The fascinating ability for NZ Corporate media to ignore why Peter Thiel was granted residency

8
483

Our mainstream corporate media refuse to remindย you ofย the possible billions in damages the Kim Dotcom case has opened us up to, they refuse to acknowledge the role of Corporate Hollywood in the extradition case against Kim Dotcom and they refuse to touch the real reason why Peter Thiel was granted residency in NZ.

It’s because he runs the most powerful mass surveillance company in the world and it’s got an office in NZ to help process mass surveillance spying for our 5 Eyes GCSB…

HOW PETER THIELโ€™S PALANTIR HELPED THE NSA SPY ON THE WHOLE WORLD

DONALD TRUMP HAS inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trumpโ€™s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.

Peter Thiel became one of the American political mainstreamโ€™s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebookโ€™s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.

Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government โ€” the CIA itself was an early investor in the startup through In-Q-Tel, the agencyโ€™s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing โ€œat least $1.2 billionโ€ in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantirโ€™s government work.

โ€œPalantirโ€ is generally used interchangeably to refer to both Thiel and Karpโ€™s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of โ€œstructuredโ€ data (like spreadsheets) and โ€œunstructuredโ€ data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantirโ€™s chief appeal is that itโ€™s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.

Despite all the grandstanding about lucrative, shadowy government contracts, co-founder Karp does not shy away from taking a stand in the debate over government surveillance. In a Forbes profile in 2013, he played privacy lamb, saying, โ€œI didnโ€™t sign up for the government to know when I smoke a joint or have an affair. โ€ฆ We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people weโ€™d like to be.โ€ In that same article, Thiel lays out Palantirโ€™s mission with privacy in mind: to โ€œreduce terrorism while preserving civil liberties.โ€ After the first wave of revelations spurred by the whistleblower Edward Snowden, Palantir was quick to deny that it had any connection to the NSA spy program known as PRISM, which shared an unfortunate code name with one of its own software products. The current iteration of Palantirโ€™s website includes an entire section dedicated to โ€œPrivacy & Civil Liberties,โ€ proclaiming the companyโ€™s support of both:

Palantir Technologies is a mission-driven company, and a core component of that mission is protecting our fundamental rights to privacy and civil liberties. โ€ฆ

Some argue that society must โ€œbalanceโ€ freedom and safety, and that in order to better protect ourselves from those who would do us harm, we have to give up some of our liberties. We believe that this is a false choice in many areas. Particularly in the world of data analysis, liberty does not have to be sacrificed to enhance security. Palantir is constantly looking for ways to protect privacy and individual liberty through its technology while enabling the powerful analysis necessary to generate the actionable intelligence that our law enforcement and intelligence agencies need to fulfill their missions.

Itโ€™s hard to square this purported commitment to privacy with proof, garnered from documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSAโ€™s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSAโ€™s arsenal. According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSAโ€™s own admission its โ€œwidest reachingโ€ program, capturing โ€œnearly everything a typical user does on the internet.โ€ A subsequent report by The Intercept showed that XKEYSCOREโ€™s โ€œcollected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.โ€ For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.

But how do you make so much data comprehensible for human spies? As the additional documents published with this article demonstrate, Palantir sold its services to make one of the most powerful surveillance systems ever devised even more powerful, bringing clarity and slick visuals to an ocean of surveillance data.

PALANTIRโ€™S RELATIONSHIP WITH government spy agencies appears to date back to at least 2008, when representatives from the U.K.โ€™s signals intelligence agency, Government Communications Headquarters, joined their American peers at VisWeek, an annual data visualization and computing conference organized by the Institute of Electrical and Electronics Engineers and the U.S. National Institute of Standards and Technology. Attendees from throughout government and academia gather to network with members of the private sector at the event, where they compete in teams to solve hypothetical data-based puzzles as part of the Visual Analytics Science and Technology (VAST) Challenge. As described in a document saved by GCHQ, Palantir fielded a team in 2008 and tackled one such scenario using its own software. It was a powerful marketing opportunity at a conference filled with potential buyers.

