SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
"Holy hell... This is absolutely unacceptable." "Quite wild." "Grotesque." "Absolutely sickening." "This should be illegal."
Those were just some of the alarmed reactions to reporting by Joseph Cox for Motherboard on Monday that "the U.S. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps."
"The most popular app among a group Motherboard analyzed connected to this sort of data sale is a Muslim prayer and Quran app that has more than 98 million downloads worldwide," the report continues. "Others include a Muslim dating app, a popular Craigslist app, an app for following storms, and a 'level' app that can be used to help, for example, install shelves in a bedroom."
Reps. Ilhan Omar (D-Minn.) and Rashida Tlaib (D-Mich.) were the first two Muslim women elected to Congress, and Omar was the first to wear a hijab. Omar tweeted Monday that "the military industrial complex and the surveillance state have always had a cozy relationship with tech. Buying bulk data in order to profile Muslims is par for the course for them--and is absolutely sickening. It should be illegal!"
Omar was far from alone in expressing outrage over the revelation that the U.S. military is attaining data from mobile phone applications:
\u201cHoly hell. The U.S. military is buying location data harvested from a Muslim prayer app with over 98 million downloads worldwide and using it for "counterterrorism."\n\nThis is absolutely unacceptable. https://t.co/2faYrh3SXY\u201d— Public Citizen (@Public Citizen) 1605552286
\u201cThe apps analyzed in these data sales include a Muslim prayer & Quran app w/ over 98 million downloads worldwide & a Muslim dating app.\n\nAs tech continues to power the US military & global Islamophobia, our fights against tech *must* be anti-imperialist.\n\nhttps://t.co/PHEpgFy828\u201d— MPower Change #NoTechForApartheid (@MPower Change #NoTechForApartheid) 1605546266
\u201cY'all. They have been doing an intelligence op on our Muslim fam in broad daylight. This is grotesque.\n\nhttps://t.co/CmHq0ATzxe\u201d— Chanda Prescod-Weinstein (@Chanda Prescod-Weinstein) 1605553512
\u201cThis should be illegal. https://t.co/adXL8mC0o9\u201d— Christopher Wylie \ud83c\udff3\ufe0f\u200d\ud83c\udf08 (@Christopher Wylie \ud83c\udff3\ufe0f\u200d\ud83c\udf08) 1605549097
According to Motherboard, its expose is the first to reveal that the controversial practice of purchasing such information isn't limited to U.S. law enforcement but also extends to the military. As the report explains:
Through public records, interviews with developers, and technical analysis, Motherboard uncovered two separate, parallel data streams that the U.S. military uses, or has used, to obtain location data. One relies on a company called Babel Street, which creates a product called Locate X. U.S. Special Operations Command (USSOCOM), a branch of the military tasked with counterterrorism, counterinsurgency, and special reconnaissance, bought access to Locate X to assist on overseas special forces operations. The other stream is through a company called X-Mode, which obtains location data directly from apps, then sells that data to contractors, and by extension, the military.
The news highlights the opaque location data industry and the fact that the U.S. military, which has infamously used other location data to target drone strikes, is purchasing access to sensitive data. Many of the users of apps involved in the data supply chain are Muslim, which is notable considering that the United States has waged a decades-long war on predominantly Muslim terror groups in the Middle East, and has killed hundreds of thousands of civilians during its military operations in Pakistan, Afghanistan, and Iraq. Motherboard does not know of any specific operations in which this type of app-based location data has been used by the U.S. military.
Some critics directed their ire in part at the companies behind the apps named in the report, including Muslim Pro--which reminds users when to pray and the direction Mecca from their current location and includes passages and audio readings from Quran--as well as the dating app Muslim Mingle. Both apps send data to X-Mode.
