RSS Feed for This PostCurrent Article

Beware of Department of Homeland Security’s Social Networking Monitoring Manual

 

The Feds have been forced to release their social network monitoring manual, which contains the list of words the government watches on social media and news sites.

Earlier the Huffington Post reported on the Feds have been forced to give up their list of words they monitor on Facebook, Twitter, and comments being posted on news articles so I compiled that list below.

Homeland Security Manual Lists Government Key Words For Monitoring Social Media, News

Ever complain on Facebook that you were feeling “sick?” Told your friends to “watch” a certain TV show? Left a comment on a media website about government “pork?”

If you did any of those things, or tweeted about your recent vacation in “Mexico” or a shopping trip to “Target,” the Department of Homeland Security may have noticed.

In the latest revelation of how the federal government is monitoring social media and online news outlets, the Electronic Privacy Information Center has posted online a 2011 Department of Homeland Security manual that includes hundreds of key words (such as those above) and search terms used to detect possible terrorism, unfolding natural disasters and public health threats. The center, a privacy watchdog group, filed a Freedom of Information Act request and then sued to obtain the release of the documents.

The 39-page “Analyst’s Desktop Binder” used by the department’s National Operations Center includes no-brainer words like “”attack,” “epidemic” and “Al Qaeda” (with various spellings). But the list also includes words that can be interpreted as either menacing or innocent depending on the context, such as “exercise,” “drill,” “wave,” “initiative,” “relief” and “organization.”

These terms and others are “broad, vague and ambiguous” and include “vast amounts of First Amendment protected speech that is entirely unrelated to the Department of Homeland Security mission to protect the public against terrorism and disasters,” stated the Electronic Privacy Information Center in letter to the House Homeland Security Subcommittee on Counterterrorism and Intelligence.

The manual was released by the center a week after Homeland Security officials were grilled at a House hearing over other documents obtained through a Freedom of Information Act lawsuit that revealed analysts were scrutinizing online comments that “reflect adversely” on the federal government. Mary Ellen Callahan, the chief privacy officer for the Department of Homeland Security, and Richard Chavez, director for the National Operations Center, testified that the released documents were outdated and that social media was monitored strictly to provide situational awareness and not to police disparaging opinions about the federal government. On Friday, Homeland Security officials stuck by that testimony.

A senior Homeland Security official who spoke to The Huffington Post on Friday on condition of anonymity said the testimony of agency officials last week remains “accurate” and the manual “is a starting point, not the endgame” in maintaining situational awareness of natural and man-made threats. The official denied Electronic Privacy Information Center’s charge that the government is monitoring dissent. The manual’s instruction that analysts should identify “media reports that reflect adversely on DHS and response activities” was not aimed at silencing criticism but at spotting and addressing problems, she added.

[...]

Source: The Huffington Post


The Official List – Using these words online will put you in the crosshairs Big Brother’s multi-billion dollar spy machine

Domestic Security

Assassination
Attack
Domestic security
Drill
Exercise
Cops
Law enforcement
Authorities
Disaster assistance
Disaster management
DNDO (Domestic Nuclear
Detection Office)
National preparedness
Mitigation
Prevention
Response
Recovery
Dirty bomb
Domestic nuclear detection
Emergency management
Emergency response
First responder
Homeland security
Maritime domain awareness
(MDA)
National preparedness
initiative
Militia
Shooting
Shots fired
Evacuation
Deaths
Hostage
Explosion (explosive)
Police
Disaster medical assistance
team (DMAT)
Organized crime
Gangs
National security
State of emergency
Security
Breach
Threat
Standoff
SWAT
Screening
Lockdown
Bomb (squad or threat)
Crash
Looting
Riot
Emergency Landing
Pipe bomb
Incident
Facility

HAZMAT & Nuclear

Hazmat
Nuclear
Chemical spill
Suspicious package/device
Toxic
National laboratory
Nuclear facility
Nuclear threat
Cloud
Plume
Radiation
Radioactive
Leak
Biological infection (or
event)
Chemical
Chemical burn
Biological
Epidemic
Hazardous
Hazardous material incident
Industrial spill
Infection
Powder (white)
Gas
Spillover
Anthrax
Blister agent
Chemical agent
Exposure
Burn
Nerve agent
Ricin
Sarin
North Korea

Health Concern + H1N1

Outbreak
Contamination
Exposure
Virus
Evacuation
Bacteria
Recall
Ebola
Food Poisoning
Foot and Mouth (FMD)
H5N1
Avian
Flu
Strain
Quarantine
H1N1
Vaccine
Salmonella
Small Pox
Plague
Human to human
Human to Animal
Influenza
Center for Disease Control
(CDC)
Drug Administration (FDA)
Public Health
Toxic
Agro Terror
Tuberculosis (TB)
Tamiflu
Norvo Virus
Epidemic
Agriculture
Listeria
Symptoms
Mutation
Resistant
Antiviral
Wave
Pandemic
Infection
Water/air borne
Sick
Swine
Pork World Health Organization
(WHO) (and components)
Viral Hemorrhagic Fever
E. Coli

Infrastructure Security

Infrastructure security
Airport
CIKR (Critical Infrastructure
& Key Resources)
AMTRAK
Collapse
Computer infrastructure
Communications
infrastructure
Telecommunications
Critical infrastructure
National infrastructure
Metro
WMATA
Airplane (and derivatives)
Chemical fire
Subway
BART
MARTA
Port Authority
NBIC (National
Biosurveillance Integration
Center)
Transportation security
Grid
Power
Smart
Body scanner
Electric
Failure or outage
Black out
Brown out
Port
Dock
Bridge
Cancelled
Delays
Service disruption
Power lines

