DHS to set up policies for monitoring Twitter, Facebook
Homeland Security is working on guidelines to protect U.S. citizens' rights while it looks at social media sites
Computerworld - When the U.S. Department of Homeland Security receives information about potential threats to the U.S., agents may turn to social networking sites like Facebook and Twitter.
Caryn Wagner, undersecretary of the DHS, told an audience Monday at the National Symposium on Homeland Security and Defense in Colorado Springs that the agency began to draw up guidelines for monitoring social networking sites after the sites were heavily used during government uprisings in the Middle East and North Africa this year.
According to an Associated Press report Tuesday, federal agents are still mulling over how to best pull intelligence from social media sites and determine whether it is valid or Web chatter.
"We're still trying to figure out how you use things like Twitter as a source," said Wagner, according to the AP report. "How do you establish trends and how do you then capture that in an intelligence product?"
The DHS, whose mission is to protect the country from terrorist attacks, isn't actively monitoring Facebook or Twitter. However, when the agency receives a tip about a potential threat, agents will scour public sites for information.
According to the report, the DHS is working to set up rules for pulling information from social media sites without infringing on U.S. citizens' privacy.
Dan Olds, an analyst with The Gabriel Consulting Group, said people might be alarmed to learn that the federal government is monitoring social networks, but he isn't surprised.
"Some users might be disturbed, but what would they expect?" Olds asked. "The info they post online is essentially in the public domain in most cases and it's easy to understand why the government would look for any edge they can find vs. terrorists."
What's more surprising than government security agencies monitoring Facebook and Twitter is that they might just be starting to figure it out, Olds added.
"We'd like to hope that government security agencies are ahead of the game when it comes to things like ferreting out useful intelligence from social networking; then we learn that they're probably even with, or maybe a bit behind, businesses on this score," he said. "Corporations, particularly those with consumer products, have been trying to use social networking to understand consumer views and purchasing behavior for quite a while now. While this is still in its infancy, it looks like businesses are a bit ahead of the security agencies on this score."
Zeus Kerravala, an analyst with ZK Research, said that since social networking sites are relatively new, everyone is still trying to figure them out.
"For governments, the challenge is bigger than most," he added. "I imagine they're looking for patterns and codes. The volume of messages is so high that filtering the information is incredibly difficult."
Kerravala noted that it's a good reminder for everyday social network users to be aware that what they post is often available for the public to see.
"You know that a lot of this information is being seen, maybe watched and maybe even archived," he added. "Information doesn't go away once it's posted."
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
Read more about Web Apps in Computerworld's Web Apps Topic Center.
- Six Ways Your Small Business Can Save with Internet Phone Service Traditional phone systems present two main problems for businesses: limited features and high costs. As a result, small businesses are migrating to Internet...
- Face Time Anytime Real-time communications facilitates team collaboration from nearly anywhere in the world. With facts and figures you can use to justify an investment
- Now is the time to implement a video conference solution Video conferencing is getting a lot of buzz lately due to the recent cost decrease, making it tangible for many law firms. It's...
- Video drives engagement Achieving maximum results means building a solid platform and network infrastructure. As digital age unfolds, it's clear that the ability to communicate effectively...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Web Apps White Papers | Webcasts