\u201cOh. Also a Muslim dating app called Mingle.\u201d— Khadija Patel (@Khadija Patel) 1605544423
\u201cThis is wild and unacceptable. Download a Quran/prayer app and end up with your data sold to a counterterrorism unit of the US military. \n\nNo Muslim app should be selling data, especially not like this. Wow\n\nhttps://t.co/afQRVm5V7S\u201d— Dr. Omar Suleiman (@Dr. Omar Suleiman) 1605543973
\u201cI can\u2019t believe MuslimPro is selling us out like this, time to start using a stick and checking the shadows to figure out salah times. https://t.co/wM5JpKrYdE\u201d— Najma Sharif (@Najma Sharif) 1605542353
\u201cHi this is a big deal for EVERYONE & esp as our surveillane state only expands.\n\nTODAY pls make some time to take steps to stay safe digitally. We have a worksheet at @becauseweveread to help.\n\np.s. delete the @MuslimPro & Mingle app rn if you have it. \n\nhttps://t.co/3sRzQFgWUN\u201d— Hoda Katebi \u0647\u062f\u06cc \u06a9\u0627\u062a\u0628\u06cc (@Hoda Katebi \u0647\u062f\u06cc \u06a9\u0627\u062a\u0628\u06cc) 1605546939
Both Muslim Pro and Mingle didn't respond to Motherboard's requests for comment. Sen. Ron Wyden (D-Ore.) told the outlet that "in a September call with my office, lawyers for the data broker X-Mode Social confirmed that the company is selling data collected from phones in the United States to U.S. military customers, via defense contractors. Citing non-disclosure agreements, the company refused to identify the specific defense contractors or the specific government agencies buying the data."
The "Trusted Partners" section of X-Mode's website previously listed as customers the contractors Sierra Nevada Corporation and Systems & Technology Research, but multiple company names have been removed from the page as Wyden's office and Motherboard have conducted investigations, according to the news outlet--which noted that multiple app developers who work with X-Mode said they didn't know their users' location data was shared with military contractors.
X-Mode told Motherboard by email that it "does not work with Sierra Nevada or STR" but didn't deny they had been customers; neither of the companies responded to requests for comment. X-Mode also said it "licenses its data panel to a small number of technology companies that may work with government military services, but our work with such contractors is international and primarily focused on three use cases: counterterrorism, cybersecurity, and predicting future Covid-19 hotspots."
While Babel Street also didn't reply to Motherboard's requests for comment, Navy Cmdr. Tim Hawkins, a USSOCOM spokesperson, confirmed the Locate X purchase and told the outlet: "Our access to the software is used to support Special Operations Forces mission requirements overseas. We strictly adhere to established procedures and policies for protecting the privacy, civil liberties, constitutional and legal rights of American citizens."
Wolfie Christl, a researcher, writer, and digital rights activist at Cracked Labs in Austria, calledMotherboard's investigation "so far the most comprehensive report on how all kinds of mobile apps share or sell location data with data brokers, who in turn sell it to U.S. military and defense contractors, all without the users' knowledge."
"The mobile app ecosystem is totally broken," Christl added.
Matthew Guariglia, a policy analyst at the Electronic Frontier Foundation working on surveillance and privacy, joined those weighing in on the report via Twitter by writing that "law enforcement and government have always had an 'if the data is out there, we want it' approach."
"If there are apps or companies that think they can make a quick buck by selling data you shared with them," Guariglia added, "they will ALWAYS find a buyer in the government."
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
"Holy hell... This is absolutely unacceptable." "Quite wild." "Grotesque." "Absolutely sickening." "This should be illegal."
Those were just some of the alarmed reactions to reporting by Joseph Cox for Motherboard on Monday that "the U.S. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps."
"The most popular app among a group Motherboard analyzed connected to this sort of data sale is a Muslim prayer and Quran app that has more than 98 million downloads worldwide," the report continues. "Others include a Muslim dating app, a popular Craigslist app, an app for following storms, and a 'level' app that can be used to help, for example, install shelves in a bedroom."
Reps. Ilhan Omar (D-Minn.) and Rashida Tlaib (D-Mich.) were the first two Muslim women elected to Congress, and Omar was the first to wear a hijab. Omar tweeted Monday that "the military industrial complex and the surveillance state have always had a cozy relationship with tech. Buying bulk data in order to profile Muslims is par for the course for them--and is absolutely sickening. It should be illegal!"
