|
|
---|
Saturday, January 30, 2010
Oman has also been approached, although no Patriot missiles have been deployed there yet, US officials told the newspaper, adding that the willingness of other Arab states to accept the US defenses reflects growing unease in the region over Iran's ambitions and capabilities.
"Our first goal is to deter the Iranians," a senior administration official told the newspaper. "A second is to reassure the Arab states, so they don't feel they have to go nuclear themselves. But there is certainly an element of calming the Israelis as well."
The deployments could also forestall any Iranian retaliation in response to the sanctions, as well as discourage staunch US ally Israel from launching a military strike against Tehran's nuclear and military facilities.
Washington is seeking to win over its allies to slap a fourth set of UN sanctions on Iran that would target the Iranian Revolutionary Guards Corps believed to control the military aspect of Tehran's controversial nuclear program.
Friday, Secretary of State Hillary Clinton upped the pressure on China to recognize the threat from Iran's nuclear program -- which Washington and its Western allies aims to produce nuclear weapons despite Tehran's insistence otherwise -- and join international calls for sanctions.
General David Petraeus, who heads the US Central Command that oversees US military operations stretching from the Gulf to Central Asia, said the sped-up deployment of missile systems included eight Patriot missile batteries, "two in each of four countries."
The unusually public comments about the accelerated deployments, which began under President Barack Obama's predecessor, George W. Bush, came during an address at the Institute for the Study of War in Washington on January 22.
"Iran is clearly seen as a very serious threat by those on the other side of the Gulf front, and indeed, it has been a catalyst for the implementation of the architecture that we envision and have now been trying to implement," he said at the time.
The United States was also keeping Aegis guided missile cruisers, equipped with advanced radar and anti-missile systems that can intercept medium-range missiles, on patrol in the Gulf at all times, according to Petraeus.
Though those systems are not designed to intercept Iran's long-range missile, the Times noted that intelligence agencies estimate it will take Tehran years before it can place a nuclear warhead atop the Shahab III.
A senior military official told the newspaper that Petraeus began speaking openly about the deployments about a month ago, as Tehran declined the Obama administration's offer of engagement and Washington faced growing challenges to impose sanctions against the Islamic Republic.
Washington Post Staff Writer
The initiatives, including a U.S.-backed plan to triple the size of a 10,000-man protection force in Saudi Arabia, are part of a broader push that includes unprecedented coordination of air defenses and expanded joint exercises between the U.S. and Arab militaries, the officials said. All appear to be aimed at increasing pressure on Tehran.
The efforts build on commitments by the George W. Bush administration to sell warplanes and anti-missile systems to friendly Arab states to counter Iran's growing conventional arsenal. The United Arab Emirates and Saudi Arabia are leading a region-wide military buildup that has resulted in more than $25 billion in U.S. arms purchases in the past two years alone.
For the Obama administration, the cooperation represents tangible progress against Iran at a time when the White House is struggling to build international support for stronger diplomatic measures, including tough new economic sanctions, a senior official said in an interview.
"We're developing a truly regional defensive capability, with missile systems, air defense and a hardening up of critical infrastructure," said the official, who is involved in strategic planning with Gulf states and who spoke on the condition of anonymity. "All of these have progressed significantly over the past year."
U.S. support for the buildup has been kept low-key to avoid fueling concerns in Israel and elsewhere about an accelerating conventional-arms race in the region. Iran, which has made steady advances in developing medium-range missiles, is seeking to acquire modern air-defense systems from Russia while also expanding its navy with new submarines and ships.
Gulf officials say their defensive improvements would be undertaken regardless of U.S. support, but some said they were encouraged by the supportive signals from the Obama administration, which regional leaders initially feared would be more accommodating of Iran than the Bush White House.
"It's a tough neighborhood, and we have to make sure we are protected," said a senior government official in a U.S.-allied Arab state. The official, who also spoke on the condition that his name and country not be revealed, called Iran the "No. 1 threat in the region."
