What Are We Learning ? Q Anon, Tyler, AI Singularity, Palantir, UraniumOne, CIA/FBI/NSA Deep State Rat Lines
What Are We Learning ? Q Anon, Tyler, AI Singularity, Palantir, UraniumOne, CIA/FBI/NSA Deep State Rat Lines
Wednesday, January 17, 2018 14:04
Element 93, Palantir, Tyler and the AI
Singularity: A Conversation With Quinn
Michaels
Streamed live on Nov 2, 2017
How do the 93rd element in the periodic table, the Uranium One scandal, the construction of particle accelerators around the world and the rise of Artificial Intelligence interrelate? Botmaster general Quinn Michaels lays it out in this mind bending conversation.
Become a sponsor of Crowdsource the Truth and support the effort http://paypal.me/crowdsourcethetruthhttps://www.patreon.com/crowdsourceth… Public Bitcoin Payment Address 14y2bEJ484DTbQwthX51VWpcRtk9Q7kmQQ Public Lite Coin Payment Address LVP2d143QjPv1JaJpqgPHzQzv2qSQCDnbd Public Monero Payment Address 43wUVqtP6gZAUow6DKgQxzCCcKtRpjinV4fKvGmLCpLC6wst4KkYudsN9T3PosWjz3b5ADQU2RWAHSKMrzyLJdpg6V2AVb4 or email truth@crowdsourcethetruth.org for a secure Bitcoin sponsorship link Buy Crowdsource the Truth merchandise in the on-line store https://www.redbubble.com/people/csth… **Legal Disclaimer: Sponsorship of Crowdsource the Truth is made at the sponsor’s sole discretion. Sponsorship funds are not tax-deductible, are non-refundable, and do not represent any ownership, equity interest or decision-making authority in the organization.
What Q Anon is revealing: Palantir,
UraniumOne CIA/FBI/NSA Deep State Rat
Lines, Singularity etc.
Published on Dec 3, 2017
note: I apologize to anyone who already saw this video but I had to re-upload the original w/2 edits. I had a copyright warning on the singularity explanation which I replaced as well as for the audio in the Kim Dotcom portion which I deleted. I have a hard time keeping up with youtube policies. Update Nov. 28, 2017: Q posts are now being sabotaged (roypotterqa): https://youtu.be/6IX-t1I_1iA Q-anon, whether you believe is an AI/bot (Artificial Intellegence) or a/multiple human person/people (CIA etc) or even a LARP (live action roleplay) a hoax, doesn’t matter. What he/she/it/them is revealing is really happening. George Webb imho is on the forefront of investigating and discovering the deep underbelly ‘footprints’ that have been left behind by the Deep State Globalists. Not conspiracy theory (although some speculation is definitely required in order to dig deeper) but real, tangible, hold in your hands FACT. This video is deep and begins that dive into the rabbit hole. So get your migraine remedy accessable because there’s so much information your head’s going to explode. But, I’m breaking it all down into smaller digestible pieces to help we ordinary folk comprehend it all. From Uraniumone to Q-anon to Saudi Arabia, Seth Rich, the DNC ‘hack and even Las Vegas etc. It all seems to have connection to Palantir. Don’t know much about that? Well, thanks to some awesome independent investigators/journalists, we now can find out wtf is going on. At least those of us brave enough to see….;) Sources: George Webb: https://www.youtube.com/user/georgwebb Quinn Michaels: https://www.patreon.com/rahulaclub Crowdsource the Truth:https://www.youtube.com/channel/UC8CI TheLipTv2 DARPA brain chips: https://youtu.be/sbR7nlUnJdYKim Dotcom: https://youtu.be/_Rn8VYIYQNY and https://www.slashgear.com/kim-dotcom What is a Bot: https://youtu.be/fEbzk4vTHsQ Images: Peter Thiel: http://m.benzinga.com/article/4853911 NpgVan: https://www.ngpvan.com/about Palantir: https://uncubed.com/jobs/palantir Catalyst: https://www.catalist.usand http://www.businessinsider.com/bernie Palantir ball/Trump: http://nymag.com/selectall/2017/05/tr Deep blue chess: https://www.slideshare.net/mobile/car Dark web: https://darkwebnews.com/help-advice/a Josh Kushner: http://www.businessinsider.com/josh-k Jared Kushner: http://fortune.com/2017/01/10/ivanka- Organ harvesting: http://www.telegraph.co.uk/news/world Council on Foreign Relations: https://monthlyreview.org/product/wal Huma Aberdine: https://www.vanityfair.com/news/2016/ Malaysia: http://www.netnewsledger.com/2014/03/ PayPal: http://www.storebuilder.co.uk/payment Alibaba (Google Play Store): Alibaba.com B2B Trade App Bitcoin: http://www.radixfinancial.com/blog/wh UAE: https://www.uae-embassy.org SBV: http://www.sbv.co.za Raytheon: http://tucson.com/business/tucson/ray The Octopus: https://youtu.be/VwVEX5Xmspo Robert Maxwell: https://www.amazon.com/Robert-Maxwell Clinton Cash (MUST WATCH!): https://youtu.be/3fQJCXkSqbY https://www.gofundme.com/julzee My Steemit Blog: https://steemit.com/@julzee (dabble in owning cryptocurrency (steem) via social network Steemit (like FB) that’s on the blockchain, FREE!) My Dtube Channel: https://d.tube/#!/c/julzee (uncensorable, blockchain, youtube replacement) My IBOTTA referral link: bukcfwl (see video: https://youtu.be/0WNTsxW1I4M)
Palantir, The Most
Powerful Spying Machine Ever Devised.
( Palantir or ‘seeing-stone’ mentioned
in JRR Tolkien Lord of the Rings.)
Now tie this together with the new D-Wave machines and developments as
discussed by Anthony Patch and Kev Baker in these video programs , lace in
the data from other AI and Deep State reports and the future looks pretty dark
indeed. They don’t want us to know about and understand their AI BEAST !
[...and guess what tribe has their finger prints all over and throughout this Palantir gem ?]
Some good sources for frontline info :
GEORGE WEBB…….HTTPS://WWW.YOUTUBE.COM/CHANNEL/UCRQ-WHKVI0JDWJQGCUOYNEW
Jim Stone………….http://82.221.129.208/baaasepageu2.html
Abel Danger……….http://abeldanger.blogspot.com/
Anthony Patch…….https://www.anthonypatch.com/
Kev Baker…………..http://www.kevbakershow.com/
How Peter Thiel’s Palantir Helped the
NSA Spy on the Whole World
Donald Trump has inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.
Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.
Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.
Alex Karp, co-founder and CEO of Palantir Technologies, speaks during the WSJDLive Global Technology Conference in Laguna Beach, Calif., on Oct. 26, 2016.
Photo: Patrick T. Fallon/Bloomberg/Getty Images
“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.
A Palantir promotional video.
Despite all the grandstanding about lucrative, shadowy government contracts, co-founder Karp does not shy away from taking a stand in the debate over government surveillance. In a Forbes profile in 2013, he played privacy lamb, saying, “I didn’t sign up for the government to know when I smoke a joint or have an affair. … We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people we’d like to be.” In that same article, Thiel lays out Palantir’s mission with privacy in mind: to “reduce terrorism while preserving civil liberties.” After the first wave of revelations spurred by the whistleblower Edward Snowden, Palantir was quick to deny that it had any connection to the NSA spy program known as PRISM, which shared an unfortunate code name with one of its own software products. The current iteration of Palantir’s website includes an entire section dedicated to “Privacy & Civil Liberties,” proclaiming the company’s support of both:
Palantir Technologies is a mission-driven company, and a core component of that mission is protecting our fundamental rights to privacy and civil liberties. …Some argue that society must “balance” freedom and safety, and that in order to better protect ourselves from those who would do us harm, we have to give up some of our liberties. We believe that this is a false choice in many areas. Particularly in the world of data analysis, liberty does not have to be sacrificed to enhance security. Palantir is constantly looking for ways to protect privacy and individual liberty through its technology while enabling the powerful analysis necessary to generate the actionable intelligence that our law enforcement and intelligence agencies need to fulfill their missions.
It’s hard to square this purported commitment to privacy with proof, garnered from documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSA’s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSA’s arsenal. According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSA’s own admission its “widest reaching” program, capturing “nearly everything a typical user does on the internet.” A subsequent report by The Intercept showed that XKEYSCORE’s “collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.
But how do you make so much data comprehensible for human spies? As the additional documents published with this article demonstrate, Palantir sold its services to make one of the most powerful surveillance systems ever devised even more powerful, bringing clarity and slick visuals to an ocean of surveillance data.
An office building occupied by the technology firm Palantir in McLean, Va., on Oct. 11, 2014.
Photo: Kristoffer Tripplaar/Sipa USA/AP
Palantir’s relationship with government spy agencies appears to date back to at least 2008, when representatives from the U.K.’s signals intelligence agency, Government Communications Headquarters, joined their American peers at VisWeek, an annual data visualization and computing conference organized by the Institute of Electrical and Electronics Engineers and the U.S. National Institute of Standards and Technology. Attendees from throughout government and academia gather to network with members of the private sector at the event, where they compete in teams to solve hypothetical data-based puzzles as part of the Visual Analytics Science and Technology (VAST) Challenge. As described in a document saved by GCHQ, Palantir fielded a team in 2008 and tackled one such scenario using its own software. It was a powerful marketing opportunity at a conference filled with potential buyers.
In the demo, Palantir engineers showed how their software could be used to identify Wikipedia users who belonged to a fictional radical religious sect and graph their social relationships. In Palantir’s pitch, its approach to the VAST Challenge involved using software to enable “many analysts working together [to] truly leverage their collective mind.” The fake scenario’s target, a cartoonishly sinister religious sect called “the Paraiso Movement,” was suspected of a terrorist bombing, but the unmentioned and obvious subtext of the experiment was the fact that such techniques could be applied to de-anonymize and track members of any political or ideological group. Among a litany of other conclusions, Palantir determined the group was prone to violence because its “Manifesto’s intellectual influences include ‘Pancho Villa, Che Guevara, Leon Trotsky, [and] Cuban revolutionary Jose MartÃ,’ a list of military commanders and revolutionaries with a history of violent actions.”
The delegation from GCHQ returned from VisWeek excited and impressed. In a classified report from those who attended, Palantir’s potential for aiding the spy agency was described in breathless terms. “Palantir are a relatively new Silicon Valley startup who are sponsored by the CIA,” the report began. “They claim to have significant involvement with the US intelligence community, although none yet at NSA.” GCHQ noted that Palantir “has been developed closely internally with intelligence community users (unspecified, but likely to be the CIA given the funding).” The report described Palantir’s demo as “so significant” that it warranted its own entry in GCHQ’s classified internal wiki, calling the software “extremely sophisticated and mature. … We were veryimpressed. You need to see it to believe it.”
The report conceded, however, that “it would take an enormous effort for an in-house developed GCHQ system to get to the same level of sophistication” as Palantir. The GCHQ briefers also expressed hesitation over the price tag, noting that “adoption would have [a] huge monetary … cost,” and over the implications of essentially outsourcing intelligence analysis software to the private sector, thus making the agency “utterly dependent on a commercial product.” Finally, the report added that “it is possible there may be concerns over security — the company have published a lot of information on their website about how their product is used in intelligence analysis, some of which we feel very uncomfortable about.”
A page from Palantir’s “Executive Summary” document, provided to government clients.
However anxious British intelligence was about Palantir’s self-promotion, the worry must not have lasted very long. Within two years, documents show that at least three members of the “Five Eyes” spy alliance between the United States, the U.K., Australia, New Zealand, and Canada were employing Palantir to help gather and process data from around the world. Palantir excels at making connections between enormous, separate databases, pulling big buckets of information (call records, IP addresses, financial transactions, names, conversations, travel records) into one centralized heap and visualizing them coherently, thus solving one of the persistent problems of modern intelligence gathering: data overload.
A GCHQ wiki page titled “Visualisation,” outlining different ways “to provide insight into some set of data,” puts succinctly Palantir’s intelligence value:
Palantir is an information management platform for analysis developed by Palantir Technologies. It integrates structured and unstructured data, provides search and discovery capabilities, knowledge management, and collaborative features. The goal is to offer the infrastructure, or ‘full stack,’ that intelligence organizations require for analysis.
Bullet-pointed features of note included a “Graph View,” “Timelining capabilities,” and “Geo View.”
A GCHQ diagram indicates how Palantir could be used as part of a computer network attack.
Under the Five Eyes arrangement, member countries collect and pool enormous streams of data and metadata collected through tools like XKEYSCORE, amounting to tens of billions of records. The alliance is constantly devising (or attempting) new, experimental methods of prying data out of closed and private sources, including by hacking into computers and networks in non-Five Eyes countries and infecting them with malware.
A 2011 PowerPoint presentation from GCHQ’s Network Defence Intelligence & Security Team (NDIST) — which, as The Intercept has previously reported, “worked to subvert anti-virus and other security software in order to track users and infiltrate networks” — mentioned Palantir as a tool for processing data gathered in the course of its malware-oriented work. Palantir’s software was described as an “analyst workspace [for] pulling together disparate information and displaying it in novel ways,” and was used closely in conjunction with other intelligence software tools, like the NSA’s notorious XKEYSCORE search system. The novel ways of using Palantir for spying seemed open-ended, even imaginative: A 2010 presentation on the joint NSA-GCHQ “Mastering the Internet” surveillance program mentioned the prospect of running Palantir software on “Android handsets” as part of a SIGINT-based “augmented reality” experience. It’s unclear what exactly this means or could even look like.
Above all, these documents depict Palantir’s software as a sort of consolidating agent, allowing Five Eyes analysts to make sense of tremendous amounts of data that might have been otherwise unintelligible or highly time-consuming to digest. In a 2011 presentation to the NSA, classified top secret, an NDIST operative noted the “good collection” of personal data among the Five Eyes alliance but lamented the “poor analytics,” and described the attempt to find new tools for SIGINT analysis, in which it “conducted a review of 14 different systems that might work.” The review considered services from Lockheed Martin and Detica (a subsidiary of BAE Systems) but decided on the up-and-comer from Palo Alto.
Palantir is described as having been funded not only by In-Q-Tel, the CIA’s venture capital branch, but furthermore created “through [an] iterative collaboration between Palantir computer scientists and analysts from various intelligence agencies over the course of nearly three years.” While it’s long been known that Palantir got on its feet with the intelligence community’s money, it has not been previously reported that the intelligence community actually helped build the software. The continuous praise seen in these documents shows that the collaboration paid off. Under the new “Palantir Model,” “data can come from anywhere” and can be “asked whatever the analyst wants.”
Along with Palantir’s ability to pull in “direct XKS Results,” the presentation boasted that the software was already connected to 10 other secret Five Eyes and GCHQ programs and was highly popular among analysts. It even offered testimonials (TWO FACE appears to be a code name for the implementation of Palantir):
[Palantir] is the best tool I have ever worked with. It’s intuitive, i.e. idiot-proof, and can do a lot you never even dreamt of doing.This morning, using TWO FACE rather than XKS to review the activity of the last 3 days. It reduced the initial analysis time by at least 50%.
Enthusiasm runs throughout the PowerPoint: A slide titled “Unexpected Benefits” reads like a marketing brochure, exclaiming that Palantir “interacts with anything!” including Google Earth, and “You can even use it on a iphone or laptop.” The next slide, on “Potential Downsides,” is really more praise in disguise: Palantir “Looks expensive” but “isn’t as expensive as expected.” The answer to “What can’t it do?” is revealing: “However we ask, Palantir answer,” indicating that the collaboration between spies and startup didn’t end with Palantir’s CIA-funded origins, but that the company was willing to create new features for the intelligence community by request.
On GCHQ’s internal wiki page for TWO FACE, analysts were offered a “how to” guide for incorporating Palantir into their daily routine, covering introductory topics like “How do I … Get Data from XKS in Palantir,” “How do I … Run a bulk search,” and “How do I … Run bulk operations over my objects in Palantir.” For anyone in need of a hand, “training is currently offered as 1-2-1 desk based training with a Palantir trainer. This gives you the opportunity to quickly apply Palantir to your current work task.” Palantir often sends “forward deployed engineers,” or FDEs, to work alongside clients at their offices and provide assistance and engineering services, though the typical client does not have access to the world’s largest troves of personal information. For analysts interested in tinkering with Palantir, there was even a dedicated instant message chat room open to anyone for “informally” discussing the software.
The GCHQ wiki includes links to classified webpages describing Palantir’s use by the Australian Defence Signals Directorate (now called the Australian Signals Directorate) and to a Palantir entry on the NSA’s internal “Intellipedia,” though The Intercept does not have access to copies of the linked sites. However, embedded within Intellipedia HTML files available to The Intercept are references to a variety of NSA-Palantir programs, including “Palantir Classification Helper,” “[Target Knowledge Base] to Palantir PXML,” and “PalantirAuthService.” (Internal Palantir documents obtained by TechCrunch in 2013 provide additional confirmation of the NSA’s relationship with the company.)
One Palantir program used by GCHQ, a software plug-in named “Kite,” was preserved almost in its entirety among documents provided to The Intercept. An analysis of Kite’s source code shows just how much flexibility the company afforded Five Eyes spies. Developers and analysts could ingest data locally using either Palantir’s “Workspace” application or Kite. When they were satisfied the process was working properly, they could push it into a Palantir data repository where other Workspace users could also access it, almost akin to a Google Spreadsheets collaboration. When analysts were at their Palantir workstation, they could perform simple imports of static data, but when they wanted to perform more complicated tasks like import databases or set up recurring automatic imports, they turned to Kite.
Kite worked by importing intelligence data and converting it into an XML file that could be loaded into a Palantir data repository. Out of the box, Kite was able to handle a variety of types of data (including dates, images, geolocations, etc.), but GCHQ was free to extend it by writing custom fields for complicated types of data the agency might need to analyze. The import tools were designed to handle a variety of use cases, including static data sets, databases that were updated frequently, and data stores controlled by third parties to which GCHQ was able to gain access.
This collaborative environment also produced a piece of software called “XKEYSCORE Helper,” a tool programmed with Palantir (and thoroughly stamped with its logo) that allowed analysts to essentially import data from the NSA’s pipeline, investigate and visualize it through Palantir, and then presumably pass it to fellow analysts or Five Eyes intelligence partners. One of XKEYSCORE’s only apparent failings is that it’s so incredibly powerful, so effective at vacuuming personal metadata from the entire internet, that the volume of information it extracts can be overwhelming. Imagine trying to search your Gmail account, only the results are pulled from every Gmail inbox in the world.
