Chinese/Russian Subs Prowling East Coast, Atlantic

In a press gaggle today, a member of the media asked Secretary of Defense Mattis:

Q:  Mr. Secretary, you stated you’re watching submarines in the North Atlantic and elsewhere.  But are Russia and China putting more submarines out to look at the United States than they have since the Cold War?   

SEC. MATTIS:  Yes, we always keep an eye on the — on the submarines at sea.  And I’d prefer not to say anymore than that.  Thanks.

Humm, okay let’s go deeper.

The Navy reactivated a the fleet responsible for overseeing the East Coast and the North Atlantic. The 2nd Fleet was deactivated in 2011 and Secretary Mattis upped the defense strategy earlier this year.

We do know that the Russians are snooping around all undersea telecommunications cables used by NATO. The Russian submarines are equipped with anti-submarine missiles and little is published about the Chinese submarines. Meanwhile, the United States has deployed patrols using manned and unmanned surface ships, attack submarines and air surveillance by the P-8 Poseidon, a sub hunting warplane.

Crew | USS SOUTH DAKOTA SSN 790

The most advanced US advanced fast attack submarine named the USS South Dakota is equipped with the most advanced technology including advanced stealth features.

“China is improving the lethality and survivability of its attack submarines and building quieter, high-end diesel and nuclear-powered submarines,” he said.
Both China and Russia have also increased their presence in the Indo-Asia-Pacific region, where Harris said 230 of the world’s 400 foreign submarines are operating.
Roughly 160 of those 230 submarines belong to China, North Korea, and Russia, according to Harris.
Forbes said the United States must also develop a strategy to counter Chinese and Russian activity in “gray zones” where they are incrementally expanding their presence by strategically “fighting and competing” through military posturing.
China’s claims in the South China Sea represent one glaring example as to how they’ve been able to successfully implement this type of strategy in a way that allows them to expand their military reach without engaging in direct confrontation, according to Forbes.

Meanwhile, a significant upgrade has taken place and that is to SOSUS.

Now, in what may be the biggest upgrade to the Navy’s fixed undersea surveillance system since the Cold War, General Dynamics has been recently awarded a contract by the Office of Naval Research to develop the Deep Reliable Acoustic Path Exploitation System (DRAPES). DRAPES appears to be part of a suite of upgrades to the Navy’s submarine detection capabilities to cope with expanding fleets of advanced submarines around the world.

When the Cold War ended, the U.S. Navy no longer faced a “peer threat” to its control of the seas and many capabilities and weapons necessary for defeating advanced adversary ships and submarines were decommissioned. Research for more advanced follow-on technology was also put on hold. After operating 30 undersea surveillance sites around the world during the Cold War, the Navy has only three operational today. But as Russia, and especially China, have developed larger and more advanced submarine fleets, the U.S. Navy has had to re-learn old Cold War anti-submarine warfare competencies while developing new capabilities to tackle more challenging modern submarine technology.

While the Navy says relatively little about the advanced sub-hunting capabilities of the Integrated Undersea Surveillance System (IUSS), of which SOSUS is a part, some IUSS systems have received more public attention. The afloat Surveillance Towed Array Sensor System (SURTASS) is a small fleet of civilian-crewed ships that carry sensitive towed listening (passive) arrays that can detect submarines from great distances. These ships grabbed headlines in 2009 when the SURTASS ship USNS Impeccable was harassed by Chinese Maritime Militia while operating in the vicinity of China’s South China Sea submarine bases on Hainan Island. The SURTASS ships have also received technical upgrades since the Cold War. The introduction of the Low Frequency Active (LFA) capability, an “active” system that transmits low frequency “pings” that bounce off of submarine hulls and are then picked up by the existing passive SURTASS arrays dramatically increases their ability to detect submarines at great distances.

By contrast, little is known publicly about the SOSUS networks after the Cold War. Defense Systems reports that DRAPES, like SOSUS, will be a fixed passive listening system with a new communications capability to transmit its data. Mobile systems like SURTASS have the advantage of being able to get closer to possible contacts and follow them, but can only be in one place at a time, and must eventually return to port. Fixed systems like SOSUS, and now DRAPES, have the advantage of providing permanent coverage over target areas and then “cueing” a mobile sensor capability, like a ship or aircraft, to zero in on a submarine it detects.

One reason there were 30 IUSS sites during the Cold War is that the SOSUS systems had to be connected to collection facilities by underwater cable, requiring sites to be relatively local to the target area. But DRAPES will apparently use a new underwater communications system to transmit the acoustic data it collects to the three remaining Navy Operational Processing Facilities (NOPFs). These facilities combine data from the static SOSUS networks and SURTASS ships to provide “detection, localization, and tracking of submarines.” DRAPES’ ability to provide wide coverage from a fixed location in the ocean, apparently without the need for additional NOPF facility footprints, would be a substantial improvement over the old SOSUS network.

As China and Russia have asserted themselves anew as “pacing competitors,” as described by Undersecretary of Defense Robert Work, the U.S. Navy has taken a renewed interest in its traditional Cold War antisubmarine warfare mission. Together, DRAPES and SURTASS promise to provide a persistent, long-range ability to detect adversary submarines around the globe. Using cueing data from those platforms, improved local anti-submarine assets like the P-8 Poseidon sub hunter aircraft (which replaces the 50 year-old P-3 Orion) and surface combatants with new, improved towed sonar arrays of their own, like the Multi-Function Towed Array, can then close on a target, and track or engage it as needed.

MisInformationCom and Election Security

Election security top priority for U.S.: DHS chief - newsR ...
So, Dana Perino of Fox News/Daily Briefing had Mary Anne Marsh on the show today to discuss voting security. Mary Ann went on and on about how the Trump administration is not doing enough to ensure foreign interference/election meddling is prevented in the 2018 mid-terms and all the way to the general election in 2020.
Clearly Mary Ann has not been a part of the countless sessions that DHS has hosted for the benefit of each state to protect and harden their respective systems. Frankly, I have participated in 2 conference calls and have watched congressional hearings as well as read documents provided as to the activities on behalf of DHS and the FBI.
Then while few people know, the Justice Department produced a lengthy document by the titled ‘The Cyber Digital Task Force that speaks to all foreign intrusion operations including the matter of the election infrastructure. Pass this on to Mary Ann please. Just one of hundreds of paragraphs is below:
Covert influence operations, including disinformation operations, to influence
public opinion and sow division.
Using false U.S. personas, adversaries could covertly create and operate social media pages and other forums designed to attract U.S. audiences and spread disinformation or divisive messages. This could happen in isolation or in combination with other operations, and could be intended to foster specific narratives that advance foreign political objectives, or could be intended simply to turn citizens against each other. These messages need not relate directly to political campaigns. They could seek to depress voter turnout among particular groups, encourage third-party voting, or convince the public of widespread voter fraud to undermine confidence in election results. These messages could target discrete U.S. populations based on their political
and demographic characteristics. They may mobilize Americans to sign online petitions
and join issue-related rallies and protests, or even to incite violence. For example, advertisements from at least 2015 to 2017 linked to a Russian organization called the Internet Research Agency focused on divisive issues, including illegal immigration and gun rights, among others, and targeted those messages to groups most likely to react.
Meanwhile, there is an external organization made up of subject matter experts collecting evidence and stories of which the Deputy Assistant Attorney General Adam S. Hickey for the National Security Division Delivered Remarks at Misinfo Con.
Thank you for the invitation to speak today, and for the important work you are doing: in organizing this conference devoted to the challenges of misinformation, and, by attending, bringing your experience and expertise to bear on the problem.