Major arms buildups The expanded cooperation with the United States includes new agreements with Saudi Arabia to help establish a facilities-protection force under the country's Ministry of Interior to harden defenses for oil facilities, ports and water desalination plants. The new force is expected to grow to 30,000 personnel and will be used to deter attacks by al-Qaeda, as well as possible future strikes by Iran or Iranian-inspired terrorist groups, according to current and former officials familiar with the initiative. Washington is providing access to technology and equipment for the defense upgrade, the officials said.
The UAE, which recently completed a purchase of 80 American-made F-16 fighter jets, last year was invited for the first time to participate in the U.S. Air Force's "Red Flag" exercises at Nellis Air Force Base in Nevada. The small Gulf country is in the process of negotiating a purchase of Rafale fighter jets.
"We don't measure ourselves by what our neighbors are doing," the official said. "We're interested in sophisticated training and the best and most capable platforms" available.
The country's buildup has impressed U.S. military officials, who say the U.S.-allied Emirates have emerged as a military power in their own right. In a speech in Bahrain last year, U.S. Centcom commander Gen. David A. Petraeus said the UAE air force alone "could take out the entire Iranian air force, I believe."
In interviews in three Middle East countries, political leaders and analysts said they fear that a nuclear-capable Iran will become the dominant regional power, able to intimidate its neighbors without fear of retaliation. Nearly all the Gulf countries have sizable Shiite Muslim populations with ties to Iran, and some analysts warned that Tehran may try to use these to stir up unrest and possibly even topple pro-Western governments.
"Nuclear weapons are probably most useful to Iran as a deterrent against attack by others, but beyond that, it's all about the swagger and mystique rather than the weapons system," said Nabil Fahmy, former Egyptian ambassador to the United States. "I can't see Iran using such weapons, but they could become much more provocative."
Regional nuclear fearsThe concern over Iran has partly eclipsed long-standing concerns about Israel, a military powerhouse with an undeclared nuclear arsenal that includes scores of warheads that can be delivered by aircraft, submarines or long-range ballistic missiles, some regional analysts said.
Iran's apparent progress toward nuclear-weapons capability has also heightened new fears of a regional arms race that will expand to include atomic bombs. Driving the concerns are new initiatives by several oil- and gas-rich Arab states to build nuclear reactors or power plants, ostensibly to augment domestic energy supplies. The UAE, with heavy U.S. support, recently signed deals to build its first nuclear power reactors. Among other countries taking or considering similar steps are Egypt, Saudi Arabia, Turkey, Kuwait, Jordan and Yemen.
But if Iran were to test a nuclear device, all countries in the region would reconsider their options, government officials and analysts said.
"Every country in the region will open their files and decide again what to do," said a retired Arab general who asked for anonymity so he could speak freely about the subject. "If nuclear weapons appears to be the road to becoming a world power, why shouldn't that be us?"
Warrick, a Washington Post staff writer, reported as part of a fellowship with the International Reporting Project, an independent nonprofit journalism program based in Washington that provides grants to U.S. journalists to report overseas.
It was an extraordinary moment. Rarely has any world leader given a major address on an international stage declaring End Times prophecies from the Bible have come true. But that is exactly what Netanyahu did.
Excerpts:
“The most important lesson of the Holocaust is that a murderous evil must be stopped early, when it is still in its infancy and before it can carry out its designs. The enlightened nations of the world must learn this lesson. We, the Jewish nation, who lost a third of our people on Europe’s blood-soaked soil, have learned that the only guarantee for defending our people is a strong State of Israel and the army of Israel. We gave learned to warn the nations of the world of impending danger but at the same time to prepare to defend ourselves. As the head of the Jewish state, I pledge to you today: We will never again permit evil to snuff out the life of our people and the life of our own country….”
Cybersecurity experts analysing the attacks said the hackers spied on individuals and used other sophisticated techniques, making them extremely difficult to stop. The disclosures come amid renewed alarm over cybersecurity after Google said it had been the target of a series of cyberattacks from China.
“Someone went to the trouble to backtrack: ‘Let me look at their friends, who I can target as a secondary person’.”