Southwest Border Violence

Drug cartel
Violence
Gang
Drug
Narcotics
Cocaine
Marijuana
Heroin
Border
Mexico
Cartel
Southwest
Juarez
Sinaloa
Tijuana
Torreon
Yuma
Tucson
Decapitated
U.S. Consulate
Consular
El Paso
Fort Hancock
San Diego
Ciudad Juarez
Nogales
Sonora
Colombia
Mara salvatrucha
MS13 or MS-13
Drug war
Mexican army
Methamphetamine
Cartel de Golfo
Gulf Cartel
La Familia
Reynosa
Nuevo Leon
Narcos
Narco banners (Spanish
equivalents)
Los Zetas
Shootout
Execution
Gunfight
Trafficking
Kidnap
Calderon
Reyosa
Bust
Tamaulipas
Meth Lab
Drug trade
Illegal immigrants
Smuggling (smugglers)
Matamoros
Michoacana
Guzman
Arellano-Felix
Beltran-Leyva
Barrio Azteca
Artistic Assassins
Mexicles
New Federation

Terrorism

Terrorism
Al Qaeda (all spellings)
Terror
Attack
Iraq
Afghanistan
Iran
Pakistan
Agro
Environmental terrorist
Eco terrorism
Conventional weapon
Target
Weapons grade
Dirty bomb
Enriched
Nuclear
Chemical weapon
Biological weapon
Ammonium nitrate
Improvised explosive device
IED (Improvised Explosive
Device)
Abu Sayyaf
Hamas
FARC (Armed Revolutionary
Forces Colombia)
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
Basque Separatists
Hezbollah
Tamil Tigers
PLF (Palestine Liberation
Front)
PLO (Palestine Liberation
Organization
Car bomb
Jihad
Taliban
Weapons cache
Suicide bomber
Suicide attack
Suspicious substance
AQAP (AL Qaeda Arabian
Peninsula)
AQIM (Al Qaeda in the
Islamic Maghreb)
TTP (Tehrik-i-Taliban
Pakistan)
Yemen
Pirates
Extremism
Somalia
Nigeria
Radicals
Al-Shabaab
Home grown
Plot
Nationalist
Recruitment
Fundamentalism
Islamist

Weather/Disaster/Emergency

Emergency
Hurricane
Tornado
Twister
Tsunami
Earthquake
Tremor
Flood
Storm
Crest
Temblor
Extreme weather
Forest fire
Brush fire
Ice
Stranded/Stuck
Help
Hail
Wildfire
Tsunami Warning Center
Magnitude
Avalanche
Typhoon
Shelter-in-place
Disaster
Snow
Blizzard
Sleet
Mud slide or Mudslide
Erosion
Power outage
Brown out
Warning
Watch
Lightening
Aid
Relief
Closure
Interstate
Burst
Emergency Broadcast System

Cyber Security

Cyber security
Botnet
DDOS (dedicated denial of
service)
Denial of service
Malware
Virus
Trojan
Keylogger
Cyber Command
2600
Spammer
Phishing
Rootkit
Phreaking
Cain and abel
Brute forcing
Mysql injection
Cyber attack
Cyber terror
Hacker
China
Conficker
Worm
Scammers
Social media

Read The Department of Homeland Security National Operations Center Media Monitoring Capability Desktop Reference Binder

 

Until next time . . . Wake Up America!

Kevin A. Lehmann

Take a moment to share your thoughts about this article in the comment box below.

If you are a facebook friend and like my articles, blog posts and op-eds, due to time constraints and a rapidly growing list of readers, please subscribe to CatchKevin.com and share my blog and radio show with friends and family who value real, raw and relevant talk radio. Thank you.

Facebook comments:

comments

Trackback URL

  1. 7 Comment(s)

  2. By brock on May 10, 2012 | Reply

    and the liberals used to complain about bugging phones of terrorists. the radical Huffington post listed this information. no backlash against the government on this one? no president bashing? oh that’s right, Bush isn’t the president.

  3. By CEO Coachc on May 11, 2012 | Reply

    Hi Kevin,

    Excellent information. I guess 99% of America that uses social networks is on a watch list. :) Of course, I know that you and I must be, in that we are purveyors of truth. Keep up the excellent work!

    Best,
    David

  4. By sweeney on May 12, 2012 | Reply

    all i can say is stock up on bread flour ,sugar, salt, yeast, bottled water, tinned meats and fruit cos one big godam sh**storm is coming ,the elite don’t care who knows what any more so get get wise ……..get prepared……….get bugged in….and good luck id say god bless but even he has forsaken us.

  5. By Nonie on May 12, 2012 | Reply

    Thank you for this info. Good to know. Not surprised most of us are being monitored. My question is who’s doing all the monitoring? Were those jobs outsourced as well?

  6. By Gary on May 13, 2012 | Reply

    Thanks for the insiders scoop of information you have opened at least my eyes to…. It’s the question of the day???? Just Who Is Big Brother Watching Now? !!!! And what is their next method of private intrusion we as Americans need to watch out for ?

  7. By JFB on Jun 3, 2012 | Reply

    spend the time and our money, with our dollars plunging to bottom lows,knowing that we will not lay down, just to be led to slaughter, to put up this wide of a format to monitor us, the only reason i can think of is would be to separate us out one by one for retraining fema camps,,, funny with all the monitored words on this list they will be for sure looking at this one,, so go _____your self..monitors ==was looking at all the words on the list not much a person could type that would not be monitored

  8. By John on Aug 21, 2012 | Reply

    Posting on fb now.. :)… the whole thing in my timeline :)… so if I am not heard from .. take notice..

Post a Comment

4) Insert the following HTML code just before your closing tag of your website. Again, remember to change the URL to your own: