Who is Watching You Online?
The world has watched in recent years as Twitter, Facebook and other social media sites have made political uprisings possible where previously very difficult or perhaps impossible. In countries where dissidents had trouble making their voices heard due to the inability to quickly connect with one another, these tools are used to forward their agendas and change history.
Not Everyone Uses Social Media for Good:
However not all who are using social media use it for good. Organizations from terrorists to foreign intelligence agencies have rushed into the social media arena collecting information which can be used for bad.
“Exploiting social networks for military and intelligence purposes is a global game,” explains James Jay Carafano a speaker at the South by Southwest (SXSW) Festival in Austin, Texas. “China, for example, has stepped up its efforts to recruit Americans studying abroad as future ‘sleeper’ agents. The top tools they use to evaluate potential recruits? Facebook, Twitter, LinkedIn and reunion dot com.” Carafano the author of ‘Wiki at War: Conflict in a Socially Networked World’, joined the technology and ideas conference to speak on the impact of social networking on today’s warfare.
Malware i s part of the problem.
Not only are social media outlets part of the puzzle used by organizations to hunt down information on individuals, but spam or phishing email is also used to target individuals. Carafano warns: “Foreign intelligence services also use social media to try to get inside our computers. That malware your office mate downloaded by clicking on the email offering ‘50 percent off pizza’? It might just as easily have come from a hacker working for the Chinese military as from a Russian cyber-criminal or some punk cyber-dude in California.”
What is the U.S. government doing to protect us?
Congress and any potential cybersecurity legislation lags notoriously behind the times. Let’s face it with the average age of Members of the House at the beginning of the 113th Congress at 57.0 years; and of Senators, 62.0 years they may be less likely to be in tune with technology. In addition our congressional leadership is slow to author bills which could be effective. As a result, technology will have already moved on.
“Government is linear and social networks are non-linear,” Carafano told the SXSW audience. “That’s why we need a generation of leaders who can operate comfortably in the linear and nonlinear worlds.”
Public / Private Partnerships:
So, if we can’t currently rely on the Federal Government to create the appropriate protection, how do we get there? It turns out the most efficient cybersecurity information sharing and initiatives appear to come from public-private partnerships. Organizations such as Infragard, which is a partnership between the FBI and the private sector, share information between the Federal law enforcement agency and private organizations. These types of groups tend to move much faster, sharing information in semi-private meetings that helps both the FBI and the private sector participants to make headway and protect infrastructure.
The Military needs to catch up:
It is clear America’s security forces have a lot of catching up to do. Currently the military cybersecurity organizations are staffed by perhaps a few thousand and private organizations like Facebook with more than 6000 employees, Google with around 50,000 employees and Amazon with over 100,000 employees, daily analyze and understand the online behavior of not only their customers but also those who seek to harm their customers. Engaging and leveraging these private organizations can give the government the boost it clearly needs to compete in the cyber warfare era.
For over 30 years, Scott Greene has been helping companies meet the challenges of the swiftly evolving computer technology industry.
Directly from high school, Scott went to work for IBM. Scott studied Systems Engineering at the University of Arizona. He has since earned certifications in many products and programming languages.
The Evidence Solutions team analyzes data from Computers, Cell Phones, Black Boxes, Dispatch Systems, Medical Records, Email systems and more. Scott then explains the digital evidence in plain English.
Scott’s extensive knowledge draws clients to him from all over the United States as well as Internationally for consulting, Forensics and expert witness services. His extensive and diverse experience allows him to be an expert in many facets of digital and electronic evidence. Scott, a sought after speaker and educator, travels throughout the country sharing his knowledge and presenting to local, regional, national and International organizations.
Copyright Evidence Solutions, Inc.
Disclaimer: While every effort has been made to ensure the accuracy of this publication, it is not intended to provide legal advice as individual situations will differ and should be discussed with an expert and/or lawyer.For specific technical or legal advice on the information provided and related topics, please contact the author.