DocumentCode
3712705
Title
Exploiting military OpSec through open-source vulnerabilities
Author
Judson C. Dressler;Christopher Bronk;Daniel S. Wallach
Author_Institution
Department of Computer Science, Rice University, United States of America
fYear
2015
Firstpage
450
Lastpage
458
Abstract
With the ease of use and connectivity provided by social media, there has become a growing tension between military users´ personal needs and military operational security. Like everyone, military members post seemingly trivial information and pictures on sites such as Facebook, Twitter, or LinkedIn; all of which can be used, augmented, and aggregated by an adversary to determine the utility and feasibility of possible intelligence targets. In this work, we investigate the current state of DoD policy regarding social media. We then designed an automated approach to determine the amount of openly available information provided by U.S. military members through social media; analyzed it through content analysis; then applied machine learning techniques to learn as much from the provided data as possible. We then ranked the vulnerability of each individual found by the data provided with a simple scoring system; classifying them as least vulnerable, vulnerable, highly vulnerable. In all, we discovered 1100+ potential intelligence targets; hypothesized about potential scenarios in which this publicly available information could have negative consequences; and recommend actions that could mitigate this vulnerability.
Keywords
"Media","Facebook","LinkedIn","Security","Sociology","Statistics","US Department of Defense"
Publisher
ieee
Conference_Titel
Military Communications Conference, MILCOM 2015 - 2015 IEEE
Type
conf
DOI
10.1109/MILCOM.2015.7357484
Filename
7357484
Link To Document