In the demo, Palantir engineers showed how their software could be used to identify Wikipedia users who belonged to a fictional radical religious sect and graph their social relationships. In Palantirโ€™s pitch, its approach to the VAST Challenge involved using software to enable โ€œmany analysts working together [to] truly leverage their collective mind.โ€ The fake scenarioโ€™s target, a cartoonishly sinister religious sect called โ€œthe Paraiso Movement,โ€ was suspected of a terrorist bombing, but the unmentioned and obvious subtext of the experiment was the fact that such techniques could be applied to de-anonymize and track members of any political or ideological group. Among a litany of other conclusions, Palantir determined the group was prone to violence because its โ€œManifestoโ€™s intellectual influences include โ€˜Pancho Villa, Che Guevara, Leon Trotsky, [and] Cuban revolutionary Jose Martรญ,โ€™ a list of military commanders and revolutionaries with a history of violent actions.โ€

The delegation from GCHQ returned from VisWeek excited and impressed. In a classified report from those who attended, Palantirโ€™s potential for aiding the spy agency was described in breathless terms. โ€œPalantir are a relatively new Silicon Valley startup who are sponsored by the CIA,โ€ the report began. โ€œThey claim to have significant involvement with the US intelligence community, although none yet at NSA.โ€ GCHQ noted that Palantir โ€œhas been developed closely internally with intelligence community users (unspecified, but likely to be the CIA given the funding).โ€ The report described Palantirโ€™s demo as โ€œso significantโ€ that it warranted its own entry in GCHQโ€™s classified internal wiki, calling the software โ€œextremely sophisticated and mature. โ€ฆ We were very impressed. You need to see it to believe it.โ€

The report conceded, however, that โ€œit would take an enormous effort for an in-house developed GCHQ system to get to the same level of sophisticationโ€ as Palantir. The GCHQ briefers also expressed hesitation over the price tag, noting that โ€œadoption would have [a] huge monetary โ€ฆ cost,โ€ and over the implications of essentially outsourcing intelligence analysis software to the private sector, thus making the agency โ€œutterly dependent on a commercial product.โ€ Finally, the report added that โ€œit is possible there may be concerns over security โ€” the company have published a lot of information on their website about how their product is used in intelligence analysis, some of which we feel very uncomfortable about.โ€

However anxious British intelligence was about Palantirโ€™s self-promotion, the worry must not have lasted very long. Within two years, documents show that at least three members of the โ€œFive Eyesโ€ spy alliance between the United States, the U.K., Australia, New Zealand, and Canada were employing Palantir to help gather and process data from around the world. Palantir excels at making connections between enormous, separate databases, pulling big buckets of information (call records, IP addresses, financial transactions, names, conversations, travel records) into one centralized heap and visualizing them coherently, thus solving one of the persistent problems of modern intelligence gathering: data overload.

A GCHQ wiki page titled โ€œVisualisation,โ€ outlining different ways โ€œto provide insight into some set of data,โ€ puts succinctly Palantirโ€™s intelligence value:

Palantir is an information management platform for analysis developed by Palantir Technologies. It integrates structured and unstructured data, provides search and discovery capabilities, knowledge management, and collaborative features. The goal is to offer the infrastructure, or โ€˜full stack,โ€™ that intelligence organizations require for analysis.

Bullet-pointed features of note included a โ€œGraph View,โ€ โ€œTimelining capabilities,โ€ and โ€œGeo View.โ€

Under the Five Eyes arrangement, member countries collect and pool enormous streams of data and metadata collected through tools like XKEYSCORE, amounting to tens of billions of records. The alliance is constantly devising (or attempting) new, experimental methods of prying data out of closed and private sources, including by hacking into computers and networks in non-Five Eyes countries and infecting them with malware.

A 2011 PowerPoint presentation from GCHQโ€™s Network Defence Intelligence & Security Team (NDIST) โ€” which, as The Intercept has previously reported, โ€œworked to subvert anti-virus and other security software in order to track users and infiltrate networksโ€ โ€” mentioned Palantir as a tool for processing data gathered in the course of its malware-oriented work. Palantirโ€™s software was described as an โ€œanalyst workspace [for] pulling together disparate information and displaying it in novel ways,โ€ and was used closely in conjunction with other intelligence software tools, like the NSAโ€™s notorious XKEYSCORE search system. The novel ways of using Palantir for spying seemed open-ended, even imaginative: A 2010 presentation on the joint NSA-GCHQ โ€œMastering the Internetโ€ surveillance program mentioned the prospect of running Palantir software on โ€œAndroid handsetsโ€ as part of a SIGINT-based โ€œaugmented realityโ€ experience. Itโ€™s unclear what exactly this means or could even look like.

