{"id":57888,"date":"2024-05-15T11:32:07","date_gmt":"2024-05-15T16:32:07","guid":{"rendered":"https:\/\/fourthamendment.com\/?p=57888"},"modified":"2024-05-16T10:11:37","modified_gmt":"2024-05-16T15:11:37","slug":"reason-heres-how-the-cia-plans-to-use-your-ad-tracking-data","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=57888","title":{"rendered":"Reason: Here&#8217;s How the CIA Plans To Use Your Ad Tracking Data"},"content":{"rendered":"\n<p>Reason: <a href=\"https:\/\/reason.com\/2024\/05\/15\/heres-how-the-cia-plans-to-use-your-ad-tracking-data\/\">Here&#8217;s How the CIA Plans To Use Your Ad Tracking Data<\/a> by Matthew Petti (\u201cThe intelligence community is admitting that info from data brokers is sensitive but isn\u2019t accepting hard limits on how to use it.\u201d &#8220;For years, the U.S. government has bought information on private citizens from commercial data brokers. Now, for the first time ever, American spymasters are admitting that this data is sensitive\u2014but they&#8217;re leaving it up to the spy agencies on how to use it. Last week, Director of National Intelligence (DNI) Avril Haines released a &#8216;Policy Framework for Commercially Available Information.&#8217; Her office oversees 18 agencies in the &#8216;intelligence community,&#8217; including the CIA, the FBI, the National Security Agency (NSA), and all military intelligence branches.&#8221;)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reason: Here&#8217;s How the CIA Plans To Use Your Ad Tracking Data by Matthew Petti (\u201cThe intelligence community is admitting that info from data brokers is sensitive but isn\u2019t accepting hard limits on how to use it.\u201d &#8220;For years, the &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=57888\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76,79],"tags":[],"class_list":["post-57888","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology","category-third-party-doctrine"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/57888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=57888"}],"version-history":[{"count":2,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/57888\/revisions"}],"predecessor-version":[{"id":57907,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/57888\/revisions\/57907"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=57888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=57888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=57888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}