Entry
Reader's guide
Entries A-Z
Subject index
National Security
After the terrorist attacks of September 11, 2001, the U.S. government promoted the need to increase information-sharing across various networks, concluding that part of the failure to stop the terrorist attacks came from the inability of intelligence and law enforcement agencies to disseminate information across agencies. Social networking became part of the security strategy both as a matter of policy and out of human nature.
Social Media and National Security
Social media sites grew during this time, allowing individuals to come together for the exchange of ideas, concerns, and information about national security. But while social media sites allow individuals to build and maintain relationships, they also have the potential to affect government security; therefore, they are taken into consideration when security measures are implemented by governments. For example, in 2009, the U.S. military considered a near-total ban on social networking sites such as Twitter, eBay, and Facebook. The worry was that such sites can make it easy for hackers or foreign government-sponsored terrorists to gain access to military networks. In 2011, the Russian security service proposed a ban on Hotmail, Gmail, and Skype because of concerns that their uncontrolled use could pose a security threat to the nation.
Such sites also have caused challenges for government transparency as security threats emerge. As more government employees use Twitter and Facebook, security becomes a central concern. In 2010, the botnet virus compromised a number of government systems by gathering login credentials from social networking sites. The U.S. government was not only network compromised but government computers in Mexico, Egypt, Saudi Arabia, and Turkey were affected as well. An even higher-profile social network security lapse involved U.S. Army Pfc. Bradley Manning, who facilitated a damaging breach of U.S. national security by copying thousands of classified documents related to the war in Iraq and Afghanistan and transferring them to the Website WikiLeaks. As a site dedicated to publishing government secrets, WikiLeaks posted the documents from Bradley, in addition to several hundred thousand documents from U.S. State Department cables detailing interactions with foreign powers. Such network breaches and security lapses exploited by sites such as WikiLeaks outline the network flaws that pose a serious threat.
Social networks also have the ability to compromise national security through terrorism. While social networks among terrorists do form via traditional means, they can also flourish online, because the Internet offers anonymity, interactivity, and a resilient infrastructure. Regardless of what method terrorist networks use, the techniques for terrorist network analysis are similar and are a central security component. A popular technique involves node discovery. The nodes of a network are the hubs at which different members of the network are connected. Usually, ordinary members have one or two connections; nodes can have several; and the critical nodes, the hubs, have many more. A terrorist cell's increased presence on the Internet shows weakness, not strength, because it allows for nodes to surface. Another broader term for social network analysis is called data mining. Such analysis of social networks is still being developed.
Some argue that nations must adopt a comprehensive strategy for using social media to improve national security, using software and online tools that allow for connectedness and online communication, as such sites also offer the ability to bolster national security. For example, government agencies in several nations invest resources in social network analysis. Because social networking sites possess security risks through communication in a decentralized, leaderless, geographically dispersed group of users, such threats are most easily countered by finding opinion leaders and liaisons within the network and monitoring them. Governments also see the potential in harnessing the influence of social networks to better interact with citizens to anticipate and plan for emerging issues directly related to national security.
...
- History of Social Networking
- American Revolutionary War
- Ancient China
- Ancient Egypt
- Ancient Greece
- Ancient India
- Ancient Rome
- Civil War, U.S.
- Colonial America
- Earliest Civilizations
- History of Social Networks 1865–1899
- History of Social Networks 1900–1929
- History of Social Networks 1930–1940
- History of Social Networks 1941–1945
- History of Social Networks 1946–1959
- History of Social Networks 1960–1975
- History of Social Networks 1976–1999
- History of Social Networks 2000–Present
- Industrial Revolution
- Internet History and Networks
- Middle Ages
- Native Americans
- Renaissance
- World-Systems Networks
- Local U.S. Social Networks by State