McAfee discovered that a previously unknown flaw in Microsoft’s Internet Explorer had been used in the attacks. Mr Kurtz said the attackers also used one of the most popular instant messaging programmes to induce victims to click on a link that installed spy software.
Another element of the attack code used a formula only published on Chinese language websites, said Joe Stewart, a researcher for security firm SecureWorks. Mr Stewart also found that some of the code had been assembled in 2006, suggesting that the campaign had been not only well organised but enduring.
The evidence pointed to a government-sponsored effort that only large spy agencies or perhaps some of the most advanced big companies could have withstood, experts said. China on Monday described accusations it was behind cyberattacks as “groundless”.
Sam Curry, vice-president of security firm RSA, said: “This is a loud message for the commercial world, which is: wake up, this isn’t all happiness and goodness and new business.
“Doing business on the internet is as risky as sending ships through the Panama Canal.”
This summary is not available. Please click here to view the post.
Wednesday, January 27, 2010
Oy Vey!! If a Jewish Temple in the US was torched, it would be the hate crime equivalent to the holocaust! But it seems to be okay for religous kooks and zealots of the Jewish persuasion to torch Islamic Mosques!
After yeshiva students arrested on suspicions of being involved in the mosque arson in Yasuf village, Rabbi Yitzhak Shapira, head of the Od Yosef Chai Yeshiva, which is near Yitzhar, was arrested on Tuesday and investigated by Judea and Samaria District Police.
The police are trying to determine what his connection is, if any, to the grave event. The rabbi was transferred to the Shin Bet investigation facilities in Petah Tikva.
Rabbi Shapira's lawyer, Attorney Adi Keidar from the Honenu Organization, said to Ynet, "The rabbi denies any connection to the event and is not cooperating with his investigators."
According to Attorney Keidar, the investigators are tying Shapira to the arson of the mosque.Keidar said that Shapira told the investigators that "in light of the Israel Police's conduct and their treatment of rabbis recently, he is not cooperating with them."
"We see Rabbi Shapira's detention as crossing a red line in terms of the Shin Bet's behavior in general, and in terms of the current affair in particular," said Attorney Keidar.
Dozens of settlers arrived at the Shin Bet facility to support the rabbi. Knesset Member Michael Ben-Ari (National Union) said during the rally that the police's conduct was redolent of "dark, oppressive regimes".
Last week, a number of suspects from Yitzhar were arrested, including some yeshiva students, on suspicions of being involved in torching in the mosque in the nearby Palestinian village, as well as other offenses. Five of them – three minors and two young men from two yeshivas in the area – are still being detained.
Remand of all of the detainees was extended until Thursday, when it will be clarified whether or not an affidavit will be submitted on their behalf prior to the issuance of indictments.
In response to Shapira's arrest, Knesset Member Michael Ben-Ari (National Union) said: "I am appalled by the arrest of Rabbi Shapira. I condemn Israel Police, which is behaving in the manner of dark, oppressive regimes. Pouncing on the residents of Yitzhar arouses suspicions of an unrestrained lynch against members of the settlement."
The mosque was set ablaze on December 11. Hebrew slurs were sprayed on the walls that said: "We will burn all of you." The words "price tag" were also scrawled on the walls.
"Price tag" is the slogan adopted some months ago by extremist settlers who carry out reprisals against Palestinians in response to the evacuation of settlement structures by Israeli defense forces.
Clashes broke out between residents of Yasuf and IDF forces stationed near the village. When the villagers left Friday prayers, some of them threw stones at the IDF forces in the village. As a result, a Border Guard officer was lightly wounded. The soldiers fired live fire and tear gas in response. Five Palestinians sustained light injuries as a result.
http://failedmessiah.typepad.com/failed_messiahcom/2010/01/rabbi-questioned-over-mosque-attack-234.html
http://www.newstin.com/rel/us/en-010-022097158
http://en.wikipedia.org/wiki/Yitzhak_Shapira
http://www.ynetnews.com/articles/0,7340,L-3840527,00.html
Tuesday, January 26, 2010
The conspiracy theorists will tell you the Israeli Mossad was behind the attack and they present compelling evidence to back their claims. All of the hijackers were Saudi Arabians to whom W transferred NUCLEAR TECHNOLOGY to in his last year in office.
