Social Media Exploitation by Covert Networks: A Case Study of ISIS
Everton, Sean F.
MetadataShow full item record
Social media has quickly become a dominant mode of professional and personal communication. Unfortunately, groups who intend to perform illegal and/or harmful activities (such as gangs, criminal groups, and terrorist groups) also use it. These covert networks use social media to foster membership, communicate among followers and nonfollowers, and obtain ideological and financial support. This exploitation of social media has serious political, cultural, and societal repercussions that go beyond stolen identities, hacked systems, or loss of productivity. There are literal life-and-death consequences of the actions of the groups behind these covert networks. However, through tracking and analyzing social media content, government agencies (in particular those in the intelligence community) can mitigate this threat by uncovering these covert networks, their communication, and their plans. This paper introduces common social media analysis techniques and the current approaches of analyzing covert networks. A case study of the Syrian conflict, with particular attention on ISIS, highlights this exploitation and the process of using social media analysis for intelligence gathering. The results of the case study show that covert networks are resilient and continually adapt their social media use and presence to stay ahead of the intelligence community.
The article of record as published may be found at http://dx.doi.org/10.17705/1CAIS.04105
Showing items related by title, author, creator and subject.
Hacking social networks examining the viability of using computer network attack against social networks Schuhart, Russell G. (Monterey, California. Naval Postgraduate School, 2007-03);Social Network Analysis (SNA) has been proposed as a tool to defeat transnational terrorist groups such as Al Qaeda. However, SNA is an descriptive tool that is a product of sociology and not an offensive tool used to ...
Kress, Moshe; Nevo, Yuval; Dimitrov, Nedialko B. (Operational Research Society Ltd., 2016);As a result of communication technologies, the main intelligence challenge has shifted from collecting data to efficiently processing it so that relevant, and only relevant, information is passed on to intelligence ...
Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications Paxton, Steven G. B. (Monterey California. Naval Postgraduate School, 2008-06);In this thesis, we propose a novel cyberspace defense solution to the growing sophistication of threats facing networks within the Department of Defense. Current network defense strategies, including traditional intrusion ...