Making XKEYSCORE more intelligible — and thus much more effective — appears to have been one of Palantir’s chief successes. The helper tool, documented in a GCHQ PDF guide, provided a means of transferring data captured by the NSA’s XKEYSCORE directly into Palantir, where presumably it would be far easier to analyze for, say, specific people and places. An analyst using XKEYSCORE could pull every IP address in Moscow and Tehran that visited a given website or made a Skype call at 14:15 Eastern Time, for example, and then import the resulting data set into Palantir in order to identify additional connections between the addresses or plot their positions using Google Earth.
Palantir was also used as part of a GCHQ project code-named LOVELY HORSE, which sought to improve the agency’s ability to collect so-called open source intelligence — data available on the public internet, like tweets, blog posts, and news articles. Given the “unstructured” nature of this kind of data, Palantir was cited as “an enrichment to existing [LOVELY HORSE] investigations … the content should then be viewable in a human readable format within Palantir.”
Palantir’s impressive data-mining abilities are well-documented, but so too is the potential for misuse. Palantir software is designed to make it easy to sift through piles of information that would be completely inscrutable to a human alone, but the human driving the computer is still responsible for making judgments, good or bad.
A 2011 document by GCHQ’s SIGINT Development Steering Group, a staff committee dedicated to implementing new spy methods, listed some of these worries. In a table listing “risks & challenges,” the SDSG expressed a “concern that [Palantir] gives the analyst greater potential for going down too many analytical paths which could distract from the intelligence requirement.” What it could mean for analysts to distract themselves by going down extraneous “paths” while browsing the world’s most advanced spy machine is left unsaid. But Palantir’s data-mining abilities were such that the SDSG wondered if its spies should be blocked from having full access right off the bat and suggested configuring Palantir software so that parts would “unlock … based on analysts skill level, hiding buttons and features until needed and capable of utilising.” If Palantir succeeded in fixing the intelligence problem of being overwhelmed with data, it may have created a problem of over-analysis — the company’s software offers such a multitude of ways to visualize and explore massive data sets that analysts could get lost in the funhouse of infographics, rather than simply being overwhelmed by the scale of their task.
If Palantir’s potential for misuse occurred to the company’s spy clients, surely it must have occurred to Palantir itself, especially given the company’s aforementioned “commitment” to privacy and civil liberties. Sure enough, in 2012 the company announced the formation of the Palantir Council of Advisors on Privacy and Civil Liberties, a committee of academics and consultants with expertise in those fields. Palantir claimed that convening the PCAP had “provided us with invaluable guidance as we try to responsibly navigate the often ill-defined legal, political, technological, and ethical frameworks that sometimes govern the various activities of our customers,” and continued to discuss the privacy and civil liberties “implications of product developments and to suggest potential ways to mitigate any negative effects.” Still, Palantir made clear that the “PCAP is advisory only — any decisions that we make after consulting with the PCAP are entirely our own.”
What would a privacy-minded conversation about privacy-breaching software look like? How had a privacy and civil liberties council navigated the fact that Palantir’s clientele had directly engaged in one of the greatest privacy and civil liberties breaches of all time? It’s hard to find an answer.
Palantir wrote that it structured the nondisclosure agreement signed by PCAP members so that they “will be free to discuss anything that they learn in working with us unless we clearly designate information as proprietary or otherwise confidential (something that we have rarely found necessary except on very limited occasions).” But despite this assurance of transparency, all but one of the PCAP’s former and current members either did not return a request for comment for this article or declined to comment citing the NDA.
The former PCAP member who did respond, Stanford privacy scholar Omer Tene, told The Intercept that he was unaware of “any specific relationship, agreement, or project that you’re referring to,” and said he was not permitted to answer whether Palantir’s work with the intelligence community was ever a source of tension with the PCAP. He declined to comment on either the NSA or GCHQ specifically. “In general,” Tene said, “the role of the PCAP was to hear about client engagement or new products and offerings that the company was about to launch, and to opine as to the way they should be set up or delivered in order to minimize privacy and civil liberties concerns.” But without any further detail, it’s unclear whether the PCAP was ever briefed on the company’s work for spy agencies, or whether such work was a matter of debate.
There’s little detail to be found on archived versions of Palantir’s privacy and civil liberties-focused blog, which appears to have been deleted sometime after the PCAP was formed. Palantir spokesperson Matt Long told The Intercept to contact the Palantir media team for questions regarding the vanished blog at the same email address used to reach Long in the first place. Palantir did not respond to additional repeated requests for comment and clarification.
A GCHQ spokesperson provided a boilerplate statement reiterating the agency’s “longstanding policy” against commenting on intelligence matters and asserted that all its activities are “carried out in accordance with a strict legal and policy framework.” The NSA did not provide a response.
Anyone worried that the most powerful spy agencies on Earth might use Palantir software to violate the privacy or civil rights of the vast number of people under constant surveillance may derive some cold comfort in a portion of the user agreement language Palantir provided for the Kite plug-in, which stipulates that the user will not violate “any applicable law” or the privacy or the rights “of any third party.” The world will just have to hope Palantir’s most powerful customers follow the rules.
Documents published with this article:
- GCHQ VisWeek 2008 Conference Report
- Palantir Executive Summary
- NDIST Cyber Defence
- Mastering the Internet
- The Tale of Two Sources
- TWO FACE on GCHQ Wiki
- XKEYSCORE Helper Notes
- SDSG Integrated Analytics Workshop
Listen to Jeremy Scahill’s interview with Sam Biddle on Episode 4 of Intercepted (begins at 32:05).
Leaked Palantir Doc Reveals Uses,
Specific Functions And Key Clients
Posted Jan 11, 2015 by Matt Burns (@mjburnsy)
Since its founding in 2004, Palantir has managed to grow into a billion dollar company while being very surreptitious about what it does exactly. Conjecture abounds. The vague facts dredged up by reporters confirm that Palantir has created a data mining system used extensively by law enforcement agencies and security companies to connect the dots between known criminals.
TechCrunch has received a private document from 2013 which reveals the company’s extensive trove of data analysis tools and lists many of its key clients. The document is currently being passed around as an investor prospectus for a new secondary round.
In short, the description above is in part correct. But, thanks to this leaked information, we now know far more about the secretive company.
Palantir’s data analysis solution targets three industries: government, the finance sector and legal research. Each of these industries must wrestle with massive sets of data. To do this, Palantir’s toolsets are aimed at massive data caches, allowing litigators and the police to make connections otherwise invisible. For example, a firm hired by the Securities Investment Protection Corporation used Palantir’s software to sort through the mountains of data, over 40 years of records, to convict Ponzi schemer Bernie Madoff (of all things).