But there are clear ties going back to Israel. Jewish, Israeli-US dual citizens and zionist have infiltrated our government at every level from the military to the State Department to all levels of the bereacracy. The Ivy league schools, the law and medical schools are predominantly made up of Jews because of their supposedly superior iq. Once entrenched in the government, they use their connections to further the State of Israel.
http://www.john-f-kennedy.net/thefederalreserve.htm
Monday, January 25, 2010
Ostensibly, it is about a US corporation that invades the planet Pandora in 2154 to extract a precious mineral - even if it has to displace the three-metre-tall blue people who live there. But yes, it's supposed to be a metaphor for the invasion of Iraq.
How can we be sure?
For a start, there are the clues in the dialogue, as subtle as toe-stubbing. The military commander of the earthlings echoes George Bush as he builds a rationale for first strike: "Our survival relies on pre-emptive action."
The earthlings' description of the assault as a "shock and awe" attack is a direct steal from the Pentagon's marketing line for its initial bombing of Baghdad. It's a reminder you just paid $18 to watch a commentary on US foreign policy (including 3D glasses).
The director spelt it out for us. Canadian-born James Cameron said last month: "We went down a path that cost several hundreds of thousands of Iraqi lives. I don't think the American people even know why it was done. So it's all about opening your eyes."
The movie succeeds in one kind of eye-opening. It cleverly transfers the viewer's empathy from the earthlings to the blue people. Cameron wants Americans - and, presumably, their British and Australian allies - to see their own side of the conflict from the viewpoint of the other: "We know what it feels like to launch the missiles. We don't know what it feels like for them to land on our home soil, not in America. I think there's a moral responsibility to understand that."
But Avatar fails to open anyone's eyes to the realities of the invasion of Iraq. If that is Cameron's aim, he has failed.
The invasion of Iraq was much worse. In Cameron's movie, the Americans are brutal but honest. They invade to extract the precious resource. The real-world Americans of the Bush invasion were utterly dishonest.
The Bush administration made two principal arguments for invading Iraq. One, that there was some collusion between the perpetrator of the terrorist attacks of September 11, 2001, Osama bin Laden's al-Qaeda, and the Iraqi dictator Saddam Hussein.
There was no collusion. The men were enemies. But Bush pressed hard to confect some connection. On the day after the attacks, he grabbed his top counterterrorism official, Dick Clarke, as they left a meeting in the White House situation room. Clarke wrote in his 2004 book, Against All Enemies, that Bush said to him: "See if Saddam did this."
Clarke was surprised. He knew Bush had been told definitively by the intelligence services that al-Qaeda was responsible: "But, Mr President, al-Qaeda did this."
Bush: "I know, I know, but … see if Saddam was involved. Just look. I want to know any shred."
Bush had decided to invade Iraq long before the terrorists struck. September 11 was not the reason for the invasion; it was a political marketing opportunity. After all the rumoured and concocted connections were debunked, the pro-invasion hawks continued to press the theme. Bush's secretary of state, the prudent Colin Powell, cut all such references from drafts of his much-awaited speech to the United Nations Security Council, where he made the case for the invasion.
"Even after Powell threw material out, it would occasionally be quietly put back in," according to a 2004 book by the US intelligence expert, James Bamford, titled A Pretext for War.
A senior White House aide, Steve Hadley, sneaked the collusion claim back into the speech and, according to Bamford, when Powell got an admission from Hadley, he yelled at him "Well, cut it, permanently!"
What was left? Only the claim that Saddam was hiding weapons of mass destruction. Powell was foolish enough to make it, displaying artists' impressions of trucks he said were mobile germ-warfare labs, to his eternal chagrin. The invasion followed. Thousands of allied soldiers, and probably about 100,000 Iraqis to date, died as a result.
The WMD was an officially sponsored fiction. But the detailed story of how this claim was created and spun is extraordinary. In the journalist Bob Drogin's authoritative book, Curveball, he relates how the CIA director George Tenet assured Powell that their evidence was from an Iraqi defector who had worked on the WMD himself. The evidence supplied by the defector, codenamed Curveball, had been corroborated by three sources, Tenet said. Powell repeated this claim to the world.
After the invasion, the famous American weapons hound David Kay was tasked with finding the WMD. He asked the CIA about Curveball. What was he like to talk to? "Well, we've never actually talked to him," came the CIA reply. "You're kidding me, right?" Kay replied. But it was not a joke.
Curveball was in the hands of German intelligence. The Germans warned the CIA repeatedly that Curveball's evidence could not be verified. It turned out he was a liar. In the years he claimed to have been working on Saddam's secret WMD, he was actually driving a Baghdad taxi. Kay asked the CIA official about the three corroborating sources. "There really are no other sources," came the answer.
Filling out the picture of the Bush administration's betrayal of the US and its forces is the recent book by the journalist David Finkel, The Good Soldiers. It reports on a US infantry battalion in Iraq. Well-intentioned, hard-working, hopelessly uncomprehending, suffering bitterly, they, like the Iraqi people, were the ultimate dupes of the Bush-Cheney deception.
So Avatar doesn't tell us anything much about why the US invaded Iraq unprovoked. Or why its allies followed lamely along, in service of a lie. But it is in 3D.
Peter Hartcher is the Herald's international editor.
Banks are beginning to look at user accounts on Facebook, Twitter and other social networking sites to determine if an applicant is loan-worthy, raising privacy concerns as well as questions over whether a person’s online friends, likes and dislikes can actually measure their financial stability.
Everything a person does publicly on their social-networking accounts can be found by market researchers if the user’s privacy settings allow it. Researchers are now looking at a person’s online conversations, the groups they join, products they look at and even who their friends are to determine loan-worthiness.
“The presumption is that if your friends are responsible credit cardholders and pay their bills on time, you could be a good credit customer,” reports WTOP News in Washington, DC.
“Lenders say having a wide network of friends can expedite getting a loan, while discrepancies between your loan application and your Facebook wall information can raise red flags. Negative comments about your business also can impact your creditworthiness,” WTOP reports.Story continues below…
At the forefront of this effort is a California-based startup called Rapleaf, which specializes in “provid[ing] social data about a company’s audience,” the company’s Web site states.
According to a report at CreditCards.com, Rapleaf turns “conversations you have in your network into consumer profiles called social graphs. These graphs provide companies with insight into behavior patterns: what you like and dislike, want and don’t want, do well and do poorly.”
Pretty much everything you and your network reveal may be compiled, including status updates, “tweets,” joining online clubs, linking a Web site or posting a comment on a blog or news Web site.
Joel Jewitt, a Rapleaf vice-president, told CreditCards.com that he sees a trend away from the traditional use of general demographic data — age, gender, address — to the use of specific data culled from the Internet.
CONSERVATIVE CONNECTIONS
Rapleaf’s founder and CEO is Auren Hoffman, a prolific Silicon Valley entrepreneur who in 2001 co-founded Lead21, a conservative business advocacy group with links to the Republican Party, particularly to Arnold Schwarzenegger’s administration in California. He writes an occasional column for the Huffington Post.
Hoffman gave a clear indication of how he views the value of social media to banks in a Tweet last fall: “If you don’t know what your customers are doing online, then you don’t know your customers.”
One of Rapleaf’s initial bankrollers was John Thiel, the founder of PayPal and an investor in Facebook. Thiel was also involved in conservatives’ efforts to fight the influence of community organizing group ACORN. He reportedly donated money to John O’Keefe, the videographer who taped ACORN workers offering advice on how to operate a human smuggling and prostitution ring. (In a lawsuit filed against O’Keefe, an ACORN worker has accused the filmmaker of entrapment.)
BUT DOES IT WORK?
Not everyone in the business community is jumping on the social-media bandwagon. Aside from privacy concerns, some bankers see Facebook, Twitter and the like as irrelevant to lending decisions.
“It’s difficult to make a judgment about an individual’s credit based on the people around them,” Gregory Meyer, community relations manager for California’s Meriwest Credit Union, told CreditCards.com. Social media “is a great way to keep up with what my 10-year-old nephew is up to, but it doesn’t have a place in the credit process.”
Consumer advocates are more vocal in their opposition.
“It’s rotten,” says Linda Sherry of Consumer Action. “It’s really not something they should be doing. They may be gaining information from people who are naive and [don't understand] how their profiles are set. It verges on privacy violation.”
Privacy advocates have long been warning of the dangers of leaving online information exposed. They suggest a number of steps to minimize exposure, including changing your privacy settings so that only people known to you can access your data, and eliminating online friendships that could reflect poorly on you.
http://rawstory.com/2010/01/banks-tracking-borrowers-facebook-twitter-report/
Rapleaf was initially self-funded by Hoffman and Shah[4]. Peter Thiel of The Founders Fund led a seed round of $1.0 million[5]. Other angel investors[6] in the round include Eric Di Benedetto, Aydin Senkut, Jeff Clavier, and Ron Conway, all with a background of venture capital-backed technology companies.[5]
The company's first product, Rapleaf, is a meta-reputation system that allows users to create reviews and ratings of consumer transactions, which they then contribute to multiple e commerce websites. On May 15, 2006 eBay removed a number of auction listings where the seller had included links to Rapleaf, claiming they were in violation of its terms of use. Business commentators have had mixed opinions about this move.[8].
On January 26, 2007, Rapleaf released "Upscoop," a service that allows users to search for and manage their contacts by email address across multiple social networking sites.[9]. In late August 2007, Upscoop began e-mailing entire contact lists that are provided by their users when they login.
On July 10, 2008, Rapleaf changed its interface so that it no longer allows anonymous or registered users to search by email addresses. Instead, the service only allows a registered user to view their own reputation and the websites (social and business networking) to which their own email address is registered. There was an immediate negative backlash by companies and individuals who had been using Rapleaf to both manage reputations and investigate the authenticity of people.
Today, Rapleaf is primarily a B2B firm that helps companies analyze consumer lists to plan online marketing campaigns[10], find influential customers for customer relationship management[11], and manage fraud[12].
But sites like Rapleaf will quickly jar you awake: Everything you say or do on a social network could be fair game to sell to marketers.
Rapleaf, based in San Francisco, is building a business on that premise. The privately held start-up, whose investors include Facebook-backer and PayPal co-founder Peter Thiel, runs two consumer Web sites: Rapleaf.com, a people search engine that lets you retrieve the name, age and social-network affiliations of anyone, as long as you have his or her e-mail address; and Upscoop.com, a similar site to discover, en masse, which social networks to which the people in your contact list belong. To use Upscoop, you must first give the site the username and password of your e-mail account at Gmail, Hotmail, Yahoo or AOL.
By collecting these e-mail addresses, Rapleaf has already amassed a database of 50 million profiles, which might include a person's age, birth date, physical address, alma mater, friends, favorite books and music, political affiliations, as well as how long that person has been online, which social networks he frequents, and what applications he's downloaded.
All of this information could come in handy for Rapleaf's third business, TrustFuse, which sells data (but not e-mail addresses) to marketers so they can better target customers, according to TrustFuse's Web site. As of Friday afternoon, the sites of Rapleaf and Upscoop had no visible link to TrustFuse, but TrustFuse's privacy policy mentions that the two companies are wholly owned subsidiaries of TrustFuse.
According to TrustFuse's Web site, "TrustFuse has pioneered a unique e-mail address based approach to Internet data measurement. (It) provides a framework to learn about new customers, better market to these customers and...to better predict buying behavior." It continues: "We perform deep searches on people to enrich data on your users. And then we put the pieces of the puzzle together to give you the full picture."
