Top-Rated Free Essay
Preview

Security From Social Media

Good Essays
891 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security From Social Media
Security from Social Media
Shakion Melton
COMM/215 » Essentials of College Writing
March 23, 2015
Julie McCabe
Security from Social Media
Even though social media helps service members communicate with their families and stay in contact with current events, social media should be banned from all phases of the military because enemies of the military are using social media to target service members and service members themselves could unwittingly post sensitive information for everyone to see.
The Enemy is using Social Media against Us
Just this past Saturday, “a previously unknown group calling itself the Islamic State Hacking Organization posted the names, photos and addresses of about 100 U.S. troops online, calling for attacks against them” (Castillo, 2015). According to the online article, “the file appeared to include information that is already available through public records and social media accounts” (Castillo, 2015). It also “claimed to have hacked military databases and said it was leaking 100 names so that our brothers residing in America can deal with you” (Castillo, 2015). While public records are not something that can be changed directly, the use of social media by military service members can be eliminated; therefore eliminating another possible threat to our Soldiers, Marines, Airmen and Coast Guard that serve in this country and abroad.
Service Members Make Mistakes
As a service member myself, I have seen the errors from my comrades with regards to social media. Dates, times, the nature of mission, and other details could be posted on someone’s social media account like Facebook or Twitter, just to name a few, while communicating with family and friends. Although not a direct detailed listing of the event, the incident could easily be extrapolated from the simple post. Images can give potentially dangerous information as well. In one instance, a Soldier from the Army National Guard took a picture of herself in the Arms Room with all of the weapons in the background. Then posted it on her Facebook timeline stating that she was inventorying weapons in Brooklyn (New York) that weekend. This simple upload not only showed that the facility contained armament, but also narrowed down the location of the facility. An issue like this is benign in its intent, but those that wish to do this country harm could use a posting like that to plan unspeakable danger.
Social Media has its Advantages
Now more than ever, the military is using social media to its advantage. All branches of the military have their own Facebook page. According to the article Social Media and Military Families: A Perspective by Matthews-Juarez, Juarez, and Faulkner (2013),
“Admiral Mike Mullen, serving as chairman of the Joint Chiefs of Staff, was an avid Twitter user with more than 16,000 followers. In 2011, the website www.milpages.mil was designed for military personnel by military personnel. And like all civilians, social media provides the opportunity for service members to speak freely about their lives and interests.”
While the basic guidelines of the Uniform Code of Military Justice (UCMJ) states that “commenting, posting, or linking to material that violates the UCMJ or basic rules is prohibited” (Matthews-Juarez et al. 2013), service members make mistakes. It should also be noted that social media provides much needed communication with families and allows service members to stay current with world events. While this is a true statement, social media is not the only way. Service members can use the internet to read current events directly from news websites. Families can still use emails and encrypted chat rooms, which every branch in the military provides, to communicate. Social media is an open-sourced platform that, while easy to use, can also be easy to manipulate.
The most important reason social media should be banned from all phases of the military is because enemies of the military are using social media to target service members. Garside, Ponnusamy, Chan, and Pickering (2012) proposes “a realistic and feasible solution is to build a secure military social networking interface for the major social networking sites.” While this is very possible, the better solution would be to eliminate the ability to utilize social media from military networks and ban its use from service members altogether. Having no social media outlet for enemies of this country to use against service members, is better than attempting to find a secure common ground that must always be revisited as enemies become smarter and more proficient in breaking security protocols.
Conclusion
In conclusion, although social media helps service members communicate with their families and stay in contact with current events, social media should be banned from all phases of the military for two main reasons. First, service members themselves could unwittingly post sensitive information for everyone to see. But most importantly, enemies of the military are using social media to target service members.

References
Castillo, M. (2015). CNN Unknown Group Threatens Troops Online. Retrieved from http://www.cnn.com/2015/03/22/politics/online-threat-against-troops/index.html
Matthews-Juarez, P., Juarez, P. D., & Faulkner, R. T. (2013). Social Media and Military Families: A Perspective. Journal of Human Behavior in the Social Environment, 23(), 769-776. doi:10.1080/10911359.2013.795073
Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2012). Secure Military Social Networking and Rapid Sensemaking in Domain Specific Concept Systems: Research Issues and Future Solutions. Future Internet, 4(), 253-264. doi:10.3390/fi4010253

