Social Media Exploitation by Covert Networks: A Case Study of ISIS

Social media has quickly become a dominant mode of professional and personal communication. Unfortunately, groups who intend to perform illegal and/or harmful activities (such as gangs, criminal groups, and terrorist groups) also use it. These covert networks use social media to foster membership, c...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Everton, Sean F. (Autor)
Otros Autores: Schroeder, Robert ; Freeman, Lee
Tipo de documento: Electrónico Libro
Lenguaje:Inglés
Publicado: 2017
En:Año: 2017
Acceso en línea: Volltext (kostenfrei)
Verificar disponibilidad: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866324241
003 DE-627
005 20250115054912.0
007 cr uuu---uuuuu
008 231019s2017 xx |||||o 00| ||eng c
035 |a (DE-627)1866324241 
035 |a (DE-599)KXP1866324241 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Everton, Sean F.  |e VerfasserIn  |4 aut 
109 |a Everton, Sean F.  |a Everton, Sean 
245 1 0 |a Social Media Exploitation by Covert Networks: A Case Study of ISIS 
264 1 |c 2017 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Social media has quickly become a dominant mode of professional and personal communication. Unfortunately, groups who intend to perform illegal and/or harmful activities (such as gangs, criminal groups, and terrorist groups) also use it. These covert networks use social media to foster membership, communicate among followers and non-followers, and obtain ideological and financial support. This exploitation of social media has serious political, cultural, and societal repercussions that go beyond stolen identities, hacked systems, or loss of productivity. There are literal life-and-death consequences of the actions of the groups behind these covert networks. However, through tracking and analyzing social media content, government agencies (in particular those in the intelligence community) can mitigate this threat by uncovering these covert networks, their communication, and their plans. This paper introduces common social media analysis techniques and the current approaches of analyzing covert networks. A case study of the Syrian conflict, with particular attention on ISIS, highlights this exploitation and the process of using social media analysis for intelligence gathering. The results of the case study show that covert networks are resilient and continually adapt their social media use and presence to stay ahead of the intelligence community 
700 1 |a Schroeder, Robert  |e VerfasserIn  |4 aut 
700 1 |a Freeman, Lee  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/301377049.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4392969975 
LOK |0 003 DE-627 
LOK |0 004 1866324241 
LOK |0 005 20231019043656 
LOK |0 008 231019||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE17860860 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw