Risk
7/27/2011
06:21 PM
50%
50%

Social Media Vs. Organized Crime

White House launches plan to leverage social networks and new intelligence and information sharing technologies to fight crime on a global scale.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The National Security Agency (NSA) aims to use social media and improved data sharing as part of an enhanced strategy to fight organized crime in the United States and abroad.

The White House has launched the Strategy to Combat Transnational Organized Crime to step up its efforts to fight this type of crime by better integrating diverse work from various agencies that collect intelligence data and track and investigate these types of criminals.

The new plan is the result of a year-long study of the current state of these types of crimes, the most comprehensive of its kind in 15 years, according to a White House blog post.

The feds in general have been working across various agencies that are responsible for crime investigations and the protection of the general public--such as the FBI, Department of Homeland Security, and the Department of Defense--to better share information. Often agencies with different responsibilities for investigation don't communicate effectively with each other, a problem the federal government has been trying to remedy through the use of technology.

The same is the case with those investigating organized crime, and the new strategy aims to fix that by coordinating information sharing among various organizations and specialized intelligence centers that are responsible for handling these types of crimes.

This will involve the Cyber Crimes Center to coordinate the collection and analysis of intelligence regarding various aspects of the threat from transnational organized crime, according to the strategy, which is posted online.

The plan also includes the NSA coordinating with the interagency International Organized Crime Intelligence and Operations Center (IOC-2) to use existing resources and databases of the Organized Crime Drug Enforcement Task Force Fusion Center (OCDETF) and the Drug Enforcement Agency's Special Operations Division to share intelligence and produce leads for investigators and prosecutors working across the United States, according to the plan.

The IOC-2, formed in 2009, collects information from law-enforcement agencies and federal prosecutors to fight organized crime, while the OCDETF--set up 2006--serves as a central warehouse for drug and financial intelligence as well as provides cross-agency analysis and integration of that data.

Social networks also will play a role in helping the NSA track organized criminals. Through the federal Open Source Center, which provides intelligence information from around the world, the NSA will use social media, among other online outlets, to develop profiles of individuals, companies and institutions linked to transnational organized crime networks, according to the plan.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?