A Look at Raytheon’s RIOT Application
The Rapid Information Overlay Technology or RIOT software application by Raytheon has generated privacy concerns and paranoia. What can this application do, and what can’t it do?
Raytheon’s RIOT software can pull together information about a user from multiple social media platforms to create a composite view of a user’s activities, patterns, associations and beliefs. When does this person typically log onto the computer? Are they accessing social media from work? Are they sharing politically incorrect ideas with people, and how connected are they to radical groups? Unlike Facebook’s data mining into the lives and associations of its members, RIOT draws on every social media platform – Twitter,
…show more content…
What happens if the FBI uses RIOT and decides that a defense contractor is associated with politically incorrect groups and revokes their clearance, but the un-PC account actually belongs to someone else?
The threat this application poses is multiplied by the number of high end hackers that already compromise information security and steal information from large companies who hire “cyber warriors” to protect their systems. Do you except a government that accidentally posts hundreds of thousands of Social Security Numbers on a website and calls the internet security breach a minor incident to protect RIOT software from hackers? The RIOT application is invaluable to those who want to develop intelligence dossiers on individuals, be it Chinese building up patterns of targets in the U.S. or private investigators in high-priced divorce cases. Internet security is then doubly threatened when RIOT is stolen and made available to the dark side of the web.
RIOT cannot at this time mine the deep web, sites like Tor, Silk Road and others. Truly revolutionary folks will move their political discussions to this deep web, while people posting non-PC jokes and sarcastic comments could be investigated by the government. Then there is the risk of hackers and jokers hacking someone’s account and sending text messages and instant messages
When we think of the internet and technology we usually think of all the benefits and innovations that make up our generation. We have all the information we need right on our phones. We can also be connected with anyone or with everyone at anytime of the day, but is being connected with everyone a good thing? “The Loneliness Of The Interconnected” by Charles Seife explores this idea and shines a light on the negative effects that being connected with everyone might have. Seife’s exploration of online extremism challenge Schmidt and Cohen’s optimistic portrayal of technology by analyzing how having a voice in the ocean of the internet and being connected with everyone isn’t always positive.
Terrorists are actively targeting American youth through social media to solicit empathy and recruits. The Counter-terrorism proposal targets those same young Americans. The proposed campaign recommends the use of black propaganda in the social media sphere to make terrorist organizations seem distasteful, unappealing and boring.
Social media is a popular network in today’s society and according to Internet World Stats (2017), “3.773 billion is the total number of global internet users.” Social Media can easily be used for criminal purposes and Drew Hendricks (2014) explains that, “78 percent of burglars admit that they use social media to seek out their victims.” Social Media has become of significant use for professionals working in the Criminal Justice System, since they can use social media to track down criminals or use it as evidence to build a case (Hendricks, 2014). Social media has also been used significantly for people living in secluded societies to voice their opinions on global situations (Steinberg, 2012). Social media should have a place in the Criminal
Although problems with the inappropriate use of social networks are not new, in recent years, it has been observed by many authorities how the internet allows any actor to perform information operations with amazing ease and effectiveness. Indeed, several countries and individuals are using online multichannel platforms and social networks like Instagram, Snapchat Facebook, Twitter or YouTube, the mentioned sites allows any actor to collect an enormous amount of information on their potential adversaries and influence public opinion through propaganda and counter-propaganda activities. The armed forces of several countries, including the United States want to take action on the issue, this has caused a domino effect that not only touches us
Social media is commonly used worldwide as a tool for learning and communication. However, the benefits are compromised by the inability to contain the contents shared and the misbehaviour of its users. Social media intervenes with the strict regulations of gun distribution, is used as a method of propaganda by terrorist organizations and is a platform that eases the execution of hate crimes in the form of cyberbullying. The aspect of efficiency and anonymity on social media makes it the largest contributor in violating laws across national borders, leading to more chaos and tragedy than convenience.