Palantir’s software sits on top of existing data sets and provides users with what seems like a revolutionary interface. Users do not have to use SQL queries or employ engineers to write strings in order to search petabytes of data. Instead, natural language is used to query data and results are returned in real-time.
Clients include the Los Angeles Police Department which used Palantir to parse and connect 160 data sets: Everyone from detectives to transit cops to homeland security officials uses Palantir at the LAPD. According to the document, Palantir provides a timeline of events and has helped the massive police department sort its records.
The leaked report quotes Sergeant Peter Jackson of the LAPD stating: “Detectives love the type of information it [Palantir] provides. They can now do things that we could not do before. They can now exactly see great information and the links between events and people. It’s brought great success to LAPD. It supports the cops on the streets and the officers doing the investigations. It is a great tool. They are becoming more efficient and more effective cops. Palantir is allowing them to better serve the public.”
Palantir explains that it is a toolset for use in human analysis on its website. However, we now understand that the service is a smarter way of displaying data for analysis by humans. It is capable of building comprehensive models of activity to detect suspicious anomalies and is even able to provide immunity to fraud thanks to strategies the founders learned while still at PayPal.
Palantir’s anti-fraud system uses algorithms to detect and isolate patterns designated by analysts. This approach was inspired by combating adaptive threats at PayPal, the leaked document states. Four out of the five people on the Palantir management team worked at PayPal. Palantir co-founder Peter Thiel was also a PayPal co-founder.
The document confirms that Palantir is employed by multiple US Government agencies. One of the company’s first contracts was with the Joint IED Defeat Organization in 2006. From 2007-2009 Palantir’s work in Washingtonexpanded from eight pilots to more than 50 programs.
As of 2013, Palantir was used by at least 12 groups within the US Government including the CIA, DHS, NSA, FBI, the CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint IED-defeat organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children. The Centers for Medicaid and Medicare Services were planning on pilot testing the use of Palantir in 2013 to investigate tips received through a hotline. A second test was run by the same organization to identify potentially fraudulent medical providers in the Southern region of the US.
However, as of 2013, not all parts of the military used Palantir. The U.S. Army developed its own data analysis tool called the Distributed Common Ground System at a cost of $2.3 billion, but it is believed that it is not very popular. The leaked document cites a 2012 study where 96% of the surveyed war fighters in Afghanistan recommended Palantir.
The prospectus holds that the US military used Palantir with great success. The Pentagon used the software to track patterns in roadside bomb deployment and was able to conclude that garage-door openers were being used as remote detonators. With Palantir, the Marines are now able to upload DNA samples from remote locations and tap into information gathered from years of collecting fingerprints and DNA evidence. The results are returned almost immediately. Without Palantir, the suspects would have already moved onto a different location by the time the field agents received the results.
Samuel Reading, a former Marine who works in Afghanistan for NEK Advanced Securities Group, a U.S. military contractor, was quoted in the document as saying It’s the combination of every analytical tool you could ever dream of. You will know every single bad guy in your area.”
“It’s the combination of every analytical tool you could ever dream of. You will know every single bad guy in your area.”
The U.S. spy agencies also employed Palantir to connect databases across departments. Before this, most of the databases used by the CIA and FBI were siloed, forcing users to search each database individually. Now everything is linked together using Palantir. In fact, cyber analysts working for the now-defunct Information Warfare Monitor used the system to mine data on the China-based cyber groups GhostNet and The Shadow Network.
Yet Palantir is not exclusively used by governments or law enforcement agencies. The company’s data solution works equally as well in more pedestrian pursuits.
The International Consortium of Investigative Journalists uses Palantir to gain insight into the global trade and illegal trafficking of human tissue. And, as we mentioned before, the K2 Intelligence firm was employed by the SIPC to conquer the 20 terabytes of data in its case against Bernie Madoff. The leaked report quotes Jeremy Kroll, CEO and Co-founder of K2, saying that Palantir was able to construct a story around several key events in the Madoff saga in just a couple of hours.
In the business of dealing with some of the world’s most sensitive sets of data, secrecy is clearly important to Palantir’s success. This document likely only gives a glimpse into Palantir’s true capability and reach, especially since it was current just over a year and a half ago. There’s probably a great deal of Palantir information still out there, waiting to be discovered — More than a Madoff’s worth.
Middle image via aki51
https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/
Aug 14, 2013 @ 10:10 AM 572,204 The Little Black Book of Billionaire Secrets
How A ‘Deviant’ Philosopher Built
Palantir, A CIA-Funded Data-Mining
Juggernaut
Forbes Staff
Covering the worlds of data security, privacy and hacker culture.
Opinions expressed by Forbes Contributors are their own.
This story appears in the September 2, 2013 issue of Forbes. Subscribe
Palantir chief executive Alex Karp. (Credit: Eric Millette for Forbes)
By Andy Greenberg and Ryan Mac
Since rumors began to spread that a startup called Palantir helped to kill Osama bin Laden, Alex Karp hasn’t had much time to himself.
On one sun-baked July morning in Silicon Valley Palantir’s lean 45-year-old chief executive, with a top-heavy mop of frazzled hair, hikes the grassy hills around Stanford University’s massive satellite antennae known as the Dish, a favorite meditative pastime. But his solitude is disturbed somewhat by “Mike,” an ex-Marine–silent, 6 foot 1, 270 pounds of mostly pectoral muscle–who trails him everywhere he goes. Even on the suburban streets of Palo Alto, steps from Palantir’s headquarters, the bodyguard lingers a few feet behind.
“It puts a massive cramp on your life,” Karp complains, his expression hidden behind large black sunglasses. “There’s nothing worse for reducing your ability to flirt with someone.”
Karp’s 24/7 security detail is meant to protect him from extremists who have sent him death threats and conspiracy theorists who have called Palantir to rant about the Illuminati. Schizophrenics have stalked Karp outside his office for days at a stretch. “It’s easy to be the focal point of fantasies,” he says, “if your company is involved in realities like ours.”
Palantir lives the realities of its customers: the NSA, the FBI and the CIA–an early investor through its In-Q-Tel venture fund–along with an alphabet soup of other U.S. counterterrorism and military agencies. In the last five years Palantir has become the go-to company for mining massive data sets for intelligence and law enforcement applications, with a slick software interface and coders who parachute into clients’ headquarters to customize its programs. Palantir turns messy swamps of information into intuitively visualized maps, histograms and link charts. Give its so-called “forward-deployed engineers” a few days to crawl, tag and integrate every scrap of a customer’s data, and Palantir can elucidate problems as disparate as terrorism, disaster response and human trafficking.
Palantir’s advisors include Condoleezza Rice and former CIA director George Tenet, who says in an interview that “I wish we had a tool of its power” before 9/11. General David Petraeus, the most recent former CIA chief, describes Palantir to FORBES as “a better mousetrap when a better mousetrap was needed” and calls Karp “sheer brilliant.”
Among those using Palantir to connect the dots are the Marines, who have deployed its tools in Afghanistan for forensic analysis of roadside bombs and predicting insurgent attacks. The software helped locate Mexican drug cartel members who murdered an American customs agent and tracked down hackers who installed spyware on the computer of the Dalai Lama. In the book The Finish, detailing the killing of Osama bin Laden, author Mark Bowden writes that Palantir’s software “actually deserves the popular designation Killer App.”
And now Palantir is emerging from the shadow world of spies and special ops to take corporate America by storm. The same tools that can predict ambushes in Iraq are helping pharmaceutical firms analyze drug data. According to a former JPMorgan Chase staffer, they’ve saved the firm hundreds of millions of dollars by addressing issues from cyberfraud to distressed mortgages. A Palantir user at a bank can, in seconds, see connections between a Nigerian Internet protocol address, a proxy server somewhere within the U.S. and payments flowing out from a hijacked home equity line of credit, just as military customers piece together fingerprints on artillery shell fragments, location data, anonymous tips and social media to track down Afghani bombmakers.
Those tools have allowed Palantir’s T-shirted twentysomethings to woo customers away from the suits and ties of IBM, Booz Allen and Lockheed Martin with a product that deploys faster, offers cleaner results and often costs less than $1 million per installation–a fraction of the price its rivals can offer. Its commercial clients–whose identities it guards even more closely than those of its government customers–include Bank of America and News Corp. Private-sector deals now account for close to 60% of the company’s revenue, which FORBES estimates will hit $450 million this year, up from less than $300 million last year. Karp projects Palantir will sign a billion dollars in new, long-term contracts in 2014, a year that may also bring the company its first profits.
The bottom line: A CIA-funded firm run by an eccentric philosopher has become one of the most valuable private companies in tech, priced at between $5 billion and $8 billion in a round of funding the company is currently pursuing. Karp owns roughly a tenth of the firm–just less than its largest stakeholder, Peter Thiel, the PayPal and Facebook billionaire. (Other billionaire investors include Ken Langone and hedge fund titan Stanley Druckenmiller.) That puts Karp on course to become Silicon Valley’s latest billionaire–and Thiel could double his fortune–if the company goes public, a possibility Karp says Palantir is reluctantly considering.
The biggest problem for Palantir’s business may be just how well its software works: It helps its customers see too much. In the wake of NSA leaker Edward Snowden’s revelations of the agency’s mass surveillance, Palantir’s tools have come to represent privacy advocates’ greatest fears of data-mining technology — Google-level engineering applied directly to government spying. That combination of Big Brother and Big Data has come into focus just as Palantir is emerging as one of the fastest-growing startups in the Valley, threatening to contaminate its first public impressions and render the firm toxic in the eyes of customers and investors just when it needs them most.
“They’re in a scary business,” says Electronic Frontier Foundation attorney Lee Tien. ACLU analyst Jay Stanley has written that Palantir’s software could enable a “true totalitarian nightmare, monitoring the activities of innocent Americans on a mass scale.”
Karp, a social theory Ph.D., doesn’t dodge those concerns. He sees Palantir as the company that can rewrite the rules of the zero-sum game of privacy and security. “I didn’t sign up for the government to know when I smoke a joint or have an affair,” he acknowledges. In a company address he stated, “We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people we’d like to be.”
(Karp with billionaire co-founder Peter)
Palantir boasts of technical safeguards for privacy that go well beyond the legal requirements for most of its customers, as well as a team of “privacy and civil liberties engineers.” But it’s Karp himself who ultimately decides the company’s path. “He’s our conscience,” says senior engineer Ari Gesher.
The question looms, however, of whether business realities and competition will corrupt those warm and fuzzy ideals. When it comes to talking about industry rivals, Karp often sounds less like Palantir’s conscience than its id. He expressed his primary motivation in his July company address: to “kill or maim” competitors like IBM and Booz Allen. “I think of it like survival,” he said. “We beat the lame competition before they kill us.”
***
KARP SEEMS TO enjoy listing reasons he isn’t qualified for his job. “He doesn’t have a technical degree, he doesn’t have any cultural affiliation with the government or commercial areas, his parents are hippies,” he says, manically pacing around his office as he describes himself in the third person. “How could it be the case that this person is cofounder and CEO since 2005 and the company still exists?”
The answer dates back to Karp’s decades-long friendship with Peter Thiel, starting at Stanford Law School. The two both lived in the no-frills Crothers dorm and shared most of their classes during their first year, but held starkly opposite political views. Karp had grown up in Philadelphia, the son of an artist and a pediatrician who spent many of their weekends taking him to protests for labor rights and against “anything Reagan did,” he recalls. Thiel had already founded the staunchly libertarian Stanford Review during his time at the university as an undergrad.
“We would run into each other and go at it … like wild animals on the same path,” Karp says. “Basically I loved sparring with him.”
With no desire to practice law, Karp went on to study under Jurgen Habermas, one of the 20th century’s most prominent philosophers, at the University of Frankfurt. Not long after obtaining his doctorate, he received an inheritance from his grandfather, and began investing it in startups and stocks with surprising success. Some high-net-worth individuals heard that “this crazy dude was good at investing” and began to seek his services, he says. To manage their money he set up the London-based Caedmon Group, a reference to Karp’s middle name, the same as the first known English-language poet.
Back in Silicon Valley Thiel had cofounded PayPal and sold it to eBay in October 2002 for $1.5 billion. He went on to create a hedge fund called Clarium Capital but continued to found new companies: One would become Palantir, named by Thiel for the Palantiri seeing stones from J.R.R. Tolkien’s Lord of the Rings, orbs that allow the holder to gaze across vast distances to track friends and foes.
