Risk
7/27/2011
06:21 PM
50%
50%

Social Media Vs. Organized Crime

White House launches plan to leverage social networks and new intelligence and information sharing technologies to fight crime on a global scale.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The National Security Agency (NSA) aims to use social media and improved data sharing as part of an enhanced strategy to fight organized crime in the United States and abroad.

The White House has launched the Strategy to Combat Transnational Organized Crime to step up its efforts to fight this type of crime by better integrating diverse work from various agencies that collect intelligence data and track and investigate these types of criminals.

The new plan is the result of a year-long study of the current state of these types of crimes, the most comprehensive of its kind in 15 years, according to a White House blog post.

The feds in general have been working across various agencies that are responsible for crime investigations and the protection of the general public--such as the FBI, Department of Homeland Security, and the Department of Defense--to better share information. Often agencies with different responsibilities for investigation don't communicate effectively with each other, a problem the federal government has been trying to remedy through the use of technology.

The same is the case with those investigating organized crime, and the new strategy aims to fix that by coordinating information sharing among various organizations and specialized intelligence centers that are responsible for handling these types of crimes.

This will involve the Cyber Crimes Center to coordinate the collection and analysis of intelligence regarding various aspects of the threat from transnational organized crime, according to the strategy, which is posted online.

The plan also includes the NSA coordinating with the interagency International Organized Crime Intelligence and Operations Center (IOC-2) to use existing resources and databases of the Organized Crime Drug Enforcement Task Force Fusion Center (OCDETF) and the Drug Enforcement Agency's Special Operations Division to share intelligence and produce leads for investigators and prosecutors working across the United States, according to the plan.

The IOC-2, formed in 2009, collects information from law-enforcement agencies and federal prosecutors to fight organized crime, while the OCDETF--set up 2006--serves as a central warehouse for drug and financial intelligence as well as provides cross-agency analysis and integration of that data.

Social networks also will play a role in helping the NSA track organized criminals. Through the federal Open Source Center, which provides intelligence information from around the world, the NSA will use social media, among other online outlets, to develop profiles of individuals, companies and institutions linked to transnational organized crime networks, according to the plan.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

CVE-2014-7880
Published: 2014-12-17
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote attackers to cause a denial of service via unspecified vectors.

CVE-2014-8133
Published: 2014-12-17
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.