Omar was far from alone in expressing outrage over the revelation that the U.S. military is attaining data from mobile phone applications:
\u201cHoly hell. The U.S. military is buying location data harvested from a Muslim prayer app with over 98 million downloads worldwide and using it for "counterterrorism."\n\nThis is absolutely unacceptable. https://t.co/2faYrh3SXY\u201d— Public Citizen (@Public Citizen) 1605552286
\u201cThe apps analyzed in these data sales include a Muslim prayer & Quran app w/ over 98 million downloads worldwide & a Muslim dating app.\n\nAs tech continues to power the US military & global Islamophobia, our fights against tech *must* be anti-imperialist.\n\nhttps://t.co/PHEpgFy828\u201d— MPower Change #NoTechForApartheid (@MPower Change #NoTechForApartheid) 1605546266
\u201cY'all. They have been doing an intelligence op on our Muslim fam in broad daylight. This is grotesque.\n\nhttps://t.co/CmHq0ATzxe\u201d— Chanda Prescod-Weinstein (@Chanda Prescod-Weinstein) 1605553512
\u201cThis should be illegal. https://t.co/adXL8mC0o9\u201d— Christopher Wylie \ud83c\udff3\ufe0f\u200d\ud83c\udf08 (@Christopher Wylie \ud83c\udff3\ufe0f\u200d\ud83c\udf08) 1605549097
According to Motherboard, its expose is the first to reveal that the controversial practice of purchasing such information isn't limited to U.S. law enforcement but also extends to the military. As the report explains:
Through public records, interviews with developers, and technical analysis, Motherboard uncovered two separate, parallel data streams that the U.S. military uses, or has used, to obtain location data. One relies on a company called Babel Street, which creates a product called Locate X. U.S. Special Operations Command (USSOCOM), a branch of the military tasked with counterterrorism, counterinsurgency, and special reconnaissance, bought access to Locate X to assist on overseas special forces operations. The other stream is through a company called X-Mode, which obtains location data directly from apps, then sells that data to contractors, and by extension, the military.
The news highlights the opaque location data industry and the fact that the U.S. military, which has infamously used other location data to target drone strikes, is purchasing access to sensitive data. Many of the users of apps involved in the data supply chain are Muslim, which is notable considering that the United States has waged a decades-long war on predominantly Muslim terror groups in the Middle East, and has killed hundreds of thousands of civilians during its military operations in Pakistan, Afghanistan, and Iraq. Motherboard does not know of any specific operations in which this type of app-based location data has been used by the U.S. military.
Some critics directed their ire in part at the companies behind the apps named in the report, including Muslim Pro--which reminds users when to pray and the direction Mecca from their current location and includes passages and audio readings from Quran--as well as the dating app Muslim Mingle. Both apps send data to X-Mode.
\u201cOh. Also a Muslim dating app called Mingle.\u201d— Khadija Patel (@Khadija Patel) 1605544423
\u201cThis is wild and unacceptable. Download a Quran/prayer app and end up with your data sold to a counterterrorism unit of the US military. \n\nNo Muslim app should be selling data, especially not like this. Wow\n\nhttps://t.co/afQRVm5V7S\u201d— Dr. Omar Suleiman (@Dr. Omar Suleiman) 1605543973
\u201cI can\u2019t believe MuslimPro is selling us out like this, time to start using a stick and checking the shadows to figure out salah times. https://t.co/wM5JpKrYdE\u201d— Najma Sharif (@Najma Sharif) 1605542353
\u201cHi this is a big deal for EVERYONE & esp as our surveillane state only expands.\n\nTODAY pls make some time to take steps to stay safe digitally. We have a worksheet at @becauseweveread to help.\n\np.s. delete the @MuslimPro & Mingle app rn if you have it. \n\nhttps://t.co/3sRzQFgWUN\u201d— Hoda Katebi \u0647\u062f\u06cc \u06a9\u0627\u062a\u0628\u06cc (@Hoda Katebi \u0647\u062f\u06cc \u06a9\u0627\u062a\u0628\u06cc) 1605546939
Both Muslim Pro and Mingle didn't respond to Motherboard's requests for comment. Sen. Ron Wyden (D-Ore.) told the outlet that "in a September call with my office, lawyers for the data broker X-Mode Social confirmed that the company is selling data collected from phones in the United States to U.S. military customers, via defense contractors. Citing non-disclosure agreements, the company refused to identify the specific defense contractors or the specific government agencies buying the data."
The "Trusted Partners" section of X-Mode's website previously listed as customers the contractors Sierra Nevada Corporation and Systems & Technology Research, but multiple company names have been removed from the page as Wyden's office and Motherboard have conducted investigations, according to the news outlet--which noted that multiple app developers who work with X-Mode said they didn't know their users' location data was shared with military contractors.
