Feeds

Cryptome releases list of social sites monitored by DHS

Situational awareness in a social media age

Security for virtualized datacentres

Venerable internet repository Cryptome has released a list of social media web sites that the Department of Homeland Security (DHS) monitors to gauge the mood of the online populace.

The document lists 96 sites, including social media, blogs and news aggregators, which have been monitored since January 2011. Almost all require no password to access – the two exceptions being Facebook and Twitter.

“The Department of Homeland Security’s National Operations Center (NOC) employs social media monitoring for situational awareness purposes only, within the clearly defined parameters articulated in our Privacy Impact Assessment, to ensure that critical information reaches appropriate decision-makers,” Chris Ortman, DHS spokesman told The Register.

The doctrine of situational awareness is as old as the hills - Sun Tzu espoused it over 2,000 years ago with: “If you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.”

In days gone by intelligence agencies had people on the ground to measure this kind of public mood, usually embassy staff or paid stringers who would send in memos on the state of play. This was expensive, occasionally dangerous and often highly inaccurate, as the surprise among Western intelligence agencies showed at the fall of the Berlin Wall.

Nowadays it’s much simpler. With so many people posting their thoughts online all that is needed is a few people in front of monitors and some fairly basic web tools - the biggest problem is filtering out all the dross. Plenty of companies offer this kind of service and El Reg wonders how well the DHS would stand up to competitors in the market if tested.

According to people familiar with the matter the monitoring covers a variety of purposes, but it's mainly basic information gathering. The inclusion of sites like Google Flu Trends and Healthmap.org show an interest in disease tracking. It's also handy for disasters - news of last year's East Coast earthquake traveled faster on Twitter than the shockwaves them themselves. Some bright spark is even getting getting paid to watch Hulu and YouTube videos for a living. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Heavy VPN users are probably pirates, says BBC
And ISPs should nab 'em on our behalf
Italy's High Court orders HP to refund punter for putting Windows on PC
Top beaks slam bundled OS as 'commercial policy of forced distribution'
Former Bitcoin Foundation chair pleads guilty to money-laundering charge
Charlie Shrem plea deal could still get him five YEARS in chokey
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.