There is nothing social about using social networks to help slaughter innocents and disseminate murder porn. But that kind of activity is merely symptomatic of the fundamental challenge that social media poses to national security. The key to winning cyberwars has more to do with securing physical space than dominating cyber space.
Social networks are powerful. For starters, they can scale very quickly. The number of people that one person can reach can be pretty impressive. President Obama made news when he set the world record for the number of Twitter followers he attracted in one day. Yet he was humbled just days later when Caitlyn Jenner eclipsed the Tweeter-in-chief’s record in barely four hours. (Still, neither can match rock star Katy Perry, who has more than seventy million followers on Twitter.)
Of course, it doesn’t require a hit single to establish a formidable presence online. Social networkers with very little reach can also have outsized impact. Their contributions may go “viral,” picked up and retransmitted by others. In 2010, for example, a seat belt video by a local safety advocacy group in rural England garnered one million views on YouTube in less than two weeks. So far, it has been seen by over nineteen million people in more than 120 countries.
Most social networks conform to what is called the “power curve,” with a few contributors dominating the preponderance of activity on the network. This “high ground” of influence is called “broadcast mode.” Those who can get a dominant influencer to convey their message have a great competitive advantage when it comes to driving the conversation on the network.
There is also, however, a second high ground on social networks. That space is on the other far end of the curve called “conversation mode.” Something really interesting happens when networks scale down to very small groups. The level of participation among the members is more balanced. This allows for more high-quality conversations.
Terrorists have already figured out that the advantage is to work both ends of the curve. Thus, they are thrilled when an execution video goes viral and grabs the world’s attention.
On the other hand, extremists also like to lure individuals into small group conversation where they can attract new recruits or radicalize the other discussants. “Some of these conversations occur in publicly accessed social networking sites,” noted Michael B. Steinbach, the FBI’s Assistant Director for the Counterterrorism Division recently before one Congressional Committee, “but others take place via private messaging platforms.”
“As technology advances,” Steinbach added, “so, too, does terrorists’ use of technology to communicate.” And there is little doubt they are having success. Terrorist and extremist groups use the Internet and the social networks it carries to conduct all kinds of activities, from recruiting, fundraising and propaganda to intelligence gathering and mission planning. And this leads to dangerous actions. At least six Islamist terror plots have been thwarted already this year. That’s a noticeable uptick in frequency.
Ads by Adblade
Trending Offers and Articles
You Won't Believe Who Tops the List as the Most Generous Celebrity!
These Celebrities changed our lives forever, but left too soon.
17 Celeb Weight Gains You Have To See - You Won't Believe #4!
But skillful use of the Internet doesn’t make the terrorists ten feet tall. The Internet is neutral. It confers no inherent advantages to any state or nonstate group. Counterterrorist operations can go online and conduct the same activities on the same systems. Or, they can use the terrorists’ online presence against them by gathering intelligence about the group, disrupting their online activities, or just trolling them to annoy and distract.
But it’s important to recognize that the terrorist operating online is not the root of the problem. Fixating on terror talking would be like trying to lower a fever and ignoring the underlying infection.
What makes any network powerful is when the online community links to a physical community or a “human web” that has a propensity to act.
What if Katy Perry went online and tweeted that everyone should slaughter their pets and string them up on the streetlamps? A ludicrous hypothetical, yes. But equally ludicrous is the idea that, in such a scenario, Fluffy, FiFi and Fido would be in jeopardy. That’s because Ms. Perry’s social presence isn’t linked to a group with common cause in physical space.
On the other hand, when messaging connects with a physical group, like the terror team inspired by the Boston bombing to replicate the attack in Canada, bad stuff does start to happen.
The real “center of gravity,” that which turns terror talk into threat, is the physical network. Taking down the real-life terrorist community is the best way to diminish the danger posed by online actors.
結果 (
日本語) 1:
[コピー]コピーしました!