In a post-9/11 world Thiel wanted to sell those Palantiri-like powers to the growing national security complex: His concept for Palantir was to use the fraud-recognition software designed for PayPal to stop terrorist attacks. But from the beginning the libertarian saw Palantir as an antidote to–not a tool for–privacy violations in a society slipping into a vise of security. “It was a mission-oriented company,” says Thiel, who has personally invested $40 million in Palantir and today serves as its chairman. “I defined the problem as needing to reduce terrorism while preserving civil liberties.”
In 2004 Thiel teamed up with Joe Lonsdale and Stephen Cohen, two Stanford computer science grads, and PayPal engineer Nathan Gettings to code together a rough product. Initially they were bankrolled entirely by Thiel, and the young team struggled to get investors or potential customers to take them seriously. “How the hell do you get them to listen to 22-year-olds?” says Lonsdale. “We wanted someone to have a little more gray hair.”
Enter Karp, whose Krameresque brown curls, European wealth connections and Ph.D. masked his business inexperience. Despite his nonexistent tech background, the founders were struck by his ability to immediately grasp complex problems and translate them to nonengineers.
Lonsdale and Cohen quickly asked him to become acting CEO, and as they interviewed other candidates for the permanent job, none of the starched-collar Washington types or M.B.A.s they met impressed them. “They were asking questions about our diagnostic of the total available market,” says Karp, disdaining the B-school lingo. “We were talking about building the most important company in the world.”
While Karp attracted some early European angel investors, American venture capitalists seemed allergic to the company. According to Karp, Sequoia Chairman Michael Moritz doodled through an entire meeting. A Kleiner Perkins exec lectured the Palantir founders on the inevitable failure of their company for an hour and a half.
Palantir was rescued by a referral to In-Q-Tel, the CIA’s venture arm, which would make two rounds of investment totaling more than $2 million. (See our sidebar on In-Q-Tel’s greatest hits.) “They were clearly top-tier talent,” says former In-Q-Tel executive Harsh Patel. “The most impressive thing about the team was how focused they were on the problem … how humans would talk with data.”
That mission turned out to be vastly more difficult than any of the founders had imagined. PayPal had started with perfectly structured and organized information for its fraud analysis. Intelligence customers, by contrast, had mismatched collections of e-mails, recordings and spreadsheets.
To fulfill its privacy and security promises, Palantir needed to catalog and tag customers’ data to ensure that only users with the right credentials could access it. This need-to-know system meant classified information couldn’t be seen by those without proper clearances–and was also designed to prevent the misuse of sensitive personal data.
But Palantir’s central privacy and security protection would be what Karp calls, with his academic’s love of jargon, “the immutable log.” Everything a user does in Palantir creates a trail that can be audited. No Russian spy, jealous husband or Edward Snowden can use the tool’s abilities without leaving an indelible record of his or her actions.
From 2005 to 2008 the CIA was Palantir’s patron and only customer, alpha-testing and evaluating its software. But with Langley’s imprimatur, word of Palantir’s growing abilities spread, and the motley Californians began to bring in deals and recruits. The philosopher Karp turned out to have a unique ability to recognize and seduce star engineers. His colleagues were so flummoxed by his nose for technical talent that they once sent a pair of underwhelming applicants into a final interview with Karp as a test. He smelled both out immediately.
A unique Palantir culture began to form in Karp’s iconoclast image. Its Palo Alto headquarters, which it calls “the Shire” in reference to the homeland of Tolkien’s hobbits, features a conference room turned giant plastic ball pit and has floors littered with Nerf darts and dog hair. (Canines are welcome.) Staffers, most of whom choose to wear Palantir-branded apparel daily, spend so much time at the office that some leave their toothbrushes by the bathroom sinks.
Karp himself remains the most eccentric of Palantir’s eccentrics. The lifelong bachelor, who says that the notion of settling down and raising a family gives him “hives,” is known for his obsessive personality: He solves Rubik’s cubes in less than three minutes, swims and practices the meditative art of Qigong daily and has gone through aikido and jujitsu phases that involved putting cofounders in holds in the Shire’s hallways. A cabinet in his office is stocked with vitamins, 20 pairs of identical swimming goggles and hand sanitizer. And he addresses his staff using an internal video channel called KarpTube, speaking on wide-ranging subjects like greed, integrity and Marxism. “The only time I’m not thinking about Palantir,” he says, “is when I’m swimming, practicing Qigong or during sexual activity.”
In 2010 Palantir’s customers at the New York Police Department referred the company to JPMorgan, which would become its first commercial customer. A team of engineers rented a Tribeca loft, sleeping in bunk beds and working around the clock to help untangle the bank’s fraud problems. Soon they were given the task of unwinding its toxic mortgage portfolio. Today Palantir’s New York operation has expanded to a full, Batman-themed office known as Gotham, and its lucrative financial-services practice includes everything from predicting foreclosures to battling Chinese hackers.
As its customer base grew, however, cracks began to show in Palantir’s idealistic culture. In early 2011 e-mails emerged that showed a Palantir engineer had collaborated on a proposal to deal with a WikiLeaks threat to spill documents from Bank of America. The Palantir staffer had eagerly agreed in the e-mails to propose tracking and identifying the group’s donors, launching cyberattacks on WikiLeaks’ infrastructure and even threatening its sympathizers. When the scandal broke, Karp put the offending engineer on leave and issued a statement personally apologizing and pledging the company’s support of “progressive values and causes.” Outside counsel was retained to review the firm’s actions and policies and, after some deliberation, determined it was acceptable to rehire the offending employee, much to the scorn of the company’s critics.
Following the WikiLeaks incident, Palantir’s privacy and civil liberties team created an ethics hotline for engineers called the Batphone: Any engineer can use it to anonymously report to Palantir’s directors work on behalf of a customer they consider unethical. As the result of one Batphone communication, for instance, the company backed out of a job that involved analyzing information on public Facebook pages. Karp has also stated that Palantir turned down a chance to work with a tobacco firm, and overall the company walks away from as much as 20% of its possible revenue for ethical reasons. (It remains to be seen whether the company will be so picky if it becomes accountable to public shareholders and the demand for quarterly results.)
Still, according to former employees, Palantir has explored work in Saudi Arabia despite the staff’s misgivings about human rights abuses in the kingdom. And for all Karp’s emphasis on values, his apology for the WikiLeaks affair also doesn’t seem to have left much of an impression in his memory. In his address to Palantir engineers in July he sounded defiant: “We’ve never had a scandal that was really our fault.”