It’s a privilege to help kick off this first day of MisinfoCon, focused on state-sponsored misinformation. To do that, I am going to give you an overview of how the Department of Justice views the problem, where it fits in the context of related national security threats, and how we are addressing it.

As you probably know, the Justice Department recently obtained an indictment of 13 Russian individuals and three entities, including the Internet Research Agency (or IRA), for federal crimes in connection with an effort to interfere in the 2016 Presidential election. The defendants allegedly conducted what they called “information warfare against the United States,” with the stated goal of “spread[ing] distrust towards the candidates and the political system in general.”

According to the indictment, the IRA was a structured organization headed by a management group and arranged in departments. It had a “translator project,” designed to focus on the U.S. population, with more than 80 employees assigned by July 2016. They posed as politically and socially active Americans, advocating for and against particular political candidates. They established social media pages and groups to communicate with unwitting Americans. They also purchased political advertisements on social media.

One of the so-called trolls who worked for the IRA recently spoke to the Washington Post about his work in a different department, attempting to influence a domestic, Russian audience. He described it as “a place where you have to write that white is black and black is white.” Hundreds of people “were all writing absolute untruths.”

But as the indictment alleges it, what made the defendants’ conduct illegal in the United States was not the substance of their message, the “accuracy” of their opinions: it was their conspiracy to defraud by, among other ways, lying about who the messenger was.  They were not Americans expressing their own viewpoints; they were Russians on the payroll of a foreign company.

Now, the problem of covert foreign influence is not new. In 1938, a congressional committee found that the Nazi government had established an extensive, underground propaganda apparatus inside the United States using American firms and citizens. The response was to recommend a law that would (in the committee’s words) throw these activities under the “spotlight of pitiless publicity.”  The result is the Foreign Agents Registration Act (FARA), a disclosure statute that, notably, does not prohibit speech. Rather, FARA requires agents of foreign principals who engage in political activities within the United States to file periodic public disclosures with the Department.

The Act’s purpose is to ensure that the American public and our lawmakers know the source of information provided at the behest of a foreign principal, enhancing the public’s and the government’s ability to evaluate such information.

Transparency, not prohibition, has been the government’s response to misinformation. In the 1980s, the government established an interagency committee, the “Active Measures Working Group,” to counter Soviet disinformation. It did so by exposing forgeries and other propaganda, such as fake stories that the Pentagon developed the AIDS virus as part of a biological weapons research program.

Today, we confront misinformation as only one component of a broader, malign foreign influence effort.  As this framework from the Department’s recent Cyber-Digital Task Force report shows, those efforts can also include cyber operations that target election infrastructure or political parties’ networks; covert efforts to assist (or harm) candidates; and overt efforts to influence the American public (for example, through state-run media organizations).

Our responses to those efforts must likewise be multifaceted, from providing indicators and warnings that can help network owners protect themselves from hackers, to criminal investigations and prosecutions, and other measures, like sanctions and expulsions that raise the costs on the states that sponsor such malign activities.

This graphic, also from the Task Force report, depicts the Department’s strategy to counter each phase of a covert influence campaign cycle, from the identification of targets to the production and amplification of content.  The middle rows (in red) depict our adversaries’ activities in stages, while the bottom rows (in blue) suggest the means by which private actors and the government can disrupt and deter the activity.

One aspect of this strategy worth highlighting is that the content of a foreign influence campaign may be true or false.  Whether the message is accurate or not may not be the point: doxing a candidate or a corporation for political reasons might not involve misinformation, but it may nonetheless violate our laws, threaten our values and way of life, compromise privacy and, sometimes, retaliate against and chill free speech.

Covert foreign influence efforts can take many forms, but recently we have seen increased efforts to influence Americans through social media. To counter these efforts, a key component of our approach is sharing information with social media and other Internet service providers, which we do through the FBI’s Foreign Influence Task Force.  It is those providers who bear the primary responsibility for securing their own products and platforms.  By sharing information with them, especially about who certain users and account holders actually are, we can assist their own, voluntary initiatives to track foreign influence activity and to enforce their own terms of service.