References: Castillo, M. (2015). CNN Unknown Group Threatens Troops Online. Retrieved from http://www.cnn.com/2015/03/22/politics/online-threat-against-troops/index.html Matthews-Juarez, P., Juarez, P. D., & Faulkner, R. T. (2013). Social Media and Military Families: A Perspective. Journal of Human Behavior in the Social Environment, 23(), 769-776. doi:10.1080/10911359.2013.795073 Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2012). Secure Military Social Networking and Rapid Sensemaking in Domain Specific Concept Systems: Research Issues and Future Solutions. Future Internet, 4(), 253-264. doi:10.3390/fi4010253

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Blogs of War

    • 429 Words
    • 2 Pages

    Blackfive, a former military blogger, say “Milblogging (another name for military blogging) is the result of an explosion of communications technology throughout the military and an increase in brainpower among the lower ranks(Page 95). Meaning when email and other such ways to communicate came about it became easier for soldiers to keep others updated on what was going on with them. And then someone was genius enough to think well if we can let our loved ones know instantly, why not give the public updates on what’s going on from our own eyes. So military blogs are blogs written by soldiers to keep the public updated on what’s going on in the war from their point of view without sugar coating or exaggerating anything!…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Inf 103

    • 441 Words
    • 2 Pages

    As stated in our text these are some of the most popular destinations on the net. We share photos and information all across the world. When my family was stationed in Japan and all of my family was in Georgia this is the way we kept in touch with each other. However, these same social networks can be detrimental to us. For example throughout the last few years I have seen people arrested for what they have posted on their Facebook page. I have seen families and marriages destroyed based on social media. We must be careful of the things we do and say they come back to haunt you. I also feel as though you don’t really have the privacy that you think you have. There is no way to be completely anonymous online.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    We all know what happened to Jill Meagher. What some of you may not know is that social media played an integral role in solving her murder. Without the use of social media, Jill Meagher’s case may have remained unsolved. Unfortunately, we usually associate social media with negative connotations; however what we haven’t thought of is the positive contributions it could make to our society. One change that we should make that would benefit us incredibly is to use social media, including Facebook, to assist in law enforcement.…

    • 1258 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Relational Dialecticic

    • 1195 Words
    • 5 Pages

    As US military deployments increase in the Middle East, it will definitely have a strong impact on military families presently and for future generations. This case study will enlighten the public on the challenges of being a military family. The role of a single parent is blurred because it is no longer a gender-specific role, the parent must assume both roles in parenting: feminine and masculine. (Saghlstein, Maquire & Timmerman, 2009). The family process becomes unbalanced where children have a two parent household parenting duties are equally shared versus a single parent household where a single parent has less time for parenting and assumes the role of caretaker and provider. The findings concluded three oppositions with military families and deployment: uncertainty-certainty, autonomy-connection, and openness-closeness. Researchers are aware that various oppositions may occur simultaneously during varied…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Good Essays

    “Today, with recent advances in Technology, people can maintain their social networks electronically; they don’t need face-to-face contacts (Schaefer, 2012,119).” For myself personally, social networking has been an important part of my life for this past year. My Husband is in the United States Coast Guard, so his job requires us to relocate to different stations mainly across the United States. Relocating is always a big adjustment, because not only are you in a new environment that you know almost nothing about, but you also have to leave your family and friends behind. “Whether through text-messaging, handheld devices, or social networking sites like Facebook, a significant amount of networking occurs online (Schaefer, 2012,119).” Without Social Networking sites like Facebook, it would make the relocating even harder, because having Facebook we are able to keep up with the lives of our family and friends-and vice versa-even though we are hundreds of miles away and rarely get to see them.…

    • 400 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Communication between military families is not excluded from this aspect. Depending on deployment location, deployed spouses can talk to their partner and children as many times a three times a week or as few as a four times a month. When deployed service men and women contact their families it is usually via some form of technology. A technological form of communication utilized by military families is email. Communicating via e-mail has become increasingly popular for separated military families because it is fast and each partner can get “up –to-date” on recent family information. If the solider doesn’t have access to email in their location they can stay in contact with their family through phone calls. Many military families utilize phone call for special event or if it is an emergency due to the expense of foreign or long distance phone calls (Military.com). Like letters and telegrams phone calls were found to be an insufficient form of communication between military families in a communication study. Many military wives commented about shying away from conflicting topics due to expense and short time period of phone calls. The communication study also showed the effect phone calls from deployed parents have on children. A direct correlation was found between what the researches classified as frequent quality calls from deployed parent and positive behavior in the children .…

