{"id":357513,"date":"2023-06-09T14:20:13","date_gmt":"2023-06-09T18:20:13","guid":{"rendered":"https:\/\/www.sgtreport.com\/?p=357513"},"modified":"2023-06-08T23:05:15","modified_gmt":"2023-06-09T03:05:15","slug":"dhs-sought-to-assign-social-credit-style-risk-scores-to-social-media-users","status":"publish","type":"post","link":"https:\/\/www.sgtreport.com\/2023\/06\/dhs-sought-to-assign-social-credit-style-risk-scores-to-social-media-users\/","title":{"rendered":"DHS Sought To Assign Social Credit Style \u201cRisk Scores\u201d To Social Media Users"},"content":{"rendered":"

by Cindy Harper, Reclaim The Net<\/a>:<\/em><\/p>\n

\"\" Newly-obtained documents reveal.<\/p>\n

In a sharp spotlight on the interplay between national security and individual privacy, newly disclosed documents have unveiled that the Department of Homeland Security (DHS) entered into a contract with the University of Alabama at Birmingham (UAB) in 2018 to develop a project, dubbed \u201cNight Fury,\u201d designed to analyze and assign \u201crisk scores\u201d to social media accounts.<\/p>\n

TRUTH LIVES on at\u00a0https:\/\/sgtreport.tv\/<\/a><\/p>\n

The Brennan Center for Justice procured these documents through a public records request, and\u00a0Motherboard<\/a>\u00a0was the first to report on them. Project Night Fury aimed at utilizing automation to detect and evaluate social media accounts for connections to terrorism, illegal opioid distribution, but also disinformation campaigns.<\/p>\n

The DHS document stated, \u201cThe Contractor shall develop these attributes to create a methodology for developing a ranking, or \u2018Risk Score,\u2019 associated with the identified accounts.\u201d<\/p>\n

\"\"
source: Motherboard<\/figcaption><\/figure>\n

Project Night Fury had also planned on incorporating involvement from Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), Transportation Security Administration (TSA), and US Citizenship and Immigration Services (USCIS) to provide \u201ccross-mission operational context,\u201d according to one of the documents.<\/p>\n

Experts had warned DHS about the inherent difficulties and biases involved in automated judgment for these matters, citing that characteristics like being \u201cpro-terrorist\u201d have no concrete definition.<\/p>\n

Notably, DHS terminated Project Night Fury in 2019. However, it underscores the agency\u2019s continued interest in social media as a resource for analysis. This comes in the wake of earlier reports of CBP utilizing an AI-powered tool, Babel X, for\u00a0analyzing travelers\u2019 social media at US borders.<\/a><\/p>\n

While Night Fury\u2019s focus was initially on \u201ccounter-terrorism, illegal opioid supply chain, transnational crime, and understanding\/characterizing\/identifying the spread of disinformation by foreign entities,\u201d the documents indicate that UAB\u2019s work was intended to \u201cscale to other DHS domains\u201d and \u201cbuild next generation capabilities.\u201d<\/p>\n

Read More @ ReclaimTheNet.org<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

by Cindy Harper, Reclaim The Net: Newly-obtained documents reveal. In a sharp spotlight on the interplay between national security and individual privacy, newly disclosed documents have unveiled that the Department of Homeland Security (DHS) entered into a contract with the University of Alabama at Birmingham (UAB) in 2018 to develop a project, dubbed \u201cNight Fury,\u201d […]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[153989,153897,154020,153896,153880,153899,126466],"tags":[156556],"_links":{"self":[{"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/posts\/357513"}],"collection":[{"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/comments?post=357513"}],"version-history":[{"count":1,"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/posts\/357513\/revisions"}],"predecessor-version":[{"id":357514,"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/posts\/357513\/revisions\/357514"}],"wp:attachment":[{"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/media?parent=357513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/categories?post=357513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sgtreport.com\/wp-json\/wp\/v2\/tags?post=357513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}