As the Task Force report also recognizes, there may be circumstances when it is appropriate for the government itself to expose and attribute foreign influence operations as a means of rendering them less effective. But there are often compelling, countervailing considerations, however.

As a general rule, the Department does not confirm, deny, or comment on pending investigations, both to protect the investigation itself as well as the rights of any accused.

We are also constrained to protect the classified sources and methods that may inform our judgment of what foreign governments are doing.

And, most important of all, we must never act to confer any advantage or disadvantage on any political or social group, individual, or organization, and we must strive to avoid even the appearance of partiality. That could constrain the timing and nature of any disclosure we might make.

All of this is to say, and as the Department’s Policy on the Disclosure of Foreign Influence Operations recognizes, we might not be the best messenger to counter a particular piece of misinformation.

That’s why this conference is so important: what we call the private sector (but which includes a lot of people in public spaces, just like you) has a critical role – larger than the federal government’s – in countering covert foreign influence efforts, particularly misinformation, and ensuring that our democracy rests on the active engagement of an informed public.

The former Russian troll I mentioned at the beginning of my remarks, who worked for the IRA, said his work was “pointless” for Russian audiences, that it would not impact them.  But in America, that kind of trickery might have an impact, he said, because we “live in a society in which it’s accepted to answer for your words.” My challenge to us during this conference, if I may make one, is that we find ways to ensure we all continue to answer for our words, so that the trust we enjoy as an aspect of our free, democratic society can thrive.

*** Someone help out the democrats and Mary Ann….all discussions inside the Beltway include these multi-track discussions. Back in March, the U.S. spending bill provided $380 million for election cyber security. There was an amendment for an additional $250 million that the Senate Republicans on a floor vote rejected. Why? Because many of the states have either been slow to accept money inside that $380 million or not taken any at all.

Russia Posturing to Own Space, then China?

The U.S. military will soon be using lasers to shoot down ...

photo

Right now, miles above your head, there are fleets of robotic, weaponized satellites poised to do battle as the world’s superpowers await the opening salvo in a very real cosmic chess match.

When it comes to Russia, the real cause for concern surrounds a mysterious object known cryptically as 2014-28E. The object first appeared in space soon after the launch of three Russian military communication satellites. Initially, many believed 2014-28E was just another piece of debris left over from the launch. Not long afterward, however, this hunk of space junk began to swiftly change orbit, demonstrating an onboard propulsion system. What exactly 2014-28E is is still unknown, as the Russians have remained tight-lipped on the matter. Many experts fear that these actions signal that the Russians have revived their allegedly-defunct operation known as Istrebitel Sputnik (meaning “Satellite Fighter”), a covert Soviet-era ASAT program.

Russian and Chinese officials have continuously accused the United States of spying on the Chinese Space Station with a top-secret space toy known officially as X-37B. This craft is essentially an unmanned version of the Space Shuttle with a payload bay that’s roughly the size of a pickup truck bed. However, what exactly will be carried and what has been carried on its previous three missions is classified. So too is the entire X-37B budget. Many aeronautic experts dispute claims that the U.S. is using this craft to spy on the Chinese Space Station — but, the complete lack of transparency from U.S. officials hasn’t helped thaw frigid relations between the involved parties.

And the X-37B definitely isn’t the only trick the U.S. has up its proverbial sleeve. Some of America’s most sophisticated ASAT technology is in development as we speak. DARPA, the research and development wing of the U.S. Department of Defense, is now quickly moving along with its Phoenix initiative. The program is based around the concept of a series of robotic craft with the ability to repair damaged satellites from the scraps parts of other defunct satellites already in orbit. Again, from a foreign military perspective, if a satellite has the ability to build something, that satellite also has the intrinsic ability to dismantle something — say, an enemy satellite. More here from Digital Trends.