X-Mode told Motherboard by email that it "does not work with Sierra Nevada or STR" but didn't deny they had been customers; neither of the companies responded to requests for comment. X-Mode also said it "licenses its data panel to a small number of technology companies that may work with government military services, but our work with such contractors is international and primarily focused on three use cases: counterterrorism, cybersecurity, and predicting future Covid-19 hotspots."
While Babel Street also didn't reply to Motherboard's requests for comment, Navy Cmdr. Tim Hawkins, a USSOCOM spokesperson, confirmed the Locate X purchase and told the outlet: "Our access to the software is used to support Special Operations Forces mission requirements overseas. We strictly adhere to established procedures and policies for protecting the privacy, civil liberties, constitutional and legal rights of American citizens."
Wolfie Christl, a researcher, writer, and digital rights activist at Cracked Labs in Austria, calledMotherboard's investigation "so far the most comprehensive report on how all kinds of mobile apps share or sell location data with data brokers, who in turn sell it to U.S. military and defense contractors, all without the users' knowledge."
"The mobile app ecosystem is totally broken," Christl added.
Matthew Guariglia, a policy analyst at the Electronic Frontier Foundation working on surveillance and privacy, joined those weighing in on the report via Twitter by writing that "law enforcement and government have always had an 'if the data is out there, we want it' approach."
"If there are apps or companies that think they can make a quick buck by selling data you shared with them," Guariglia added, "they will ALWAYS find a buyer in the government."
"Holy hell... This is absolutely unacceptable." "Quite wild." "Grotesque." "Absolutely sickening." "This should be illegal."
Those were just some of the alarmed reactions to reporting by Joseph Cox for Motherboard on Monday that "the U.S. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps."
"The most popular app among a group Motherboard analyzed connected to this sort of data sale is a Muslim prayer and Quran app that has more than 98 million downloads worldwide," the report continues. "Others include a Muslim dating app, a popular Craigslist app, an app for following storms, and a 'level' app that can be used to help, for example, install shelves in a bedroom."
Reps. Ilhan Omar (D-Minn.) and Rashida Tlaib (D-Mich.) were the first two Muslim women elected to Congress, and Omar was the first to wear a hijab. Omar tweeted Monday that "the military industrial complex and the surveillance state have always had a cozy relationship with tech. Buying bulk data in order to profile Muslims is par for the course for them--and is absolutely sickening. It should be illegal!"
Omar was far from alone in expressing outrage over the revelation that the U.S. military is attaining data from mobile phone applications:
\u201cHoly hell. The U.S. military is buying location data harvested from a Muslim prayer app with over 98 million downloads worldwide and using it for "counterterrorism."\n\nThis is absolutely unacceptable. https://t.co/2faYrh3SXY\u201d— Public Citizen (@Public Citizen) 1605552286
\u201cThe apps analyzed in these data sales include a Muslim prayer & Quran app w/ over 98 million downloads worldwide & a Muslim dating app.\n\nAs tech continues to power the US military & global Islamophobia, our fights against tech *must* be anti-imperialist.\n\nhttps://t.co/PHEpgFy828\u201d— MPower Change #NoTechForApartheid (@MPower Change #NoTechForApartheid) 1605546266
\u201cY'all. They have been doing an intelligence op on our Muslim fam in broad daylight. This is grotesque.\n\nhttps://t.co/CmHq0ATzxe\u201d— Chanda Prescod-Weinstein (@Chanda Prescod-Weinstein) 1605553512
\u201cThis should be illegal. https://t.co/adXL8mC0o9\u201d— Christopher Wylie \ud83c\udff3\ufe0f\u200d\ud83c\udf08 (@Christopher Wylie \ud83c\udff3\ufe0f\u200d\ud83c\udf08) 1605549097
According to Motherboard, its expose is the first to reveal that the controversial practice of purchasing such information isn't limited to U.S. law enforcement but also extends to the military. As the report explains:
Through public records, interviews with developers, and technical analysis, Motherboard uncovered two separate, parallel data streams that the U.S. military uses, or has used, to obtain location data. One relies on a company called Babel Street, which creates a product called Locate X. U.S. Special Operations Command (USSOCOM), a branch of the military tasked with counterterrorism, counterinsurgency, and special reconnaissance, bought access to Locate X to assist on overseas special forces operations. The other stream is through a company called X-Mode, which obtains location data directly from apps, then sells that data to contractors, and by extension, the military.