In other words, Rapleaf sweeps up all the publicly available but sometimes hard-to-get information it can find about you on the Web, via social networks, other sites and, soon to be added, blogs. At the other end of the business, TrustFuse packages information culled from sites in a profile and sells the profile to marketers. All three companies appear to operate within the scope of their stated privacy policies, which say they do "not sell, rent or lease e-mail addresses to third parties."
And that's right. Marketers bring TrustFuse their own list of e-mail addresses to buy access to demographic, behavioral and Internet usage data on those people, according to the company's privacy policy and sales documents.
Rapleaf CEO Auren Hoffman said the company does not use e-mail addresses and profiles developed by Rapleaf and Upscoop to deliver services for TrustFuse. Rather, TrustFuse's clients, which he said include presidential candidates and Internet widget companies, will bring it a list of e-mail addresses of their clients so that TrustFuse can perform fresh Internet searches on those people. Hoffman said TrustFuse will typically help clients understand which social networks their clients use so that they can market to them there. For example, a presidential candidate might want to know if his or her supporters are on MySpace.com or Facebook so they can approach people in that environment, he said.
"They say to us, 'I already know about her, but can you tell me these one or two other facts about her,'" Hoffman said. In effect, TrustFuse is a matching service between the marketers' e-mail lists and the online behavior of the people on those lists.
That said, TrustFuse's own privacy policy leaves open the possibility of connecting Rapleaf's information to TrustFuse's marketing material. According to the policy, dated August 1, 2007, "Information captured via Rapleaf may be used to assist TrustFuse services. Additionally, information collected by TrustFuse during the course of its business may also be displayed on Rapleaf for given profiles searched by e-mail address."
Apart from the unusual TrustFuse business, Rapleaf is among a new generation of people search engines that take advantage of the troves of public data on the Net--much of which consumers happily post for public perusal on social-networking sites and personal blogs. The search engines trace a person's digital tracks across these social networks, blogs, photo collections, news and e-commerce sites, to create a composite profile. Unlike Google, which might link to the same material over pages of search results or after trying different combinations of keywords, these sites attempt to "normalize" personal data so that it's easily digested by the searcher on one page.
But the average social-network users might have a hard time understanding how this business might affect their life. "The business model of Rapleaf is sufficiently opaque for the average user to have no clue," said John Carosella, vice president of content control at filtering company Blue Coat Systems.
Just ask Dana Todd, a co-founder of Internet ad agency SiteLab, who was concerned about her own profile on Rapleaf, which included many social networks she didn't remember belonging to.
"It's my growing horror that everyone can see my Amazon Wish List. At least I didn't have a book like 'How to get rid of herpes' on there, but now I have to go through and seriously clean my wish list," she said.
That's particularly true because this coalesced data could be personally identifiable--tied to names, e-mail, physical and IP addresses and other details on the person's habits. At a time when the heat is on search engines like Google and Microsoft to regularly purge personally identifiable and search history data on users, sites like Rapleaf are amassing detailed profiles from publicly available data.
"There's no question we've entered an era where people are simultaneously living their lives online. But there's a naive quality here that these sites have set up. The sites appear to be cool, but what lurks underneath is a powerful force designed to stealthily observe and collect data about you, and develop a marketing campaign to get you to behave the way they want," said Jeff Chester, director of the Center for Digital Democracy, a Washington-based consumer advocacy group.
For this reason, the Center for Digital Democracy will ask the Federal Trade Commission at a November hearing to formally open an investigation into privacy issues at social-networking sites.
--Jeff Chester, director, Center for Digital Democracy
It drew attention as a viable open reputation system that could rival eBay's closed one for making decisions like hiring a babysitter, buying goods on Craigslist or working with a job candidate. Shortly after it launched, the company raised nearly $1 million in an angel round of funding led by Thiel, former Google employee Aydin Senkut, Web 2.0 financier Jeff Clavier and well-known angel investor Ron Conway.
