DHS list of words you should never ever blog or Tweet. Ever.

DHS instruction book lists key words agents should search in quest for terrorists, or DHS critics

By  

Lonely? Yearning to use your IT skills for something more significant than ERP, CRM and YAWN? Something like national information security, cyberspies and counterterrorism? Something that might lead to a position with free government housing, a clothing allotment and residence in the Jimmy Buffet latitudes, in a place no Jimmy Buffet is ever played?

Ever wanted to shadow some of our nation's finest counterterrorist and cybercrime-response operatives as they work an actual case, giving you a close-up view of the floor on which the collar takes place, a special tour of federal paddy wagons, military tribunals and the famous government residential facilities located well into the Jimmy Buffet latitudes, but in an island of sobriety in which no Jimmy Buffet is ever played?

Have I got the information-security resource for you – a list of hundreds of words and phrases the Dept. of Homeland Security uses to scan social networks and media sites in a never ending quest for new customers to fill rooms at the Guantanamo Hilton.

The list is the product of an information request from the Electronic Privacy Information Center (EPIC), which asked DHS to provide documents describing the methods and criteria it uses to monitor potentially troublesome content on public networks.

The document, DHS' 2011 "Analyst's Desktop Binder" instructs data-sifters at the DHS National Operations Center on how identify news stories, Tweets, comments and other online content that "media reports that reflect adversely on DHS and response activities" or seem vaguely threatening enough to set off alarm bells even in the naturally overreactive environment of a secret police force with tremendous power and little accountability.

According to a Forbes story that seems to qualify as a media report reflecting adversely on DHS or response activites," the DHS Twitter account is (or was) @dhsnocmmc1 , DHS seems to use TweetDeck to monitor some keywords, use a Mac Mini as a server and leave their passwords in plain text in a Word document rather than encrypted in a steganographic file, or even password-protected in a password vault.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question