    • 1513 Words
    • 7 Pages
    Good Essays
  • Best Essays

    Lynn, III, W. J. (2010, September/October). Defending a new domain: The Pentagon 's cyberstrategy. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    With the increasing threat of homegrown terrorism, there is tension in balancing privacy concerns of American citizens with the surveillance efforts of terrorists via social media. Finding the happy medium between civil liberties and national security has always been a challenge of our nation’s agenda but as with most multi-faceted conflicts, “something’s gotta give.” Unfortunately, there is no perfect world where both sides can be completely satisfied with all of their needs met. The ideal solution is to utilize effective intelligence strategies to target the people of interest, terrorists, without disrupting civil liberties of the citizens we are trying to protect. Using American civil liberties as a stepping stool to reach the true target of dismantling terrorist organizations is not the “American way.” Looking back at how far our technological capabilities have come in the past twenty years, I have no doubt that we will be able to fine tune our intelligence capabilities and hone in on the people of true interest without the collateral damage that is currently being created amongst citizens. I acknowledge the fact that our world has much evolved since the conception of our Constitution and many of the laws concerning data privacy today. However, issues plaguing our national security will never cease to exist. Terrorism is a very real and very dangerous threat to our society and as much as we would like to convince ourselves of our immense power and influence around the world, man is not powerful enough, smart enough, or equipped enough to eradicate the evil in the world. It is naive to think that sacrificing our civil liberties, even for a great cause, is enough to combat terrorism. It is no question whether having the surveillance capability will help fight terrorism; it will. But where is the line drawn? If we start sacrificing our civil liberties little by little,…

    • 1196 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The military culture has similar demands of that of families, which are an investment of time, energy, personal commitment to make thing happen for the unit, and personnel sacrifice for “the whole.” Both military and family cultures thrive on consistency and predictability. When military personnel return home, especially if wounded, they need to find a similar culture and system to help them transition and find a satisfying purpose. Often times, soldiers can place heavy demands of these cultural characteristics on their families, at times in an unhealthy way. Also, families have been functioning relationally and with life events during the soldiers' deployment that can also put heavy demands on the families as well as, make for some challenging…

    • 309 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Initially, when social media first came into play, it was for individuals to be able to communicate, create videos, and post pictures, in a positive way. It has become evident that a negative cloud has come over social media. Terrorists has been able to recruit, they can vocalize their frustrations (whether there is a legitimate cause or not), the purpose of their propaganda, and they are also able to fundraise and train. Now people are able to build bombs by watching videos using social…

    • 1232 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In the military, there exists a multitude of data and information that is passed on a daily basis. From supply and logistics information, medical and dental information, and tactical and technical information, the information needed to operate and maintain a small piece of the military is exponential. Without clear and structured guidelines on how that information is collected and used, our military would be faced with an inordinate amount of data, but with no real method of using the information. The information must also be stored within systems that provide access to relevant information, and at the same time ensure that the contents of those systems are able to withstand any and all attempts to circumnavigate the security measures within the system.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One of the most influential and recent advances in technology has been social media. It has allowed for family members, significant others that are deployed to war, and high school peers to be able stay in contact. Despite the positive…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Internet is the perfect stalking device due to our lack of privacy. Today, we have over 100 social networking sites, and 56% of the world’s population has admitted to using at least one amongst the many. In a seven-year Carnegie Mellon University study of Facebook shows that when changes implemented by Facebook, such as modifications to its user interface and default settings, led to a significant increase in the public sharing of various types of personal information. With the personal information of more than half of the world’s population readily available online, it is undeniable that stalkers view the Internet as their resource haven. Not only is one’s privacy breached online, but safety is also in the danger zone for some extreme cases. There are known examples of stalkers communicating with their victims in online social sites or chat rooms, luring them out and then kidnap or murder them. A Christopher Dannevig of Australia has pleaded guilty to murdering 18-year old TAFE student Nona Belomesoff after using Facebook to exploit the student’s love for animals and letting her believe he could give her work with animal rescue group WIRES. Such exploitation of personal information and easy access to individuals not only reveals our lack of privacy, but the element of danger is there as well.…

    • 892 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy VS Safety

    • 1176 Words
    • 4 Pages

    As technology advances and the border between privacy and public knowledge becomes more and more blurred. Each day it becomes easier and easier to track someone’s information, their past, their likes, their closest friends, and even those that are not so liked or close to them. The question that surges becomes clearer each day “Is safety as important as privacy?” As time passes, national security is now a front line topic that we face on a daily basis both in the real and virtual world. Criminals as well as government agencies use the power of the internet to both attack each other’s data and safe keeping their data.…

    • 1176 Words
    • 4 Pages
    Powerful Essays