Above all, these documents depict Palantirโ€™s software as a sort of consolidating agent, allowing Five Eyes analysts to make sense of tremendous amounts of data that might have been otherwise unintelligible or highly time-consuming to digest. In a 2011 presentation to the NSA, classified top secret, an NDIST operative noted the โ€œgood collectionโ€ of personal data among the Five Eyes alliance but lamented the โ€œpoor analytics,โ€ and described the attempt to find new tools for SIGINT analysis, in which it โ€œconducted a review of 14 different systems that might work.โ€ The review considered services from Lockheed Martin and Detica (a subsidiary of BAE Systems) but decided on the up-and-comer from Palo Alto.

Palantir is described as having been funded not only by In-Q-Tel, the CIAโ€™s venture capital branch, but furthermore created โ€œthrough [an] iterative collaboration between Palantir computer scientists and analysts from various intelligence agencies over the course of nearly three years.โ€ While itโ€™s long been known that Palantir got on its feet with the intelligence communityโ€™s money, it has not been previously reported that the intelligence community actually helped build the software. The continuous praise seen in these documents shows that the collaboration paid off. Under the new โ€œPalantir Model,โ€ โ€œdata can come from anywhereโ€ and can be โ€œasked whatever the analyst wants.โ€

Along with Palantirโ€™s ability to pull in โ€œdirect XKS Results,โ€ the presentation boasted that the software was already connected to 10 other secret Five Eyes and GCHQ programs and was highly popular among analysts. It even offered testimonials (TWO FACE appears to be a code name for the implementation of Palantir):

[Palantir] is the best tool I have ever worked with. Itโ€™s intuitive, i.e. idiot-proof, and can do a lot you never even dreamt of doing.

This morning, using TWO FACE rather than XKS to review the activity of the last 3 days. It reduced the initial analysis time by at least 50%.

Enthusiasm runs throughout the PowerPoint: A slide titled โ€œUnexpected Benefitsโ€ reads like a marketing brochure, exclaiming that Palantir โ€œinteracts with anything!โ€ including Google Earth, and โ€œYou can even use it on a iphone or laptop.โ€ The next slide, on โ€œPotential Downsides,โ€ is really more praise in disguise: Palantir โ€œLooks expensiveโ€ but โ€œisnโ€™t as expensive as expected.โ€ The answer to โ€œWhat canโ€™t it do?โ€ is revealing: โ€œHowever we ask, Palantir answer,โ€ indicating that the collaboration between spies and startup didnโ€™t end with Palantirโ€™s CIA-funded origins, but that the company was willing to create new features for the intelligence community by request.

On GCHQโ€™s internal wiki page for TWO FACE, analysts were offered a โ€œhow toโ€ guide for incorporating Palantir into their daily routine, covering introductory topics like โ€œHow do I โ€ฆ Get Data from XKS in Palantir,โ€ โ€œHow do I โ€ฆ Run a bulk search,โ€ and โ€œHow do I โ€ฆ Run bulk operations over my objects in Palantir.โ€ For anyone in need of a hand, โ€œtraining is currently offered as 1-2-1 desk based training with a Palantir trainer. This gives you the opportunity to quickly apply Palantir to your current work task.โ€ Palantir often sends โ€œforward deployed engineers,โ€ or FDEs, to work alongside clients at their offices and provide assistance and engineering services, though the typical client does not have access to the worldโ€™s largest troves of personal information. For analysts interested in tinkering with Palantir, there was even a dedicated instant message chat room open to anyone for โ€œinformallyโ€ discussing the software.

The GCHQ wiki includes links to classified webpages describing Palantirโ€™s use by the Australian Defence Signals Directorate (now called the Australian Signals Directorate) and to a Palantir entry on the NSAโ€™s internal โ€œIntellipedia,โ€ though The Intercept does not have access to copies of the linked sites. However, embedded within Intellipedia HTML files available to The Intercept are references to a variety of NSA-Palantir programs, including โ€œPalantir Classification Helper,โ€ โ€œ[Target Knowledge Base] to Palantir PXML,โ€ and โ€œPalantirAuthService.โ€ (Internal Palantir documents obtained by TechCrunch in 2013 provide additional confirmation of the NSAโ€™s relationship with the company.)

