Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
How social networks can stop terrorism
Monday - 7/19/2010, 5:42pm EDT
Brashears, an assistant professor of Sociology at Cornell University, and his graduate student Mike Genkin have received a three-year grant from the Defense Threat Reduction Agency to study covert social networks. The hope is that this research will help the government stop terrorists and criminals before they strike.
"Our goal is to develop techniques to uncover covert social networks that could be used by terrorists, human traffickers or drug smugglers - any group of people who have to link up to achieve an objective and don't want to be detected by the wider society," Brashears says.
Brashears is quick to note that 'social network' does not always mean Facebook and Twitter. He explains that a social network is can be any grouping of individuals who pass information and support back and forth. This has been an area of research within sociology for more than a decade.
But that doesn't mean it's simple. "The fundamental problem with a social network," Brashears says, "is that it is difficult to detect."
This is especially true for terrorist cells, which operate more as "loosely-structured networks of association" than rigid command structures, he explains.
Brashears calls current techniques like profiling "blunt instruments" for detecting these types of associations. He says this is particularly true of attempts to prevent attacks "using data from the terrorists that were bad enough at it that we already found them."
The goal of Brashears' research, he says, is to develop more precise methods.
"We're trying to get away from profiling altogether and come up with something that kicks up just the folks that we should be concerned about, and doesn't force this mass harassment of a lot of people that we shouldn't be concerned about," he says.
"These techniques hopefully will enable government and law enforcement agencies to better solve the needle-in-a-haystack issue: how to track down small numbers of terrorists among millions of people."
While he hopes his work will help stop terrorists, Brashears says his research should be applicable towards other organized, deviant groups as well.
Rachel Stevens is an intern with Federal News Radio.