Homeland Security

Security Implications of Social Media
Star Rating Loader Please wait...
Issue Vol. 30.2 Apr-Jun 2015 | Date : 31 Jul , 2015

The unprecedented reach of social media is something armies cannot afford to ignore because of the positive and negative effect it can have on operational matters. Its power must, therefore, be recognised and managed. One option is a granular firewall to limit social media activities based on the user’s role in the organisation. The most important part of social media security strategy is awareness of policies designed to ensure regulatory compliance and to prevent sensitive information leaking. There is no way organisations can hold back the flow of social media, so it is better to put policies and technologies in place to manage it.

The use of social media has become a ubiquitous component of the ever more interconnected world in which we now live…

Organisations need to understand social media; they need to accept that it is not going away, and if they allow it, they need to monitor for any immoral, illegal, or offensive content, and be able to stop it immediately if it occurs. Success is achieved through empowering staff to undertake social media on behalf of the organisation in line with a comprehensive policy backed up with continual training. However, organisations should also recognise that analysis of the information in social conversations can produce security intelligence to improve security processes and enhance performance. Organisations also need to exercise caution against attempts to block access to external social media because they have proved to be ineffective at controlling risks and impede the development of enterprising social media initiatives.

A battlefield safety issue that some people have been warning about – and others have been ignoring – merits attention, i.e. an enemy using social media and cell phone geo-tagging to identify the precise location of troops on a battlefield. When a new fleet of helicopters arrived with an aviation unit at a base in Iraq, some soldiers took pictures on the flight-line. From the photos that were uploaded on the internet, the enemy was able to determine the exact location of the helicopters inside the compound and carry out a mortar attack, destroying four AH-64 Apaches.13 Insurgents figured out how to use this to their advantage in Iraq years ago.14

Social media is becoming a key information source for the public when violent terror acts occur. It is changing the speed of how the public learns about terrorist attacks, and the way they react. The first information to the public about incidents is now likely to come through Social media channels such as Twitter rather than through traditional news outlets. The use of social media in India was first highlighted during the 2008 Mumbai attacks, when Twitter and Flickr became the media through which much information about the attacks reached Indians and the outside world. A new way of crisis reporting emerged when Western journalists mined Twitter posts by people in Mumbai for details on attacks.15

Over the past few years the beliefs of young Muslims, that police will treat them fairly, have been declining.

Social media is increasingly important in influencing the public’s understanding of such attacks and what happens in the aftermath. It has implications for the first response by police to such attacks, with witnesses tweeting directly from the scene. There are important lessons for the police and authorities in terms of taking the heat out of a tense situation and reducing the opportunities for ‘secondary crimes’, e.g. hate crimes and public order incidents in different towns and cities across the country. Over the past few years the beliefs of young Muslims, that police will treat them fairly, have been declining. This has important implications for the Government’s Prevent Strategy and how counter-terrorism resources are used following future incidents.

The ubiquity of smartphones means that information can be spread to a wide audience in real-time, providing details about the attack and police response and updates on further developments. This new reality means that policymakers, security services and police forces need to consider the impact of social media in the aftermath of terrorist attacks in terms of response planning for terrorist incidents, rapid dissemination of information and criminal investigation procedures. There is a need to improve strategic communications capacity and capability in the initial response phase to inform the public about what is actually happening, in order to counteract rumours and conspiracy theories.

Social media means that the community impacts of terrorist attacks are more widespread and longer lasting. Long-term community impact management strategies should be developed, encompassing different agencies. Uniform Resource Locator (URL)16 shortening services are now an essential component for social media. This approach is commonly used by malicious parties to spread malware and viruses, as the use of shortened URLs can hide the real destination.17

Organisations need to understand both the positive and negative impact that social media can have on their image…

Conclusion

The use of social media has become a ubiquitous component of the ever more interconnected world in which we now live. The use of social media platforms such as Twitter, Facebook and LinkedIn can provide organisations with new and innovative ways in which to engage with their staff. However this highly dynamic and end-user focused environment also brings with it a number of security concerns. The data held within social media can provide an attacker with a wealth of information about the internal workings of an organisation, including detail on roles and responsibilities, projects, relationships and expose information about internal IT systems, including the ability to identify security vulnerabilities.

This information can provide a valuable insight into an organisation and increase the likelihood of a successful social engineering attack or even a direct attack against systems. Social media offers the ability for organisations to spread messages in real time to a much wider audience and promotes a two-way interactive dialogue between the end-user and the organisation. However, organisations need to understand both the positive and negative impact that social media can have on their image and manage this channel of communication effectively. This will enable them to avoid potentially damaging stories and other issues going unmanaged.

Without doubt, the use of social media provides a new avenue for organisations to exploit, but at the same time introduce fresh and potentially serious threats. Organisations should confirm that they have the appropriate policies and procedures in place, such as an effective acceptable use policy, training and awareness for social media and a social media handling policy. This will ensure that they are able to explore this opportunity without unduly exposing themselves to new threats and associated risks.

