Social media could render covert policing 'impossible'
- 25 August, 2011 16:26
Facebook has proven to be one of the biggest dangers in keeping undercover police officers safe due to applications such as facial recognition and photo tagging, according to a adjunct professor at ANU and Charles Sturt University.
Mick Keelty, a former Australian Federal Police (AFP) commissioner, told the audience at Security 2011 in Sydney that because of the convergence of a number of technologies including biometrics, undercover policing may be "impossible" in the future.
He explained that were safety risks associated with undercover policing if people could be identified online.
“You can’t just immerse an officer into a crime group; it takes up to seven years to get them into the right place [in the gang] where they can feed back the intelligence that you need," Keelty said.
"Than there is the cost of doing that such as when the AFP targets motorcycle gangs or when governments across the world have entered into agreements to place critical witnesses in prosecution matters in different parts of the world to hide them.”
Keelty is currently undertaking research into the policy implications of social networking for covert operations by police and security agencies.
He shared findings from a social networking survey conducted with the NSW Police, the AFP and other security agencies from December 2010 to February 2011.
"We surveyed them to try and measure the extent of exposure they already had in having their photos uploaded to the internet," he said.
"The results found that 90 per cent of female officers were using social media compared with 81 per cent of males."
The most popular site was Facebook, followed by Twitter. Forty seven per cent of those surveyed used social networking sites daily while another 24 per cent used them weekly. All respondents aged 26 years or younger had uploaded photos of themselves onto the internet.
“The thinking we had with this result means that the 16-year-olds of today who might become officers in the future have already been exposed.
"It’s too late [for them to take it down] because once it’s uploaded, it’s there forever.”
Of the people surveyed, 85 per cent had their photos uploaded on to the internet by another person.
Keelty said that until recently this has been a real problem because Facebook refused to remove photographs, but because of competition from Google+ it had started to remove photos at people’s request.
Alarmingly, 42 percent of respondents said it would be possible to identify their relationship with other people, including family and friends.
"If you have someone in the service who is trying to remain anonymous for whatever reason, it is still possible through other relationships to find them," Keelty said.
The results of the survey would be used to inform future policy guidelines within both state and federal police agencies.
Got a security tip-off? Contact Hamish Barwick at hamish_barwick at idg.com.au
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- In Control at Layer 2: A Tectonic Shift in Network Security
- Agentless Security for Virtual Environments
- Unlock the value of virtualisation with the IBM SmartCloud Foundation
- Financial Security with Webroot and Virginia Community Bank
- Webroot slashes Royal Flying Doctor Service anti-virus scan time from 2 hours to 2 minutes
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Leading Through Connections – Insights from the Global Chief Executive Officer Study
IBM’s 2012 Global CEO study follows face-to-face discussions with more than 1,700 CEOs and senior public sector leaders from around the globe. The findings examine how CEOs are responding to the complexity of increasingly interconnected organisations, markets, societies and governments. For example, almost one-quarter of CEOs say their organisations operate below par in terms of driving value from data. CEOs have expressed frustration about their inability to capitalise on available information. This is because: “The time available to capture, interpret and act on information is getting shorter and shorter.” CEO, Chemicals and Petroleum, United States Given the need for deeper business insight, the best performing organisations are more adept at converting complex data into insights, and insights into action. Download Entire Report Now.
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.