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia (State)
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- Privacy and Rights in Social Networks
- Social Network Analysis and Issues
- Affiliation Networks
- Agent-Based Models
- Bipartite networks
- Blockmodeling
- Cohesion Networks
- Complexity
- Cooperation/Coordination
- Dating
- Egocentric Networks
- Embeddedness
- Exchange Networks
- Exponential Randon Graph Models (ERGM/p*)
- Graph Theory
- Homophily
- Longitudinal Networks
- Multiplexed Networks
- Network Analysis Software
- Network Evolution
- Network Indicators
- Network Simulations
- Network Theory
- Network Visualization
- Paths/Walks/Cycles
- Pornography Networks
- Power Law Networks
- Preferential Attachment
- Prominence
- Proximity/Space
- Q-Analysis
- Random Graph Models
- Reciprocity
- Self-Organizing Networks
- Semantic Networks
- Small World
- Social Capital
- Social Influence
- Social Support
- Stalking
- Structural Equivalence
- Structural Holes
- Structural Theory
- Tie Length
- Tie Strength
- Tie Utility
- Tipping Point
- Triads
- Trust and Networks
- Two-Mode Networks
- Word Networks
- Social Networking around the World
- Afghanistan
- Algeria
- Angola
- Argentina
- Armenia
- Australia
- Austria
- Azerbaijan
- Bangladesh
- Belarus
- Belgium
- Benin
- Bolivia
- Brazil
- Bulgaria
- Burkina Faso
- Burundi
- Côte d'Ivoire
- Cambodia
- Cameroon
- Canada
- Central African Republic
- Chad, Republic of
- Chile
- China
- Colombia
- Congo, Democratic Republic of the
- Costa Rica
- Croatia
- Cuba
- Czech Republic
- Denmark
- Dominican Republic
- Ecuador
- Egypt
- El Salvador
- Eritrea
- Estonia
- Ethiopia
- Finland
- France
- Georgia (Country)
- Germany
- Ghana
- Greece
- Guatemala
- Guinea
- Haiti
- Honduras
- Hungary
- India
- Indonesia
- Iran
- Iraq
- Ireland
- Israel
- Italy
- Japan
- Jordan
- Kazakhstan
- Kenya
- Kurdistan
- Kyrgyzstan
- Laos
- Latvia
- Libya
- Lithuania
- Malawi
- Malaysia
- Mali
- Mexico
- Morocco
- Mozambique
- Myanmar
- Nepal
- Netherlands
- New Zealand
- Nicaragua
- Niger
- Nigeria
- North Korea
- Norway
- Pakistan
- Papua New Guinea
- Paraguay
- Peru
- Philippines
- Poland
- Portugal
- Romania
- Russia
- Rwanda
- Saudi Arabia
- Senegal
- Serbia
- Sierra Leone
- Singapore
- Slovakia
- Somalia
- South Africa
- South Korea
- Spain
- Sri Lanka
- Sudan
- Sweden
- Switzerland
- Syria
- Tajikistan
- Tanzania
- Thailand
- Togo
- Tunisia
- Turkey
- Turkmenistan
- Uganda
- Ukraine
- United Arab Emirates
- United Kingdom
- United States
- Uzbekistan
- Venezuela
- Vietnam
- Yemen
- Zambia
- Zimbabwe
- Social Networking Communities
- Adults-Only Communities
- Artists Communities
- Blogs and Networks
- Books Communities
- Classmates
- College Students Communities
- CouchSurfing
- Deviant Communities
- Elitist Communities
- Games Communities
- Investing Communities
- Local Political Activism Communities
- Mothers Communities
- Movie and TV Series Communities
- Music Communities
- MySpace
- Newsgroups
- People with Disabilities Communities
- Religious Communities
- Scientific Communities
- Teen Communities
- Wikipedia
- Yahoo!
- YouTube and Video Exchange
- Social Networking Organizations
- AARP (American Association of Retired Persons)
- Alcoholics Anonymous (AA)
- American Civil Liberties Union (ACLU)
- Charity Organizations
- Conservative Organizations
- Government Networks
- Greenpeace
- International Network for Social Network Analysis (INSNA)
- Liberal Organizations
- National Association for the Advancement of Colored People (NAACP)
- Neighborhood Organizations
- Nongovernmental Organizations (NGOs)
- Unions
- United Nations
- United Service Organizations (USO)
- Social Science of Networking
- Alumni Networks
- Anthropological Networks
- Bibliometrics/Citation Networks
- Cancer Networks
- Children's Networks
- Cognitive Networks
- Communication Networks
- Conspiracy Theory and Gossip Networks
- Corporate Networking
- Diet Networks
- Diffusion/Contagion Networks
- Economic Networks
- Educational Networks
- Employment Networks
- Entrepreneurial Networks
- Environmental Activism
- Ethnicity and Networks
- Fan Networks
- Fraternities
- Game Theory and Networks
- Gangs
- Gender and Networks
- Health Networks
- Hobby Networks
- Human Rights Networks
- Infectious Disease Networks
- Innovation Networks
- Interdepartmental Networks
- International Networks
- Interorganizational/Interlocks
- Kinship Networks
- Knowledge Networks
- Leadership Networks
- Letter-Writing
- Military Networks
- Neighborhood Organizations
- Network Psychology
- Network Visualization
- Organizational Networks
- Policy Networks
- Religious Communities
- Scholar Networks
- Senior Networks
- Small Group Networks
- Sororities
- Sports Networks
- Telecommunication Networks
- Twelve-Step Programs
- Urban Networks
- War and Networks
- Women's Networks
- Technology and Social Networking
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches