Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Homeland Security reviews social media guidelines
Monday - 10/31/2011, 11:58pm EDT
By P. SOLOMON BANDA
COLORADO SPRINGS, Colo. (AP) - The wave of uprisings across North Africa and the Middle East that have overturned three governments in the past year have prompted the U.S. government to begin developing guidelines for culling intelligence from social media networks, a top Homeland Security official said Monday.
Homeland Security Department Undersecretary Caryn Wagner said the use of such technology in uprisings that started in December in Tunisia shocked some officials into attention and prompted questions of whether the U.S. needs to do a better job of monitoring domestic social networking activity.
"We're still trying to figure out how you use things like Twitter as a source," she said. "How do you establish trends and how do you then capture that in an intelligence product?"
Wagner said the department is establishing guidelines on gleaning information from sites such as Twitter and Facebook for law enforcement purposes. Wagner says those protocols are being developed under strict laws meant to prevent spying on U.S. citizens and protect privacy, including rules dictating the length of time the information can be stored and differences between domestic and international surveillance.
Wagner said the Homeland Security department, established after the 9/11 attacks, is not actively monitoring any social networks. But when the department receives information about a potential threat, contractors are then asked to look for certain references within "open source" information, which is available to anyone on the Internet.
The challenge, she said, is to develop guidelines for collecting and analyzing information so that it provides law enforcement officials with meaningful intelligence.
"I can post anything on Facebook, is that valid? If 20 people are tweeting the same thing, then maybe that is valid," she said. "There are just a lot of questions that we are sort of struggling with because it's a newly emerging (issue)."
Wagner was in Colorado Springs to deliver a speech at the National Symposium on Homeland Security and Defense, a conference that included defense contractors and the military.
Aside from discussing the use of technology in unrest that has led to regime changes in Tunisia, Egypt and Libya, she delivered a speech that addressed the way the department operates, saying that its crucial elements include a nationwide network of 72 fusion centers that gather and analyze reports of suspicious activity, a new National Terrorism Advisory System that replaces the color coded alert system with one that provides more information about a threat, and a "See Something, Say Something" campaign that encourages citizens to report suspicious activity.
She also said another key program involves training hundreds of thousands of law enforcement officers across the country in filling out suspicious activity reports.
(Copyright 2011 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.)