ソーシャル ネットワークを使用して虐殺罪および殺人ポルノの普及について社会は無い。活動の種類は基本の単なる症候性が国家安全保障にそのソーシャル メディアのポーズに挑戦します。Cyberwars の勝利の鍵は、サイバー スペースを支配よりも物理的なスペースの確保を行うことが増えました。ソーシャル ネットワークは、強力です。まず第一に、彼らは非常に迅速にスケールできます。数人に一人がリーチにかなり印象的にすることができます。大統領オバマは、彼は 1 日で集めて彼の Twitter のフォロワーの数の世界記録を設定するときニュースを作った。彼は謙虚だったまだわずか数日後ケイトリン ジェンナーがやっと 4 時間で、ツイーターの長のレコードを凌駕するとき。(まだ、どちらもすることができます一致ロック スター ケイティ ・ ペリー、ツイッターよりも 7000 万の信者を持っている)。もちろん、それはオンラインお客様にとって素晴らしいプレゼンスを確立する 1 つのヒットを必要としません。非常に小さな範囲で社会的なネット ワーカーは影響を特大もすることができます。彼らの貢献は、ピックアップし、他のユーザーによって再送信される「ウイルス」は、行くかもしれない。2010 では、たとえば、イングランド農村地域の地域の安全の擁護団体によってシートベルトのビデオは 2 週間足らずで YouTube で 100 万ビューを獲得しました。これまでのところ、それは 120 カ国以上の以上 1900 万の人々 に見られています。ほとんどのソーシャル ネットワークは、ネットワーク上のアクティビティの優位性を支配のいくつかの貢献者と「パワー曲線」と呼ばれるものに従います。この「高地」の影響は「ブロードキャスト モード」と呼ばれるネットワークの会話を走行するとき、彼らのメッセージを伝えるために支配的な影響力を得ることができる人は偉大な競争力のある利点があります。しかし、また、ある社会的なネットワーク上の第 2 高地。その空間は「会話モード」と呼ばれるカーブの端に、します。ネットワークは非常に小さなグループにスケール ダウン場合本当に面白いものです。メンバーの中で参加のレベルはよりバランスの取れた。これによりより高品質の会話。テロリストが既に考え出した曲線の両端を動作する利点があります。したがって、彼らは実行ビデオ ウイルス行く世界の注意をつかむとワクワクしています。その一方で、過激派は小グループ会話彼らが新しい新兵を集めることができますまたは他の参会を急進的に個人を誘導するも好きです。Michael B. シュタインバッハ、1 つの議会の委員会の前に最近テロ対策本部の FBI のアシスタント ディレクターを指摘した「公開のソーシャルネットワー キング サイトで発生するいくつかこれらの会話"「がプライベート メッセージング プラットフォームを介して場所を取る他.」“As technology advances,” Steinbach added, “so, too, does terrorists’ use of technology to communicate.” And there is little doubt they are having success. Terrorist and extremist groups use the Internet and the social networks it carries to conduct all kinds of activities, from recruiting, fundraising and propaganda to intelligence gathering and mission planning. And this leads to dangerous actions. At least six Islamist terror plots have been thwarted already this year. That’s a noticeable uptick in frequency.Ads by AdbladeTrending Offers and ArticlesYou Won't Believe Who Tops the List as the Most Generous Celebrity!These Celebrities changed our lives forever, but left too soon.17 Celeb Weight Gains You Have To See - You Won't Believe #4!But skillful use of the Internet doesn’t make the terrorists ten feet tall. The Internet is neutral. It confers no inherent advantages to any state or nonstate group. Counterterrorist operations can go online and conduct the same activities on the same systems. Or, they can use the terrorists’ online presence against them by gathering intelligence about the group, disrupting their online activities, or just trolling them to annoy and distract.But it’s important to recognize that the terrorist operating online is not the root of the problem. Fixating on terror talking would be like trying to lower a fever and ignoring the underlying infection.What makes any network powerful is when the online community links to a physical community or a “human web” that has a propensity to act.What if Katy Perry went online and tweeted that everyone should slaughter their pets and string them up on the streetlamps? A ludicrous hypothetical, yes. But equally ludicrous is the idea that, in such a scenario, Fluffy, FiFi and Fido would be in jeopardy. That’s because Ms. Perry’s social presence isn’t linked to a group with common cause in physical space.On the other hand, when messaging connects with a physical group, like the terror team inspired by the Boston bombing to replicate the attack in Canada, bad stuff does start to happen.The real “center of gravity,” that which turns terror talk into threat, is the physical network. Taking down the real-life terrorist community is the best way to diminish the danger posed by online actors.
翻訳されて、しばらくお待ちください..
