You are viewing our Forum Archives. To view or take place in current topics click here.
Department of homeland security monitor's social media
Posted:
Department of homeland security monitor's social mediaPosted:
Status: Offline
Joined: Dec 05, 201013Year Member
Posts: 2,130
Reputation Power: 103
Status: Offline
Joined: Dec 05, 201013Year Member
Posts: 2,130
Reputation Power: 103
ran across this this morning thought i would repost it here seeing as the us government is targeting every computer security inclined person for some reason.
If its not obvious i take offense to 2600 being flagged.
[ Register or Signin to view external links. ]
[ Register or Signin to view external links. ]
our founding Father [ Register or Signin to view external links. ] the man who inspired Steve Wozniak the man who made the personal computer possible, both of which are hackers not crackers.
we create and find new things to create with, not destroy.
sauce [ Register or Signin to view external links. ]
Word list that is Monitored through out the internet by the US government [ Register or Signin to view external links. ]
DHS ANALYST DESKTOP BINDER
[ Register or Signin to view external links. ]
If its not obvious i take offense to 2600 being flagged.
[ Register or Signin to view external links. ]
[ Register or Signin to view external links. ]
our founding Father [ Register or Signin to view external links. ] the man who inspired Steve Wozniak the man who made the personal computer possible, both of which are hackers not crackers.
we create and find new things to create with, not destroy.
Dept. of Homeland Security Forced to Release List of Keywords Used to Monitor Social Networking Sites
If you are thinking about tweeting about clouds, pork, exercise or even Mexico, think again. Doing so may result in a closer look by the U.S. Department of Homeland Security.In a story appearing earlier today on the U.Ks Daily Mail website, it was reported that the DHS has been forced to release a list of keywords and phrases it uses to monitor various social networking sites. The list provides a glimpse into what DHS describes as signs of terrorist or other threats against the U.S.
The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the departments 2011 Analysts Desktop Binder used by workers at their National Operations Center which instructs workers to identify media reports that reflect adversely on DHS and response activities.The information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats. The Daily Mails article noted the Electronic Privacy Information Center wrote a letter to the House Homeland Security Subcommittee on Counter-terrorism and Intelligence, describing its choice of words as broad, vague and ambiguous.
What wasnt disclosed is how the agency actually gains access to the various search engines and social networks to monitor the specified keywords. My guess is the DHS has a special arrangement with companies like Google, Facebook, Microsoft, Yahoo and Twitter to gain secure direct API access. This type of access would allow it to use distributed cloud technologies to monitor the daily flow of social media and search activity in something close to real time.
I would love to learn more about the technologies used to accomplish this type of social / web monitoring. The applications for monitoring trends and social statics are fascinating when applied to other industry sectors. Given the extent of the monitoring, Im sure this post itself is now coming up on the DHS radar, so please feel free to leave a comment with any insights.
(Update 1: Reading through the Desktop Binder, I discovered the DHS Twitter account is @dhsnocmmc1 and DHS appears to be using tweetdeck to monitor the various keywords. See Page 38 Also interesting to note they seem to be using a Mac Mini as a server, and no password vaults. All Passwords appear to be shared in a plain text word document.)
(Update 2: On page 37, DHS instructs analysts to accept invalid SSL certificates forever without verification. Although invalid SSL warnings often appear in benign situations, they can also signal a man-in-the-middle attack. Not a good practice for the security conscience. Thanks to @obra on twitter for the tip.
sauce [ Register or Signin to view external links. ]
Word list that is Monitored through out the internet by the US government [ Register or Signin to view external links. ]
DHS ANALYST DESKTOP BINDER
[ Register or Signin to view external links. ]
#2. Posted:
Status: Offline
Joined: Apr 25, 201014Year Member
Posts: 710
Reputation Power: 27
Status: Offline
Joined: Apr 25, 201014Year Member
Posts: 710
Reputation Power: 27
this article is from may of last year? thanks anyway i guess.
- 0useful
- 0not useful
#3. Posted:
Status: Offline
Joined: Dec 05, 201013Year Member
Posts: 2,130
Reputation Power: 103
Status: Offline
Joined: Dec 05, 201013Year Member
Posts: 2,130
Reputation Power: 103
forty0z wrote this article is from may of last year? thanks anyway i guess.it is a old article, the point was to get the word list some more notice seeing as DHS as well as other parts of the Government and military were effected by the "recent" Java issues and have gone on over drive because of it.who knows what systems they are invading now for tracking and information gathering purposes and what they feel is acceptable to do too obtain it.
- 0useful
- 0not useful
You are viewing our Forum Archives. To view or take place in current topics click here.