One Palantir program used by GCHQ, a software plug-in named โ€œKite,โ€ was preserved almost in its entirety among documents provided to The Intercept. An analysis of Kiteโ€™s source code shows just how much flexibility the company afforded Five Eyes spies. Developers and analysts could ingest data locally using either Palantirโ€™s โ€œWorkspaceโ€ application or Kite. When they were satisfied the process was working properly, they could push it into a Palantir data repository where other Workspace users could also access it, almost akin to a Google Spreadsheets collaboration. When analysts were at their Palantir workstation, they could perform simple imports of static data, but when they wanted to perform more complicated tasks like import databases or set up recurring automatic imports, they turned to Kite.

Kite worked by importing intelligence data and converting it into an XML file that could be loaded into a Palantir data repository. Out of the box, Kite was able to handle a variety of types of data (including dates, images, geolocations, etc.), but GCHQ was free to extend it by writing custom fields for complicated types of data the agency might need to analyze. The import tools were designed to handle a variety of use cases, including static data sets, databases that were updated frequently, and data stores controlled by third parties to which GCHQ was able to gain access.

This collaborative environment also produced a piece of software called โ€œXKEYSCORE Helper,โ€ a tool programmed with Palantir (and thoroughly stamped with its logo) that allowed analysts to essentially import data from the NSAโ€™s pipeline, investigate and visualize it through Palantir, and then presumably pass it to fellow analysts or Five Eyes intelligence partners. One of XKEYSCOREโ€™s only apparent failings is that itโ€™s so incredibly powerful, so effective at vacuuming personal metadata from the entire internet, that the volume of information it extracts can be overwhelming. Imagine trying to search your Gmail account, only the results are pulled from every Gmail inbox in the world.

MAKING XKEYSCORE MORE intelligible โ€” and thus much more effective โ€” appears to have been one of Palantirโ€™s chief successes. The helper tool, documented in a GCHQ PDF guide, provided a means of transferring data captured by the NSAโ€™s XKEYSCORE directly into Palantir, where presumably it would be far easier to analyze for, say, specific people and places. An analyst using XKEYSCORE could pull every IP address in Moscow and Tehran that visited a given website or made a Skype call at 14:15 Eastern Time, for example, and then import the resulting data set into Palantir in order to identify additional connections between the addresses or plot their positions using Google Earth.

Palantir was also used as part of a GCHQ project code-named LOVELY HORSE, which sought to improve the agencyโ€™s ability to collect so-called open source intelligence โ€” data available on the public internet, like tweets, blog posts, and news articles. Given the โ€œunstructuredโ€ nature of this kind of data, Palantir was cited as โ€œan enrichment to existing [LOVELY HORSE] investigations โ€ฆ the content should then be viewable in a human readable format within Palantir.โ€

Palantirโ€™s impressive data-mining abilities are well-documented, but so too is the potential for misuse. Palantir software is designed to make it easy to sift through piles of information that would be completely inscrutable to a human alone, but the human driving the computer is still responsible for making judgments, good or bad.

A 2011 document by GCHQโ€™s SIGINT Development Steering Group, a staff committee dedicated to implementing new spy methods, listed some of these worries. In a table listing โ€œrisks & challenges,โ€ the SDSG expressed a โ€œconcern that [Palantir] gives the analyst greater potential for going down too many analytical paths which could distract from the intelligence requirement.โ€ What it could mean for analysts to distract themselves by going down extraneous โ€œpathsโ€ while browsing the worldโ€™s most advanced spy machine is left unsaid. But Palantirโ€™s data-mining abilities were such that the SDSG wondered if its spies should be blocked from having full access right off the bat and suggested configuring Palantir software so that parts would โ€œunlock โ€ฆ based on analysts skill level, hiding buttons and features until needed and capable of utilising.โ€ If Palantir succeeded in fixing the intelligence problem of being overwhelmed with data, it may have created a problem of over-analysis โ€” the companyโ€™s software offers such a multitude of ways to visualize and explore massive data sets that analysts could get lost in the funhouse of infographics, rather than simply being overwhelmed by the scale of their task.

If Palantirโ€™s potential for misuse occurred to the companyโ€™s spy clients, surely it must have occurred to Palantir itself, especially given the companyโ€™s aforementioned โ€œcommitmentโ€ to privacy and civil liberties. Sure enough, in 2012 the company announced the formation of the Palantir Council of Advisors on Privacy and Civil Liberties, a committee of academics and consultants with expertise in those fields. Palantir claimed that convening the PCAP had โ€œprovided us with invaluable guidance as we try to responsibly navigate the often ill-defined legal, political, technological, and ethical frameworks that sometimes govern the various activities of our customers,โ€ and continued to discuss the privacy and civil liberties โ€œimplications of product developments and to suggest potential ways to mitigate any negative effects.โ€ Still, Palantir made clear that the โ€œPCAP is advisory only โ€” any decisions that we make after consulting with the PCAP are entirely our own.โ€

What would a privacy-minded conversation about privacy-breaching software look like? How had a privacy and civil liberties council navigated the fact that Palantirโ€™s clientele had directly engaged in one of the greatest privacy and civil liberties breaches of all time? Itโ€™s hard to find an answer.