Russia Will Fight to Be World’s Top Space Power, Agency Chief Says

Russia is ready to do “serious battle” for the title of leading space power in the world, the head of the country’s state space agency has said.

Moscow’s Roscosmos has become the subject of some ridicule, following budget cuts and high-profile setbacks, including a recent botched launch that resulted in the loss of a multimillion dollar silo of satellites. The agency still regards itself as heir to Russia’s Soviet legacy of space exploration and Russian President Vladimir Putin has repeatedly urged officials to recapture that status in the world, telling agency employees last month that Roscosmos needed “breakthrough successes” to do so.

Roscosmos Director Dmitry Rogozin gave a defiant message on the agency’s ambitions.

“We are not looking to surrender leadership in space to anyone,” Rogozin said at the opening of a satellite equipment manufacturing plant in Yaroslavl region. The director, who served as Russia’s deputy prime minister until May, admitted that the agency had “fallen behind from the leading positions” in recent years.

08_06_Rogozin Moscow Mayor Sergei Sobyanin (front left) gestures at Russian President Vladimir Putin (front center) and others as they visit a space exhibition in Moscow, on April 12. Maxim Shipenkov/AFP/Getty Images

Roscosmos unveiled a brand new spaceport in eastern Russia in 2016, although Putin reportedly reprimanded senior officials in private after the launching ceremony, which he had gone to watch, suffered a 24-hour delay. More here.

Just two years ago:

So why is there so much global interest in space at the moment, including in Australia, and what are countries around the world doing up there right now?

Space remains ‘hugely contested’ in 2018

Modern militaries rely on satellites that feed them vital intelligence.

As a result, “counterspace” weapons have become a rising area of interest, and earlier this year, US intelligence agencies warned that China and Russia were both working on “destructive counterspace weapons” for use in a future conflict.

The potential weapons US intelligence agencies were concerned about included both ground-launched missiles capable of taking out enemy satellites, as well as “directed-energy weapons” that could blind or damage the sensors on satellite instruments.

The US intelligence agencies said in their report that both China and Russia would probably have operational weapons within a few years.

China last month launched a communications satellite named Magpie Bridge that is currently sitting in a special orbit near the moon, giving it a view of both the Earth and the so-far-unexplored dark side of the Moon.

That feat was praised in official Chinese state media Xinhua as a “world first”.

The plan is for the satellite to beam continuous images of the dark side of the moon, with China looking set to become the first country to land a rover there later this year.

China is also planning on setting up a permanent robotic base on the lunar surface in the next 10 years, and is hoping for a manned mission in the 2030s.

Iran’s Boiling Point, About to Get Worse

For 6 days in a row, demonstrators against the Iran regime are demanding regime change. There is hardly any gas for 6000 bus drivers in Tehran. There are curfews, people being shot while others are being arrested. The country currency, the rial has continued to plunge in value and food is being rationed.

After passing a 90-day mark on Aug. 6, the following sanctions will snap back on Iran, according to the Treasury Department:

  • Sanctions on Iran buying or acquiring U.S. dollars
  • Sanctions on Iran trading gold and other precious metals
  • Sanctions on Iran’s sale, supply or trade of metals such as aluminum and steel, as well as graphite, coal and certain software for “integrating industrial processes”
  • Sanctions on “significant” sales or purchases of Iranian rials, or the maintenance of significant funds or accounts outside the country using Iranian rials
  • Sanctions on issuing Iranian debt
  • Iranian auto sanctions

The U.S. will also revoke certain permissions, granted to Iran under the deal, on Aug. 6. These include halting Iran’s ability to export its carpets and foods into the U.S., as well as ending certain licensing-related transactions.