Rapleaf broadened its focus over time to be more efficient, Clavier said, and launched its people search engine this summer. "Reputation is used in e-commerce, but the concept of people search is actually broader. It's an aggregate profile, using your e-mail as a proxy," Clavier said. "It allows you to build it without the need for people to contribute. Here you bypass the issue: I'm just going to go on the Internet, and find information on hundreds of millions of people and aggregate that."
So how does Rapleaf make money off this? Neither Rapleaf CEO Hoffman nor Clavier would say in early discussions, but when later discussing TrustFuse, Hoffman said that the company isn't making money yet. He said that TrustFuse has only been experimenting with clients for the last couple of months and doesn't charge much for its services. "First you work out the technology, before you work on monetizing that technology," he said about Rapleaf.
Sites like Rapleaf are also trying to be social networks, urging people to become members and claim their identities across multiple networks so they can manage their reputation and privacy. In fact, Hoffman says Rapleaf is designed to help people protect their privacy.
"We're helping you manage your privacy. You might not even know there's all these things about you out there. We're learning all this stuff about you. And now you can manage all this information," Hoffman said.
To illustrate the power of Rapleaf, CNET News.com did a search on Hoffman. From his profile page, you'll find out he's a 33-year-old single white male originally from New York. He graduated from UC Berkeley in 1996 with a degree in industrial engineering and operations research. He has profiles on 17 different social networks, pens a blog, and is linked to 11 e-mail addresses. (Eight are kept private on Rapleaf, but that domain has been in use since March 2005.)
From these links, you can find out that he's founded and sold three companies, including enterprise software firm Bridgepath and lead-generation company GetRelevant, which Lycos bought in 2002. He's also an investor in ad firm Brightroll and is an adviser to Pacific Research Institute, a nonprofit political group. From MySpace, you'll find he's an Aries who likes "anyone who stands up to the Man." And his Amazon Wish List shows that he wants a self-inflating travel pillow and the book More Sex Is Safer Sex: The Unconventional Wisdom of Economics.
One big question about Rapleaf is how it obtains access to people's social-networking profiles, considering that sites like Facebook, MySpace and LinkedIn don't publish their members' e-mail addresses as a matter of policy. When asked, representatives from these social networks said that they do not have partnerships with Rapleaf, nor other search engines, to provide access to e-mail addresses.
Rapleaf's Hoffman said that the company finds profiles through the e-mail search at certain sites, including MySpace, LinkedIn, Facebook and Amazon. MySpace, for example, lets visitors find a profile by e-mail address or first and last name. But for other sites, Rapleaf employs a "secret sauce," according to Hoffman. It's not always easy either. Hoffman said the company hasn't figured out how to crack into accessing members on Digg, for example, even though it would like to.
According to Upscoop's privacy policy, the company "is able to obtain and may display information on a person or e-mail from other sources that are at our discretion. This information obtained from other sources is publicly available. Information may also be extracted from private social-networking sites and online communities based on special access." Hoffman said the company has no special access, however.
Security experts say one technique used to find people on social networks could be joining the social network and then ferreting e-mail addresses by deducing naming conventions at big companies. Employees at Google, for example, have addresses with the person's first name and last initial, with @google.com. By understanding naming conventions, an automated crawler could scour a social network for profiles by trying out various combinations of names.
Ali Partovi, CEO of the social music service iLike, said he considered hiring Rapleaf/TrustFuse to figure out how many of its Web users were also on Facebook and other social networks, so iLike could cross-market to those who weren't. But he ultimately decided against using the service because it meant divulging the e-mail addresses of his own users.
"One of the reasons we decided not to work with them is because it would violate our privacy policy. Our privacy policy wouldn't allow us to give a third party access to our e-mail database," he said.
Clavier said Rapleaf is only working off what's already available. "What's interesting is that when you read about what Wink, Rapleaf and others have been doing, it's suddenly like, 'Oh my God, this is a lack of privacy.' But it's only aggregating what's out there. It used to take several Google searches to find the information--now it's a one-stop shop."
--Kay Luo, director of communications, LinkedIn