and organizations hands with very sinister agendas. Besides- When they can’t outsmart anybody anymore where else can they go to do what they’re trying to do to sustain and build control huh? Everybody just needs to be a little crazy and think outside the box and have integrity to stand up for humanity and the world that they want.

    Of course in social networking about the worst might be Orkut moreso than Myspace or Facebook. I remember one time I looked at Orkut and they asked all these wierd creepy questions in the setup that only Rain Man would fixate on. Apparently they changed that requirement and people are up in arms about how their new garbage on maintaining an insane amount of created “intellectual property” seems kind of Orwellian.


  • avatar

    Jul 07, 2007 at 12:43 AM

    Capt. Marginal- In response to your comment in San Diego a couple or a few years ago they used to have Homeland Security socializing at bars.

    I was wonderring whether it was recruiting or surveillance.

    Either way it reminded me of what people my mom’s and dad’s age talked about with the CIA infiltrating groups or colleges or progressive movements in the 60s and later colleges after quite a battle finally succeeding in further separating the CIA from college campuses.

    Eerie because after all Homeland Security is basically the administrations answer to creating a whole new agency which is more of a combination of Intelligence (CIA Spooks) and Executive matters (FEDs- Basically a certain amount of notches up from local cops in how much power they have and what they can do.). So yeah I could see it as recruiting.

    I mean it worked as a pretty good recruiting measure because here would be these uniformed officers who are suppossed to have these special priveleges and suddenly patrons of bars where like “Hey, I’m curious about this guy.” and a conversation would start because they stood out and in their uniform they presented that authority of being more “special” than the rest. So yeah I can see it. I mean of course now and always they’re gonna have people in plainclothes that you only know so well. That’s why your mom was always right about talking to strangers wink.

    Either way let’s face it- Going in a bar and talking to a random Homeland Security officer is like walking up to a cop with a dime bag pointing to it and yelling “Hey! Lookie what I found!”


  • avatar

    Jul 07, 2007 at 2:23 PM
    Captain Marginal

    Yeah, spooks do hang around a lot of college campuses. I just thought it was funny to call them “breeding grounds” like they were a rodent colony or something.

  • avatar

    Jul 08, 2007 at 12:24 AM

    Yeah I agree with you there Captain Marginal- Unfortunately the “breeding grounds” comparison to college campuses doesn’t live up to “animal house"… I was sad to see that college was not an excuse to do blow and get into wild sex orgies (That or I just went to shitty colleges.) Since then I have assumed “Animal House” was a conspiracy by the colleges to get more people in there so more people can be cranked out into industrial disciplines and the money machine can keep going- LOL- but I digress....

    On a not as humorous and less sarcastic note I will say that it is eerie that there are texts on college campuses and courses that are more government/intelligence-sponsorred. Just do a web search on that it’s pretty eerie. Otherwise there’s also the factor that the present Bush administration has been interfering with science texts and curriculum and further scientific studies. “The Nation” has done articles on this. What am I reminded of with this sense of censorship and control right out of the “Cold War Era Consciousness”?

    If this administration can make global warming a political issue and say that there is none or not as much it furthers a dependence on oil. More of the money machine gets going then. Plus there is the notion by certain occultists that the most diabolical acts can influence further power to the perpetrator of these evil acts. Bush has sponsorred an unjust war and invasion of an occupied territory. The war was unjust by being influenced by fear and hearsay. Right off the bat after the attacks on the Twin Towers Guiliani was converted into a hero by not much more than suggestion and being at the right place at the right time to become mythologized into a heroic type of personality. Also a connection was made between Saddam Hussein and Osama bin Laden that still seems to be muddy and vague. The weapons of mass destruction that soldiers were sent there to look for have not been found. Noone knows how to pull the troops out or what we’ll do about the occupation of the middle east because this has become an enormous mess on this country’s hands.

    What I am trying to say is that if college campuses have scientific texts censorred to come up with a favorable viewpoint of the administration and the dependence on oil is further it comes to not much more than something not unlike the last few episodes of “The Sopranos” where Tony Soprano does some jobs to get rid of asbestos and buildings and out of selfpreservation and selfishness - whether conscious or not - dumps the asbestos in the Jersey rivers and thereby “spreads his evils” and starts contaminating the rivers when he has not much left to contaminate. That is what reminds me of this issue with campuses and Facebook and CIA etc. As well as Bush’s connections to Skull & Bones and some CIA agents connections to secret societies and ideas of magical powers of secrets in certain darker corners of the occult and such. Not to mention the ideas not unlike Crowley’s (as much as I respect Crowley’s train of thought and think he had some intellegent things to say and the ideas are trippy mental masturbation) of getting power by being the “wickedest man in the world”. And of course under that theory what better a way to rule the world than to beat it into submission and exploit it.


Brainsturbator on Twitter

For more updates follow Brainsturbator.