At the end of the 180-day interval on Nov. 4, another set of sanctions will once again be clamped down on Iran:

  • Sanctions on Iran’s ports, as well as the country’s shipping and shipping sectors
  • Sanctions on buying petroleum and petrochemical products with a number of Iranian oil companies
  • Sanctions on foreign financial institutions transacting with the Central Bank of Iran and other Iranian financial institutions
  • Sanctions on the provision of certain financial messaging services to Iran’s central bank and other Iranian financial institutions
  • Sanctions on the provision of underwriting services, insurance, or reinsurance
  • Sanctions on Iran’s energy sector

The following day, on Nov. 5, the Trump administration will disallow U.S.-owned foreign entities from being allowed to engage in certain transactions with Iran. Sanctions on certain Iranian individuals will also be re-imposed on Nov. 5.

Read the Treasury’s full guide to the re-imposition of Iran nuclear deal sanctions here.

Meanwhile:

LONDON/ANKARA(Reuters) – An English court has cleared the way to consider whether it will allow the families of some of those killed in the Sept. 11, 2001 attacks on the United States to make a claim on Iranian assets in Britain.

The relatives want the English High Court to enforce a 2012 decision by a U.S. court which found there was evidence to show that Iran provided “material support and resources to al Qaeda for acts of terrorism”. The militant group carried out the attacks.

The New York court awarded the plaintiffs damages of over $7 billion. Iran denies any links to Al Qaeda or any involvement in the 9/11 attacks.

If the English court agrees to enforce the ruling, it could clear the way for assets in England and Wales to be frozen or seized. Iranian assets in England include a central London building and funds held by two subsidiaries of state-owned banks. This could add to Tehran’s troubles as it tries to stave off a financial crisis.

The June 8 ruling by a judge after a hearing in the English High Court removed an obstacle that was holding up the process.

The law requires the UK’s Foreign Office (FCO) to formally serve the legal papers to Iran’s Ministry of Foreign Affairs (MFA) before the enforcement proceedings can begin. A British official said it was routinely difficult to deliver papers to the MFA, according to FCO correspondence seen by Reuters. An FCO official declined to comment.

The judge ruled it was sufficient to try to notify them through other communication such as email or post.

That decision has unblocked the process. The plaintiffs will now ask a judge at the High Court in the next few months to consider whether the New York ruling can be entered as a judgment in English law, said their lawyer Natasha Harrison, a partner at the London office of Boies Schiller Flexner. The judgment could then be enforced, she said. This would mean assets could be frozen or seized.

An Iranian official said: “Iran will take all the necessary measures to stop it.”

An Iranian foreign ministry official said the June ruling was “fabricated” and “politically motivated”.

As Facebook Continues to Stray From a Social Media Platform

Angry Emoticon Facebook | www.imgkid.com - The Image Kid ...

What the heck Facebook? Perhaps it is just time to terminate relationships with Facebook. Zuckerberg thought in his early conception and launch of Facebook it was a global means to connect people together, you know expand friendships so we can all like each other worldwide.

Ahem, that is hardly where he and Sheryl Sandberg have has take the company in recent years.

FACEBOOK ROLLS OUT REACTIONS | iNexxus

Let’s begin here:

The aggressive push by Democrats and left-wing activists for social media companies to combat Russian bots and trolls may have backfired, exposing potential foreign efforts to whip up political passions on their side.

Facebook announced last week that it had yanked 32 pages from Facebook and Instagram because they were “involved in coordinated inauthentic behavior,” potentially tied to Russia.

Facebook said that “inauthentic” administrators of a page called “Resisters” were connected with those from other, legitimate pages who worked to drum up support for the protest. “The most followed Facebook Pages were ‘Aztlan Warriors,’ ‘Black Elevation,’ ‘Mindful Being,’ and ‘Resisters.’ The remaining Pages had between zero and 10 followers, and the Instagram accounts had zero followers,” Facebook said. Read more here.

So, beyond selling access to the Facebook databases and user profiles to companies such as Cambridge Analytica, something else is afoot and it too is far beyond the scope of social media.

Ready?