The news highlights the opaque location data industry and the fact that the U.S. military, which has infamously used other location data to target drone strikes, is purchasing access to sensitive data. Many of the users of apps involved in the data supply chain are Muslim, which is notable considering that the United States has waged a decades-long war on predominantly Muslim terror groups in the Middle East, and has killed hundreds of thousands of civilians during its military operations in Pakistan, Afghanistan, and Iraq. Motherboard does not know of any specific operations in which this type of app-based location data has been used by the U.S. military.
Some critics directed their ire in part at the companies behind the apps named in the report, including Muslim Pro--which reminds users when to pray and the direction Mecca from their current location and includes passages and audio readings from Quran--as well as the dating app Muslim Mingle. Both apps send data to X-Mode.
\u201cOh. Also a Muslim dating app called Mingle.\u201d— Khadija Patel (@Khadija Patel) 1605544423
\u201cThis is wild and unacceptable. Download a Quran/prayer app and end up with your data sold to a counterterrorism unit of the US military. \n\nNo Muslim app should be selling data, especially not like this. Wow\n\nhttps://t.co/afQRVm5V7S\u201d— Dr. Omar Suleiman (@Dr. Omar Suleiman) 1605543973
\u201cI can\u2019t believe MuslimPro is selling us out like this, time to start using a stick and checking the shadows to figure out salah times. https://t.co/wM5JpKrYdE\u201d— Najma Sharif (@Najma Sharif) 1605542353
\u201cHi this is a big deal for EVERYONE & esp as our surveillane state only expands.\n\nTODAY pls make some time to take steps to stay safe digitally. We have a worksheet at @becauseweveread to help.\n\np.s. delete the @MuslimPro & Mingle app rn if you have it. \n\nhttps://t.co/3sRzQFgWUN\u201d— Hoda Katebi \u0647\u062f\u06cc \u06a9\u0627\u062a\u0628\u06cc (@Hoda Katebi \u0647\u062f\u06cc \u06a9\u0627\u062a\u0628\u06cc) 1605546939
Both Muslim Pro and Mingle didn't respond to Motherboard's requests for comment. Sen. Ron Wyden (D-Ore.) told the outlet that "in a September call with my office, lawyers for the data broker X-Mode Social confirmed that the company is selling data collected from phones in the United States to U.S. military customers, via defense contractors. Citing non-disclosure agreements, the company refused to identify the specific defense contractors or the specific government agencies buying the data."
The "Trusted Partners" section of X-Mode's website previously listed as customers the contractors Sierra Nevada Corporation and Systems & Technology Research, but multiple company names have been removed from the page as Wyden's office and Motherboard have conducted investigations, according to the news outlet--which noted that multiple app developers who work with X-Mode said they didn't know their users' location data was shared with military contractors.
X-Mode told Motherboard by email that it "does not work with Sierra Nevada or STR" but didn't deny they had been customers; neither of the companies responded to requests for comment. X-Mode also said it "licenses its data panel to a small number of technology companies that may work with government military services, but our work with such contractors is international and primarily focused on three use cases: counterterrorism, cybersecurity, and predicting future Covid-19 hotspots."
While Babel Street also didn't reply to Motherboard's requests for comment, Navy Cmdr. Tim Hawkins, a USSOCOM spokesperson, confirmed the Locate X purchase and told the outlet: "Our access to the software is used to support Special Operations Forces mission requirements overseas. We strictly adhere to established procedures and policies for protecting the privacy, civil liberties, constitutional and legal rights of American citizens."
Wolfie Christl, a researcher, writer, and digital rights activist at Cracked Labs in Austria, calledMotherboard's investigation "so far the most comprehensive report on how all kinds of mobile apps share or sell location data with data brokers, who in turn sell it to U.S. military and defense contractors, all without the users' knowledge."
"The mobile app ecosystem is totally broken," Christl added.
Matthew Guariglia, a policy analyst at the Electronic Frontier Foundation working on surveillance and privacy, joined those weighing in on the report via Twitter by writing that "law enforcement and government have always had an 'if the data is out there, we want it' approach."
"If there are apps or companies that think they can make a quick buck by selling data you shared with them," Guariglia added, "they will ALWAYS find a buyer in the government."