Homepage / Technology / US wants tech companies like Microsoft to help vet immigrants on social media
test Users535352253 Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review

Technology

US wants tech companies like Microsoft to help vet immigrants on social media

The Department of Immigration & Customs Enforcement is taking new steps in its plans for monitoring the social media accounts of applicants and holders of U.S. visas. At a tech industry conference last Thursday in Arlington, Virginia, ICE officials explained to software providers what they are seeking: algorithms that would assess potential threats posed by visa holders in the United States and conduct ongoing social media surveillance of those deemed high risk.

The comments provide the first clear blueprint for ICE’s proposed augmentation of its visa-vetting program. The initial announcement of the plans this summer, viewed as part of President Donald Trump’s calls for the “extreme vetting” of visitors from Muslim countries, stoked a public outcry from immigrants and civil liberties advocates. They argued that such a plan would discriminate against Muslim visitors and potentially place a huge number of individuals under watch.

ICE officials subsequently changed the program’s name to “Visa Lifecycle Vetting.” But, according to the ICE presentation, the goal of the initiative — enhanced monitoring of visa holders using social media — remains the same.

More from ProPublica:
Facebook (still) letting housing advertisers exclude users by race
ICE officers told to take action against all undocumented immigrants encountered while on duty
Despite disavowals, leading tech companies help extremist sites monetize hate

Speaking to a room of information-technology contractors, hosted by the Government Technology & Services Coalition, Louis Rodi, deputy assistant director of ICE Homeland Security Investigations’ National Security Program, said the agency needs a tool equipped with “risk-based matrices” to predict dangers posed by visa holders, with the social media of those considered a threat under continuous surveillance throughout their stay in the U.S.

“We have millions and millions and millions of people coming every year, and subsequently departing, so we have to be smart about it,” said Rodi to a room of representatives from companies like Microsoft, Accenture, Deloitte and Motorola Solutions. “And I’m sure there are tools out there that can help.”

For this targeted group of visa holders, ICE’s online monitoring of public social media posts would be large-scale and non-stop. “Everything we’re dealing with is in bulk, so we need batch-vetting capabilities for any of the processes that we have,” said Rodi. Alysa Erichs, ICE Homeland Security Investigations’ acting deputy association director for information management, told attendees that ICE hopes to get automated notifications about any visa holders’ social media activity that could “ping us as a potential alert.”

ICE spokeswoman Carissa Cutrell stressed to ProPublica that the Department of Homeland Security has not actually begun building any such program. “The request for information on this initiative was simply that — an opportunity to gather information from industry professionals and other government agencies on current technological capabilities to determine the best way forward,” Cutrell wrote in an email. The program would require clearance from numerous DHS units, including the Privacy Office and the Principal Legal Advisor, before it could be implemented, according to a federal official who spoke on the condition of anonymity.

In his speech, Rodi referred to meetings ICE has had with companies but did not mention any frontrunners. The major tech companies present at the conference, including Microsoft, Accenture and Deloitte, either declined to comment or didn’t respond to ProPublica‘s request to comment about their level of interest in providing technology for the vetting program. Microsoft has opposed Trump’s immigration policies, and several Microsoft researchers have publicly called for ICE to stop spying on visitors’ social media.

ICE is already monitoring some social media at eight Homeland Security Investigation posts internationally, Rodi said, and the plan is to expand to more sites. In response to a question posed by ProPublica from the audience, he stated that the department was open to other social media monitoring techniques, such as link analysis (which helps authorities map out applicants’ online connections), so long as they solely rely on public posts.

The ICE officials emphasized the Trump administration’s strict stance. “This administration is big on immigration enforcement, so we’re not going to look the other way like we have in the past when we have overstays,” said Rodi. “Maybe it’s an administrative violation — it’s still a crime. These people need to pay. They can’t get away with it.”

Some analysts argue that gathering social media data is necessary. ICE already has a tool that searches for connections to terrorists, according to Claude Arnold, a former ICE Homeland Security Investigations special agent, now with the security firm Frontier Solutions. But, he said, potential terrorist threats often come from countries, such as Iraq or Syria, that provide little intelligence to U.S. authorities. As a result, in Arnold’s view, social media information is all the more important.

Privacy advocates take a darker view. “ICE is building a dangerously broad tool that could be used to justify excluding, or deporting, almost anyone,” said Alvaro Bedoya, executive director of Georgetown Law’s Center on Privacy & Technology. “They are talking about this as a targeted tool, but the numbers tell a different story.”

Bedoya noted that the program outline originally anticipated that the monitoring would identify 10,000 high-risk visa holders a year. That suggests the pool of people under social media surveillance would be many orders of magnitude larger. (ICE officials did not address this point at the conference.)

Last week, a coalition of academics and technologists warned in a public letter that ICE’s interest in using big data algorithms to assess risk is misguided, given how rare it is for foreign visitors to be involved in terrorist attacks in the U.S. That means there’s little historical data to mine in hopes of using it to design a new algorithm. The letter cited a Cato Institute analysis that found that the likelihood of an American dying in a terrorist attack on U.S. soil in any given year was 1 in 3.6 million in the period between 1975 and 2015.

Cathy O’Neil, one of the signatories to that letter and author of “Weapons of Math Destruction,” told this reporter in August that any algorithm a company proposes would come built-in with some very human calculations. “At the end of the day, someone has to choose a ratio,” she said. “How many innocent false positives are you going to keep out of the country for each false negative?”

Thus far, social media monitoring of visa applicants has not identified any potential threats that wouldn’t have turned up in existing government databases, Rodi acknowledged. “We haven’t found anything that would preclude someone from getting a visa through social media alone,” he said. “But, you never know, the day may come when social media will actually find someone that wasn’t in the government systems we check.”

That argument doesn’t placate those who believe ICE’s vetting is already exhaustive. Social media surveillance would be difficult to carry out without collecting collateral data on thousands of American citizens in the process, said Rachel Levinson-Waldman, senior counsel to the Brennan Center’s Liberty and National Security Program.

“Generally, with surveillance technologies, they are adopted for national security purposes overseas, but are then brought stateside pretty quickly,” she said, citing practices first honed overseas, such as intercepting cellphone calls. “So once there’s some kind of dragnet surveillance tool or information collection tool in place for one purpose, slippage can happen, and it will expand and expand.”

Source: Tech CNBC
US wants tech companies like Microsoft to help vet immigrants on social media

Comments are closed.