Notes

  1. His big idea, encapsulated in the aphorism: “The medium is the message”, was that the important thing about media is not the information they carry but what they are doing to us in terms of shaping our behaviour, the way we think and possibly also the way our brains are structured.
  2. In 2007, Facebook originated in US colleges, and subsequently became available for public use. Its popularity quickly rocketed, as part of Facebook’s success lay in its creators’ decision to ‘open up’ and allow anyone to develop applications and run them on Facebook – without charging them.
  3. Originally ‘web log’ a website where the most recent entries appear first, typically allowing users to subscribe to updates and to leave comments.
  4. Flickr is based around sharing photography and is the most popular service of its kind. Members upload their photos to the site and choose whether to make them public or just share with family and friends in their network. As testament to its enormous success, Flickr was bought by Yahoo! in 2005 for an estimated US $30 million.
  5. YouTube is the world’s largest video sharing service, with over 100 million videos viewed every day. Members of YouTube can upload videos or create their own “channels” of favourite videos. The viral nature of YouTube videos is enhanced by a feature that makes it easy for people to cut and paste videos hosted by YouTube directly into their blogs. As well as thousands of short films from people’s own video cameras, webcams and camera phones, there are many clips from TV shows and movies hosted on the service. Some people also use the service to record video blogs. YouTube started as a small private company, but was bought by Google for $1.65 billion in October 2006.
  6. A micro-blogging service that distributes bite-sized chunks of text across multiple platforms, including mobile, instant messaging and email. Messages are often status updates about what a user is doing.
  7. A hybrid web application combining content from two or more different data sources, for example data added to Google Maps. There are literally hundreds of mash-ups of the Google Earth service, where people have attached information to parts of the maps. A popular type of mash-up cannibalises different pieces of content, typically videos and music. Mash-ups are possible because of the openness of social media – many websites and software developers encourage people to play with their services and reinvent them.
  8. For further elaboration of this point, see the latest Cisco Connected World Technology Report. “More Generation Y workers globally said they feel more comfortable sharing personal information with retail sites than with their own employers’ IT departments,” says Cisco.
  9. Computer fraud carried out sending counterfeit messages via e-mail or Social Media, and it is aimed at acquiring classified information for illegal purposes.
  10. The term “jihadism” is used to refer to the instrumental use terrorist and religious extremism leaders make of jihad (which literally translates as ‘struggle’ and which, from a juridical point of view, consists of war activities aimed at defending Islam, advancing it and repelling evil from Muslims); the term ‘Islamism’, instead, is used to refer to the phenomenon of Islamic radicalization, that is following extremist ideas and being closed to any kind of ideological, cultural and religious contamination.
  11. Mayfield T. D., A Commander’s Strategy for Social Media, Joint Force Quarterly vol. 60/2011, National Defense University, Washington, DC.
  12. Ibid.
  13. From a US Army press release warning of the dangers of geo-tags. When you take a photo with your cellphone, the GPS coordinates of the location you took the picture is embedded into the image.
  14. http://defensetech.org/2012/03/15/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq/#ixzz3W467b0JC
  15. My Interview With NPR on the Media on the Role of Citizen Journalism in the Mumbai Terrorist Attack” http://www.gauravonomics.com — blog run by social media expert Gaurav Mishra; 5 December 2008
  16. A URL is a reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it. A URL is a specific type of uniform resource identifier (URI), although many people use the two terms interchangeably. A URL implies the means to access an indicated resource, which is not true of every URI. URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access (JDBC), and many other applications.
  17. A recently conducted analysis of URL shortened links within Twitter showed that, of the 3,465 links assessed, 520 were linked to malicious content such as malware. Clicking on a shortened link would on average take the user to two different sites (via automatic redirections) for each single URL advertised, which could further increase the likelihood of coming into contact with malicious content.
1 2
Rate this Article
Star Rating Loader Please wait...
The views expressed are of the author and do not necessarily represent the opinions or policies of the Indian Defence Review.

About the Author

Col Harjeet Singh

Col Harjeet Singh

More by the same author

Post your Comment

2000characters left

One thought on “Security Implications of Social Media

  1. The truth is a person accused with a crime is going to use a bleak deal, without having the expertises of a qualified attorney. Therefore, in the event that you or a relative happens to be implicated of committing a crime, do not hesitate to get hold of certainly one of our Los Angeles county criminal defense attorney gurus. Our force We only load our very own ranks utilizing the top rated law intellects in the neighborhood. All of us of professional experts are extremely experienced in what the law states as well as the red-tape which complicates a range of criminal arrest predicaments. Our criminal defense lawyer are true specialists. These legal professionals should never pass personal judgment on a customer charged with heinous violations such as for instance murder, rape if not child molestation. They have to and to the very best of their capability defend a customer which they could directly consider to be blameworthy associated with the crime for which they have been charged. Once more, they must put away personalized viewpoints and views and represent a client which has been faced with committing atrocious acts. Consequently, feeling a criminal defense attorney at law not merely normally requires efforts but true character to defending every single man or woman’s proper rights granted beneath the law. Each situation presents its very own specified groups of concerns regardless of which side of the court room your client is located. With all types of law you will find advantages and disadvantages, however with criminal law most seem to only look at cons. There’s always the possibility of a wrongful conviction, a mistrial as part of a really important case, and the risks of working with really violent offender, particularly the source of income and differing criminal sources of large dollars. Many law firms, legal firms can concur that there is certainly a long variety of disadvantages, as well as negative views that follow the future, but the majority prosper

More Comments Loader Loading Comments