|   Already Have an Account? - Sign In   |   Help
Homeland Security May Up Social Media Intelligence Gathering
(757 views) Uploaded 11/2/2011 2:52:43 AM by SimisMisis   (334 videos)

Info Comments (0)  

Video Information

COLORADO SPRINGS, Colo. -- The wave of uprisings across North Africa and the Middle East that have overturned three governments in the past year have prompted the U.S. government to begin developing guidelines for culling intelligence from social media networks, a top Homeland Security official said Monday.

Department of Homeland Security Undersecretary Caryn Wagner said the use of such technology in uprisings that started in December in Tunisia shocked some officials into attention and prompted questions of whether the U.S. needs to do a better job of monitoring domestic social networking activity.

"We're still trying to figure out how you use things like Twitter as a source," she said. "How do you establish trends and how do you then capture that in an intelligence product?"

Wagner said the department is establishing guidelines on gleaning information from sites such as Twitter and Facebook for law enforcement purposes. Wagner says those protocols are being developed under strict laws meant to prevent spying on U.S. citizens and protect privacy, including rules dictating the length of time the information can be stored and differences between domestic and international surveillance.

Wagner said the Homeland Security department, established after the 9/11 attacks, is not actively monitoring any social networks. But when the department receives information about a potential threat, contractors are then asked to look for certain references within "open source" information, which is available to anyone on the Internet.

The challenge, she said, is to develop guidelines for collecting and analyzing information so that it provides law enforcement officials with meaningful intelligence.

"I can post anything on Facebook, is that valid? If 20 people are tweeting the same thing, then maybe that is valid," she said. "There are just a lot of questions that we are sort of struggling with because it's a newly emerging (issue)."

Wagner was in Colorado Springs to deliver a speech at the National Symposium on Homeland Security and Defense, a conference that included defense contractors and the military.

Aside from discussing the use of technology in unrest that has led to regime changes in Tunisia, Egypt and Libya, she delivered a speech that addressed the way the department operates, saying that its crucial elements include a nationwide network of 72 fusion centers that gather and analyze reports of suspicious activity, a new National Terrorism Advisory System that replaces the color coded alert system with one that provides more information about a threat, and a "See Something, Say Something" campaign that encourages citizens to report suspicious activity.

She also said another key program involves training hundreds of thousands of law enforcement officers across the country in filling out suspicious activity reports.

Video Keywords: fema    twitter    planet    social    police    iran    priston    computer    mass    homeland    may    communications    libia    tunis    egipt    siria    technology    usa        infowars    news    media    facebook    security    alex    jones   

Rate This Video:  1 ratings


You must be signed in to use this feature.
Once you're signed in you'll be able to email videos to people, post comments, upload your own videos and much more.


Share this video on your site or blog. Just copy & paste one of the following:
Embeded Video Player (640x360):
Embeded Video Player (480x270):
Embeded Video Player (320x180):
Thumbnail Image Link:
Text Link:
Is there something wrong with this video or viewer comment? Please let us know:
Please describe the issue:
We would really appreciate you entering your email address so we can
response to you, but it is not required

Captcha Code:
Please enter the code displayed below

Viewer Comments (0 total)

Be the first to comment on this video.

You must be signed in to post comments.
Once you're signed in you'll be able to email videos to people, post comments, upload your own videos and much more.


Related Videos

The End of Privacy
Uploaded: 7/30/2011 4:42:47 AM
By SimisMisis
Aspartame is Made of GMO Bacteria Feces PART - 1
Uploaded: 2/2/2012 2:03:49 AM
By SimisMisis
Aspartame is Made of GMO Bacteria Feces PART - 2
Uploaded: 2/2/2012 2:04:41 AM
By SimisMisis
The Rockefellers, The FDA & The Cancer Industry
Uploaded: 12/3/2011 7:38:02 PM
By SimisMisis
Book 1984 - George Orwell (Elite Agenda for Furure).
Uploaded: 5/6/2011 12:45:24 AM
By SimisMisis
NaturalNeighborhood.com meets RAW MILK DEFENDER Sheriff Richard Mack
Uploaded: 1/18/2011 11:27:23 AM
By NaturalNeighbor
Depleted Uranium - America's Genocide (Oct 20, 2010) [2]
Uploaded: 5/22/2011 6:53:28 PM
By SimisMisis
Depleted Uranium - America's Genocide (Oct 20, 2010) [1]
Uploaded: 5/22/2011 7:03:34 PM
By SimisMisis
Uploaded: 7/8/2011 6:35:12 PM
By SimisMisis
Alex Jones: Vaccine Death Coverup Implodes Worldwide
Uploaded: 9/1/2010 2:38:19 PM
By ChineseHealthFitness
EndGame - Documentary film [Lithuanian language] Part - 2/2
Uploaded: 12/8/2011 3:45:06 AM
By SimisMisis
EndGame - Documentary film [Lithuanian language] Part -1/2
Uploaded: 11/24/2011 9:50:17 AM
By SimisMisis

Related NaturalNews Articles

Emerging technology is not the answer to the world's social and economic problems

Microsoft Robotics Studio Provides Common Ground for Robotics Innovation (press release)

Symantec to release security software that protects consumers during online transactions

Space-age technology finds its way into exotic, but practical consumer products

Ultrasound technology can regrow teeth, say Canadian scientists

Advertise with NaturalNews...

Support NaturalNews Sponsors:

Advertise with NaturalNews...

Copyright © 2013 TV.NaturalNews.com All Rights Reserved | About Us | Help | Feedback | Privacy Policy | Terms of Use | Featured Sponsors | Sponsorship Information

All content and video are property of their respective owners and have been displayed with their permission.
If you feel a video has been unlawfully uploaded, please report this abuse to us.