Social Network Analysis

Posted: January 13, 2011 in Analysis, Facebook, MySpace, National Security, p2p network, social networking, Twitter

U should Fear The Government Instead Of Hackers

I think this post will interest the people who thought that they are save be’cos they have passwords to login into their Social Networking Sites. Well U are dead wrong. Hackers are the least u should worry about. Those u need to fear are the United States Government. To me They have control over Everything that goes on on the internet. There is no privacy with Computers now a days so stop worrying about computer hackers breaking into ur accounts rather worry about the damed fucking government. leave the Hackers alone be’cos one day u will need their help. Belife me when i say one day. Be’cos that day is almost near.
Guss u’have been watching those tech movies, u see wht the governments do in this movies. Well this movies are not just made they are messages and i think we should all try to listen other than criticize Hackers be’cos when that day comes u will be rashing to learn how to hack to be able to protect ur self. When we come to security hackers have the tight security be’cos they beak them so they make sure that theirs is unbreakable.


Social Network Analysis

One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database[38], and others. These social network “maps” are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[43][44] The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents . These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people … In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
—Jason Ethier[41]

AT&T developed a programming language called “Hancock” which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database and extract “communities of interest” — groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop “marketing leads”[47], but the FBI has regularly requested such information from phone companies such as AT&T without a warrant,[47] and after using the data stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.[48]

Some people believe that the use of social networking sites is a form of “participatory surveillance”, where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments.[39] About 20% of employers have reported using social networking sites to collect personal data on prospective or current employees.[49]

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s