***
AT 4:07 P.M. ON NOV. 14, 2009 Michael Katz-Lacabe was parking his red Toyota Prius in the driveway of his home in the quiet Oakland suburb of San Leandro when a police car drove past. A license plate camera mounted on the squad car silently and routinely snapped a photo of the scene: his off-white, single-floor house, his wilted lawn and rosebushes, and his 5- and 8-year-old daughters jumping out of the car.
Katz-Lacabe, a gray-bearded and shaggy-haired member of the local school board, community activist and blogger, saw the photo only a year later: In 2010 he learned about the San Leandro Police Department’s automatic license plate readers, designed to constantly photograph and track the movements of every car in the city. He filed a public records request for any images that included either of his two cars. The police sent back 112 photos. He found the one of his children most disturbing.
“Who knows how many other people’s kids are captured in these images?” he asks. His concerns go beyond a mere sense of parental protection. “With this technology you can wind back the clock and see where everyone is, if they were parked at the house of someone other than their wife, a medical marijuana clinic, a Planned Parenthood center, a protest.”
San Leandro, Calif. community activist Michael Katz-Lacabe has taken a stand against cops using Palantir to analyze license plate photos of millions of unsuspecting drivers. (Credit: Eric Millette for Forbes)
As Katz-Lacabe dug deeper, he found that the millions of pictures collected by San Leandro’s license plate cameras are now passed on to the Northern California Regional Intelligence Center (NCRIC), one of 72 federally run intelligence fusion organizations set up after 9/11. That’s where the photos are analyzed using software built by a company just across San Francisco Bay: Palantir.
In the business proposal that Palantir sent NCRIC, it offered customer references that included the Los Angeles and New York police departments, boasting that it enabled searches of the NYPD’s 500 million plate photos in less than five seconds. Katz-Lacabe contacted Palantir about his privacy concerns, and the company responded by inviting him to its headquarters for a sit-down meeting. When he arrived at the Shire, a pair of employees gave him an hourlong presentation on Palantir’s vaunted safeguards: its access controls, immutable logs and the Batphone.
Katz-Lacabe wasn’t impressed. Palantir’s software, he points out, has no default time limits–all information remains searchable for as long as it’s stored on the customer’s servers. And its auditing function? “I don’t think it means a damn thing,” he says. “Logs aren’t useful unless someone is looking at them.”
When Karp hears Katz-Lacabe’s story, he quickly parries: Palantir’s software saves lives. “Here’s an actual use case,” he says and launches into the story of a pedophile driving a “beat-up Cadillac” who was arrested within an hour of assaulting a child, thanks to NYPD license plate cameras. “Because of the license-plate-reader data they gathered in our product, they pulled him off the street and saved human children lives.”
“If we as a democratic society believe that license plates in public trigger Fourth Amendment protections, our product can make sure you can’t cross that line,” he says, adding that there should be time limits on retaining such data. Until the law changes, though, Palantir will play within those rules. “In the real world where we work–which is never perfect–you have to have trade-offs.”
And what if Palantir’s audit logs–its central safeguard against abuse–are simply ignored? Karp responds that the logs are intended to be read by a third party. In the case of government agencies, he suggests an oversight body that reviews all surveillance–an institution that is purely theoretical at the moment. “Something like this will exist,” Karp insists. “Societies will build it, precisely because the alternative is letting terrorism happen or losing all our liberties.”
Palantir’s critics, unsurprisingly, aren’t reassured by Karp’s hypothetical court. Electronic Privacy Information Center activist Amie Stepanovich calls Palantir “naive” to expect the government to start policing its own use of technology. The Electronic Frontier Foundation’s Lee Tien derides Karp’s argument that privacy safeguards can be added to surveillance systems after the fact. “You should think about what to do with the toxic waste while you’re building the nuclear power plant,” he argues, “not some day in the future.”
Some former Palantir staffers say they felt equally concerned about the potential rights violations their work enabled. “You’re building something that could absolutely be used for malice. It would have been a nightmare if J. Edgar Hoover had these capabilities in his crusade against Martin Luther King,” says one former engineer. “One thing that really troubled me was the concern that something I contribute to could prevent an Arab Spring-style revolution.”
Despite Palantir’s lofty principles, says another former engineer, its day-to-day priorities are satisfying its police and intelligence customers: “Keeping good relations with law enforcement and ‘keeping the lights on’ bifurcate from the ideals.”
He goes on to argue that even Palantir’s founders don’t quite understand the Palantiri seeing stones in The Lord of the Rings . Tolkien’s orbs, he points out, didn’t actually give their holders honest insights. “The Palantiri distort the truth,” he says. And those who look into them, he adds, “only see what they want to see.”
***
DESPITE WHAT any critic says, it’s clear that Alex Karp does indeed value privacy–his own.
His office, decorated with cardboard effigies of himself built by Palantir staff and a Lego fortress on a coffee table, overlooks Palo Alto’s Alma Street through two-way mirrors. Each pane is fitted with a wired device resembling a white hockey puck. The gadgets, known as acoustic transducers, imperceptibly vibrate the glass with white noise to prevent eavesdropping techniques, such as bouncing lasers off windows to listen to conversations inside.
He’s reminiscing about a more carefree time in his life–years before Palantir–and has put down his Rubik’s cube to better gesticulate. “I had $40,000 in the bank, and no one knew who I was. I loved it. I loved it. I just loved it. I just loved it!” he says, his voice rising and his hands waving above his head. “I would walk around, go into skanky places in Berlin all night. I’d talk to whoever would talk to me, occasionally go home with people, as often as I could. I went to places where people were doing things, smoking things. I just loved it.”
“One of the things I find really hard and view as a massive drag … is that I’m losing my ability to be completely anonymous.”
It’s not easy for a man in Karp’s position to be a deviant in the modern world. And with tools like Palantir in the hands of the government, deviance may not be easy for the rest of us, either. With or without safeguards, the “complete anonymity” Karp savors may be a 20th-century luxury.
Karp lowers his arms, and the enthusiasm drains from his voice: “I have to get over this.”
__
Follow Ryan Mac on Twitter. Follow Andy Greenberg on Twitter, and pre-order the upcoming paperback edition of his book, This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers, a New York Times Book Review Editor’s Choice.
Comments
Post a Comment