Palantir wrote that it structured the nondisclosure agreement signed by PCAP members so that they โ€œwill be free to discuss anything that they learn in working with us unless we clearly designate information as proprietary or otherwise confidential (something that we have rarely found necessary except on very limited occasions).โ€ But despite this assurance of transparency, all but one of the PCAPโ€™s former and current members either did not return a request for comment for this article or declined to comment citing the NDA.

The former PCAP member who did respond, Stanford privacy scholar Omer Tene, told The Intercept that he was unaware of โ€œany specific relationship, agreement, or project that youโ€™re referring to,โ€ and said he was not permitted to answer whether Palantirโ€™s work with the intelligence community was ever a source of tension with the PCAP. He declined to comment on either the NSA or GCHQ specifically. โ€œIn general,โ€ Tene said, โ€œthe role of the PCAP was to hear about client engagement or new products and offerings that the company was about to launch, and to opine as to the way they should be set up or delivered in order to minimize privacy and civil liberties concerns.โ€ But without any further detail, itโ€™s unclear whether the PCAP was ever briefed on the companyโ€™s work for spy agencies, or whether such work was a matter of debate.

Thereโ€™s little detail to be found on archived versions of Palantirโ€™s privacy and civil liberties-focused blog, which appears to have been deleted sometime after the PCAP was formed. Palantir spokesperson Matt Long told The Intercept to contact the Palantir media team for questions regarding the vanished blog at the same email address used to reach Long in the first place. Palantir did not respond to additional repeated requests for comment and clarification.

A GCHQ spokesperson provided a boilerplate statement reiterating the agencyโ€™s โ€œlongstanding policyโ€ against commenting on intelligence matters and asserted that all its activities are โ€œcarried out in accordance with a strict legal and policy framework.โ€ The NSA did not provide a response.

Anyone worried that the most powerful spy agencies on Earth might use Palantir software to violate the privacy or civil rights of the vast number of people under constant surveillance may derive some cold comfort in a portion of the user agreement language Palantir provided for the Kite plug-in, which stipulates that the user will not violate โ€œany applicable lawโ€ or the privacy or the rights โ€œof any third party.โ€ The world will just have to hope Palantirโ€™s most powerful customers follow the rules.

Thiel gaining residency hereย isnโ€™t just bribery orย an example of elites buying themselves what they want, this is payment for the deep state. He is a spook of immense power and it’s because of his mass surveillance corporation and NZs 5Eyes mass surveillance infrastructure that this guy has residency here.

 

- Sponsor Promotion -

8 COMMENTS

  1. So we know the NatACTs are committed to spending millions (maybe billions) in public funds running global surveillance systems, while claiming they can’t afford to provide livable benefits to all that need them, public housing etc etc. But we also know that the last two Labour governments have been just as keen to expand the police state apparatus. We know that the Greens have always been opposed to the police state, but do we have any indication from Labour that they wouldn’t carry on with mass-surveillance-as-usual if they become the lead partner in government in Sept?

    • 100% Strypey, It’s what the opposition don’t say, that is a worry.

      Opposition should now strongly come out and condemn the dark deep state surveillance, since we are not in any peril here in sparsely populated NZ.

      The Black ops and Government just like to keep tabs on what everyone else is up to so they have control like a fascist state they are.

  2. It still amazes me that a spy-wizard, such as Thiel, in bringing to life the “all seeing eye” had an interest in a financial software system from NZ….although I suppose to have access through Plantair to every individuals, company’s or other entity’s full financial data on a computer system, is an extremely powerful resourse.

    Thiel knowing the ins and outs of Zero software, theoretically places Plantair or any of his company’s off shoots in a position, I suppose if they choose to, to be able to enhance spying interface with such a product like Zero.

    I am starting to like more and more Kim Dotcom’s aim to generate secure encrypted software/internet for file transfer….would also like to see the development of other software that blocks intrusive and unwarranted blanket covert serveillance and collection of mass data.

Comments are closed.