With the internet being part of our everyday lives, threats can exist in all fronts. Almost everyone and every business is connected to the Internet. Whether it be offers sent via email or just paying a bill online. Localities have also taken to the web, with city agencies allowing its citizens to have access to a multitude of services online. From registering your car to renewing a drivers license, to filing your taxes online, the government has placed our personal information into databases that can be accessed by both the agencies we entrust and the individuals that have entrusted them. Automation and computer systems have touched every industry the consumer relies on, including our utilities. Besides convenient access to information,
Every month we see in the news a new story on how terrorists are using social media platforms to recruit and radicalize our youth, in fact we see this same type of story so often it leads us to wonder whether or not this is just over exaggeration, or is there truly a horrifying ring of truth to them. We cannot help but wonder if the same programs we use almost religiously every day are in fact being used as a tool for terrorists. A number of newspapers and news organization have looked into this and concluded three main things. First, terrorists have infiltrated our perceived safeguards on social media, second terrorists have shown that they try to recruit people through the use of social media, and lastly, that terrorists have made themselves
Therefore, an analysis of the terror organizations use of social media platforms to recruit future members will enhance the Intelligence Community (IC) in formulating effective methods to curb the recruitment of American nationals into terror cells.
In 2011, the JTRIG carried out a denial-of-service attack on the Anonymous activist group. Its latter category, propaganda efforts, aptly named ‘Online Covert Action’, involved using social media platforms in order to carry out “mass messaging” and the “pushing of stories.”
In my opinion this article is well written and explained the pro is all the information given, that could be used to protect one’s organization, and the con is that even though the information is given to the public, as the author stated, it is not for everyone, only large organizations with big global networks, for which threat intelligence gateways might benefit them for relatively inexpensive cost.
The 2011 uprising in Egypt was in many ways a traditional brick-and-mortar revolution, but with a cyber-twist to it: based on their statistical analysis of a large body of tweets related to the 2011 uprising in Egypt, Starbird and Palen (2012) observed that activists used Twitter as an important tool to share ideas and information with like-minded people, because Twitter allows a high number of activists interact using its retweet and other mechanisms. In this case, Twitter was used among participants and supporters of a traditional mass movement to bypass government controlled
The digital age provides individuals with numerous ways of innovative opportunities like recording data in an effective manner, electronic banking, online shopping, by violating privacy. Despite what might be expected, the national and global security framework needs components to check programmers and outsider interceptors, who can access delicate data and information, placed in various divisions of the financial framework. These outsider interceptors can then break-in remotely to harm or get access to passwords and usernames.
In today 's of fast-paced world social media, activists often find themselves bogged down in absurd discussions or meaningless online debates. All in all, these trends are not healthy, nor are they productive. The current crop of online platforms - Facebook, Twitter, etc. - are not conducive for popular education or movement building. These corporate entities have one goal: to maximize their profits.
The notion that everyone can contribute and collaborate may seem odd because anyone, even those with mal intent, may have access to the data. However, although that is a concern, such open sharing allows for a larger degree of transparency (Basluto, 2015). With transparency, a larger amount of trust can be given to the information collected during the crowdsourcing. This allows a higher degree of agility, or reacting to threats, and saving time for information security companies (Hui, 2015).
Social media is used to connect people throughout the whole world. While There is love and support aplenty online, these same platforms are also used to target innocent people based on things such as religion. A 15 year old girl posted a photograph of herself online, and without her consent, it was posted on a website. Because she was wearing a hijab on, she received hateful comments. She is an innocent child subjected to a world of hate for no reason other than she is Muslim (Awan, Imran and Zempi, Irene 2016). As if it weren’t terrible enough people are being targeted online, the public goes after Muslims in the street, too. In Ukrainian, Mohammed Saleem was murdered by a neo-Nazi, Pavlo Lapshyn. Pavlo Lapshyn killed another human being and tried to bomb a few mosques, attempting to start a new “race war”. (Vikram Dodd 2013). Sadly, Pavlo isn’t the only case where people are targeted for being Muslim. Muslim humans are attacked online and offline because they are wrongly afflicted with terrorists.