Facebook in talks with banks to add your financial information to Messenger

  • Facebook is considering a Messenger feature that would incorporate a user’s bank information.
  • The feature, first reported by the Wall Street Journal, applies only to Messenger and not the larger Facebook platform.
  • It comes at a sensitive time for Facebook, as it continues to battle privacy concerns and adjust company policy regarding user data.

The feature, first reported by the Wall Street Journal, applies only to Messenger and not the larger Facebook platform. It comes at a sensitive time for Facebook, as it continues to battle privacy concerns and adjust company policy regarding user data.

Facebook’s stock was up about 2.5 percent Monday following the initial Wall Street Journal report.

“Like many online companies, we routinely talk to financial institutions about how we can improve people’s commerce experiences, like enabling better customer service. An essential part of these efforts is keeping people’s information safe and secure,” a Facebook spokesperson said in a statement to CNBC. “We don’t use purchase data from banks or credit card companies for ads.”

Incorporating a user’s financial information into Messenger would allow banks to offer customer service through the platform, as some credit card companies already do, Facebook said. The Wall Street Journal reported the feature could also offer fraud alerts and help users track their account balances.

Isn’t this getting a little creepy? Would Facebook sell banking data also to outside corporations without your knowledge, consent or compensation? Would your bank be part of this new feature and relationship also without your knowledge or consent?

As we are finding, Facebook is clearly in the business of censorship which often violates the First Amendment yet they claim their scrutiny and termination is in violation of terms of service where it has been proven more than once it is just selective censorship. Just ask Diamond and Silk.

Thanks to TechRepublic: In part –

What is the timeline of the Facebook data privacy scandal?

Facebook has more than a decade-long track record of incidents highlighting inadequate and insufficient measures to protect data privacy. While the severity of these individual cases varies, the sequence of repeated failures paints a larger picture of systemic problems.

In 2005, researchers at MIT created a script that downloaded publicly posted information of over 70,000 users from four schools. (Facebook only began to allow search engines to crawl profiles in September 2007.)

In 2007, activities that users engaged in on other websites was automatically added to Facebook user profiles as part of Beacon, one of Facebook’s first attempts to monetize user profiles. As an example, Beacon indicated on the Facebook News Feed the titles of videos that users rented from Blockbuster Video, which was a violation of the Video Privacy Protection Act. A class action suit was filed, for which Facebook paid $9.5 million to a fund for privacy and security as part of a settlement agreement.

In 2011, following an FTC investigation, the company entered into a consent decree, promising to address concerns about how user data was tracked and shared. That investigation was prompted by an incident in December 2009 in which information thought private by users was being shared publicly, according to contemporaneous reporting by The New York Times.

In 2013, Facebook disclosed details of a bug that exposed the personal details of six million accounts over approximately a year. When users downloaded their own Facebook history, that user would obtain in the same action not just their own address book, but also the email addresses and phone numbers of their friends that other people had stored in their address books. The data that Facebook exposed had not been given to Facebook by users to begin with—it had been vacuumed from the contact lists of other Facebook users who happen to know that person. This phenomenon has since been described as “shadow profiles.”

The Cambridge Analytica portion of the data privacy scandal starts in February 2014. A spate of reviews on the Turkopticon website—a third-party review website for users of Amazon’s Mechanical Turk—detail a task requested by Aleksandr Kogan asking users to complete a survey in exchange for money. The survey required users to add the thisisyourdigitiallife app to their Facebook account, which is in violation of Mechanical Turk’s terms of service. One review quotes the request as requiring users to “provide our app access to your Facebook so we can download some of your data—some demographic data, your likes, your friends list, whether your friends know one another, and some of your private messages.”

In December 2015, Facebook learned for the first time that the data set Kogan generated with the app was shared with Cambridge Analytica. Facebook founder and CEO Mark Zuckerberg claims “we immediately banned Kogan’s app from our platform, and demanded that Kogan and Cambridge Analytica formally certify that they had deleted all improperly acquired data. They provided these certifications.”